Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm%2012%2000 Llorente%2012 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (203)
  • News (35)
  • Article (15)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 26 Next »

56%
Extended detection and response in networks, endpoint devices, and the cloud
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Kritiya, 123RF.com
2022
56%
Preparing for cyberattacks
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
2022
56%
Rocky Linux 9 (x86_64)
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Rocky Linux 9 (x86_64) ... 2022
56%
Automate macOS 12 with the Shortcuts app
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Kirsty Pargeter, 123RF.com
is not Apple's first attempt to automate macOS. The Automator app has been an integral part of the operating system since Mac OS X 10.4 (Tiger), which was released in 2005. In recent years, however, Apple has ... 2022
56%
The Great Stay Put
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
123rf_79654762_Shield_OleksandrOmelchenko_resized.png
well on paper, but two minutes in front of someone else's eyes yielded a disappointing, "Yeah, but what about X?" Too often my response was, "I hadn't thought of that. I guess I need to examine this more ... 2022
56%
Distributed Linear Algebra with Apache Mahout
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Peter Galbraith, Fotolia.com
) // Sparse vectors: val sparseVec1: Vector = (5 -> 1.0) :: (10 -> 2.0) :: Nil val sparseVec1 = svec((5 -> 1.0) :: (10 -> 2.0) :: Nil) // Dense matrices: val A = dense((1, 2, 3), (3, 4, 5)) // Sparse matrices ... 2022
56%
PowerDNS Authoritative server high availability with MariaDB Galera
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Sergey Nivens, 123RF.com
crunch away on installing MariaDB. The first step is to download and run the MariaDB repo setup script: wget https://downloads.mariadb.com/MariaDB/mariadb_repo_setup chmod +x mariadb_repo_setup sudo ... 2022
56%
A central access manager for SSH, Kubernetes, and others
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Andriy Popov, 123RF.com
, standardizing SSH authentication within a setup by issuing and revoking its own Secure Sockets Layer (SSL) certificate authority (CA) and X.509 certificates (instead of relying on simple SSH keys), and adding two ... 2022
56%
Azure AD with Conditional Access
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Jeffrey Dungen on Unsplash
because access tokens in the OAuth 2.0 standard are usually only valid for one hour, after which you need to obtain a new token, which involves an in-depth reappraisal of the access context. At the end ... 2022
56%
Measuring the performance health of system nodes
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Peter Hermes Furian, 123RF.com
be turned on and off according to what you want to check about the state of the node. Almost 20 years ago, when I worked for a Linux high-performance computing (HPC) company that no longer exists, we had ... 2022

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 26 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice