Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1024)
  • Article (299)
  • News (156)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 149 Next »

10%
Exploring SQL Server on Linux
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © yewkeo, 123RF.com
_64 3/4 19 Verifying : bzip2-1.0.6-13.el7.x86_64 4/4 20 21 Installed: 22 mssql-server.x86_64 0:14.0.3026.27-2 23 24 Dependency
10%
Kubernetes clusters within AWS EKS
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Zlatko Guzmic, 123RF.com
), and the Controller Manager (which keeps an eye on misbehaving worker nodes). For more information about these components, along with a graphical representation, visit the official website [6]. In addition to hosting
10%
Nmon: All-Purpose Admin Tool
17.12.2014
Home »  HPC  »  Articles  » 
distros even have nmon in their Yum repositories. I’m using CentOS 6.6, and nmon isn’t available from the standard Yum repos, so I downloaded the binary from the website. Nmon Examples One of the best
10%
Understanding the Status of Your Filesystem
18.06.2014
Home »  HPC  »  Articles  » 
 = os.open(fileloc, os.O_RDONLY)         junk = os.fstat(FILE)         size = junk[6]         atime = junk[7]         mtime = junk[8]         ctime = junk[9]         uid = junk[4]         gid = junk[5]         print "   File: %s size: %s atime
10%
Datadog Report Examines DevSecOps Best Practices
09.05.2024
Home »  News  » 
 
image is, the fewer vulnerabilities it is likely to have. According to the report, container images smaller than 100 MB had 4.4 high or critical vulnerabilities, versus 42.2 for images between 250 and 500
10%
Getting started with the OpenStack cloud computing framework
28.06.2011
Home »  CloudAge  »  Articles  » 
 
) layer for the cloud, virtualizing the various hardware components and making them available through a standard API. The first OpenStack release (dubbed "Austin") became available October 22 [3]; The Open
10%
SC24 – Bursting at the Seams
07.01.2025
Home »  HPC  »  Articles  » 
SC24 took place in Atlanta, GA, November 17-22. As I'm writing this, 17,959 attendees – that’s 3,000+ more than last year – registered. More than 500 companies filled the exhibition floor, which
10%
PowerDNS Authoritative server high availability with MariaDB Galera
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Sergey Nivens, 123RF.com
) NOT NULL, 06 master VARCHAR(128) DEFAULT NULL, 07 last_check INT DEFAULT NULL, 08 type VARCHAR(6) NOT NULL, 09 notified_serial INT UNSIGNED DEFAULT
10%
Better compression of web pages
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
if TLS connections (SSL) are used. Fortunately, the free Let's Encrypt [6] certification service makes light work of configuring SSL on the web server [7]. Install the Let's Encrypt client on Debian
10%
The OpenResty distribution for Nginx
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Kirill Kurashov, 123RF.com
with the popular Linux distributions; in other words, you need to build it from the source code. To do this, you also need to install some packages and libraries: Perl 5.6.1 or later, libreadline, libpcre

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 149 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice