Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: brain causing -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1077)
  • Article (285)
  • News (93)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 68 69 70 71 72 73 74 75 76 77 78 79 80 81 ... 146 Next »

24%
OpenStack Sahara brings Hadoop as a Service
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © RFsole, Fotolia.com
added value. For example, MySQL can be installed and configured quite easily, although this is not the case with Hadoop, so the agent really does pay dividends in Sahara's case. CLI or Dashboard? Like
24%
Integrating FreeIPA with Active Directory
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © payphoto, 123RF.com
, but it definitely is not a satisfactory solution in large environments. In such cases, you would be better off going for indirect integration based on a Kerberos trust. Here, I present an example setup based
24%
Encrypted backup with Duplicity
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Boing, Photocase.com
of the directory information. Furthermore, you must ensure that Duplicity has the correct permissions. In the above case, it must therefore be allowed to access /etc and all its contents. Duplicity automatically
24%
Identity Governance regulates access control in Azure AD
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © amasterpics123, 123RF.com
in one directory, collaboration across a diverse range of applications becomes easier but managing the various authorizations more complex. Azure identity governance comes in handy in these cases. Access
24%
Policy-based DNS in Windows Server 2016
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © mikiel, 123RF.com
and their respective records separately on each server or transfer the scope files from the master server by some other means. In each case, however, you need to create the zone scope for each server; otherwise
24%
NAS with Btrfs-based Rockstor
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by Lane Smith on Unsplash
with UNetbootin, for example. If you want to support the project, you can order a preconfigured USB stick from the Rockstor shop. In any case, start the server from the installation medium created in this way
24%
System logging for data-based answers
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Gerard Boissinot, Fotolia.com
to the standard system log /var/log/syslog located on each node. By default, it also writes the time stamp with the log entry. You can specify the log as well, in case you don't want to write to /var
24%
Automated orchestration of a horizontally scalable build pipeline
15.02.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
© Kittipong Jirasukhanont, 123RF
1. The arrows from the Ansible and Vagrant boxes illustrate how Vagrant controls the VM infrastructure, whereas Ansible controls what happens inside the operating system – in this case, Ubuntu Linux
24%
Network simulation with GNS3
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Joseasreyes, 123RF.com
or decompressed image to the GNS3 VM. After the upload, assign a name and a router platform to the image. The setup wizard gets this information directly from the image, so no adjustments are needed, in most cases
24%
Improved Performance with Parallel I/O
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Ying Feng Johansson, 123RF.com
and combines them into a single file (in the case of output data) or reads the input file and creates separate files for input (in the case of input data). Although this solution eliminates the limitation

« Previous 1 ... 68 69 70 71 72 73 74 75 76 77 78 79 80 81 ... 146 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice