Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1559)
  • News (435)
  • Article (314)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 141 142 143 144 145 146 147 148 149 150 151 152 153 154 ... 232 Next »

12%
Neglected IPv6 features endanger the LAN
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Stanislaw Tokarski, 123RF.com
the source and target addresses are part of the link-local scope (fe80::/10), the transport protocol is IPv6. Since IPv6 is enabled and LLMNR provides name resolution, the pending messages are now also
12%
Intelligent observability with AI and Coroot
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Gustavo Xavier on Unsplash
yourself with the solution's key components. Coroot itself acts as the platform's linchpin, on the one hand acting as an API and, on the other, handling communication with the provider's cloud services (i
12%
Red Hat Ansible Automation Platform
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Dmitry Sunagatov, Fotolia.com
on demand, also scales seamlessly. Conveniently, after rolling out AAP, you only need to worry about some of these details. As long as you provide enough systems for AAP, it takes care of its own scalability
12%
Securing email communication with GnuPG
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Amol Tyagi on Unsplash_Key.jpg
) provides a simple and secure way to make public keys for email addresses available over HTTPS. The underlying standard was first implemented in GnuPG version 2.1.12 and has been enabled by default since
12%
Processor and Memory Metrics
12.02.2014
Home »  HPC  »  Articles  » 
their output. If that isn’t possible, I look for other tools that can provide the metrics I want. If that fails, I resort to writing my own code. However, in some cases, I write code because I will better
12%
Comparing Ceph and GlusterFS
21.04.2015
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © agencyby, 123RF.com
. On the other hand, US-based InkTank and the Linux veteran Red Hat have been providing concrete contributions to the subject of Big Data for some time. Specifically, this means the Ceph [1] object store
12%
PostgreSQL 9.3
04.02.2014
Home »  Articles  » 
 
, for example, in version 9.2 of PostgreSQL. In this case, pg_dump cannot provide synchronized snapshots; thus, no changes should be permitted to the databases for the duration of the dump to avoid
12%
Exploring Ubuntu cloud tools
28.06.2011
Home »  CloudAge  »  Articles  » 
 
Figure 1: Seach on "eucalyptus" in Synaptic. Although the additional packages here are not necessary for a basic installation, the eucalyptus-walrus and eucalyptus-sc packages provide Amazon S3-like
12%
Desktop Supercomputers: Past, Present, and Future
17.03.2021
Home »  HPC  »  Articles  » 
, or 5600 processors with two, four, or six cores. As with the previous systems, you could plug it into normal home or office outlets. It was designed to use a 20A circuit that provided up to 1,920W
12%
Analyzing Logs
03.11.2022
Home »  HPC  »  Articles  » 
entries that have been defined as “uninteresting.” Commonly, these entries are typical of a system that is operating normally and don’t provide any useful information (however “useful” is defined). The idea

« Previous 1 ... 141 142 143 144 145 146 147 148 149 150 151 152 153 154 ... 232 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice