Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1260)
  • News (419)
  • Article (309)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 200 Next »

16%
Native serverless computing in Kubernetes
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Adam Bixby on Unsplash
. In MariaDB, for example, the service would be the active mysqld instance – not because it is a single process, but because this service provides the central function of the database. Several processes might ... Knative transfers serverless workloads to Kubernetes and provides all the container components you need to build serverless applications and PaaS and FaaS services.
16%
HPC resource monitoring for users
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © Andrey_Russinkovskiy, 123RF.com
: REsource MOnitoring for Remote Applications [2], from the University of Texas Advanced Computing Center (TACC), combines monitoring and profiling to provide information about your application. Not strictly ... Remora provides per-node and per-job resource utilization data that can be used to understand how an application performs on the system through a combination of profiling and system monitoring.
16%
Cloud Orchestration with Cloudify
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © alenavlad, 123RF.com
bootstrapping of its own local cloud, which does not require access to a public cloud provider and thus imposes very few requirements. The Cloudify tarball is a heavyweight at 160MB, but the user initially only ... Cloud computing is forcing admins to rethink automation because classic tools like Puppet do not provide a sufficient range of configuration options. Cloudify offers a new direction for orchestration
16%
Monitor Linux with Red Hat Insights
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Rgbspace, Fotolia.com
[7]. Before you create your first image, it makes sense to set up a shortcut between your cloud provider and the Red Hat Hybrid Cloud Console. When creating an image, you can then take the shortcut ... cloud providers.
16%
Network management with the IPRoute2 toolbox
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © donatas1205, 123RF.com
the configuration files for the individual tools are located in /etc/iproute2 and contain some values that are required only in advanced scenarios. Most of the programs provided by IPRoute2 have a special task ... Traditional administration command-line tools such as ifconfig, route, and arp are almost as old as TCP/IP itself. We provide an overview of how the IPRoute2 toolkit now unifies the management
16%
PowerShell add-on security modules
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
expand the command set or provide more secure alternatives for standard procedures, such as SSH as an alternative to Windows Remote Management (WinRM) remote maintenance. Even malware scanners ... Numerous PowerShell add-on modules provide security and attack functions for penetration tests and forensic analyses, to help admins search for vulnerabilities in their networks.
16%
Bpytop command-line monitoring tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Filip Mroz on Unsplash
on the command line. In some cases, the ncurses library provides a slightly more elegant interface for user interaction. However, bpytop [4] takes a slightly different approach. As the name suggests, the tool ... The bpytop command-line monitoring tool provides a variety of information via a fancy user interface and supports network monitoring and mouse- or keyboard-based control.
16%
Configuring IPv6 in Windows with NetShell
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © James Steidl, 123RF.com
). If you want to delve deeper into your IPv6 configuration, the tool you'll need is NetShell. Figure 1: The default input mask for IPv6 provides only ... Windows provides a simple dialog box for configuring IPv6, but the available settings only scratch the surface. IPv6 comes with many features that are primarily managed using the command-line tool
16%
Virtual networks with Hyper-V in Windows Server 2016
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Tjefferson, 123RF.com
an IP address failover configuration. If you work with HNV, two IP addresses are assigned to each virtual network adapter on the network: the customer address (CA) and the provider address (PA). The CA ... Microsoft provides some interesting virtualization features in current and future versions of Windows Server. You can connect or isolate virtual machines, and Windows Server 2016 even supports
16%
Accessibility wherever you are with Mobile IPv6
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Fotograf, 123RF.com
, the tablet uses LTE to connect with your provider, so you can check your home portal to see whether the heating was turned off. At the airport, the mobile device automatically connects to the public Wi ... IPv6 includes Mobile IPv6, a new standard for communication with mobile devices, which ensures permanent accessibility regardless of your current location. In this article, we provide an overview

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 200 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice