Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (460)
  • Article (53)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 40 41 42 43 44 45 46 47 48 49 50 51 52 Next »

9%
Intelligent Stack
07.12.2025
Home »  Articles  » 
Lead Image © antoinepham2903, 123RF.com
community implementations and openEuler-optimized alternatives. Intelligence BooM (Figure 1) draws together a collection of advanced tools and services to provide a complete solution for AI. Joining ... Lead Image © antoinepham2903, 123RF.com
9%
Manage Windows AD with PowerShell
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Kelly Sikkema on Unsplash
[1]. On domain controllers, when you promote the server you will be prompted as to whether you want to install the administration tools and PowerShell together with the domain controller role
9%
Manipulation detection with AFICK
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Christos Georghiou, 123RF.com
that start with afick and are immediately followed by the version number (e.g., afick_3.6.1-1_all.deb) are of importance. If you have an Ubuntu-based distribution, you should grab the package with the ubuntu
9%
Open source monitoring with Zabbix
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Vincentiu Solomon on Unsplash
caused by conditions that occur for a short time but do not represent a malfunction). For example, a simple trigger expression such as max(//icmpping,3m)=0 could be used to respond only if a host
9%
Secure cloud-native services with Prisma Cloud Compute
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © alexmillos, 123RF.com
. Soon you'll see how they slot together from the Console perspective. As an example, I have a simple Lambda function written in Python that will perform a DNS lookup of devsecops.cc (Listing 1
9%
Six storage drivers for Kubernetes
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © webreporter, photocase.com
installations and specify their areas of application. A complete overview of all currently available Kubernetes CSI drivers is available online [1]. CSI Drivers A CSI driver that dynamically creates storage
9%
Open Virtual Desktop 3.0 as an alternative to VDI
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Oksana Bratanova, 123RF.com
SQL Listing 1 ovd.repo 01 [ovd-3.0.3] 02 name=Ulteo OVD 3.0.3 03 baseurl=http://archive.ulteo.com/ovd/3.0.3/rhel/6.0/ 04 enabled=1 05 gpgcheck=1 06 gpgkey=http://archive.ulteo.com ... Open Virtual Desktop 3.0 as an alternative to VDI
9%
Building a low-powered NAS
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © vesuv, photocase.com
in the location area (e.g., smb://192.168.0.11 ). You'll be prompted for an admin username and password before you can access the folders, unless of course, you marked them as public when adding them. After
9%
Automating system configuration with Ansible AWX
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Rungaroon taweeapiradeemunkohg, 123RF.com
dockerhub_version, you can also specify a specific AWX version, like dockerhub_version=1.0.1. A web server that delivers the AWX user interface runs in the Docker container. This web server listens on port
9%
Take your pick from a variety of AWS databases
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Claudia Paulussen, Fotolia.com
(Figure 1). Like DB parameter groups, individual product features can be defined in DB option groups (e.g., transparent data encryption) and applied to DB instances

« Previous 1 ... 40 41 42 43 44 45 46 47 48 49 50 51 52 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice