Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1201)
  • Article (331)
  • News (166)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 140 141 142 143 144 145 146 147 148 149 150 151 152 153 ... 171 Next »

23%
A service mesh for microarchitecture components
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Alexey Shkitenkov, Fotolia.com
, thus enabling virtualization with graphical appeal (Figure 4). Figure 4: Red Hat's Kiali visualizes the service mesh in Istio, making it easier
23%
OS10 and Dell's open networking offensive
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Pei Ling Hoo, 123RF.com
in cases where, for example, clouds are distributed across multiple locations and rely on different local networks: Thanks to L3 routing, such constructs no longer need a centralized router (Figure 4
23%
NFS and CIFS shares for VMs with OpenStack Manila
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Steve Everts, 123RF.com
] in the Manila documentation when planning their setup to make sure the storage driver really fits the requirements (Figure 4). Figure 4: On the OpenStack website
23%
Focusing on security in Active Directory
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © Mykola Velychko, Fotolia.com
replicated to the server. If so, the user is logged on. 3. If the password is not available on the RODC, the login request is forwarded to a fully fledged DC. 4. If the registration is successful, a Kerberos
23%
Analyzing tricky database problems
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Photo by Quino Al on Unsplash
, six MariaDB servers [2] are used in Galera Cluster [3], and hosting is handled by nine Apache servers (four each for sync and web and one for management). Switch uses Redis [4] as its key-value store
23%
Effective debugging of Docker containers
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Stuart Monk, Fotolia.com
that have been set accordingly. If something fails to work when passing in the environment parameters, you can discover from the inspect output which variables were set for the container at startup (Figure 4
23%
Security analysis with Microsoft Advanced Threat Analytics
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © fourseasons, 123RF.com
the option of defining an email server or syslog server here, although these settings are optional (Figure 4). After completing the configuration, ATA is now set up and can protect your network. The setup can
23%
Automate your VMware configuration with Puppet
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © astragal, 123RF.com
is based on the fog library [4]. Its configuration is located in the root directory of the user responsible for provisioning; to create it, you need to type touch ~/.fog. Fog will accept a variety different
23%
Lean Linux distribution for Kubernetes
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © joingate, 123RF.com
services (e.g., those from Kubelets) to a logging host. Talos relies on Filebeat (Figure 4), Fluentd, or Vector, but all of these tools first need to be set up with separate Talos configurations. You can
23%
OpenFlow and the Floodlight OpenFlow Controller
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © aurielaki, 123RF.com
Flow island can only have exactly one connection to non-OpenFlow equipment. Furthermore, OpenFlow and non-OpenFlow islands must not form a loop themselves. Figure 4 shows a potential topology that allows

« Previous 1 ... 140 141 142 143 144 145 146 147 148 149 150 151 152 153 ... 171 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice