Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1559)
  • News (435)
  • Article (314)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 140 141 142 143 144 145 146 147 148 149 150 151 152 153 ... 232 Next »

12%
High availability for RESTful services with OpenStack
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Ying Feng Johansson, 123RF.com
. Figure 2: HAProxy is an application that does its job solely in user space, providing a clear statistics page that can also enable and disable back ends. Listing 1 haproxy.cfg 01 global
12%
Live migration of virtual machines
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Michael Edward, 123RF.com
are necessary. VM live migration is easier to set up on a distributed replicated block device (DRBD) cluster basis. DRBD basically provides the option of using an existing resource in dual primary mode [2
12%
Alternatives to Google Analytics
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Vasilii Shestakov, 123RF.com
account. When you log in, you are providing a concentrated bundle of information. Often, users don't bother to log out of their Google accounts so that all searches carried out in Google are linked
12%
Deploying OpenStack in the cloud and the data center
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © johnjohnson, 123RF.com
interface. On top of this, the MAAS server runs a DHCP daemon that provides all computers with IP addresses. On request, MAAS will also configure the system's out-of-band interfaces and initiate
12%
Automating network hardware
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Lead Image © Rajesh Rajendran Nair, 123RF.com
of switching to a different provider. In a nutshell, Cisco ACI is a dream from the vendor's point of view, for one reason, because it extends vendor lock-in right down to the software level and, for another
12%
Creating RAID systems with Raider
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
©Slawomir Kruz, 123RF.com
little sense because, if the disk fails, both "disks" in your RAID are goners. However, you can create multiple partitions on a hard disk and assign them to different RAID arrays. I'll provide an example
12%
Apache 2.4 with mod_lua
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Tom Grundy, 123RF.com
the provided configure with the additional --enable-lua parameter. Alternatively, you can append lua to --enable-mods-shared=, or just go for --enable-mods-shared=all. If you are inexperienced with the build
12%
An IP-based load balancing solution
30.11.2025
Home »  CloudAge  »  Articles  » 
arsgera, 123RF
SUSE) already provide inherent load balancing capabilities for most network services, such as web, cache, mail, FTP, media, and VoIP. These inherent capabilities are based on Layer 4 switching, allowing Linux
12%
Windows Performance Toolkit and System State Analyzer
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Ewa Walicka, fotolia.com
users and developers will discover that the toolkit also provides options for measuring application resources and interrupts. The new version of the toolkit is optimized for use with Windows Server 2008
12%
Virus scanner and content filter with AD authentication
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Denis Makarov, 123RF.com
3. You might have seen that ntlm_auth occurs twice with different helper protocols. Squid first tries with ntlmssp (SSP, Security Support Provider), transferring the encrypted username and password

« Previous 1 ... 140 141 142 143 144 145 146 147 148 149 150 151 152 153 ... 232 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice