Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6gbps Llorente"5432 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (941)
  • Article (274)
  • News (114)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 66 67 68 69 70 71 72 73 74 75 76 77 78 79 ... 134 Next »

26%
Take your pick from a variety of AWS databases
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Claudia Paulussen, Fotolia.com
type (e.g., General Purpose (SSD) or Provisioned IOPS (SSD) [i.e., input/output operations per second]) and storage size. The storage can extend up to 6TB (for Aurora, 64TB) and does not affect
26%
OpenStack Trove for users, sys admins, and database admins
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © cheskyw, 123RF.com
intervention by the user. The command: trove create lm-slave 1 --size 2 --slave_of ae427c76-eee3-11e6-802a-00215acd73e2 would add a slave node named lm-slave of flavor 1 to the database with the ID ae427c76
26%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
. Magic?! To create a new policy and escalate the privilege [6] inside the environment to the administrator, the attacker can use the command: $ aws iam create-policy-version --policy-arn arn
26%
Software-defined networking for the future
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Leio McLaren on Unsplash
. The platform is designed for multicloud deployment and enables wireless connectivity in licensed and unlicensed bands. Aether version 1.6 is currently available. Certified products are available from Wiwynn
26%
Graphical management solutions for Docker
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Elena Rouame on Unsplash
-critical environments and support stricter security requirements. If you are looking to install Portainer with Docker on Linux, detailed documentation can be found on the project's website [6]. Usage After the install
26%
Goodbye virtual machines, hello microVMs
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Eric Froehling on Unsplash
of this series with Footloose for automation. To begin, grab the Footloose binary from the GitHub project site [6], if you haven't set it up already, and create the YAML file shown in Listing 1 in the directory
26%
Protecting the production environment
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Intricate Explorer on Unsplash
resources also belong to the parent class, unlike include, and is the only way to make sense of a dependency definition (e.g., for the apache class) [6]. Idempotency allows a declaration with class
26%
Automating development environments and deployment with Otto
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © baloncici, 123RF.com
happens transparently for the user, who has no contact at all with the tools. Otto is released under Mozilla Public License Version 2.0, and development is an open process on GitHub [6]. Otto has one
26%
Enterprise job scheduling with schedulix
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © homestudio, 123RF.com
, and Linux. The product discussed in this article, schedulix [6], is a free enterprise resource scheduling system targeting small to medium-sized enterprises, designed for Linux environments, and available
26%
Safely integrating and running Office 365
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Matty Sysmons, 123RF.com
interface. They then forward the login to the cloud. Microsoft provides the free Client Access Policy Builder [6] so that these policies can be created and implemented as easily as possible. The Client

« Previous 1 ... 66 67 68 69 70 71 72 73 74 75 76 77 78 79 ... 134 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice