Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1029)
  • News (227)
  • Article (224)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 101 102 103 104 105 106 107 108 109 110 111 112 113 114 ... 149 Next »

13%
Monitor applications end to end
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Adam Winger on Unsplash
measurements, allowing you to determine quickly whether requests from provider A's network are answered faster than those from provider B's network. Programmers and administrators are likely to be experiencing
13%
Oracle Database 12c: Cloud computing with multitenant architecture
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Jakub Jirsak, 123RF.com
Around five years of development went into the new release of the Oracle database, and the current version, Oracle 12c [1], has been available for download from the Oracle Technology Network (OTN
13%
Optimize and manage Linux-based Azure VMs
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Allan Swart, 123RF.com
are necessary. Monitoring network throughput and latency is essential for identifying networking issues that could affect performance or user experience. Additionally, keeping track of the number of running
13%
News for Admins
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
 
is paramount. 2. Knowledge of the business is crucial. 3. OT data is extremely valuable and needs to be protected. 4. Segment and segregate OT from all other networks. 5. The supply chain must be secure. 6
13%
Secure Kubernetes with Kubescape
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © limbi007, 123RF.com
are not enough because they only offer very basic functionality for complex software-defined networking (SDN) and software-defined storage. Without these components, container fleets in particular cannot
13%
A multicluster management tool for Kubernetes
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Kenny Eliason on Unsplash
]. The secret ingredient is nested containers. Kind launches complete Kubernetes clusters with the appropriate virtual networking in CRI-O containers, where the whole environment sits inside a Podman or Docker
13%
Fedora 18 as a server distribution
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Anna Ivanova, 123RF.com
, controllable via D-Bus, and firewalld [5] now take care of the firewall rules. Among other things, firewalld supports various security zones, such as public WLAN, home, or corporate networks
13%
Live migration of virtual machines
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Michael Edward, 123RF.com
from one host to another during the game, caused a sensation [1]. The effective downtime for the client was a few seconds, which could be mistaken as a hiccup on the network. Admins enjoy live migration
13%
Troubleshooting and maintenance in Ceph
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © KrishnaKumar Sivaraman, 123RF.com
). Such scenarios occur much more frequently if something is wrong with the network or power connection in the cluster. Sometimes, several computers fail simultaneously for the same reason; this kind of incident
13%
Simplify your migration from Docker to Podman
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Oli Zubenko on Unsplash
are assigned by default if the Machine with root privileges box is checked: You will want to change this setting. Now press Create to create the container. The User mode networking option lets you forward

« Previous 1 ... 101 102 103 104 105 106 107 108 109 110 111 112 113 114 ... 149 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice