Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: [tippo365.com]time its go each real money[tippo365.com]time its go each real moneygram ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (733)
  • Article (234)
  • Blog post (6)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 81 82 83 84 85 86 87 88 89 90 91 92 93 94 ... 98 Next »

8%
The achievements of and plans for systemd
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lennart Poettering CC-BY-SA-3.0
't think it's a good idea to balance supposed speed advantages against security gains from more init system alternatives – they have nothing to do with each other. Sure, it would be good if there were
8%
Microsoft 365 DSC
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Will Myers on Unsplash
In the Microsoft 365 environment, with its variety of configurations and multiple tenants to manage, Desired State Configuration (DSC) is an ideal way to track changes and reset a configuration ... of the Microsoft 365 Desired State Configuration. ... Microsoft 365 DSC
8%
Cost management for cloud services
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Elijah Mears on Unsplash
drawn from the cost management framework. Its specific task is budgeting and accounting, as well as visualizing and analyzing costs. You can enter and categorize the various items generated by the model
8%
OpenStack workshop, part 3:Gimmicks, extensions, and high availability
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Steven Frame, 123RF
virtualization environments face. Once the basic installation is in place, it's time to tweak: How can cloud providers add value to their software? How can you future-proof the installation? How can you best
8%
Kali Linux is the complete toolbox for penetration testing
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Tatiana Venkova, 123RF.com
. Exploitation tests should look for vulnerabilities in a secure, real environment, so you can shut down any vulnerabilities found – and you need to do this over and over again. The variety of IT components
8%
Relational databases as containers
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © James Thew, 123RF.com
/calavera/docker-volume-glusterfs Plugin helpers: http://github.com/docker/go-plugins-helpers Docker Swarm: http://www.docker.com/products/docker-swarm Docker Compose: http://docs.docker.com/compose/ Documentation on database
8%
PowerShell Part 1: Retrieving System Information
18.03.2012
Home »  Articles  » 
 
that works locally will also work remotely if you specify -ComputerName in the syntax. The PowerShell Help System If you’re going to use PowerShell with any of its advanced features
8%
Profiling Python Code
09.12.2019
Home »  HPC  »  Articles  » 
the next position of each particle requires the evaluation of the right hand side of its corresponding differential equation.” Serial Code and Profiling When you download the Python version of the code
8%
Retrieving Windows performance data in PowerShell
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © andresr, fotolia.com
for local and remote machines because it is familiar with a variety of interfaces in different Windows subsystems. The number of interfaces and connection points increases steadily with each new version
8%
Command-line tools for the HPC administrator
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Vasyl Nesterov, 123RF.com
will locate any file that ends in .dat.2. If I truly get desperate to find a file, I can go to the root directory (/) and run the same find command. The second way I run find is to use its output as input

« Previous 1 ... 81 82 83 84 85 86 87 88 89 90 91 92 93 94 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice