Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1520)
  • Article (349)
  • News (274)
  • Blog post (10)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 94 95 96 97 98 99 100 101 102 103 104 105 106 107 ... 216 Next »

42%
Backups using rdiff-backup and rsnapshot
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Dmitry Pichugin, Fotolia.com
--remove-older-than (i.e., versions that are older than a certain time). Backups run at certain intervals (e.g., daily or weekly); retain controls which type of snapshot is retained for how long
42%
Manipulation detection with AFICK
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Christos Georghiou, 123RF.com
as a starting point. For an initial test run, leave the settings in the configuration file as they are. Before AFICK can report changes, the tool needs to create checksums and store them in its database
42%
DebOps delivers easy Ansible automation for Debian-based systems
26.10.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Nuno Andre, 123RF.com
. This example is based on the assumption that Ansible is running on a central automation host, which logs on to other systems via SSH. DebOps is designed for Debian, but it is also supposed to work
42%
Plundering treasures with Gitrob
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © pip, photocase.com
," and it runs with a variety of options for your own edification. Macramé Before looking at Gitrob in more detail, I'll take a moment to talk about what these tools are doing, which is really just scanning
42%
Five Kubernetes alternatives
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © alphaspirit, 123RF.com
Kubernetes [1] is king of the hill in the orchestration universe. Invented by Google and now under the auspices of the Linux Foundation, Kubernetes has not only blossomed quickly but has led
42%
Clusters with Windows Server 2012 R2
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Jakub Gojda, 123RF.com
is in the configuration of virtual disks as shared VHDX files [1]. You can, of course, continue to work with other shared storage for your cluster, even if you are running a virtual cluster. Windows Server 2012 also
42%
Building Big Iron in the Cloud with Google Compute Engine
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Zavalnyuk Sergey, 123RF.com
_cloud_sdk.bash | bash $ unzip google-cloud-sdk.zip $ ./google-cloud-sdk/install.sh $ gcloud auth login to transfer the SDK to your machine, unzip the file, run the installation script, and authenticate to the Google ... Google Compute Engine removes the technical and financial headaches of maintaining server, networking, and storage. ... Building Big Iron in the Cloud with Google Compute Engine
42%
Welcome to ADMIN
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
a second thought, but to those of us in the trenches who face users directly, buzzwords take on different meanings. Business continuity to us means keeping servers and desktops running by preventing hacks
42%
Cloud-native application bundles for easy container deployment
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © nattapol sritongcom, 123RF.com
of containerization is that applications packaged in containers can very easily be rolled out to other environments – provided the same container run time is available there. For example, if you are installing
42%
A service mesh for microarchitecture components
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Alexey Shkitenkov, Fotolia.com
they are running. At the end of the day, a container is only a combination of several isolation techniques at the Linux kernel level that enclose an application in a virtual environment. Because the Linux kernel

« Previous 1 ... 94 95 96 97 98 99 100 101 102 103 104 105 106 107 ... 216 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice