Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brian calling -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (490)
  • Article (106)
  • News (71)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 67 Next »

14%
Keeping container updates under control
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by nikko osaka on Unsplash
. For this to work, the architecture of a setup must be designed to be implicitly redundant from the start. Central tools such as databases must be clustered so that the failure of a container does not cause
14%
The achievements of and plans for systemd
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lennart Poettering CC-BY-SA-3.0
causes bigger problems. LM: Originally, systemd was intended as a replacement for the SysVinit system. In the meantime, however, it manages all kinds of resources, including its own out-of-memory (OOM
14%
Create secure simple containers with the systemd tools Nspawnd and Portabled
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Ian Taylor on Unsplash
The debate surrounding systemd, originally launched with the simple goal of replacing the ancient SysVinit scripts in most Linux distributions with a contemporary solution, has caused even venerable
14%
Zero Trust as a security strategy
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Jack Dong on Unsplash
to use these and other technical measures of dubious benefit. As if things weren't bad enough, some managers are not afraid to cite data protection blatantly as the cause of the malaise. In the given
14%
Endpoint Security for Windows 10
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Galina Peshkova, 123RF.com
policies that can configure the Windows Store. Windows Update for Business The monthly patch day still causes excitement among many administrators, as does the question as to whether everything
14%
Portable home directory with state-of-the-art security
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © SOMYOT TECHAPUWAPAT , 123RF.com
is in trouble. The damage caused by industrial espionage and damage to the company's reputation can exceed the value of the hardware many times over. Manufacturers have long since recognized this vulnerability
14%
Spotlight on the Kubernetes package manager, Helm
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Nick Fewings on Unsplash
's performance limitations, some of which were inherent, caused recurring difficulties over the years. Many modern programming mantras and techniques, for example, are missing from PHP, partly because they had
14%
Defining measures
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Lars Kienle on Unsplash
operations include I/O functions such as stat, fstat, getdents, or fsync that don't really have a "payload," as do read or write functions. However, they all still affect performance because they can cause
14%
Monitoring network computers with the Icinga Nagios fork
17.06.2011
Home »  Archive  »  2010  »  Issue 1: System...  » 
 
: If the hosts are healthy, the admin is happy. Figure 2: Everything is working, but the nrp plugin is causing problems
14%
Overview of cloud platforms and appliances
15.06.2011
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
 
. Any administrator who has tried to modify the IP address of an Active Directory Domain Controller will be aware that this is not a trivial task. Even with the less invasive changes caused by the cloud

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 67 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice