Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 怎么用身份证号查宾馆入住信息-(⏭查询网站gpio17.com⏮)-查信息可以查到开宾馆吗-怎么查宾馆入住人员信息-去宾馆查别人住房信息-(⏭查询网站gpio17.com⏮)-怎么查宾馆入住人信息9v ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (537)
  • Article (51)
  • News (8)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 45 46 47 48 49 50 51 52 53 54 55 56 57 58 ... 60 Next »

78%
The practical benefits of network namespaces
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Morganimation, fotolia.com
@8.8.8.8 suse.com still does not produce a result (Figure 2). Figure 3 shows many network devices in the operating system at hand, although with only a single loopback in the ns1 namespace. You can
78%
Exploring Ubuntu cloud tools
28.06.2011
Home »  CloudAge  »  Articles  » 
 
. Figure 6: Once installed, the web UI tells you how to run your VM. Make a note of the command, then click Close to continue. To see what images are available, click the Images tab (Figure 7
78%
Managing access credentials
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Marcel Goldbach, photocase.com
://sourceforge.net/projects/mypasswords7/ Loxodo: https://github.com/sommer/loxodo pass: https://www.passwordstore.org Buttercup: https://buttercup.pw Download Buttercup: https://github.com
78%
Code IaC for provisioning of preconfigured virtual environments
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © vladnikon, 123RF.com
.DevCenter/projects" -ResourceName "project-65" $resourceId = $resource.ResourceId New-AzRoleAssignment -ObjectId (Get-AzADUser -UserPrincipalName "aduser@domain.com").Id -RoleDefinitionName "DevCenter Project Admin" -Scope
78%
Collaborative online office solutions
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Photo by Truong Trung Cap Kinh Té Du Lich Thành Pho Ho Chí Minh CET on Unsplash
users can edit a document simultaneously, and all users can track changes. To share a document, the author first presses the Share button (Figure 7) top right in the browser window. This opens a small
78%
Managing Linux Memory
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © J.R. Bale, 123RF.com
in many environments. Another approach, which also requires intervention with the code and system administration, relies on huge pages, which the Linux kernel has in principle supported since 2003 [7
78%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
therefore requires these attack surfaces to be monitored and evaluated 24/7. Similarly, analysts at Forrester Research in 2022 described ASM as "the process of continuously discovering, identifying
78%
Pulumi multicloud orchestrator
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Dmitriy Shpilko, 123RF.com
At this point, Pulumi is almost ready for use – almost. Now you need to deal with a service that seems a bit strange at first glance: the Pulumi service app.pulumi.com, a centrally operated directory for Pulumi
78%
Key-value stores: an alternative to relational databases
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © islander11, 123RF.com
a few basic rules, the RocksDB developers significantly tuned their product for data store applications. RocksDB was inspired by Google's LevelDB [7], a key-value store capable of running exclusively
78%
Migrating to Azure Monitor Agent
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Generator, you need at least Azure PowerShell 5.1 or higher; as usual, Microsoft recommends the latest version, which is version 7. You also need to allocate read access to the workspace and the Azure Az

« Previous 1 ... 45 46 47 48 49 50 51 52 53 54 55 56 57 58 ... 60 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice