Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1249)
  • News (231)
  • Article (228)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 117 118 119 120 121 122 123 124 125 126 127 128 129 130 ... 171 Next »

12%
Make better use of Prometheus with  Grafana, Telegraf, and Alerta
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Valerie Elash on Unsplash
in classic monitoring systems. On the one hand, Node Exporter has various plugins that support not only basic values but also special cases, such as reading network statistics for InfiniBand cards. However
12%
Highly available storage virtualization
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Les Cunliffe, 123RF.com
, which is a useful approach for coping with massive data growth. In this article, I provide an overview of basic technologies and explain how to implement highly available storage area network (SAN
12%
How vector databases work and when they're used
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © neyro2008, 123rf.com
). Figure 2: A neural network transforms words into vectors. © Qdrant [2] The process of vectorization cannot be reversed: You can no longer infer the wording of a paragraph from its vector, because its
12%
Monitor applications end to end
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Adam Winger on Unsplash
measurements, allowing you to determine quickly whether requests from provider A's network are answered faster than those from provider B's network. Programmers and administrators are likely to be experiencing
12%
Oracle Database 12c: Cloud computing with multitenant architecture
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Jakub Jirsak, 123RF.com
Around five years of development went into the new release of the Oracle database, and the current version, Oracle 12c [1], has been available for download from the Oracle Technology Network (OTN
12%
Optimize and manage Linux-based Azure VMs
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Allan Swart, 123RF.com
are necessary. Monitoring network throughput and latency is essential for identifying networking issues that could affect performance or user experience. Additionally, keeping track of the number of running
12%
News for Admins
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
 
is paramount. 2. Knowledge of the business is crucial. 3. OT data is extremely valuable and needs to be protected. 4. Segment and segregate OT from all other networks. 5. The supply chain must be secure. 6
12%
Secure Kubernetes with Kubescape
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © limbi007, 123RF.com
are not enough because they only offer very basic functionality for complex software-defined networking (SDN) and software-defined storage. Without these components, container fleets in particular cannot
12%
A multicluster management tool for Kubernetes
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Kenny Eliason on Unsplash
]. The secret ingredient is nested containers. Kind launches complete Kubernetes clusters with the appropriate virtual networking in CRI-O containers, where the whole environment sits inside a Podman or Docker
12%
Fedora 18 as a server distribution
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Anna Ivanova, 123RF.com
, controllable via D-Bus, and firewalld [5] now take care of the firewall rules. Among other things, firewalld supports various security zones, such as public WLAN, home, or corporate networks

« Previous 1 ... 117 118 119 120 121 122 123 124 125 126 127 128 129 130 ... 171 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice