Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (67)
  • Article (9)
  • News (8)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 Next »

56%
Code IaC for provisioning of preconfigured virtual environments
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © vladnikon, 123RF.com
is an excellent Bicep-based reference and starting point that helps you get up and running quickly [3]. Table 1 BICEP Resource Definitions Resources Versioned w/@yyyy-mm-dd-state Common
55%
Update on Containers in HPC
08.07.2024
Home »  HPC  »  Articles  » 
Shifter Apptainer (formerly Singularity) Sarus Podman Docker Enroot/enroot Kubernetes CRI-O, containerd , Kata NVIDIA/enroot , Pyxis Containers/runc Fuzzball K3s
55%
Manage Windows images with the Windows ADK
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Maksym Yemelyanov, 123RF.com
be found online [3], although it is targeted at system administrators who are familiar with Windows development. Performance data acquisition is split into two parts: Windows Performance Recorder
55%
Six storage drivers for Kubernetes
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © webreporter, photocase.com
-node setups. Both MicroK8s and K3s use Hostpath in the basic installation. Hostpath can do little more than create and delete file-based PVs. Also, the driver cannot control or limit the memory quota. Nothing
55%
News for Admins
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
 
percent of the vulnerable versions have safer alternatives available. 3.6 percent of dependencies are still vulnerable because they were updated to another insecure version. Reliance on end
55%
Replication between SQL Server and Azure SQL
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Charles Gibson, 123RF.com
. The differences are described in the dialog (Figure 3). Figure 3: Choosing the publication type for replication between local databases and Azure SQL
55%
Zulip, Mattermost, and Rocket.Chat
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © rll, fotolia.com
Zulip [1], Mattermost [2], and Rocket.Chat [3] and discover how well these platforms integrate with other applications. Functions and Features A number of questions should be considered when looking
55%
Developments in storage management
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by DESIGNECOLOGIST on Unsplash
. The ability to connect to the cloud and manage it with Amazon Simple Storage Service (S3) as the de facto standard for object storage is now an option for storage systems virtually everywhere. In addition
55%
Post-Quantum Cryptography with TutaCrypt
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © pitinan, 123RF.com
now. With that need in mind, the email vendor Tuta [3] just rolled out a new version of their Tuta Mail product (Figure 1) that features quantum-resistant encryption, becoming one of the first
55%
Sovereign Cloud Stack – a genuine alternative for Europe
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © solerf, 123RF.com
in a business-friendly manner and Max Schrems [3] having to remind the European Court of Justice (CJEU) of the applicable law. Here, too, the remedy is a lengthy process because an entire ecosystem is built

« Previous 1 2 3 4 5 6 7 8 9 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice