Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (870)
  • Article (89)
  • News (8)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 50 51 52 53 54 55 56 57 58 59 60 61 62 63 ... 98 Next »

36%
Installing applications in OpenStack with Murano
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © stylephotographs, 123RF.com
are pretty simple for Ubuntu (or Fedora 21) and are well documented [6]. Using the latest software version proved invaluable in the lab tests performed by the magazine's staff (Listing 1). Ideally, users
36%
Ansible as an alternative to the Puppet configuration tool
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Jenzig, photocase.com
an orchestration solution that is useful for customers who operate virtual machines in cloud environments. In the Ansible manual [6], administrators will find a script for practically any cloud environment
36%
Hands-on test of Windows Subsystem for Linux
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image Craig Whitehead on Unsplash
of a bit of extra work, you will find another blog post on this topic online [6]. To sum up, you need to install an X server such as vcxrc or Xming, add the export DISPLAY=:0.0 entry to .bashrc, and use
36%
Automation with System Center 2012 R2 Orchestrator
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © skaisbon, photocase.com
with SCO. You can connect to the Orchestrator Web Console [6] by calling the SCO web server URL. In addition to starting and stopping existing Runbooks, you can see an overview of the current Runbooks
36%
Exploring OpenStack's Trove DBaaS
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Brian Kenney, 123RF.com
are created so the application can use MySQL. Several ready Ansible roles are available on the web that allow you to install and configure the package [5] [6]. To get a working database, you need to create
36%
Preparing to move to the cloud
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © mikdam, 123RF.com
Protection (GDPR) [6], which comes into force in May 2018, states that if credit card information is involved, then Payment Card Industry Data Security Standard (PCI DSS) [7] immediately takes effect
36%
Desktops and applications with Essentials
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © krisckam, 123RF.com
Disk (VHD) file to the resource group from a storage account. It doesn't really matter which method you choose. If you don't want to do all this manually, you can use prefabricated Azure templates [6
36%
Exploring the AlmaLinux Build System
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © stylephotographs, 123RF.com
and assigning tasks to the build nodes. Another important component of the build system is Pulp [6], which provides artifact storage for newly-built packages and other products of the build process. According
36%
The state of open source groupware
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Andrey Bayda, 123RF.com
-Xchange The OX example proves that investments can bear fruit: United Internet Ventures invested EUR15 million in Open-Xchange [6]. The company has constantly expanded the range of products around the OX app suite
36%
Throw Down the Gauntlet
14.08.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
© bluebay, 123RF.com
, the command in Listing 6 uses -F for fast mode, -P for “protocol ping” (or port status test), and -S to attempt to spoof the IP address, so the targeted machine doesn’t know where the probe is coming from

« Previous 1 ... 50 51 52 53 54 55 56 57 58 59 60 61 62 63 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice