Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1249)
  • News (231)
  • Article (228)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 105 106 107 108 109 110 111 112 113 114 115 116 117 118 ... 171 Next »

12%
Rancher manages lean Kubernetes workloads
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Sebastian Duda, 123RF.com
to be correct on every system of the installation and can be implemented within the distributions either by the legacy network time protocol (NTP) or with chronyd. Either way, one of the two components needs
12%
Measuring the performance health of system nodes
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Peter Hermes Furian, 123RF.com
are running, the amount of memory is correct, networking is up, and so on. I refer to this as the "state" of the node's health. In that same article, I mentioned Node Health Check (NHC) [2], which is used
12%
Rancher Kubernetes management platform
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © Franck Boston, 123RF.com
be a matter of course today, the time needs to be correct on each system of the installation. On the distribution used here, this can be done by the legacy network time protocol (NTP) or chronyd. Either way
12%
Risky Business
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © Oksana Stepanenko, 123RF.com
. A virtual private network (VPN) is a good thing. Encryption is a good thing. Multi-factor authentication is a good thing. Firewalls are good things. Unique, complex passwords are good things. Nothing
12%
Using the MQTT IoT protocol for unusual but useful purposes
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Heiko Küverling, 123RF.com
again a minute later anyway (QoS 0 is fine). Users might want to transmit the position of a mobile device with a bit more reliability (QoS 1 or 2), although the network traffic and costs rise, too
12%
Storage Spaces Direct with different storage media
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Twwx, photocase.com
, and make them available on the network. Microsoft's Storage Replica [1] can in turn replicate the data from S2D, for example, in other data centers and to other clusters. To create an S2D, Windows Server
12%
Simplify integration of S3 storage with local resources
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Photo by Christopher Burns on Unsplash
At Amazon Web Services (AWS), the hybrid idea is by no means limited to allowing companies to extend the scope of their corporate network securely to the AWS Virtual Private Cloud with the help
12%
A smoke-jumping admin's best friend
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Thomas Detert, Fotolia.com
be quite complicated and require a great deal of computational, memory, network, and disk resources. What happens, though, if the display server misbehaves and you have to debug the problem? How do you
12%
Apache Storm
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergei Tryapitsyn, 123RF.com
Huge amounts of data that are barely manageable are created in corporate environments every day. This data includes information from a variety of sources such as business metrics, network nodes
12%
Four rescue systems compared
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Stephen Coburn, fotolia.com
SSH to get rid of the VNC console. This is no problem with Knoppix – an SSH server is included. The network configuration can also be changed on the fly, as long as you are logged in locally via VNC

« Previous 1 ... 105 106 107 108 109 110 111 112 113 114 115 116 117 118 ... 171 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice