Articles
Run TensorFlow models on edge devices
TensorFlow Lite on a mobile device predicts harvest time for a real-world vertical farming operation.
Secure access to Kubernetes
Kubernetes comes with a sophisticated system for ensuring secure access by users and system components through an API. We look at the options for authentication, authorization, and access control.
Export and analyze Azure AD sign-in and audit logs
The relevant sign-in and audit logs in Azure Active Directory can be exported to external data sources to provide not only long-term archiving, but also the freedom to analyze the stored data.
Mesh Service for OSI Layers 2 and 3
In early April 2018, the Cloud Native Computing Foundation accepted a new sandboxing project: Network Service Mesh. In this article, we explain how it resembles a conventional service mesh and what makes it different.
Identity Governance regulates access control in Azure AD
Azure Active Directory Identity Governance brings security processes to organizations with users who access resources or collaborate with partners in the cloud.
Secure your data channel with stunnel
Stunnel provides a TLS wrapper with extensive configuration options to secure your data over insecure wireless networks.
Serverless run times with custom Bash AWS Lambda layers
A piece of old-meets-new functionality lets you run Bash scripts in an AWS Lambda layer.
Use PowerShell to manage Exchange Online
Exchange Online in Office 365 can be managed just like its local counterpart with similar, sometimes identical, PowerShell cmdlets.
Cloud-native application bundles for easy container deployment
Cloud-native application bundles are an easy option for distributing applications in a microservice architecture.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.