Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1126)
  • News (395)
  • Article (298)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 112 113 114 115 116 117 118 119 120 121 122 123 124 125 ... 183 Next »

18%
News for Admins
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
 
will be able to take advantages of both the Windows NT and Linux kernels. According to Jack Hammons, program manager, Linux Systems Group at Microsoft, "The kernel provided for WSL 2 will be fully open source
18%
Registry for Docker images
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Viktoriya Malova, 123RF.com
both the registry and auth server behind a proxy like Apache, Nginx, or HAProxy. In this case, the port number is omitted from the registry URLs, and you have to avoid two open ports on the server
18%
The Fine Art of Relationship Maintenance
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © scanrail, 123RF.com
is complicated, at best. Open a fresh can of your favorite beverage and follow along. Trust me, the next 500-ish words will change your life forever (slight exaggeration). I think that we can all agree
18%
OCI containers with Podman
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Ray Aucott on Unsplash
running a containerized cluster system called Borg and released the open source Kubernetes orchestrator. On an exponentially growing proliferation of popularity, Kubernetes, akin to Docker's stratospheric
18%
Static code analysis finds avoidable errors
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Andrey KOTKO, 123RF.com
a block in a new line with a bracket (Pascal begin style), many view the loop header or the condition as sufficient and place the opening bracket at the end of the line. The pseudocode in Listing 1
18%
A service mesh for microarchitecture components
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Alexey Shkitenkov, Fotolia.com
, as well as with Google Kubernetes Engine or OpenShift. Istio also natively supports Kubernetes clusters in Amazon Web Services (AWS); just load the Istio ruleset into an existing Kubernetes cluster and add
18%
Useful tools for automating network devices
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
© Sila Nimkittikul, 123RF.com
. Unconventional Implementation Because classical network devices are not open platforms, the way Puppet integration is implemented can seem strange at times. In Cisco's case, for example, Puppet integration
18%
My Five Favorite Sys Admin Tools
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © Roywylam and Hans Slegers, 123RF.com
of Perl (and other open source prerequisites) and the installation of Webmin over the phone. When he finished and looked at the Sendmail configuration screen, he paused for at least 10 seconds before
18%
Efficiently planning and expanding the capacities of a cloud
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © digifuture, 123RF.com
such as CPU load, RAM usage, and network traffic without additional overhead. In most cases, you can find additional agents for the cloud: An OpenStack exporter for Prometheus [2], for example, docks onto
18%
Distributed denial of service attacks from and against the cloud
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © leksustuss, 123RF.com
their attackers to hide their identity behind a third party. DNS servers are designed to provide information. Some providers run their DNS servers as open DNS resolvers; in this configuration, recursive requests

« Previous 1 ... 112 113 114 115 116 117 118 119 120 121 122 123 124 125 ... 183 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice