Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (499)
  • Article (140)
  • News (12)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 57 58 59 60 61 62 63 64 65 66 Next »

11%
Flexible backup for large-scale environments
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by Nils Bouillard on Unsplash
to three collections of hard drives (just a bunch of disks, JBODs). Each array comprises 90 SAS2 disks connected by several controllers, each with a capacity of 12TB. ZFS ensures the required filesystem
11%
Get to know Azure Files and Azure File Sync
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © moovstock, 123RF.com
. In terms of costs, you can configure a lower maximum capacity for individual shares at a later date. On the Advanced tab, keep the default settings. TLS 1.2, the highest available minimum version
11%
Secure status and event monitoring of tier 0 systems
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Brian Jackson, 123RF.com
of a general architecture for distributed monitoring. Some systems such as Checkmk [5] or Zabbix [6] support this type of architecture by default. However, the emergence of distributed monitoring strategies
11%
Self-hosted remote support
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by Karsten Würth on Unsplash
took the form of a context menu; from v1.2.x (used here) a separate tab has several subcategories. In the advanced settings, you can manage the authorizations for remote sessions in the Security
11%
The basics of domain-driven design
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Christos Georghiou, 123RF.com
for the analysis of domains and the design of application-oriented software was filled by others. Popular methods include event storming [6], domain storytelling [7], or example mapping [8]. These methods have
11%
Domain-driven design and agile development
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © omnimages, 123RF.com
the required detailed knowledge of the domain – not the developers. This point is exactly where the first tie to agility can be found. One of the 12 principles of the agile software development manifesto
10%
A ptrace-based tracing mechanism for syscalls
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Nadjib BR on Unsplash
this problem. File I/O can therefore be a highly relevant factor for program optimization. The libiotrace [4] library uses LD_PRELOAD to gather data about POSIX [5] and MPI [6] file I/O functions. Although other
10%
What's new in Samba 4
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Natalia Sheinkin, 123RF.com
to be invoked. [Bug 9651] 6. Windows clients complain that they cannot disable offline caching on the profile share [Bug 7810]. (This is a non-critical message and does not affect operation.) Issues 2 and 3
10%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
authentication on the basis of text messages. Zyxel [6], the Taiwanese network equipment manufacturer, has a two-factor authentication solution in its portfolio. It provides VPN access to the company's own Zy
10%
The pros and cons of a virtual desktop infrastructure
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Mariia Puliaieva, 123RF.com
budget [5] – it's not only the capacity but also the performance that influences user acceptance. The network should not use legacy 10Mb technology, which is often encountered in the form of small

« Previous 1 ... 57 58 59 60 61 62 63 64 65 66 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice