Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 谷歌seo外推【电报e103】google seo代发.run ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1520)
  • Article (349)
  • News (274)
  • Blog post (10)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 84 85 86 87 88 89 90 91 92 93 94 95 96 97 ... 216 Next »

43%
VMware vRealize management suite for hybrid clouds
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © ucadp, 123RF.com
is primarily aimed at customers who already run VMware in their datacenters. The solution also results in a migration path: If a company wants to reduce its own infrastructure, VMware vRealize will be the tool
43%
Persistent storage management for Kubernetes
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by CHUTTERSNAP on Unsplash
With ongoing developments in container technology in the area of data management and persistent storage, business-critical applications have been running in cloud-native environments with containers
43%
Creating Active Directory reports using free tools
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © reddz, 123RF.com
for the task, and many deliver usable results. You can use free tools to evaluate Active Directory (AD) permissions, users, user data, and more. A big advantage of these free tools is you do not need to run
43%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
account privileges from zero to hero. The attacker is able to get valid AWS credentials from a spare phishing attack from a compromised cloud user that has the permissions to run EC2 instances, as well
43%
Certificate management with FreeIPA and Dogtag
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Oscar Sutton on Unsplash
, and Audit (IPA) system can trust each other with cross-domain trusts, allowing administrators of heterogeneous networks to run a connected directory for Windows and Linux machines. In this article, I review
43%
Distributed MySQL with Vitess
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Kheng Ho Toh, 123RF.com
in their care; however, today they are more likely to have hundreds of machines or even more. Of course, this also affects the applications that run on these platforms: They need to be able to grow along
43%
OpenStack Sahara brings Hadoop as a Service
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © RFsole, Fotolia.com
Scalable cloud environments appear tailor-made for Big Data application Hadoop, putting it squarely in the cloud computing kingdom. Hadoop also has a very potent algorithm at its side: Google's Map
43%
Red Hat PaaS hyperconverged storage
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Oleksandr Omelchenko, 123RF.com
or their own operating system and thus run directly within the system on which the container is started. This arrangement is good not only for developers, who can thus very quickly and independently provision
43%
Connecting Windows Server 2016 with Azure
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by Yannick Pulver on Unsplash
run clusters in the cloud, such as Azure or Amazon Web Services, use of this function also makes sense. Scale-out file servers (SOFS) in Windows Server 2016 can also be integrated optimally as clusters
43%
Monitoring Active Directory Federation Services
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Helder Almeida, 123RF.com
or applications are also common: SharePoint, Salesforce, or Google, for example. The important point is that both sides know each other, which is ensured when setting up the trust with certificates. In the home

« Previous 1 ... 84 85 86 87 88 89 90 91 92 93 94 95 96 97 ... 216 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice