Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (377)
  • Article (111)
  • News (16)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 43 44 45 46 47 48 49 50 51 Next »

23%
Managing mailing lists with Mlmmj
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© suze, Photocase.com
is mainly web-based, protected by the same password for all moderators, and mailing lists of the same name will not be supported until version 3.0 is released. After evaluating several systems, Mlmmj
23%
Red Hat Ansible Automation Platform
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Dmitry Sunagatov, Fotolia.com
features only found their way into the software in AAP 2.0. Table 1 Ansible Automation Platform Objective To create, execute, and manage automation processes Manufacturer
23%
Security data analytics and visualization with R
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Rancz Andrei, 123RF.com
among the integrated development environment (IDE) options available for R, I use RStudio [8]. I downloaded RStudio 0.98.1083 Debian 6+/Ubuntu 10.04+ (32-bit) and ran: sudo dpkg -i rstudio-0.98.1083-i386
23%
Kubernetes Auto Analyzer
05.10.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
. Referring to the benchmarks, the website says: “With our global community of cybersecurity experts, we’ve developed CIS Benchmarks: 100+ configuration guidelines for various technology groups to safeguard
23%
Enterprise resource planning and customer relationship management with open source
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © ximagination, fotolia.com
-commerce or MRP inventory planning) at a price of US$  0.25 per instance and hour. An opentaps full AMI with a full installation at a price of US$ 0.50 per instance and hour. Unfortunately, the AMIs could
23%
Sustainable Kubernetes with Project Kepler
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Hassan Pasha on Unsplash
. For this, I created a text file of 50,000 random numbers between 1 and 100 and a suitably inefficient bubble sort program packaged into a container designed to sort the text file and then politely exit when
23%
Processing streaming events with Apache Kafka
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Photo by Mark Decile on Unsplash
developed by the career platform LinkedIn to process massive volumes of data in real time. Today, Kafka is used by more than 80 percent of the Fortune 100 companies, according to the project's own information
23%
Open Source Security Information and Event Management system
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Yoichi Shimizu, 123RF.com
and lets you know of changes or foul play on the data link layer. P0f – An effective passive fingerprinting tool to identify OS and software on endpoints and to show how the machine is connected
23%
Supporting WebRTC in the enterprise
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © pat138241, 123RF.com
Capture Task Force and is a part of HTML5. WebRTC 1.0 (aka RTCPeerConnection) is the API used to control the browser's WebRTC peer-to-peer connections. This is what a JavaScript app uses to initiate
23%
Computational storage that supports storage operations
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © sdecoret, 123RF.com
-IOV) implementation with a total of 15 different virtualization functions. Hardware support for various security functions in line with the Trusted Computing Group (TCG) Opal 2.0 specification is also part

« Previous 1 ... 43 44 45 46 47 48 49 50 51 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice