Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1020)
  • News (227)
  • Article (223)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 100 101 102 103 104 105 106 107 108 109 110 111 112 113 ... 148 Next »

13%
Docker image security analysis
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Rodolfo Sanches Carvalho on Unsplash
broken into your container and is about to start breaking things. I call this "anomalous behavior." Red flags could include network ports being opened unexpectedly, disk volumes being mounted without
13%
The new OpenShift version 4
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Artem Egorov, 123RF.com
is also taking steps to make life easier for developers. One example is Istio, a service mesh that makes it easy for developers to build a working network between many microservices of the same application
13%
Make better use of Prometheus with  Grafana, Telegraf, and Alerta
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Valerie Elash on Unsplash
in classic monitoring systems. On the one hand, Node Exporter has various plugins that support not only basic values but also special cases, such as reading network statistics for InfiniBand cards. However
13%
Highly available storage virtualization
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Les Cunliffe, 123RF.com
, which is a useful approach for coping with massive data growth. In this article, I provide an overview of basic technologies and explain how to implement highly available storage area network (SAN
13%
How vector databases work and when they're used
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © neyro2008, 123rf.com
). Figure 2: A neural network transforms words into vectors. © Qdrant [2] The process of vectorization cannot be reversed: You can no longer infer the wording of a paragraph from its vector, because its
13%
Monitor applications end to end
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Adam Winger on Unsplash
measurements, allowing you to determine quickly whether requests from provider A's network are answered faster than those from provider B's network. Programmers and administrators are likely to be experiencing
13%
Oracle Database 12c: Cloud computing with multitenant architecture
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Jakub Jirsak, 123RF.com
Around five years of development went into the new release of the Oracle database, and the current version, Oracle 12c [1], has been available for download from the Oracle Technology Network (OTN
13%
Optimize and manage Linux-based Azure VMs
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Allan Swart, 123RF.com
are necessary. Monitoring network throughput and latency is essential for identifying networking issues that could affect performance or user experience. Additionally, keeping track of the number of running
13%
News for Admins
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
 
is paramount. 2. Knowledge of the business is crucial. 3. OT data is extremely valuable and needs to be protected. 4. Segment and segregate OT from all other networks. 5. The supply chain must be secure. 6
13%
Secure Kubernetes with Kubescape
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © limbi007, 123RF.com
are not enough because they only offer very basic functionality for complex software-defined networking (SDN) and software-defined storage. Without these components, container fleets in particular cannot

« Previous 1 ... 100 101 102 103 104 105 106 107 108 109 110 111 112 113 ... 148 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice