Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (484)
  • Article (114)
  • Blog post (1)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 45 46 47 48 49 50 51 52 53 54 55 56 57 58 ... 60 Next »

16%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
authentication on the basis of text messages. Zyxel [6], the Taiwanese network equipment manufacturer, has a two-factor authentication solution in its portfolio. It provides VPN access to the company's own Zy
16%
Red Hat Storage Server 2.1
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © avian, 123RF.com
the modules and their Gluster-integration on the OpenStack website http://6. Thanks to all these features, Gluster acts as a storage jack-of-all-trades for OpenStack with direct access to the major components
16%
Securing email communication with GnuPG
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Amol Tyagi on Unsplash_Key.jpg
in which security and data integrity are paramount, especially when it comes to information with EU-RESTRICTED and NATO-RESTRICTED information [6]. Provisioning Keys in the WKD A Web Key Directory (WKD
16%
Test JavaScript programs with Karma
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image Photo by Pierre Bamin on Unsplash
frameworks as DIY plugins. On the same principle, Karma plugins support continuous integration with Jenkins [5], Travis [6], or Semaphore [7]. After launching, Karma first loads all the plugins and parses its
16%
Exploring the AlmaLinux Build System
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © stylephotographs, 123RF.com
and assigning tasks to the build nodes. Another important component of the build system is Pulp [6], which provides artifact storage for newly-built packages and other products of the build process. According
16%
Flexible software routing with open source FRR
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Sahand Babali on Unsplash
password t0ps3cr3t 06 neighbor 192.0.2.1 peer-group LAB 07 ... 08 address-family ipv4 unicast network 192.168.1.1/32 09 exit-address-family 10 #FRR2 11 router bgp 65541 12 neighbor LAB peer
16%
Benchmarks Don’t Have to Be Evil
12.03.2015
Home »  HPC  »  Articles  » 
). Benchmark results are usually expressed in terms of how much (wall clock) time it takes to run and in GFLOPS (10^9 floating point operations per second) or MFLOPS (10^6 floating point operations per second
16%
Using benchmarks to your advantage
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Tom De Spiegelaere, 123RF.com
). Benchmark results are usually expressed in terms of how much (wall clock) time it takes to run and in GFLOPS (10^9 floating point operations per second) or MFLOPS (10^6 floating point operations per second
16%
The limits and opportunities of artificial intelligence
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © sebastien decoret, 123RF.com
Despite, or perhaps because of, research successes in artificial intelligence (AI), powerful AI seems to be further away today than it was 10 years ago. Will AI ever step toward automated super
16%
A GitOps continuous delivery tool for Kubernetes
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Tingey Injury Law Firm on Unsplash
-password If your private repository uses SSH keys for authentication, you can provide the SSH private key in the Secret instead of a username and password (Listing 6). The url field specifies the SSH URL

« Previous 1 ... 45 46 47 48 49 50 51 52 53 54 55 56 57 58 ... 60 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice