Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: [tippo365.com]tune its go each real money[tippo365.com]tune its go each real moneygram ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (733)
  • Article (234)
  • Blog post (6)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 98 Next »

13%
Data virtualization using JBoss and Teiid
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © J.R. Bale, 123RF.com
the advantages of the underlying methods of JBoss Data Virtualization software, explain how to install it, and conclude with an initial data integration project. Business Intelligence (BI) applications ... JBoss Data Virtualization software applications receive a uniform interface to all data – regardless of its source.
13%
Intrusion Detection with OSSEC
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Rayner Simpson on Unsplash
As a host-based intrusion detection system (HIDS), OSSEC [1] detects and reacts to security incidents in real time. The software is capable of detecting a wide range of security incidents, including ... The OSSEC free intrusion detection and host-based intrusion prevention system detects and fixes security problems in real time at the operating system level with functions such as log analysis, file
13%
Resource monitoring for remote applications
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image Gustavo Quepón on Unsplash.com
that were used to run an application. Remora is not strictly a profiler, and it's not strictly a monitoring tool in the traditional sense of monitoring the entire cluster. Rather, it provides per ... Remora combines profiling and system monitoring to help you get to the root of application problems by revealing its use of resources.
13%
Business continuity management
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Andrea Danti, 123RF.com
, System Center, and SQL Server AlwaysOn. In this article, we show how the new business continuity service works and how to deploy it. Creating good business continuity involves a fair amount of complexity ... We take a look at the new business continuity service from Azure and show how to use it.
13%
Monitoring HPC Systems
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Alexander Rivosh, 123RF.com
via multicast (port 8649 by default). At the same time, each gmond also listens to the announcements from its peers so that every node knows the metrics of all of the other nodes. The advantage ... Ganglia is probably the most popular monitoring framework and tool, in that HPC, Big Data, and even cloud systems are using it. In this article, we show you how to install and configure Ganglia
13%
On the ground at the Linux Foundation's signature event
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Swapnil Bhartiya and Brian Behlendorf, Hyperledger Project
and especially how Hollywood has embraced it. He shared that The Linux Foundation is now home to the Academy Software Foundation (ASWF) project, which bears the coveted name from the Academy of Motion Picture Arts ... On the first day of the summit, Jim Zemlin, the executive director of The Linux Foundation, discussed the explosive growth of open source and especially how Hollywood has embraced it.
13%
Recovering from a cyberattack in a hybrid environment
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Kelly Sikkema on Unsplash
has its IT firmly anchored locally or is already on its way into the cloud, most directory services now have a hybrid design. The legacy Active Directory (AD) is the primary identity store, and users ... services with Entra ID, the Graph API, and its PowerShell implementation.
13%
An IP-based load balancing solution
21.07.2011
Home »  CloudAge  »  Articles  » 
 
servers that serve critical PHP applications. Because you will put the same virtual IP address as an alias of Ethernet interfaces on each real web server, it's important to configure arptables
12%
Improved Performance with Parallel I/O
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Ying Feng Johansson, 123RF.com
that many applications use, is to have each TP write to its own file. The concept is simple, because there is zero coordination between TPs. All I/O is independent of all other I/O. Figure 3 illustrates ... Understanding the I/O pattern of your application is the starting point for improving its I/O performance, especially if I/O is a fairly large part of your application's run time.
12%
Debian's quest for reproducible builds
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Author, 123RF.com
the time. For example, Linux Mint recently fell victim to a manipulated image and delivered it to its users. Although Debian sets the bar high, some developers asked themselves several years ago what ... Debian's reproducible builds project tries to meet strict security requirements for binary packages from its archives through the creation of bitwise identical binary packages.

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice