Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25252522Rub%252525C3%252525A9n Llorente%2012 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (279)
  • Article (50)
  • News (35)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 37 Next »

59%
Monitoring in the Google Cloud Platform
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Maksym Chornii, 123rf.com
Installing the Ops Agent :> agents_to_install.csv && echo '"projects/playground-gs/zones/europe-west3-c/instances/test-vm1","[{""type"":""ops-agent""}]"' > agents_to_install.csv && curl -sSO https://dl ... 2022
59%
Terraform multicloud orchestrator version 1.0
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Annie Spratt on Unsplash
software-as-a-service (SaaS) offerings is missing from the classic Terraform, as is extended logging for auditing purposes. The practical GUI for various tasks in Terraform Enterprise is more or less ... 2022
59%
Ubuntu Server 22.04 LTS (Install)
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
, and Loki. Other features include: Compatibility with all major architectures OpenSSL 3.0 Linux 5.15 kernel SmartNIC support in Netplan ... 2022
59%
Foundries.io IoT development platform
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Juan Rumimpunu on Unsplash
in this example) is basically a small computer with a system-on-a-chip board that requires an operating system. Foundries.io offers the Factory development environment to help manufacturers achieve results quickly ... 2022
59%
Puppet Bolt orchestration tool
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by lee junda on Unsplash
/bash -c "$(curl -fsSL https://raw.githubusercontent.com/Homebrew/install/HEAD/install.sh)" Use the tap brew command to instruct Homebrew to use additional repositories. By default, the tap command assumes ... 2022
59%
Employing DNS in network security
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Abbas Tehrani on Unsplash
, a multicloud rollout, or software-as-a-service (SaaS) and software-defined (SD)-WAN implementations. According to a Ponemon study sponsored by IBM [1], it still takes more than 280 days on average for a security ... 2022
59%
Tracking down problems with Jaeger
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Sebastian Molina fotografÌa on Unsplash
on one side and queries for existing data piling in from the query component on the other. Jaeger query, by the way, is the application that uses Jaeger's own user interface (UI; Figure 3) when it queries ... 2022
59%
Certificate management with FreeIPA and Dogtag
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Oscar Sutton on Unsplash
._tcp.mykier.ip,ipa.mykier.ip,389 A Berkeley Internet Name Domain (BIND) 9 DNS server needs the same entries, but in a different format: _kerberos._udp.mykier.ip. 86400 IN SRV 0 100 88 ipa.mykier.ip. [...] The important ... 2022
59%
Detect anomalies in metrics data
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © rudall30, 123RF.com
] of the mean), the 95th percentile (+/-2SD), and the 99.7th percentile (+/-3SD). Red Hat with Groundwork Now the question arises as to what you need to do to generate appropriate alerts from your metrics data ... 2022
59%
Extended detection and response in networks, endpoint devices, and the cloud
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Kritiya, 123RF.com
common wordage: response. Currently, the two most popular frameworks for IT security – National Institute of Standards and Technology (NIST) Cybersecurity Framework (CSF) and MITRE D3FEND – address central ... 2022

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 37 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice