Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1396)
  • Article (299)
  • News (185)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 87 88 89 90 91 92 93 94 95 96 97 98 99 100 ... 189 Next »

10%
Configuring IPv6 in Windows with NetShell
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © James Steidl, 123RF.com
by the following command: netsh interface ipv6 show addresses See Figure 5. In addition to displaying the address type, this command also shows the validity and status. This information is particularly relevant
10%
Scalable mail storage with Dovecot and Amazon S3
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Vlad Kochelaevskiy, Fotolia.com
architecture referred to previously. After all, there is no obstacle to treating an email message like a binary object. That is what Timo Sirainen, the author of the Dovecot secure IMAP mail server [5], probably
10%
Data virtualization using JBoss and Teiid
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © J.R. Bale, 123RF.com
to a variety of different data sources at this point. An XML file will be used in this example. A Git repository from Blaine Mincey [5] is helpful here; it supplies a completed file with fictitious customer data
10%
Automatic build and deploy with OpenShift and GitLab CI
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Photo by Jantine Doornbos on Unsplash
and deploy slides automatically with OpenShift on every new commit in the Git repository. The slides are available online [5] and the source code of this example is available at the CETIC Git repository [6
10%
On the ground at the Linux Foundation's signature event
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Swapnil Bhartiya and Brian Behlendorf, Hyperledger Project
, but roughly 17,000 are employed by public open source software (OSS) companies. In a $180 billion cloud market, open source companies manage only $5 billion of the market. Golub highlighted the imbalance
10%
ASP.NET web development framework
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © balein, 123RF.com
in this article refer to that version. The successor version will be numbered 5 and is already available as a preview. Microsoft intends to merge the "original" .NET framework – which is currently also approaching
10%
Securing and managing Microsoft IIS
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
then show the successful binding (Figure 5). In PowerShell, you can also output the bindings specifically for a website, (Get-Website -Name '').bindings.Collection as shown in Figure 5
10%
Why Good Applications Don't Scale
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © man64, 123RF.com
portion of the application. Four processors only gets a speedup of 2.5 – the speedup is losing ground. This "decay" in speedup continues as processors are added. With 64 processors, the speedup is only 4
10%
Bare metal deployment with OpenStack
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Anatolii Nesterov on Unsplash
be installed with the: osism-kolla deploy bifrost command to create the bifrost_deploy container and four volumes (Listing 5, lines 1-5). There are two operating system images: One is the Ironic Python Agent
10%
Secure SSH connections the right way
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Olivier Le Moal, 123RF.com
-Grundschutz (Basic Protection) Compendium [5], serve as public information security guidelines for many companies because they are very close to the requirements of ISO 27001 IT management certification [6]. Other

« Previous 1 ... 87 88 89 90 91 92 93 94 95 96 97 98 99 100 ... 189 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice