Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1330)
  • News (426)
  • Article (311)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 208 Next »

16%
The state of open source groupware
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Andrey Bayda, 123RF.com
information about advanced configuration is available in easily understandable how-tos. Kolab is one of the few products that provides a cross-platform desktop client in the form of Kontact. Even Windows users ... Microsoft Exchange and Lotus Notes hold onto the big chunks of the groupware market, and social networks are rushing to transform the space. All the same, free software provides an effective
16%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
and various web plugins for Windows Terminal Services, Citrix, Outlook Web Access, and so on. Client-side Vasco provides one-time password (OTP) tokens of various designs under its DIGIPASS brand – for example ... Making your systems really secure can be a bit more complicated than resorting to the use of regular passwords. In this article, we provide an overview of authentication solutions and present
16%
Native serverless computing in Kubernetes
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Adam Bixby on Unsplash
. In MariaDB, for example, the service would be the active mysqld instance – not because it is a single process, but because this service provides the central function of the database. Several processes might ... Knative transfers serverless workloads to Kubernetes and provides all the container components you need to build serverless applications and PaaS and FaaS services.
16%
HPC resource monitoring for users
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © Andrey_Russinkovskiy, 123RF.com
: REsource MOnitoring for Remote Applications [2], from the University of Texas Advanced Computing Center (TACC), combines monitoring and profiling to provide information about your application. Not strictly ... Remora provides per-node and per-job resource utilization data that can be used to understand how an application performs on the system through a combination of profiling and system monitoring.
16%
Cloud Orchestration with Cloudify
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © alenavlad, 123RF.com
bootstrapping of its own local cloud, which does not require access to a public cloud provider and thus imposes very few requirements. The Cloudify tarball is a heavyweight at 160MB, but the user initially only ... Cloud computing is forcing admins to rethink automation because classic tools like Puppet do not provide a sufficient range of configuration options. Cloudify offers a new direction for orchestration
16%
Monitor Linux with Red Hat Insights
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Rgbspace, Fotolia.com
[7]. Before you create your first image, it makes sense to set up a shortcut between your cloud provider and the Red Hat Hybrid Cloud Console. When creating an image, you can then take the shortcut ... cloud providers.
16%
Network management with the IPRoute2 toolbox
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © donatas1205, 123RF.com
the configuration files for the individual tools are located in /etc/iproute2 and contain some values that are required only in advanced scenarios. Most of the programs provided by IPRoute2 have a special task ... Traditional administration command-line tools such as ifconfig, route, and arp are almost as old as TCP/IP itself. We provide an overview of how the IPRoute2 toolkit now unifies the management
16%
Automating repetitive tasks
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Greg Rakozy on Unsplash
of the Microsoft Power Platform and provides low-code tools. In combination with other tools, MSPA offers a comprehensive system that covers the entire process optimization cycle, from data collection and analysis ... We provide an overview of the features, fields of application, and pricing of Microsoft Power Automate, highlighting the pros and cons of the SaaS platform for optimizing and automating workflows
16%
PowerShell add-on security modules
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
expand the command set or provide more secure alternatives for standard procedures, such as SSH as an alternative to Windows Remote Management (WinRM) remote maintenance. Even malware scanners ... Numerous PowerShell add-on modules provide security and attack functions for penetration tests and forensic analyses, to help admins search for vulnerabilities in their networks.
16%
Bpytop command-line monitoring tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Filip Mroz on Unsplash
on the command line. In some cases, the ncurses library provides a slightly more elegant interface for user interaction. However, bpytop [4] takes a slightly different approach. As the name suggests, the tool ... The bpytop command-line monitoring tool provides a variety of information via a fancy user interface and supports network monitoring and mouse- or keyboard-based control.

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 208 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice