Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (978)
  • Article (305)
  • News (84)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 82 83 84 85 86 87 88 89 90 91 92 93 94 95 ... 138 Next »

28%
Take your pick from a variety of AWS databases
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Claudia Paulussen, Fotolia.com
can be controlled in a very granular manner. As with most AWS services, the decision as to where the DB instance is created (i.e., in which of the four regions) is made when calling the API. Thus
28%
Lithnet Password Protection for Active Directory
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Nah Ting Feng, 123RF.com
: The local message on a Windows client is not very informative, but the event log on a domain controller reveals why a password change failed. Two settings reject passwords that contain the user
28%
Kubernetes for small and medium-sized enterprises
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © zelfit, 123RF.com
assured, it has very little in common with the modern container world. In these typical setups, each system is assigned a fixed task. Because not even virtualization plays a role in many cases, a static
28%
Chef users faced with a license change might find solace in a new open source distribution, Cinc.
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Pascal Bernardon on Unsplash
and are not deprecated. Chef and the company behind it, Progress Software, adhered to this very principle for quite a while – including proprietary tools whose source code was not publicly available. Well Meant, Badly
28%
Rancher manages lean Kubernetes workloads
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Sebastian Duda, 123RF.com
to be set up and have access to an NTP server to set the system time correctly. Rolling Out K3s The K3s authors make it very easy for you to install their software on your system. To do so, simply run
28%
Terraform multicloud orchestrator version 1.0
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Annie Spratt on Unsplash
approaches, you can very well be forced to do the same work multiple times. This is where Terraform comes in. Technology Jungle For years, HashiCorp's tool has touted itself as a powerful and environment
28%
Tracking down problems with Jaeger
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Sebastian Molina fotografÌa on Unsplash
of environment can easily become a Herculean task. A very simple example makes this clear: Imagine a user who accesses a distributed application through a web application and wants to query the data stored there
28%
Rancher Kubernetes management platform
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © Franck Boston, 123RF.com
controls downstream. Some administrators might already be cringing at this point, because – at first glance – the Rancher approach seems clumsy and, above all, not very efficient in terms of resource usage
28%
Data loss prevention with Microsoft Purview
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Antonio Guillem Fernandez, 123RF.com
comprise Conditions describing the confidential data, Actions , and Exceptions (Figure 3). Figure 2: Microsoft Purview comes with a very extensive template
28%
Discover vulnerabilities with Google Tsunami
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Silas Baisch on Unsplash
to become very helpful in everyday admin life. For example, Tsunami will be able in the future to automatically detect an unprotected Hashicorp Consul server exposed to the web. Overly communicative Docker

« Previous 1 ... 82 83 84 85 86 87 88 89 90 91 92 93 94 95 ... 138 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice