Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 怎么用身份证号查宾馆入住信息-(⏭查询网站gpio17.com⏮)-查信息可以查到开宾馆吗-怎么查宾馆入住人员信息-去宾馆查别人住房信息-(⏭查询网站gpio17.com⏮)-怎么查宾馆入住人信息9v ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (537)
  • Article (51)
  • News (8)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 52 53 54 55 56 57 58 59 60 Next »

76%
High-performance backup strategies
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Kian Hwi Lim, 123RF.com
at times when this was previously not possible. In companies for which IT must be available 24/7, this can have an extremely positive effect. Infos Veeam: https://www.veeam.com
76%
Hyper-V with the SMB 3 protocol
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Vladimir Kramin, 123RF.com
immediately started improving SMB after taking it over from IBM. Microsoft added some improvements in version 2.0 of Windows Vista and version 2.1 of Windows 7 and Windows Server 2008. As of version 2
76%
Kubernetes for small and medium-sized enterprises
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © zelfit, 123RF.com
, and if the vendor then decides that the collection of packages included in, say, CentOS 7 is not enough and that the extra packages for Enterprise Linux (EPEL) directory are also required, it's the administrator who
76%
Automated compliance testing with InSpec
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Gunnar Pippel, 123RF
sources of knowledge, you can pick up various "benchmarks" from the Center for Internet Security (CIS). Using Ubuntu 4.16 [7] as an example, the experts establish rules that harden the system. Contrary
76%
NAS with Btrfs-based Rockstor
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by Lane Smith on Unsplash
with Rockstor. Based on Btrfs Rockstor is based on the CentOS 7 Linux distribution with a more recent kernel version provided by the ElRepo project. Thus, compared with CentOS, Rockstor supports some additional
76%
Improved Performance with Parallel I/O
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Ying Feng Johansson, 123RF.com
and read it on another. Moreover, a number of languages have HDF5 APIs, including C, C++, Fortran, Python, Perl, Julia, Go, Matlab, R, Scilab, Octave, and Lua, to name a few. Parallel HDF5 [7] uses MPI
76%
Arm yourself against cloud attacks
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © sandra zuerlein, Fotolia.com
in an Amazon document [6], and OpenStack provides a manual [7], as well. The Trouble with IDSs Some admins might be used to working with intrusion detection systems (IDSs) in their conventional setups
76%
Network load balancing on Windows Server
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Nathan Cima on Unsplash
a virtual network needs to be balanced. You will find this setup in Azure Load Balancer components. Microsoft also provides the Azure Application Gateway for Layer 7, as well as regional load balancing
76%
Production-ready mini-Kubernetes installations
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Goran Bogicevic, Fotolia.com
, assume in this example that the all-rounder Flannel will be handling SDN, with Ceph shouldering the SDS load. Ceph can be rolled out as a service in Kubernetes by Rook [7], which automatically gives you
76%
Anonymization and pseudonymization of data
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Debby Ledet on Unsplash
such as PostgreSQL [5], MongoDB [6], and Cassandra [7]. For example, you can use PostgreSQL extensions such as pgcrypto to encrypt data directly in the database [8]. MongoDB offers integrated encryption functions

« Previous 1 ... 52 53 54 55 56 57 58 59 60 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice