Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (571)
  • Article (132)
  • News (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 71 Next »

17%
Dos and don'ts of backing up Kubernetes storage
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Alexander Bedrin, 123rf.com
and adopts the redundant data of the failed container. The files need to be backed up as objects that the application regularly stores in Amazon Simple Storage Service (S3) buckets or comparable object storage ... Containers offer great flexibility, but the data they contain often needs to be backed up. Stateful applications that store their information in a container's persistent volume can be backed up
17%
Network overlay with VXLAN
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Fikri Rasyid on Unsplash
. Freedom from loops is ensured for redundant links by path blocking, but this comes at the cost of compromising maximum throughput, because the maximum combined or load-distributed data rates cannot be fully ... VXLAN addresses the need for overlay networks within virtualized data centers accommodating multiple tenants.
17%
Visualize Your Network
27.10.2011
Home »  Articles  » 
 
exposed to the multitude of SNMP-based monitoring tools available on Linux systems. SNMP (the Simple Network Messaging Protocol) is an excellent method to use for gathering changing data on a frequent basis ... Sometimes data that’s five minutes old just isn’t good enough. An abundance of network monitoring tools for SNMP makes a sys admin’s job easier by collecting and displaying a superabundance
17%
Six emergency CDs from antivirus manufacturers
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Karsten Winegeart on Unsplash
, the listed files are either deleted or repaired after clicking Fix top right in the window after a further prompt. This process may make a blocked Windows system workable again. Data Backup After updating ... Linux-based rescue systems, such as those offered by most antivirus software manufacturers, can repair and recover data from Windows computers compromised by malware.
17%
Supporting WebRTC in the enterprise
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © pat138241, 123RF.com
RTC is made up of separate IETF and W3C standards, currently in Candidate Recommendation status, with each covering a different aspect of setting up a peer-to-peer connection. The essential parts include ... WebRTC has the potential to bring high-quality, easily developed, and interoperable real-time voice, video, and data communication to all manner of applications in web browsers.
17%
Rethinking RAID (on Linux)
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © nikkikii, 123RF.com
=libaio, iodepth=32 fio-3.12 Starting 1 process Jobs: 1 (f=1): [w(1)][100.0%][w=1420KiB/s][w=355 IOPS][eta 00m:00s] test: (groupid=0, jobs=1): err= 0: pid=3377: Sat Jan 9 15:31:04 2021 write: IOPS=352, BW=1410Ki ... Configure redundant storage arrays to boost overall data access throughput while maintaining fault tolerance.
17%
Shell practice: Introduction to the sed stream editor
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Dmitriy Sladkov, 123RF.com
and any script file calls in a shell script. In some cases, the order of the commands matters. Test your scripts before making them "real" to avoid errors and data loss. Sample Data To exercise your sed ... With sed, you can edit text data without an interactive user interface, using pipes or input redirection. Sed lets you execute extensive editing commands on a single line.
17%
Private cloud with Microsoft Azure Stack
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © Mikko J. Pitkänen, Fotolia.com
whitepaper: https://azure.microsoft.com/mediahandler/files/resourcefiles/643b5d13-a28f-46e1-a215-4cde55435f97/Azure-Stack-white-paper-v3.pdf Azure Stack forum in MSDN: https://social.msdn.microsoft.com ... Azure Stack is an Azure extension that implements an on-premises data center for consistent hybrid cloud deployments.
17%
Kafka: Scaling producers and consumers
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Patrick Schneider on Unsplash
for partition source_topic-7 returned fetch data (error=NONE, highWaterMark=26974, lastStableOffset = -1, logStartOffset = 0, abortedTransactions = null, recordsSizeInBytes=0) Here are some quick ... A guide to 10x scaling in Kafka with real-world metrics for high throughput, low latency, and cross-geographic data movement.
17%
Protect Azure resources with Network Security Groups
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © ogm & roywylam, 123RF.com
The Azure cloud offers a variety of access options for resources. Many organizations outsource parts of their data centers to Azure and publish services such as websites, applications, or complex ... Security segmentation into zones has long been the norm in data centers. Microsoft Azure Network Security Groups offers this kind of granular defense-in-depth security, including multilevel

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 71 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice