Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1020)
  • News (227)
  • Article (223)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 101 102 103 104 105 106 107 108 109 110 111 112 113 114 ... 148 Next »

13%
A multicluster management tool for Kubernetes
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Kenny Eliason on Unsplash
]. The secret ingredient is nested containers. Kind launches complete Kubernetes clusters with the appropriate virtual networking in CRI-O containers, where the whole environment sits inside a Podman or Docker
13%
Fedora 18 as a server distribution
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Anna Ivanova, 123RF.com
, controllable via D-Bus, and firewalld [5] now take care of the firewall rules. Among other things, firewalld supports various security zones, such as public WLAN, home, or corporate networks
13%
Live migration of virtual machines
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Michael Edward, 123RF.com
from one host to another during the game, caused a sensation [1]. The effective downtime for the client was a few seconds, which could be mistaken as a hiccup on the network. Admins enjoy live migration
13%
Troubleshooting and maintenance in Ceph
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © KrishnaKumar Sivaraman, 123RF.com
). Such scenarios occur much more frequently if something is wrong with the network or power connection in the cluster. Sometimes, several computers fail simultaneously for the same reason; this kind of incident
13%
IceWarp: MS Exchange Mail Server for Linux
20.08.2013
Home »  Articles  » 
 
a link. That is, when users send an email to multiple users, only one copy of the file is necessary. Access to the files is also possible via network shares or FTP, helping companies save space, especially
13%
Integrating AWS Cloud Services with Your Custom Apps
21.01.2014
Home »  Articles  » 
service Amazon offers. Thus, besides EC, it includes the basic services, such as Secure Virtual Network, Autoscaling, DNS, and Load Balancing. For simple web applications with greater scalability
13%
Automation Scripting with PHP
16.10.2012
Home »  Articles  » 
 
networking will dictate one hypervisor over another. For the purpose of this article, I’m assuming you have access to a Linux system as a standalone, physical system or as a virtual machine. You must have
13%
Mobile PC Monitor
20.02.2012
Home »  Articles  » 
 
scenarios that attempt to serve networks of any size. Installation and Setup On Windows systems, you’ll need to install the .NET 4.x framework before you install the agent. If your system doesn’t have .NET
13%
The Lua Scripting Language
28.01.2014
Home »  HPC  »  Articles  » 
.” However, Lua can also be found in a variety of network and system programs, such as the Wireshark network analyzer, the Nmap scanner [1], the MySQL Proxy program, the Rspamd anti-spam solution, the Free
13%
Putting Windows 8 on a USB Drive
10.12.2012
Home »  Articles  » 
 
screens: Accepting the License Agreement Personalize Color Scheme and Name the Computer Select a Wireless Network Enter the Wireless Network Password Set Express or Custom Settings Sign

« Previous 1 ... 101 102 103 104 105 106 107 108 109 110 111 112 113 114 ... 148 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice