Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1020)
  • News (227)
  • Article (223)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 135 136 137 138 139 140 141 142 143 144 145 146 147 148 Next »

12%
Linux I/O Schedulers
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © pandavector, 123RF.com
, schedulers are concerned with CPU resources, but they could also consider other system resources (e.g., memory, input devices, networks, etc.). The focus of this article is the I/O scheduler, including I
12%
Continuous integration with Docker and GitLab
17.07.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © alexutemov, 123RF.com
on OpenStack as an example. For the user to start virtual machines with an API call, many different services need to collaborate in the background. Every server needs a suitable network configuration
12%
Opportunities and risks: Containers for DevOps
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Ping Han, 123RF.com
for the IT infrastructure operations: This individual loads the container onto a Docker host and puts it into operation. Immediately afterward, the container service is available on the network; the developer
12%
Citrix XenServer 6.2 goes open source
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © George Tsartsianidis, 123RF.com
. The network can be teamed for failover and link aggregation, and dynamic memory allocation is supported. XenServer also supports a variety of storage back ends, all of which can be managed at the Xe command
12%
Introducing the NoSQL MongoDB database
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Wesley Tingey on Unsplash
's data is stored on a single server, a server crash or network failure could prevent access [5]. The idea behind replication is to spread the data across several servers, significantly increasing data
12%
Vector databases for data-driven artificial intelligence
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © sdecoret, 123RF.com
compare various data points in network traffic with normal behavior patterns to identify anomalies by the distance to the typical vectors. Particularly in business sectors such as finance and security
12%
Chatbots put to the scripting test
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © lexandersikovl, 123RF.com
Andreas Stolzenberger worked as an IT magazine editor for 17 years. He was the deputy editor in chief of the German Network Computing magazine from 2000 to 2010. After that, he worked as a solution engineer
12%
Automating command execution across servers
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Adrian Hartanto on Unsplash
to the configuration file. Discriminating Servers Real networks feature a heterogeneous mix of services and operating systems. You are likely to have different Linux distributions coexisting together in your server
12%
Making Kerberoasting uneconomical
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © alphaspirit, 123RF.com
of your network that recognize and prevent data extraction, you will want to check whether you can enable rules there that respond to service tickets as payload. However, this option should only be viewed
12%
What's left of TLS
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Maria Dryfhout, 123RF
have long been known, which demonstrates one of the difficulties in developing secure network technologies: As long as there are no practical attacks, many programmers and system administrators see

« Previous 1 ... 135 136 137 138 139 140 141 142 143 144 145 146 147 148 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice