Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (937)
  • Article (261)
  • News (42)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 93 94 95 96 97 98 99 100 101 102 103 104 105 106 ... 125 Next »

19%
Key-value stores: an alternative to relational databases
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © islander11, 123RF.com
and values. Another solution, and one that has always been something like etcd's natural archenemy, demonstrates this problem vividly. Consul [3] (Figure 2), from HashiCorp, a corporation that recently became
19%
Hands-on Exchange rights management
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Isaac Marzioli, 123RF.com
for the Set-RoleGroup cmdlet always overwrites the entire managed-by list for a role group. Figure 3: With PowerShell, you can assign management role group
19%
Warewulf 4 – Environment Modules
20.03.2023
Home »  HPC  »  Articles  » 
. My Warewulf 4 cluster currently runs Rocky 8.6 (soon to be 8.7). A container used for the stateless compute nodes is the same as the head node (Rocky 8.6). Both /home  and /opt  are NFS shared from
19%
Exchange Online migration with the Hybrid Agent
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Natee Srisuk, 123RF.com
Framework 4.6.2 or higher. If Hybrid Agent and Exchange are set up on a server, you need to ensure compatibility between Exchange and .NET [1] to avoid the use of an unsupported combination. Beyond this
19%
Verifying packages with Debian's ReproducibleBuilds
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © jaroonrat vitoosuwan , 123RF.com
exploits like the OpenSSH bug CVE-2002-0083 [2] show that sometimes changing just one bit is sufficient to install a backdoor [3]. For sophisticated attacks, attackers could dump a kernel rootkit
19%
Domain name resolution with DNS over HTTPS
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Sergejus Bertasius, 123RF.com
.gtld-servers.net. redhat.com. 172800 IN NS ns2.redhat.com. redhat.com. 172800 IN NS ns3.redhat.com. redhat.com. 172800 IN NS ns1.redhat.com. redhat.com. 172800 IN NS ns4
19%
Web applications with Flask
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Photographer, 133RF.com
Flask uses by default. WSGI [3] is a specification that defines how a web server software and a web application written in Python communicate. This could be the Apache or Nginx web server with their WSGI
19%
Build a Network Attached Storage System with FreeNAS
10.12.2013
Home »  Articles  » 
, plus the parity level of the group. Thus, the optimal RAID-Z1 group sizes are 3, 5, and 9 disks, RAID-Z2 are 4, 6, and 10 disks, and RAID-Z3 are 5, 7, 11 disks. When combining multiple RAID-Z groups
19%
Linux with Windows 8
08.01.2013
Home »  Articles  » 
 
Samba, dual-boot Windows 8 with Linux, and install Linux filesystem software on a Windows 8 system. Joining Windows 8 to a Samba 3.6.9 Domain You can
19%
Modern Fortran – Part 2
15.12.2016
Home »  HPC  »  Articles  » 
are over i = 2,n − 1 and j = 2,n −1. Here is how you can write the iteration over the domain using array notation: a(2:n-1,2:n-1) = 0.25 * &     (a(1:n-2,2:n) + a(3:n,2:n) + a(2:n,1:n-2) + a(2:n,3:n

« Previous 1 ... 93 94 95 96 97 98 99 100 101 102 103 104 105 106 ... 125 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice