Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (427)
  • Article (134)
  • Blog post (1)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 49 50 51 52 53 54 55 56 57 Next »

12%
Code IaC for provisioning of preconfigured virtual environments
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © vladnikon, 123RF.com
properties include the sku, which controls resource specifications such as capacity, VM series (e.g., Standard_D4s_v3), size, and tier (e.g., standard or premium). Other key properties are hibernate
12%
Microsoft Exchange replacement
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Gabriel Crismariu on Unsplash
$MailboxesTotal++ 32 33 [...] 34 35 $nTimeout = 0 36 while ((Get-MailboxExportRequest -Mailbox $Mailbox).Status -ne "Completed") { 37 Start-Sleep -s 2 38 $nTimeout += 2 39 if ($nTimeout % 60
12%
Open Source Security Information and Event Management system
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Yoichi Shimizu, 123RF.com
and lets you know of changes or foul play on the data link layer. P0f – An effective passive fingerprinting tool to identify OS and software on endpoints and to show how the machine is connected
12%
The limits and opportunities of artificial intelligence
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © sebastien decoret, 123RF.com
for 20 or 30 years are better. Every now and then, though, we probably need a new wave of hype and new terms like Industry 4.0 to whip progress forward. In the 1980s, by the way, we used to refer
12%
Dockerizing Legacy Applications
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © hanohiki, 123RF.com
--version Now that you have Docker installed, you'll also need Docker Compose, a tool for defining and running multi-container Docker applications [3]. If you have Docker Desktop installed, you won't need
12%
Sustainable Kubernetes with Project Kepler
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Hassan Pasha on Unsplash
Chromebox with Skylake architecture – gives the results shown in Figure 4, which is an approximately 12.5W power increase over a six-minute period, or 0.49g of CO2. This setup at least shows that you get more
12%
Private cloud with Microsoft Azure Stack
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © Mikko J. Pitkänen, Fotolia.com
virtualization is ultimately only a means to an end. In other words, infrastructure as a service (IaaS) should complete platform as a service (PaaS) and not serve as the primary solution. Microsoft does
12%
Three full-text desktop search engines
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Lucas Gallone on Unsplash
) documentation [8]. (Note that the most recent version of the tool is tracker3.) Table 1 Important Tracker Commands tracker daemon -s Start the daemon and its processes. tracker
12%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
system1 (IP address 172.16.190.158, marked with the red circle). Then, you can see how system2 (172.16.190.159) begins the SMB protocol version negotiation and how NT LAN Manager 1.0 and 1.2 are being
12%
Where does job output go?
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Charles Forerunner on Unsplash
variables; execute the application(s); and so on. When the job finishes or the time allowed is exceeded, the job stops and releases the resources. As resources change in the system (e.g., nodes become

« Previous 1 ... 49 50 51 52 53 54 55 56 57 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice