Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1537)
  • News (430)
  • Article (313)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 87 88 89 90 91 92 93 94 95 96 97 98 99 100 ... 229 Next »

12%
Linux Kernel Project Becomes CVE Numbering Authority
22.02.2024
Home »  News  » 
 
. The full implications of this change are not immediately clear; however, in a recent blog post, Jonathan Corbet provided further information. “The key to how this is going to work, he says, can be found
12%
IT Pros Report Lack of Familiarity with Secure Software Development
30.07.2024
Home »  News  » 
 
provide insight as to the importance of secure software development training and how tech professionals can acquire it. For example: 50% of professionals identify a lack of training as a major
12%
NIST Releases Open Source Tool for Assessing Risk of AI Models
08.08.2024
Home »  News  » 
 
by generative AI. Secure Software Development Practices for Generative AI and Dual-Use Foundation Models augments the Secure Software Development Framework by providing practices and recommendations specific
12%
Welcome
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Linda Bucklin, 123RF.com
nanoscopic computers implanted into their bodies that provide constant feedback on a number of parameters. I'm OK with body temperature, blood pressure, galvanic skin response, hemoglobin, electrolytes, blood
12%
Software-defined wide area networks
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © ktsdesign, 123RF.com
connections). Examples of underlay networks include private multiprotocol label-switching (MPLS) networks leased from providers, directly leased point-to-point routes, and simple xDSL (i.e., ADSL, SDSL, etc
12%
Ubuntu Server 15.10
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
as resources are added. The LXD container hypervisor hosts Linux guests, providing image management, snapshots, live migration, Fan overlay networking for increasing the number of addressable Docker and LXD
12%
Interview: Nginx's Gus Robertson
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
the market for Nginx, which, from the beginning, has provided high performance, high concurrency, and low memory usage. Instead of using a threaded or process-based architecture, Nginx provides an event
12%
Vulnerability scans for containers
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image by Ricardo Gomez Angel on Unsplash
Containers are increasingly being used to install a particular application on a system. The basis of such a container is an image that provides an appropriate run-time environment
12%
Fedora 32 Server (Install Only)
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
releases of Red Hat Enterprise Linux. Fedora 32 sees a number of changes: With Python 2 past end-of-life, most Python 2 packages have been removed, although a legacy python27 package is provided
12%
A REST interface for FreeIPA
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © P.Gudella, 123RF.com
followed by an array of arguments and options. The method names of the JSON-RPC API are identical to those of the Python API. For example, a FreeIPA User plugin provides classes for user management

« Previous 1 ... 87 88 89 90 91 92 93 94 95 96 97 98 99 100 ... 229 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice