Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (544)
  • Article (132)
  • News (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 68 Next »

22%
Red Hat Storage Server 2.1
05.03.2014
Home »  Articles  » 
If you believe Red Hat’s marketing hype, the company has no less than revolutionized data storage with version 2.1 of its Storage Server. The facts tell a rather different story. ... . Figure 2: Use a specially generated SSH key to access the VMs in the test environment. Functionally, RHSS is oriented on classic storage systems – in the background, data resides in block storage ... If you believe Red Hat’s marketing hype, the company has no less than revolutionized data storage with version 2.1 of its Storage Server. The facts tell a rather different story.
22%
The SDFS deduplicating filesystem
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © maridav, 123RF.com
. Figure 3: DSEs provide storage space, which the FSS then uses to provide a volume. High Availability and Redundancy SDFS can store data blocks redundantly in the cluster. To do this, use ... Deduplicating filesystems like SDFS store redundant data, such as that created by backups, only once, thereby saving valuable disk space. Additionally, the filesystem can distribute the data
20%
News for Admins
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
 
from Datadog (https://www.datadoghq.com/) analyzed thousands of applications and container images to "evaluate the adoption of best practices that are at the core of DevSecOps – infrastructure as code ... In the news: DHS Releases New Guidelines for Securing Critical Infrastructure; Datadog Report Examines DevSecOps Best Practices; Upskilling Key to Tech Staffing Challenges, Says LF Survey; 2024 Open
20%
Tuning Ansible
09.05.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
-markupsafe ieee-data python-minimal libpython-stdlib python-netaddr libpython2.7-minimal python-paramiko libpython2.7-stdlib python ... A number of widely adopted configuration management tools have risen and fallen in popularity since the DevOps craze first appeared. In this article, we look at a few tweaks that can help you
20%
News for Admins
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
 
OpenSSL 3.0.7 Patches Serious Vulnerabilities OpenSSL has issued an advisory (https://www.openssl.org/news/secadv/20221101.txt) relating to two vulnerabilities (CVE-2022-3602 and CVE-2022 ... OpenSSL has issued an advisory (https://www.openssl.org/news/secadv/20221101.txt) relating to two vulnerabilities (CVE-2022-3602 and CVE-2022-3786), which affect OpenSSL version 3.0.0.
20%
How persistent memory will change computing
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © rangizzz, 123RF.com
by Intel and Micron's 3D XPoint PM [1], is part of the system. Most commonly, the data storage is put into the DRAM slots. If the power is removed, the data stored in the PM will be there when power ... Persistent memory is non-volatile data storage in DIMM format. Losing power means that you won't lose data. What is it, and how can you use it?
20%
Managing GPT-4 on the Network
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by Cécile Brasseur on Unsplash
on the Configuration Settings tab (Figure 3), then type TurnOffWindowsCopilot (e.g., under Name). In the OMA-URI field, enter ./User/Vendor/MSFT/WindowsAI/TurnOffWindowsCopilot with Integer as the data type and 1 ... to know how to control or even block its use on the network.
20%
Build storage pools with GlusterFS
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © jala, Fotolia.com
is then available via a native GlusterFS client or via the Network Filesystem (NFS) or Server Message Block (SMB) protocol. GlusterFS can distribute the data across the individual storage systems, as well as mirror ... GlusterFS stores data across the network and can be used as a storage back end in cloud environments.
19%
Optimizing utilization with the EDF scheduler
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © SV-Luma, 123RF.com
0; 105 } The block of code starting with line 17 defines the required system call numbers for three platforms (ARM, 32 bit, and 64 bit). The central data structure that follows, struct sched ... The superior "Earliest Deadline First" task scheduling method has been part of Linux since kernel 3.14.
19%
Using the ATA security features of modern hard disks and SSDs
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © braverabbit, 123RF.com
is now in the SEC5 security state (if it were turned off, this would be SEC3). In this state, you can do two things with the device: block it for all I/O or erase it completely. The lock is automatically ... Modern ATA hard drives and SSDs offer security options that help you control access and reliably destroy data if necessary.

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 68 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice