Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (756)
  • Article (188)
  • Blog post (3)
  • News (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 95 Next »

10%
Visualizing kernel scheduling
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © 36clicks, 123RF.com
SchedViz [1] is one of a variety of open source tools recently released by Google that allows you to visualize how your programs are being handled by Linux kernel scheduling. The tool allows you ... The Google SchedViz tool lets you visualize how the Linux kernel scheduler allocates jobs among cores and whether they are being usurped.
10%
News for Admins
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
 
Stack Overflow Compromised According to The Hacker News, a hacker gained unauthorized access to the production version of Stack Overflow (https://thehackernews.com/2019/05/stack ... Stack Overflow Compromised; Docker Hub Breached; Microsoft Brings Linux to Windows 10; Running Oracle? Get Ready for Almost 300 Patches and Microsoft Acquired RTOS Company.
10%
An IP-based load balancing solution
30.11.2025
Home »  CloudAge  »  Articles  » 
arsgera, 123RF
virtual webs.test.com { 15 active = 1 16 address = 192.168.1.250 eth0:0 17 vip_nmask = 255.255.255.0 18 port = 80 19 send = "GET / HTTP/1.0\r\n\r\n" 20 expect = "HTTP" 21 ... Red Hat's Piranha load balancing software is based on the Linux Virtual Server concept. We show you how to configure and test your setup.
10%
Application Monitoring with openITCOCKPIT
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Author, 123RF.com
trusty main' To get the latest packages, you can specify nightly in addition to the trusty option: $ apt-key adv --recv --keyserver hkp://keyserver.ubuntu.com A7D3EAFA Now, an update is needed to read ... A good monitoring solution must provide information about applications and their performance. We show you how to monitor a database using openITCOCKPIT.
10%
Disaster recovery for Windows servers
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © joseasreyes, 123RF.com
AdministratorPassword (Read-\ Host-Prompt password -AsSecureString) Figure 6: Domain controllers can also be downgraded using PowerShell. The Get-Help Uninstall ... Need to fix a Windows server? We'll discuss some techniques for getting your system back. You'll also learn some tricks for Active Directory and Exchange.
10%
Laying out documents with Markdown and Pandoc
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Edgar Chaparro on Unsplash
writing, attention must be paid not only to the content of the document but also to coordinating the individual elements neatly in terms of the layout. Unsurprisingly, this what-you-see-is-what-you-get ... We show you how to use Markdown and Pandoc to transform your technical documentation into a number of formats and create sophisticated presentations along the way.
10%
Monitor your nodes with collectl
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© nobeastsofierce, 123RF.com
that you know what collectl can measure and what you should think about when deploying it on a cluster, I'll look at some quick examples of using collect on a single node so you can get a feel for how ... Effectively monitoring your cluster can be one of the keys to understanding how the hardware and software are interacting. In many cases, this means examining the performance of a single node.
10%
Correctly integrating containers
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Beboy, Fotolia.com
in June 2017 [5]. Kubernetes abstraction enables completely new concepts. Network policy [6] regulates how groups of pods talk with each other and with other network endpoints. With this feature, you can ... If you run microservices in containers, they are forced to communicate with each other – and with the outside world. We explain how to network pods and nodes in Kubernetes.
10%
ZAP provides automated security tests in continuous integration pipelines
23.08.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Galina Peshkova, 123RF.com
that by harnessing the power of ZAP you can get some very useful scanning results (and enjoy the minimal setup time involved and not very steep learning curve), you now need to focus on how to access the ZAP API ... Despite the abundance of tools that test code and help improve the effectiveness of a continuous integration pipeline, automated security testing is much more difficult to get right than it might
10%
Secret Sauce
09.11.2017
Home »  Articles  » 
Senior Architect and Software Fellow Ben Sander about HIP and how it emerged from the ROCm development process. “When we started putting together the ROCm environment, one of the things we heard from ... AMD senior architect Ben Sander explains how the HIP interface integrates existing CUDA programs with the ROCm open development environment.

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 95 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice