Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1017)
  • News (227)
  • Article (221)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 104 105 106 107 108 109 110 111 112 113 114 115 116 117 ... 147 Next »

13%
The OpenResty distribution for Nginx
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Kirill Kurashov, 123RF.com
2 /lib/systemd/system/nginx.service (systemd) 01 [Unit] 02 Description=OpenResty Stack for Nginx 03 After=syslog.target network.target remote-fs.target nss-lookup.target 04 05 [Service] 06
13%
The Lua scripting language
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Nataliya Velykanova, 123RF.com
." However, Lua can also be found in a variety of network and system programs, such as the Wireshark network analyzer, the Nmap scanner [2], the MySQL Proxy program, the Rspamd anti-spam solution, the Free
13%
First steps in IT automation by Rex
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Konstantin Chagin , 123RF.com
such as the uptime. You can use the same technique to obtain other client values, such as the amount of free memory (free or vmstat), the fill factor of the hard disks (df), the network utilization (netstat
13%
Artificial intelligence improves monitoring
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Photo by Ivan F on Unsplash
as the implementation stage which algorithm to use or how to filter what set of information. In deep learning, on the other hand, a neural network determines which information it passes on and how this information
13%
Activate HTTP/2 on web servers
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Soloviova Liudmyla, 123RF.com
difference between the two. When I restricted the bandwidth of the network interface to 1MBps with the Wonder Shaper tool, a clear difference was apparent. The HTTP/2 version was about 20% faster than the HTTP
13%
Dialing up security for Docker containers
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © Dmytro Demianenko, 123RF.com
using a Unix socket (Figure 1). If necessary, you can activate an HTTP socket for access via the network. Figure 1: The Docker daemon listens on a Unix
13%
Tuning Ansible
09.05.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
. Additionally, sometimes network firewall rules would change, unbeknownst to me, and certain SSH sessions would simply stop working, only to start working again miraculously a few minutes later.Another headache I
13%
AWX: Web-Based Console Manager for Ansible
13.07.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
© Maksym Shevchenko, 123rf.com
point your browser to http://localhost . (Clearly, I am assuming that you have a sane networking and firewalling configuration.) On my droplet, however, I need to find my public IP address and point my
13%
New administration options on Windows Server 2016
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Dmitriy Shironosov, 123RF.com
will see that it already has some local security groups, such as the local Administrators, Server Operators, Backup Operators, and others. Enterprise networks rely on the Active Directory service. Again
13%
Outfitting an IT training environment with Docker containers
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Kamonrat Meunklad, 123RF.com
of the system, so a user working within the container can't bring down the server or damage other user spaces. We put Docker containers to work on a problem we had on our network: creating workspaces for users

« Previous 1 ... 104 105 106 107 108 109 110 111 112 113 114 115 116 117 ... 147 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice