Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (636)
  • Article (203)
  • News (82)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 80 81 82 83 84 85 86 87 88 89 90 91 92 93 Next »

24%
Supporting WebRTC in the enterprise
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © pat138241, 123RF.com
. Any proxy that inspects secure content will rely on a self-signed certificate to re-encrypt the content, and WSS signaling channels fail to connect if the browser can't establish a root certificate
24%
Manage software apps publicly and privately
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Akurhan, 123RF.com
the local, absolute path where logfiles are stored. The console output displays the log settings, commonly rooted in the %LOCALAPPDATA% directory. App Management Lifecycle The classic lifecycle
24%
Computational storage that supports storage operations
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © sdecoret, 123RF.com
's specifications on the drives' capabilities make for pretty impressive reading. If you are looking to virtualize the devices' functions, you could go for a complete single-root I/O virtualization (SR
24%
Border Gateway Protocol
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Rachael Arnott, 123RF.com
framework. RPKI uses the same hierarchy as for IP address assignment to reflect the chain of trust and consequently ensure attestation. The Internet Assigned Numbers Authority (IANA) is the root element
24%
Asynchronous PostgreSQL
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Fesus Robert, 123RF.com
that takes frequent breaks. Finding the Root Cause The application in the example here is quite conservative: the Apache web server, mod_cgi, some CGI programs in Perl, and the PostgreSQL database. Apache
24%
Three full-text desktop search engines
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Lucas Gallone on Unsplash
, Recoll confronts you with several options (Figure 6). You will want to focus mainly on word stemming (reduction to the root lexeme) and choose the languages to be used. Also, go to the Unac exceptions
24%
Network access control with Cisco's Identity Services Engine
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Keith Hardy on Unsplash
(ADE-OS). The current version 3.1 is a Red Hat Enterprise Linux version 8.2. Full root access is reserved for the manufacturer's Technical Assist Center. Some services are run as microservices in Docker
24%
Networking strategies for Linux on Azure
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image ©pakhnyushchyy, 123RF.com
by offloading network processing from the VM's CPU to the underlying hardware, specifically to a dedicated NIC that supports single-root I/O virtualization (SR-IOV). To enable Accelerated Networking on Linux VMs
24%
Storage across the network with iSCSI and Synology DiskStation Manager
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Vladimir Nenov, 123RF.com
: The iscsiadm command issued as the root user can show more results than are contained in the default configuration file located under the /etc/iscsi/nodes/ path. If you do not want to use a terminal
23%
Serverless run times with custom Bash AWS Lambda layers
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Eric Gevaert, 123RF.com
as policy.json. Note that bashFunction under Resource is the name of your function and needs to be changed if you change the function name. Listing 2 policy.json 01 { 02 "Version": "2012

« Previous 1 ... 80 81 82 83 84 85 86 87 88 89 90 91 92 93 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice