Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1167)
  • Article (116)
  • News (104)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 49 50 51 52 53 54 55 56 57 58 59 60 61 62 ... 140 Next »

36%
Explore automation-as-code with Ansible
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Kittipong Jirasukhanont, 123RF.com
hierarchically: scm: name:"Github" User: "user01" url: "https://www.github.com" The playbook then accesses variables like {{ scm.url }}, which means you can easily see the sub-section to which
36%
Kopano Groupware – an open source productivity suite
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Klementiev, fotolio.com
CPUs, 2GB of RAM, and 5GB of disk space. Depending on the number of active users, the RAM requirement can increase to 16GB. In Real Time Kopano relies on the software stack from Zarafa, which became
36%
CRI-O and Kubernetes Security
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Corina Rosu, 123rf.com
, push, and sign images. Skopeo Copy, remove, inspect, or sign images. Red Hat resources [5] [6] can help you understand fully how CRI-O is used within Kubernetes and Open
36%
Haskell framework for the web
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Photo by Aidas Ciziunas, Unsplash.com
malware threats. Quite a few reasons speak to the use of exotic frameworks such as the Haskell-based Yesod [4] [5]. It is not just that Yesod is less widespread, it is also that the security built
36%
The state of open source groupware
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Andrey Bayda, 123RF.com
://oxpedia.org Scalix: http://www.scalix.com Scalix 12.5: http://www.scalix.com/main/37-english/support/400-scalix-12-5-release-notes Tine 2.0: https://www.tine20.org Zarafa: http://www.zarafa.com Zarafa
36%
Enterprise resource planning and customer relationship management with open source
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © ximagination, fotolia.com
system, you might be better served with a combination of Apache OFBiz and Magnolia CMS instead of opentaps. ERP5 URL: http://erp5.com Strengths: Unique ERP workflow options Mature
36%
Kubernetes k3s lightweight distro
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image Photo by Josh Rakower on Unsplash
key-value store etcd [5] with a teeny, tiny SQLite3 database module to act as the storage component. For context, the not-so-new Android smartphone on which I am writing this article uses an SQLite
36%
Minifying container images with DockerSlim
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Maggie Molloy, 123RF.com
(minified by 25.99X) from python:2.7-alpine - 84.3MB => 23.1MB (minified by 3.65X) from python:2.7.15 - 916MB => 27.5MB (minified by 33.29X) from centos:7 - 647MB => 23MB (minified by 28.57X) from centos
36%
Proactive Monitoring
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Tom Wang, 123RF.com
(every 5 seconds): 14 (periodically-expire 5) 15 16 ; Email address used to send notifications: 17 (def email (mailer {:from "riemann@example.com"})) 18 19 ; Index: Definition 20 (let [index (index)] 21
36%
Discover the power of RouterBOARDS
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © andreysuslov, 123RF.com
multiple ARP replies posing as the target machine and convince the originator of the connection to create a connection with it instead of the correct computer. This deceit is known as ARP spoofing [5

« Previous 1 ... 49 50 51 52 53 54 55 56 57 58 59 60 61 62 ... 140 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice