Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: bring calling -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (879)
  • Article (252)
  • News (183)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 57 58 59 60 61 62 63 64 65 66 67 68 69 70 ... 132 Next »

15%
CI/CD deliverables pipeline
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image by serhat-beyazkaya, Unsplash.com
calling the Jenkins URL in the browser. The easiest way to do this is by typing http://:8080/ directly on the Jenkins Master, because the setup is simplified and does not include HTTPS setup
15%
Five graphical database front ends
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © yewkeo, 123RF.com
. This again calls a wizard or lets you create a form manually. The wizard prompts you for the data source. Decide whether a table or a query will serve as a source for the form. You can edit the form and use
15%
OCI containers with Podman
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Ray Aucott on Unsplash
software, because in my opinion, it is far from receiving its coup de grâce. However, I do look at an alternative to Docker called Podman, its feature set, and some notable differences in its container run
15%
Setting up Windows clients with Chef
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Sebastian Kaulitzki, 123RF.com
certificate testing than its predecessor. It is evident here that the server name called in knife.rb doesn't match the output value from hostname, which was used to create the certificate. You can remedy
15%
Persistent volumes for Docker containers
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by Alexander Redl on Unsplash
. At the heart of the solution is the volume API: If you define persistent memory for a container, calling docker on the command line leads to a corresponding API request to the volume API that provides
15%
Make better use of Prometheus with  Grafana, Telegraf, and Alerta
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Valerie Elash on Unsplash
, other functions have virtually died in the program, such as reading SMART statistics for hard drives, for which Node Exporter can only call an immature external script. Prometheus developers find
15%
Build storage pools with GlusterFS
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © jala, Fotolia.com
/gv0/ Here, the gluster3 system is added to the storage pool to expand the existing volume by one brick. A call to gluster volume info should confirm that the volume now has three bricks. Depending
15%
Exploring Apache CloudStack
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Utemov, fotolia.com
the creation of new types of allocators for the selection of storage and hosts. CloudStack can translate Amazon Web Services (AWS) EC2 and S3 API calls to native CloudStack API calls so that users can continue
15%
An introduction to FreeNAS
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Mario Lopes, fotolia.com
of ZFS's features can be a definite success. A ZFS filesystem resides in a pool, which may contain one or more groups of devices called vdevs. The possible types of vdev are individual disks, mirrors
15%
Managing infrastructure as code with Spacelift
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Konstantin Shaklein, 123RF.com
stack as a CI/CD pipeline that can have several runs or calls – an excellent illustration of how Spacelift works under the hood. In the first step and immediately after gaining access to Spacelift

« Previous 1 ... 57 58 59 60 61 62 63 64 65 66 67 68 69 70 ... 132 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice