Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1375)
  • News (404)
  • Article (301)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 126 127 128 129 130 131 132 133 134 135 136 137 138 139 ... 209 Next »

18%
A service mesh for microarchitecture components
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Alexey Shkitenkov, Fotolia.com
, as well as with Google Kubernetes Engine or OpenShift. Istio also natively supports Kubernetes clusters in Amazon Web Services (AWS); just load the Istio ruleset into an existing Kubernetes cluster and add
18%
Useful tools for automating network devices
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
© Sila Nimkittikul, 123RF.com
. Unconventional Implementation Because classical network devices are not open platforms, the way Puppet integration is implemented can seem strange at times. In Cisco's case, for example, Puppet integration
18%
My Five Favorite Sys Admin Tools
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © Roywylam and Hans Slegers, 123RF.com
of Perl (and other open source prerequisites) and the installation of Webmin over the phone. When he finished and looked at the Sendmail configuration screen, he paused for at least 10 seconds before
18%
Efficiently planning and expanding the capacities of a cloud
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © digifuture, 123RF.com
such as CPU load, RAM usage, and network traffic without additional overhead. In most cases, you can find additional agents for the cloud: An OpenStack exporter for Prometheus [2], for example, docks onto
18%
Distributed denial of service attacks from and against the cloud
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © leksustuss, 123RF.com
their attackers to hide their identity behind a third party. DNS servers are designed to provide information. Some providers run their DNS servers as open DNS resolvers; in this configuration, recursive requests
18%
Vector databases for data-driven artificial intelligence
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © sdecoret, 123RF.com
insights and ultimately open new business models capable of generating real added value for companies. The World of Complex Data Against the background of these challenges, vector databases open a new
18%
Secure status and event monitoring of tier 0 systems
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Brian Jackson, 123RF.com
and theoretically also need to be operated by separate administrative identities and protected in line with the rules for tier 0. This perspective in turn opens up new rifts in company-wide monitoring setups
18%
Tinkerbell bare metal deployment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by engin akyurt on Unsplash
first be opened for internal engineering because either the automation or the central logging was not up to the task of sending the system for reinstallation after the event. The thinking behind
18%
Manage containerized setups with Ansible
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © Franck Boston, Fotolia.com
application. This pod only opens up the HTTP port of the application to the outside by port mapping. Internal ports (e.g., the database container) remain invisible outside the pod. This way, you could easily
18%
Digital Forensics
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Image © armmypicca, 123RF Free Images
search for open ports and check network data to see if information is being exfiltrated. You isolate systems and run various vulnerability and rootkit scans. You might even enlist the assistance of other

« Previous 1 ... 126 127 128 129 130 131 132 133 134 135 136 137 138 139 ... 209 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice