Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (978)
  • Article (305)
  • News (84)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 76 77 78 79 80 81 82 83 84 85 86 87 88 89 ... 138 Next »

28%
Nagios alerts implemented via VoIP
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Zentilia, 123RF.com
up your account. A Matching SIP Client The process for the CLI SIP client is slightly more complex. Most VoIP clients are designed for the desktop and cannot be scripted at all, or at least not very
28%
Red Hat Container Development Toolkit for container-based applications
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Paulus NR, 123RF.com
developers become familiar with the platform. Conclusion The CDK is a very powerful tool that administrators and developers can use to install a standardized environment for developing container
28%
ID Views smooth migration to a new identity management system
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Nigel Silcock, Fotolia.com
for a single user or for a group of users, which is very practical because different attributes can be connected to particular hosts. Even if central management now exists for a user account, the option of using
28%
NetworkManager at the command line
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © godrick, 123RF.com
Issues However, there are some exceptions, so you will need to clarify very early in your system planning whether you want to rely on the legacy init scripts or the newer NetworkManager. Some Network
28%
Data Compression as a CPU Benchmark
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Lucy Baldwin, 123RF.com
]. Demonstrating higher compression ratios than the original LZ77 [5] algorithm, it is generally expected to have comparable decompression performance. More important to the purpose, 7-Zip's author is very
28%
Docker and Podman environments on Windows and Mac machines
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bowie15 , 123RF.com
virtual machines based on Vagrant boxes and a Vagrantfile. The workflow required for this can be completely automated and scales very well, even if you are using a large number of virtual machines. Listing
28%
Bpytop command-line monitoring tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Filip Mroz on Unsplash
for bpytop is that it has a very active developer, with a small community, who is constantly looking to enhance the software and is happy to accept requests from users. Infos top: https
28%
CPU affinity in OpenMP and MPI applications
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © podfoto, 123RF.com
everything possible to get the highest performance possible for your applications. Needless to say, but I will say it anyway, processors and systems have gotten very complicated. Individual CPUs can have 64
28%
Network access control with Cisco's Identity Services Engine
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Keith Hardy on Unsplash
at an early stage is important. Despite cloudification and zero trust approaches, securing internal networks and resources is still very important in many organizations because this is where the crown jewels
28%
MySQL upgrade obstacles
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © cycloneproject, 123RF.com
this article, you may very well be among them. Fortunately, with some planning, you can take the sting out of this particular mandatory upgrade. I won't be able to discuss every breaking change or possible

« Previous 1 ... 76 77 78 79 80 81 82 83 84 85 86 87 88 89 ... 138 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice