Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (919)
  • Article (281)
  • News (69)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 68 69 70 71 72 73 74 75 76 77 78 79 80 81 ... 128 Next »

15%
Look for file changes and kick off actions with Watchman
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © leksele, 123RF.com
for changed files from the command line). Listing 1 Configuration File 01 { 02 "version": "3.0.0", 03 "watched": [ 04 { 05 "path": "/opt/repos", 06 "triggers": [] 07 } 08
15%
Protect privileged accounts in AD
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © ginasanders, 123RF.com
policies can be assigned to the same security principal both directly and through policy silos (Figure 3). Policies from the silo always take precedence over the directly assigned policies
15%
The AWS CDK for software-defined deployments
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © krisckam, 123RF.com
, if it is the first subnet of the entire VPC CIDR block; otherwise, it's just a reserved address. 10.200.0.3 is reserved for future use. 10.200.0.255 is the broadcast address reserved by AWS, as in traditional
15%
Why Good Applications Don’t Scale
13.10.2020
Home »  HPC  »  Articles  » 
and increasing the wall clock time. Notice that the peak speedup is only about a = 3.0 and happens at around 16 processors. This speedup is less than that predicted by Amdahl’s Law (a = 5). Note that you can
15%
Workflow-based data analysis with KNIME
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Andrea De Martin, 123RF.com
Gateway Initiative (OSGI) technology. The latest version (version 3.7) is available at the project website [1], where you will also find other introductory materials, including blogs, videos, and sample
15%
Pattern matching dispute in Python 3.10
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Steve Harvey on Unsplash
languages that use a match expression to process data on the basis of its structure (e.g., in Scala [1], Rust [2], and F# [3]). A match statement takes an expression and compares it with successive patterns ... A controversial change is taking place in Python version 3.10 known mainly from functional languages: pattern matching. ... Pattern matching dispute in Python 3.10
15%
OpenShift by Red Hat continues to evolve
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © ktsdesign, 123RF.com
a commercial distribution of the Kubernetes container orchestration [2]. However, things have changed. In version 3.0, Red Hat shifted the product onto the new Kubernetes underpinnings and has since made
15%
PowerShell add-on security modules
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
PowerSploit expects a list of bytes in the form 0xXX,0xXX,0xXX,0xXX . The Backtrack toolset is helpful for generating the correct format: > msfpayload windows/exec CMD="cmd /k calc" EXITFUNC=thread C ... Script Kiddies 4.0
15%
News for Admins
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
 
to encrypt data that is transmitted across a network between a client application and an instance of SQL Server. SQL Server on Linux supports TLS protocols 1.2, 1.1, and 1.0. Machine Learning Services
15%
Single sign-on with Keycloak
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Kirsty Pargeter, 123RF.com
ID Connect or the somewhat older SAML (security assertion markup language). If you have the choice, the Keycloak developers recommend OpenID Connect, which is an extension of OAuth 2.0 and offers JSON web

« Previous 1 ... 68 69 70 71 72 73 74 75 76 77 78 79 80 81 ... 128 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice