Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (463)
  • Article (151)
  • News (34)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 53 54 55 56 57 58 59 60 61 62 63 64 65 66 Next »

17%
Guarding against social engineering attacks
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Benjamin Sow on Unsplash
, the current version was 5.3, so you might see options or menus different from those I discuss here if you work on a different version. BackBox Linux includes the familiar and slick Xfce desktop manager [3
17%
Arm yourself against cloud attacks
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © sandra zuerlein, Fotolia.com
the context of the organization" [2] may be familiar to many people from their own business experience. SOC2 C5 [3] from the German Federal Office for Information Security (BSI) also demonstrates fundamental
17%
Swagger and OpenAPI Specification for documents
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © smeagorl, 123RF.com
) for client programs on request. Division of Responsibilities What initially sounds complicated proves to be remarkably simple in practice [3]. First, the developer describes the feature set of their REST API
17%
Let the hardware do the heavy lifting
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by Victor Freitas on Unsplash
. Accessed September 22, 2016: https://lwn.net/Articles/665602 Inline TLS performance: https://www.chelsio.com/wp-content/uploads/resources/t6-100g-inline-linux.pdf Kernel documentation: https
17%
Ceph object store innovations
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Max, fotolia.com
, that version was not available at the time of this review, the work on the DSPs was largely completed. Recently, the Jewel version of CephFS was announced to be stable – "with caveats" [3]. New Functions
17%
Getting a free TLS certificate from Let's Encrypt
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Stuart Miles, 123RF.com
information [2]. You can use Let's Encrypt for any website regardless of the web server. For my home-grown sites, I use one ESXI VMware server and deploy pre-installed virtual machines using TurnKey Linux [3
17%
Managing Linux Filesystems
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Ulrich Krellner, 123RF.com
of filesystems from which to choose, and the ext2/3/4 series is likely known by everyone. If you work with a current distribution, you have probably met other filesystems, too (Table 1). Table 1
17%
Build storage pools with GlusterFS
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © jala, Fotolia.com
pool or storage domain for some time. Qemu can access the disk directly without having to detour via a FUSE mount, thanks to integration of the libgfapi library in GlusterFS version 3.4 [6]. Performance
17%
How vector databases work and when they're used
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © neyro2008, 123rf.com
={"city": "New York"}), PointStruct(id=5, vector=[0.24, 0.18, 0.22, 0.44], payload={"city": "Beijing"}), PointStruct(id=6, vector=[0.35, 0.08, 0.11, 0.44], payload={"city": "Mumbai"}),], ) The database
17%
Flexible backup for large-scale environments
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by Nils Bouillard on Unsplash
so, for a combination of open source software with extension modules and commercial support. Starting Point The backup software originally used was IBM's Tivoli Storage Manager [3]. However, a review

« Previous 1 ... 53 54 55 56 57 58 59 60 61 62 63 64 65 66 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice