Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede Llorente ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (532)
  • Article (146)
  • News (103)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 57 58 59 60 61 62 63 64 65 66 67 68 69 70 ... 79 Next »

15%
Flexible software routing with open source FRR
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Sahand Babali on Unsplash
-group 13 neighbor LAB remote-as 65540 14 neighbor LAB password t0ps3cr3t 15 neighbor 192.0.2.0 peer-group LAB 16 ... 17 address-family ipv4 unicast network 192.168.2.2/32 18 exit
15%
Hyper-V with the SMB 3 protocol
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Vladimir Kramin, 123RF.com
the option of replicating the data from the host every 30 seconds. On the other hand, you can also extend the replication interval up to 15 minutes. Replication occurs on the filesystem and the network via SMB
15%
Kolab iRony with CalDAV and CardDAV support
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Pablo Hidalgo, 123RF.com
/caldav.yourkolab.com-access_log combined 09 10 11 AllowOverride All 12 Order Allow,Deny 13 Allow from All 14 15 RewriteEngine On 16 RewriteBase / 17
15%
Live Kernel Update Tools
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Andrea, Fotolia.com
/fs/proc/meminfo.c 2014-03-31 05:40:15.000000000 +0200 +++ new/fs/proc/meminfo.c 2014-05-11 16:33:19.148771809 +0200 @@ -131,7 +131,7 @@ "Committed_AS: %8lu kB\n" "VmallocTotal: %8lu kB\n" "VmallocUsed: %8lu
15%
Evaluating logfiles with Microsoft Log Parser Studio
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Thomas Lammeyer, Fotolia.com
is a string like "1, 10, 12, 15, 2, 21, 3, …" and not the ascending order of the values. Exporting the data into another program and anchoring the desired sorting directly in the query by adjusting
15%
Read-only file compression with SquashFS
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © modella, 123RF.com
) Directory table size 2199 bytes (2.15 Kbytes) 63.72% of uncompressed directory table size (3451 bytes) Xattr table size 54 bytes (0.05 Kbytes) 100.00% of uncompressed xattr table size (54
15%
Take your pick from a variety of AWS databases
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Claudia Paulussen, Fotolia.com
as a cluster with up to 15 Read Replicas. If the primary instance fails, one of the replicas is automatically appointed the new primary instance. If no Read Replica is configured, a new instance of the DB
15%
Monitoring container clusters with Prometheus
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Guido Vrola, 123RF.com
then independently modify, delete, or create a new ConfigMap: kubectl create -f 02-prometheus-configmap.yml Deployments provide declarations [15] for updating pods and replica sets. The Kubernetes deployment
15%
A Hands-on Look at Kubernetes with OpenAI
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Luxuz, photocase.com
Timestamp: 2017-06-07T08:15:30Z labels: openai.org/location: azure-us-east-v2 name: 10.126.22.9 spec: externalID: 10.126.22.9 providerID: azure:////62823750-1942-A94F-822E-E6BF3C9EDCC4 status
15%
Lithnet Password Protection for Active Directory
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Nah Ting Feng, 123RF.com
with password length. From 15 to 20 characters, cracking is no longer possible in a finite amount of time – or at least not with today's technology. However, length alone is not helpful if a password

« Previous 1 ... 57 58 59 60 61 62 63 64 65 66 67 68 69 70 ... 79 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice