Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brain causing -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1077)
  • Article (285)
  • News (93)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 66 67 68 69 70 71 72 73 74 75 76 77 78 79 ... 146 Next »

24%
Coordinating distributed systems with ZooKeeper
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © smileus, 123RF.com
can run a ZooKeeper server in standalone mode or with replication; you can see a sample configuration in the online manual [2] [3]. The second case seems more favorable for distributed filesystems
24%
Top Top-Like Tools
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
minutes), how many users are on the system (12 users – just a number of terminals in my case), and the 1-minute, 5-minute, and 15-minute loads on the system
24%
Multifactor authentication from FIDO
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © John McAllister, 123RF.com
password), something you have (physical authentication token or virtual MFA on a smartphone), and in the case of biometrics, a third physical factor such as a fingerprint, retinal pattern, and so on
24%
Operating systems for the cloud and containers
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © leeavison, 123RF.com
this principle. In the simplest case, they reduce the amount of software supplied, but if they want to do a better job, they need to look in even more depth at processes, procedures, and other design principles
24%
Running OpenStack in a data center
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © lassedesignen - Fotolia.com
are usually fine, but they should be equipped with fast network cards. Modular System Basically, the recommendation is to define a basic specification for all servers. It should include the type of case
24%
Monitor Active Directory with Azure AD Connect Health
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © skaisbon, photocase.com
support, especially when using multiple DCs, sites, and domains, because it keeps an eye on server data and performance information and notifies you in case of problems. Because monitoring takes place
24%
Take your pick from a variety of AWS databases
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Claudia Paulussen, Fotolia.com
. This configuration is known as RDS Multi-AZ deployment. Changes to the primary instance replicate synchronously to the standby. In a failover case, users can switch without loss of data. For this to happen, the DNS
24%
Correctly integrating containers
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Beboy, Fotolia.com
and possibly even for several stages of development, testing, and production. Listings 3 and 4 show typical configurations. Listing 3 adds an annotation to a namespace. In specific cases, you need to extend net
24%
Detecting malware with Yara
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Mohamad Razi Bin Husin, 123RF.com
Yara what to match. In this case, Yara looks for either string. Once you've defined the patterns, Yara can go out and look for problems. A Very Simple Example Figure 1 is a very simple example
24%
Security features in Windows Server 2022
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Matthew Henry on Unsplash
the name resolution policy table (NRPT) at this point to configure queries to a DNS namespace for use of a static DNS server. In this case, encrypted DNS connections can be used for certain queries

« Previous 1 ... 66 67 68 69 70 71 72 73 74 75 76 77 78 79 ... 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice