Articles

Lead Image © Oleksandr Omelchenko, 123RF.com

Lead Image © Oleksandr Omelchenko, 123RF.com

Link Encryption with MACsec

MACsec encrypts defined links with high performance and secures Layer 2 protocols between client and switch or between two switches.
Lead Image © Peapop, Fotolia.com

Lead Image © Peapop, Fotolia.com

Low-code development with Microsoft Power Apps

If the IT staff is having trouble keeping up with the demand for custom applications, end users can pitch in with low-code programming tools like Microsoft Power Apps.
Photo by Dan Dennis on Unsplash

Photo by Dan Dennis on Unsplash

Sharding and scale-out for databases

Apache ShardingSphere extends databases like MySQL or PostgreSQL, adding a modular abstraction layer to support horizontal sharding and scalability – but not replication or encryption at rest.
Photo by Adam Bixby on Unsplash

Photo by Adam Bixby on Unsplash

Native serverless computing in Kubernetes

Knative transfers serverless workloads to Kubernetes and provides all the container components you need to build serverless applications and PaaS and FaaS services.
Lead Image © Valentyn Ihnatkin, 123RF.com

Lead Image © Valentyn Ihnatkin, 123RF.com

Incident response with Velociraptor

The software incarnation of the feared predator in the Jurassic Park movies has been on the hunt for clues to cyberattacks and indicators of compromise. We show you how to tame the beast and use it for your own purposes.
Photo by Hassan Pasha on Unsplash

Photo by Hassan Pasha on Unsplash

Sustainable Kubernetes with Project Kepler

Measure, predict, and optimize the carbon footprint of your containerized workloads.
Lead Image © Sergii_Figurnyi, 123RF.com

Lead Image © Sergii_Figurnyi, 123RF.com

Improved visibility on the network

OpenNMS collects and visualizes flows so you can discover which network devices communicate with each other and the volume of data transferred.
Photo by Michael D on Unsplash

Photo by Michael D on Unsplash

Secure and seamless server access

The powerful Cloudflare Tunnel provides secure and seamless access to servers and applications, making it a convenient alternative to VPN for any modern IT infrastructure.
Photo by Sudhith Xavier on Unsplash

Photo by Sudhith Xavier on Unsplash

A watchdog for every modern *ix server

Monit is a lightweight, performant, and seasoned solution that you can drop into old running servers or bake into new servers for full monitoring and proactive healing.
Photo by Kenneth Berrios Alvarez on Unsplash

Photo by Kenneth Berrios Alvarez on Unsplash

Response automation with Shuffle

The concept of security orchestration, automation, and response (SOAR) is increasingly important in IT security to counter ever-growing threats. We introduce Shuffle, a tool that lets you define automated workflows that boost infrastructure security.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=