Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (590)
  • Article (186)
  • News (70)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 56 57 58 59 60 61 62 63 64 65 66 67 68 69 ... 85 Next »

48%
mpi4py – high-performance distributed Python
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © liu liming, 123RF.com
, is a parallel implementation of Conway's Game of Life [14] that I got from Kevin Moore's GitHub site [15]. Again, I won't show the lengthy code here. Because it's old Python 2.x style, I had to fix the print
48%
Pulumi multicloud orchestrator
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Dmitriy Shpilko, 123RF.com
is that there are so many of them, and the subject of orchestration in the cloud is no exception. AWS has a dedicated service named CloudFormation for this task. Microsoft Azure and Google Cloud services can also
48%
Secure authentication with FIDO2
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © lassedesignen, 123RF.com
as the authenticator, which can be an internal device, the TPM in your computer, or an external device, such as a USB security token like a YubiKey. Android has had FIDO2 certification since February 2019. Therefore
48%
Self-signed certificates with Jenkins
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Art Lasovsky on Unsplash
plugin. Although I haven't used Jenkins much in the past, the quandary I faced and, most importantly, resolved could affect novice and advanced users alike. The problem was that once I had figured out how
48%
Flexible software routing with open source FRR
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Sahand Babali on Unsplash
hardware routers or to recreate specific behaviors. Network administrators who wanted to test their implementations for vulnerabilities had to build elaborate hardware environments or write their own routing
48%
Manage cluster state with Ceph dashboard
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © damedeeso,123rf.com
into the depths of the command line and the ceph tool. Because Ceph has gained more and more functions in recent years, its commands have also had to become more comprehensive. Newcomers might find it difficult
48%
Vagrant, Serf, Packer, and Consul create and manage development environments
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © 36clicks, 123RF.com
. Here is where Packer steps in [7]. The tool not only sets up a virtual machine automatically, it also builds images for cloud services such as Amazon EC2, DigitalOcean, Google Compute Engine, and Open
48%
Hardware MFA: Death to the password!
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © alphaspirit, 123RF.com
. Beyond Passwords In days of yore, only a few large corporations had MFA options, and they were prohibitively expensive and difficult to deploy. A few major changes have taken place that have dramatically
48%
Top Top-Like Tools
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
100.0% That is, it is using 100% of the core %MEM Percent memory used by the process 3.3% Percentage of the total memory available TIME+ Total time
48%
Evaluating logfiles with Microsoft Log Parser Studio
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Thomas Lammeyer, Fotolia.com
for Log Parser Studio. The latter is a universal tool of just a few megabytes suitable for analyzing both text (i.e., logs, XML, or CSV files) and sources (i.e., Windows's own event logs). Microsoft has had

« Previous 1 ... 56 57 58 59 60 61 62 63 64 65 66 67 68 69 ... 85 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice