Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1249)
  • News (231)
  • Article (228)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 130 131 132 133 134 135 136 137 138 139 140 141 142 143 ... 171 Next »

12%
Eat. Pray. Script.
23.12.2011
Home »  Articles  » 
 
environment. So, you have the best of both worlds: Windows and Linux. You can use Windows commands mixed with Linux commands. For example, if you want to see a list of all systems on your network that begin
12%
Persistent Memory
14.01.2016
Home »  HPC  »  Articles  » 
. Additionally, you have to consider moving data from the network interface to PM via the filesystem. With PM, you have extremely fast storage, and the I/O bottleneck might just have moved to the network interface
12%
Getting Ready for the New Ceph Object Store
19.05.2016
Home »  HPC  »  Articles  » 
The situation seems paradoxical: Ceph started life more than 10 years ago as a network filesystem. Sage Weil, the inventor of the solution, was looking into distributed filesystems at the time in the scope of his
12%
NVDIMM Persistent Memory
22.09.2016
Home »  HPC  »  Articles  » 
consisting of capacitors and typically used as main memory in PCs and servers. HBA Host Bus Adapter: Hardware interface that connects a computer to a bus or a network system. The term is commonly
12%
Small Tools for Managing HPC
18.10.2017
Home »  HPC  »  Articles  » 
machine to the target machine with no encryption – including passwords. Therefore, a very simple network sniff could gather lots of passwords. Using rsh , rlogin , or telnet between systems across
12%
Desktop Blades (of Glory)
06.05.2024
Home »  HPC  »  Articles  » 
, the components you needed to build them, the networking you needed, the concepts for managing and monitoring them, how to program them, how to debug and identify bottlenecks, and so on; however, some were being
12%
Transport Encryption with DANE and DNSSEC
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © nerhuz, 123RF.com
Communication needs privacy. It forms the basis for confidential and binding exchange. A typical email does not offer any privacy as it passes through the network in cleartext. Anyone who reads
12%
A versatile proxy for microservice architectures
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Russell Shively, 123RF.com
reviewed in an earlier article [1], are currently enjoying great popularity, promising admins an automated approach to networking. As a closer look at the Istio architecture (Figure 1) reveals, the Envoy
12%
11 Tricks for Windows servers
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Kati Molin, Fotolia
to domains. 11. Optimizing DNS Settings for AD The TCP/IP | Properties | Advanced | DNS IPv4 and IPv6 protocols lets you access additional settings to set up name resolution optimally on the network by DNS
12%
Secure containers with a hypervisor DMZ
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © lightwise, 123RF.com
. One well-known example comes from the field of networks, when securing a website with an application and database. A buffer zone, known as the demilitarized zone (DMZ) [3], has long been established

« Previous 1 ... 130 131 132 133 134 135 136 137 138 139 140 141 142 143 ... 171 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice