Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: [tippo365.com]time its go each real money[tippo365.com]time its go each real moneygram ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (733)
  • Article (234)
  • Blog post (6)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 74 75 76 77 78 79 80 81 82 83 84 85 86 87 ... 98 Next »

8%
Throw Down the Gauntlet
14.08.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
© bluebay, 123RF.com
Special Thanks: This article was made possible by support from  Linux Professional Institute When you add features to your software frequently, each iteration needs to be checked meticulously
8%
Desktop Blades (of Glory)
06.05.2024
Home »  HPC  »  Articles  » 
't designed for that purpose. The SBC world has even started developing systems for HPC (or close to it) with SBCs such as a Raspberry Pi Compute Model 4, blades, chassis, or a combination of devices
8%
OpenLDAP Workshop
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © tiero, 123RF.com
with corresponding sub-branches. The tree structure is referred to as the DIT (Directory Information Tree). Each item of information stored within the tree can contain a set of attributes, some of which are mandatory
8%
Vulnerability assessment best practices for enterprises
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Fancycrave on Unsplash
with equivalent responsibility been designated in writing to ensure that classified and controlled unclassified information is properly handled during its entire life cycle? Cybersecurity Does
8%
Kubernetes StatefulSet
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Ashley Light on Unsplash
. Instead of structured tables, these databases save information with keys and values. In principle, each document could use its own keys. These NoSQL databases focus on the dataset itself and are therefore
8%
Attacks on HTTPS Connections
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © almagami, 123RF.com
connection to the specific server (Figure 1). The server identifies itself with a certificate containing its public key and the signature of a trusted third party, called a certificate authority (CA). The CA
8%
What's your status (page)?
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Tatiana Venkova, 123RF.com
products and services. Keeping a close watch on each and every element of the running infrastructure is a necessity for any technology-driven business. The modern monitoring solutions are devised to address
8%
Profiling application resource usage
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© fauxware, fotolia.com
called each function within the program and its children. The timing information created by gprof is probably the most immediately useful data, allowing you to see where the application spends most of its
8%
(Re)Installing Python
17.07.2023
Home »  HPC  »  Articles  » 
believe it’s going to start pushing people away from Python to something else, creating more confusion while diluting Python. It is what it is, as my camp counselor told me.
8%
Incident Analysis with The Hive and Cortex
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Kurhan, 123RF.com
configuration files for different setups, which means you don't have to go into the details of configuring the components. To download the contents of the repository, use the command: git clone https://github.com

« Previous 1 ... 74 75 76 77 78 79 80 81 82 83 84 85 86 87 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice