Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1124)
  • Article (264)
  • News (170)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 144 145 146 147 148 149 150 151 152 153 154 155 156 157 Next »

12%
Management improvements, memory scaling, and EOL for FileStore
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Yannic Läderach on Unsplash
. The usual restrictions apply: In smaller installations, you should take care to remove only a few OSDs from the cluster at a time to avoid massive recovery operations on the back end. Either way, you end up
12%
Manage Windows Server storage with PowerShell
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Brian McGowan on Unsplash
over Ethernet (FCoE). MPIO lets the initiator manage multiple connections to the same storage target in line with a defined policy. On a freshly installed Windows system, the iSCSI initiator service
12%
Databases in the Google Cloud
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Jon Parry on Unsplash
likely use more than just one kind of database. In principle, cloud databases can be operated in the same way as databases in an organization's data center. The admin team simply installs the database
12%
Distributed MySQL with Vitess
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Kheng Ho Toh, 123RF.com
also be usable with a normal installation of MySQL. Of course, a front end for storing data does not give you a database, because the information has to go somewhere. Vitess relies on My
12%
Storage protocols for block, file, and object storage
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo Johannes Plenio on Unsplash
-defined infrastructures, Ethernet will remain the first choice for the foreseeable future in the breadth of all installations for reasons of standardization and cost. In the highly specialized HPC environment
12%
HTTP/1.1 versus HTTP/2 and HTTP/3
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © alphaspirit, 123RF.com
to do this manually by installing http2_module and enabling it, LoadModule http2_module modules/mod_http2.so in the configuration file. The second directive to be entered is, Protocols h2 h2c HTTP/1
12%
Safely integrating and running Office 365
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Matty Sysmons, 123RF.com
've installed the extension on a computer, launch the special Excel table either using the new icon on the desktop or via the C:\ProgramData\Microsoft\MailProtectionReports directory (Figure 2). Then, log
12%
Established container solutions in Linux
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © dixiland, Photocase.com
that leaves nothing to be desired. Immediately after the install, the distribution asks you if you want to create containers – virtual private servers (VPS) or virtual environments (VEs). Virtuozzo, like Linux
12%
Legally compliant blockchain archiving
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Photo by Jade Masri on Unsplash
of data can easily be realized as a service within the processing routine. The Analytics Service is not an essential installation on the system in general. Technically, it is Apache Spark for the more
12%
Solving the security problems of encrypted DNS
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
. Blocking command and control systems or servers from which malicious software retroactively installs functions is a standard security measure and one often implemented by manipulating DNS. The use of Do

« Previous 1 ... 144 145 146 147 148 149 150 151 152 153 154 155 156 157 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice