Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: notes ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (466)
  • Article (174)
  • News (50)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 62 63 64 65 66 67 68 69 70 Next »

13%
Minifying container images with DockerSlim
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Maggie Molloy, 123RF.com
] are impressive, although Node.js, Ruby, Golang, Java, PHP, and other languages can be expected to achieve similar results. Listing 1 Python Minify Results from ubuntu:14.04 - 438MB => 16.8MB
13%
DiffServ service classes for network QoS
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Elgris, Fotolia.com
into the Network Control and OAM service classes. The Network Control service class is used to transfer packets between routers that need to exchange control (routing) information between nodes within
13%
Troubleshooting and analyzing VoIP networks
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Ioannis Kounadeas, Fotolia.com
which codecs the terminal devices use. When a call is established, the terminal devices involved send the supported codecs to the other end node in the form of a codec list. If multiple codecs
13%
Proactive Monitoring
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Tom Wang, 123RF.com
Riemann with a statistics daemon like Collectd [18], which collects the metrics and then sends them to Riemann, makes sense. High availability (e.g., synchronization between multiple nodes, failover
13%
WordPress, Joomla, and Drupal compared
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Zoya Fedorova, 123RF.com
://www.drupal.org/project/tfa WordPress Social Login plugin: https://wordpress.org/plugins/miniorange-login-openid/ Drupal Social Auth module: https://www.drupal.org/project/social_auth Drupal Message Stack module: https://www.drupal.org/node
13%
Monitoring with System Center 2012 R2 Operations Manager
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © dotshock, 123RF.com
domain controllers. To enable the Agent Proxy function, start the Operations Manager console, navigate to the Device Management | Agent Managed node, right-click on the agent, and select Properties
13%
Error-correcting code memory keeps single-bit errors at bay
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Igor Stevanovic, 123RF.com
| ============================== The number of csrows depends on the electrical loading of a given motherboard and the memory controller and DIMM characteristics. An Example For this example node, each memory controller has eight csrows
13%
Manage status messages in CouchDB with MapReduce
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by Austin Distel on Unsplash
be found in Setup , with the choice of Configure Single Node or Configure Cluster . The Active Tasks item takes you to all active tasks in CouchDB. Configuration is where can you adjust some
13%
Resolving problems with DNS, Active Directory, and Group Policy
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Fernando Gregory, 123RF.com
directory services (NTDS) settings, in addition to its host A name (e.g., dc01.contoso.com ). The CNAME is the GUID of the DSA object, which can be found as an SRV record in the DNS under the _msdcs node
13%
Detecting system compromise
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Nah Ting Feng, 123RF.com
are defined that require a match to expected values. Not only will the constraint-checking process indicate a failed appraisal, but it will also identify specific data structure nodes, along with the unexpected

« Previous 1 ... 62 63 64 65 66 67 68 69 70 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice