Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (35)
  • Article (1)
Keywords

« Previous 1 2 3 4 Next »

42%
When you should and should not use NoSQL databases
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Artem Gavrysh on Unsplash
available and also partition-tolerant, but not always consistent. It's up to you to decide. If consistency plays the main role for you (e.g., for financial software), you will probably prefer a relational
39%
Networking strategies for Linux on Azure
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image ©pakhnyushchyy, 123RF.com
effectively, for example: sysctl -w net.core.rmem_max=16777216 sysctl -w net.core.wmem_max=16777216 sysctl -w net.ipv4.tcp_window_scaling=1 These adjustments help in maximizing the throughput by allowing
39%
Storage trends for taming the flood of data
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Natalia Lukiyanova, 123RF.com
to improve the situation with several specifications included in the OCP data center NVMe specifications. First is to define a health information log with SSD statistics (version 1.0) suitable for monitoring
39%
RFID technologies and risks
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Claudio Schwarz on Unsplash
frequency – the reader and tags must transmit in the same frequency range to work together successfully. Candidate 1 is low-frequency systems that operate at between 120 and 140KHz. Product or card family 2
38%
Managing GPT-4 on the Network
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by Cécile Brasseur on Unsplash
on the Configuration Settings tab (Figure 3), then type TurnOffWindowsCopilot (e.g., under Name). In the OMA-URI field, enter ./User/Vendor/MSFT/WindowsAI/TurnOffWindowsCopilot with Integer as the data type and 1
38%
Sovereign Cloud Stack – a genuine alternative for Europe
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © solerf, 123RF.com
hand are the offshoots of the major American providers that are technologically equivalent to the originals, but where operations are handled by a European partner (e.g., Delos, T-Systems) or a European
38%
Web applications with Julia
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © sony sivanandan, 123RF.com
22 ztable = join(ztable) 23 p = plot([f1 f2]; xrange=(0, 1), lc=[lc1 lc2], lw=2, xlabel="x", ylabel="y", label=["cos($c x)" "$(t)tan(x)"]) 24 show(io, MIME"image/png"(), p) 25
37%
Automated Azure Kubernetes Service cluster builds
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Kittipong Jirasukhanont, 123RF.com
-nodepool1-39945963-vmss000000 Ready agent 14m v1.27.7 10.224.0.4 Ubuntu 22.04.3 LTS 5.15.0-1051-azure containerd://1.7.5-1 You can see an internal IP address, the version of the Ubuntu Linux node
37%
Getting your virtual machine dimensions right
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by ROCCO STOPPOLONI on Unsplash
increases. Figure 1 illustrates this for a two-socket system. Figure 1: A two-socket system (two NUMA nodes) showing local and remote RAM access from CPU0
37%
Monitor applications end to end
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Adam Winger on Unsplash
is called end-to-end (E2E) monitoring (Figure 1) and is primarily used for web applications (see the "Confusion of Terms" box). However, it can also be used for native Linux programs and smartphone apps. E2E

« Previous 1 2 3 4 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice