Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (414)
  • Article (121)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 54 Next »

21%
The basics of domain-driven design
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Christos Georghiou, 123RF.com
are sometimes questioned: Don't they lead to duplicate code and redundant data? In fact, duplication is not a major worry because each bounded context holds only the data relevant to its specific model (Figure 1 ... , and code.
21%
ZAP provides automated security tests in continuous integration pipelines
23.08.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Galina Peshkova, 123RF.com
involve interrogating the quality of code from developers or checking code for licensing issues. A continuous testing strategy can be onerous to set up but brings unparalleled value to your end product ... Despite the abundance of tools that test code and help improve the effectiveness of a continuous integration pipeline, automated security testing is much more difficult to get right than it might
20%
Building better software on schedule with DevOps
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
© J. Allspaw and P. Hammond 2009
, and the company makes negative headlines in the press. Additionally, the new software release – code-named "Phoenix" – is already two years behind schedule. As if all of this were not enough, the Sarbanes
20%
A Container for HPC
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © orson, 123RF.com
of Singularity. First, I build Singularity from the latest version on GitHub (which for HPC requires MPI). The first step is to clone Git locally: $ git clone -b 1.x https://github.com ... Working with containers in high-performance computing can be difficult; a new container named Singularity comes to the rescue.
19%
Introducing the NoSQL MongoDB database
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Wesley Tingey on Unsplash
in this collection has different fields, depending on the type of vehicle (Listing 1). Listing 1 Collection of Vehicles 01 { 02 "type": "Car", 03 "brand: "BMW, 04 "model": "X5", 05 "year": 2021
16%
The PHP FastCGI process manager, PHP-FPM
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© conceptw, 123RF.com
/my/jail. To query the current pool health via a special URL, add the following line to the pool configuration (from Listing 1): pm.status_path = /status Among other things, http://www.example.com ... Apache web servers generally use the mod_php module to run PHP programs, but the official PHP package also contains a little-acclaimed alternative by the name of PHP-FPM, which uses the Fast
16%
Zero Day UEFI Exploit Affecting Lenovo, HP, and Gigabyte Laptops
06.07.2016
Home »  News  » 
 
A security researcher named Dmytro Oleksiuk has discovered a zero-day exploit for the low-level firmware found in some Lenovo laptops. Oleksiuk wrote on GitHub, “Vulnerability is present in all
15%
Client management in the domain using PowerShell
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Maurizio Ascione, Fotolia.com
takes the form of a unique Boolean type ($TRUE, $FALSE): if (test-Connection -ComputerName -ComputerName Item.IP){..}else{exit 1}" Establishing Trust If your company uses a directory service, you also
15%
DoubleAgent: Unpatchable Windows Vulnerability Discovered
28.03.2017
Home »  News  » 
 
Researchers at Cybellum, an Israeli zero-day prevention firm, have discovered a vulnerability in Windows that allows attackers to take complete control of the system. Named Double
15%
Sys Admin On the Go
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Laurent Davoust, 123RF.com
gateways: http://www.mutube.com/projects/open-email-to-sms/gateway-list/ ConnectBot: http://code.google.com/p/connectbot/ pssh – SSH2 for Palm OS 5: http://www.sealiesoftware.com/pssh/ TuSSH – SSH1

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 54 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice