Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1020)
  • News (227)
  • Article (223)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 104 105 106 107 108 109 110 111 112 113 114 115 116 117 ... 148 Next »

13%
Isolate workloads from Docker and Kubernetes with Kata Containers
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Stephen Pedersen on Unsplash
is handled by a relatively new mechanism in the Linux kernel. Namespaces keep a record within the kernel of which process is allowed to access which resources (e.g., processes, network interfaces, or hard disk
13%
Mesos compute cluster for data centers
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Artisticco LLC, 123RF.com
available at runtime. In the as-delivered state, the number of processors, the RAM, disk space, and free network ports are predefined. Without any customization, the slave simply tells the master what
13%
The OpenResty distribution for Nginx
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Kirill Kurashov, 123RF.com
2 /lib/systemd/system/nginx.service (systemd) 01 [Unit] 02 Description=OpenResty Stack for Nginx 03 After=syslog.target network.target remote-fs.target nss-lookup.target 04 05 [Service] 06
13%
The Lua scripting language
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Nataliya Velykanova, 123RF.com
." However, Lua can also be found in a variety of network and system programs, such as the Wireshark network analyzer, the Nmap scanner [2], the MySQL Proxy program, the Rspamd anti-spam solution, the Free
13%
First steps in IT automation by Rex
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Konstantin Chagin , 123RF.com
such as the uptime. You can use the same technique to obtain other client values, such as the amount of free memory (free or vmstat), the fill factor of the hard disks (df), the network utilization (netstat
13%
Artificial intelligence improves monitoring
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Photo by Ivan F on Unsplash
as the implementation stage which algorithm to use or how to filter what set of information. In deep learning, on the other hand, a neural network determines which information it passes on and how this information
13%
Activate HTTP/2 on web servers
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Soloviova Liudmyla, 123RF.com
difference between the two. When I restricted the bandwidth of the network interface to 1MBps with the Wonder Shaper tool, a clear difference was apparent. The HTTP/2 version was about 20% faster than the HTTP
13%
Dialing up security for Docker containers
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © Dmytro Demianenko, 123RF.com
using a Unix socket (Figure 1). If necessary, you can activate an HTTP socket for access via the network. Figure 1: The Docker daemon listens on a Unix
13%
Tuning Ansible
09.05.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
. Additionally, sometimes network firewall rules would change, unbeknownst to me, and certain SSH sessions would simply stop working, only to start working again miraculously a few minutes later.Another headache I
13%
AWX: Web-Based Console Manager for Ansible
13.07.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
© Maksym Shevchenko, 123rf.com
point your browser to http://localhost . (Clearly, I am assuming that you have a sane networking and firewalling configuration.) On my droplet, however, I need to find my public IP address and point my

« Previous 1 ... 104 105 106 107 108 109 110 111 112 113 114 115 116 117 ... 148 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice