Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 凭手机号怎么查身份证号-(⏭查询网站gpio17.com⏮)-身份证号查新办手机号怎么办-公安局身份证号查手机号码-查手机身份证号按什么后果-(⏭查询网站gpio17.com⏮)-查身份证有几个手机gw ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (976)
  • Article (71)
  • News (8)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 54 55 56 57 58 59 60 61 62 63 64 65 66 67 ... 106 Next »

80%
Six storage drivers for Kubernetes
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © webreporter, photocase.com
for many years, Red Hat has largely withdrawn from the GlusterFS project and is set to discontinue support for GlusterFS at the end of 2024. TopoLVM Much like Hostpath, TopoLVM [7] is another single
80%
Secure status and event monitoring of tier 0 systems
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Brian Jackson, 123RF.com
SCOM, setting up tier-specific distributed monitoring is somewhat more complex and requires you to create at least three management groups (MGs) [7] (Connected MG, Tier 1, and Tier 0), each
80%
Sync identities with Microsoft Identity Manager
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © alphaspirit, 123RF.com
, you can press the Script button to create a VBScript, which – when wrapped in a batch file and handed over to the scheduling service – ensures that regular synchronization runs [7]. This is quite
80%
Endpoint Security for Windows 10
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Galina Peshkova, 123RF.com
in the directory service. Defender Exploit Guard Defender Exploit Guard (WDEG) [7] is provided by Microsoft starting with Windows version 1709. WDEG provides a set of host intrusion prevention features
80%
Creating and evaluating kernel crash dumps
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Giuseppe Ramos, 123RF.com
success. Meanwhile, an approach that can be used reliably in production environments comes in the form of kexec and kdump [4]-[7]. A core issue and the biggest challenge in writing kernel dumps is: Who
80%
Intelligent observability with AI and Coroot
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Gustavo Xavier on Unsplash
with the OpenTelemetry standard [7] as the basis for its analyses. This approach primarily means two types of data: logfiles and traces. This data can be linked to existing applications in two ways: either
80%
Using Univention Corporate Server 2.4 for virtual infrastructure management
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Martin B, Pixelio.de
directly in the wizard or later in the advanced settings (Figure 4). Currently, depending on your computer architecture (i386 or AMD64), the following predefined profiles exist: Windows XP, Windows 7
80%
Get Started with Parallel CPython
07.11.2011
Home »  HPC  »  Articles  » 
understanding of parallel computing [1]. I used the Ubuntu 9.10 x86_64 desktop distribution along with Python 2.7 to test the code in this article and to generate the screen shots. Breaking GIL and Extracting
80%
Save and Restore Linux Processes with CRIU
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Valentin Volkov, 123RF.com
distributions satisfy this condition, but popular Linux distributions on servers, Debian 7, and CentOS 6.5 do not. The use of CRIU on these systems thus would require a kernel upgrade. The running kernel must
80%
Exploring dhcpy6d, a DHCP server for IPv6 networks
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Paul Herbert, 123RF.com
]. You can download the source code from GitHub or obtain it from the project's home page [7]. Dhcpy6d intentionally violates the requirements of RFC 3315. Other tools, such as the ISC DHCP daemon, now

« Previous 1 ... 54 55 56 57 58 59 60 61 62 63 64 65 66 67 ... 106 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice