Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: "0mbén Llorente%2012 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1020)
  • Article (297)
  • News (199)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 152 Next »

62%
Tools for managing AWS cloud services
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by elnaz asadi on Unsplash
Management (IAM) support common open identity standards – for example, Security Assertion Markup Language (SAML) 2.0, OpenID Connect, and OAuth 2.0 – to facilitate identity federation. To secure your root user ... 2022
62%
Private 5G networks for industry and business
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Tyler Nix on Unsplash
that can be deployed on both 4G and 5G technology. A 5G campus network is designed to meet special requirements (e.g., to allow Industry 4.0 [1] applications to communicate). The market for 5G campus ... 2022
62%
Single sign-on like the big guys
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Sergey Nivens, 123RF.com
.4' 02 services: 03 keycloak: 04 container_name: keycloak 05 image: quay.io/keycloak/keycloak:17.0.1 06 ports: 07 - 8080:8080 08 environment: 09 - KEYCLOAK ... 2022
62%
Measuring the performance health of system nodes
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Peter Hermes Furian, 123RF.com
B time (s) Class C time (s) BT (4 cores) 11.95 66.5 272 CG (4 cores) 0.4 23.9 62.3 EP (6 cores) 1.4 5.46 21 ... 2022
62%
Management improvements, memory scaling, and EOL for FileStore
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Yannic Läderach on Unsplash
.2, which is set to 0.7 out of the box. On systems with this setting, Ceph-Mgr configures the OSDs to occupy 70 percent of a system's available RAM. Of course, the purpose of hyperconverged setups ... 2022
62%
The achievements of and plans for systemd
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lennart Poettering CC-BY-SA-3.0
you very much for the insightful interview. Infos Attribution-ShareAlike 3.0 Unported (CC BY-SA 3.0): https://creativecommons.org/licenses/by-sa/3.0/ ... 2022
62%
Goodbye virtual machines, hello container machines
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Erik Odiin on Unsplash
the number of desired container machines to be created. The names of the created container machines are a combination of the cluster name, the machines name, and the count index starting from 0. The image ... 2022
62%
Azure AD with Conditional Access
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Jeffrey Dungen on Unsplash
because access tokens in the OAuth 2.0 standard are usually only valid for one hour, after which you need to obtain a new token, which involves an in-depth reappraisal of the access context. At the end ... 2022
62%
Microsoft Exchange replacement
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Gabriel Crismariu on Unsplash
scripts for importing Exchange data by user and account. Since 2022, users benefit from the powerful PowerShell exchange2grommunio.ps1 script [10] that connects to the server and handles the migration ... 2022
62%
Employing DNS in network security
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Abbas Tehrani on Unsplash
servers have long been a worthwhile target for attacks, such as the Li0n worm, which exploited a vulnerability in BIND. Moreover, DNS servers of all kinds are often used as amplifiers in distributed denial ... 2022

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 152 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice