Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6mbps Llorente"5432 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (936)
  • Article (270)
  • News (113)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 118 119 120 121 122 123 124 125 126 127 128 129 130 131 ... 133 Next »

27%
OPNids: Suricata with built-in machine learning
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © sarah maher, 123RF.com
tap into those sinks and derive their sets of rules from them. This functionality is exactly what Suricata offers. If you throw a Lua sink [6] to the tool, it automatically adopts it, including
27%
The limits and opportunities of artificial intelligence
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © sebastien decoret, 123RF.com
pioneers of neural networks, expressed it in an interview as follows: "My view is throw it all away and start again" [6]. ADMIN: If the mood among scientists is fairly sober, then where did all this hype
27%
Managing Bufferbloat
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Eric Issel, 123RF.com
.217.16.206: icmp_seq=3 ttl=54 time=24.450 ms 64 Bytes from 172.217.16.206: icmp_seq=4 ttl=54 time=23.802 ms 64 Bytes from 172.217.16.206: icmp_seq=5 ttl=54 time=29.555 ms 64 Bytes from 172.217.16.206: icmp_seq=6 ttl
27%
A self-healing VM system
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © THISSATAN KOTIRAT , 123RF.com
the same exit status conditions. Line 6 declares another check program, sync_all_node_5, that runs an Ansible playbook called sync_files.yml with webbox5 as the target. This program is run every 15 cycles
27%
How to back up in the cloud
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Sgursozlu, Fotolia.com
, you can also use a trick based on erasure coding: With a 5PB gross capacity, only 1.6PB are effectively available if you have enabled double redundancy in Ceph. In a backup, redundancy is theoretically
27%
CI/CD deliverables pipeline
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image by serhat-beyazkaya, Unsplash.com
Hub, you need a suitable mechanism to automate this upload step. The aktau/github-release [6] project, a Go application that helps publish arbitrary artifacts on GitHub, is the perfect solution
27%
GitLab for DevOps teams
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © maroti, 123RF.com
Lab Runner One basic building block of the GitLab CI architecture is the GitLab Runner [6]. According to the pull principle, a Runner communicates with the GitLab server via an API, executes declared jobs
27%
Arm yourself against cloud attacks
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © sandra zuerlein, Fotolia.com
in an Amazon document [6], and OpenStack provides a manual [7], as well. The Trouble with IDSs Some admins might be used to working with intrusion detection systems (IDSs) in their conventional setups
27%
A service mesh for microarchitecture components
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Alexey Shkitenkov, Fotolia.com
of application X). That version 1.0 runs on pods 1 through 5 of the application and version 1.1 on pods 6 and 7 does not matter from Istio's point of view. If you were to launch additional 1.0 or 1.1 pods
27%
Analyzing tricky database problems
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Photo by Quino Al on Unsplash
. The infrastructure also includes three LDAP servers, six NFS servers (based on Ceph), and two HAProxy load balancers. Monitoring is done via Graphite [5], with an Elasticsearch [6], Logstash [7], and Kibana [8] (ELK

« Previous 1 ... 118 119 120 121 122 123 124 125 126 127 128 129 130 131 ... 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice