Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (276)
  • Article (45)
  • News (6)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 33 Next »

16%
Key-value stores: an alternative to relational databases
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © islander11, 123RF.com
have virtually become generic terms for databases themselves, to which the LAMP stack (e.g., Linux, Apache, PHP, MySQL) bears witness to this day. However, just as LAMP has become less important over
16%
Introducing the NoSQL MongoDB database
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Wesley Tingey on Unsplash
., provisioning, scaling, updating, backup, and security configuration) and runs on the major cloud platforms (e.g., AWS, Azure, Google Cloud). In addition to the basic database functions, MongoDB Atlas includes
16%
Finding Your Way Around a GPU-Accelerated Cloud Environment
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © Lucy Baldwin, 123RF.com
, Google, or Linode, to name but a few options. This month I look at the tools needed to discover, configure, and monitor an accelerated cloud instance in my trademark style, employing the simplest possible
16%
Project management with Phabricator
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Joy Fera, fotolia.com
; instead, you need to make a separate virtual host available for Phabricator. This vhost also requires a host name with a complete domain. If you use Red Hat-related Linux distributions or Ubuntu, you can
16%
Turning machine state into a database
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Lucy Baldwin, 123RF.com
by the Linux Foundation's recent announcement [2] of yet another open source foundation, this one tasked with steering the development of a really under-appreciated tool named osquery [3]. The announcement
16%
Call web pages in the terminal with Browsh
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © yemelyanov, 123RF.com
with the IP address or the name of the computer on which the browser is running in server mode. Default port 4333 can be changed by editing the port= variable in the configuration file. To call up a page (e
16%
Error-correcting code memory keeps single-bit errors at bay
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Igor Stevanovic, 123RF.com
the second and seventh from the left – the byte is now 11011110 (i.e., 222). Typical ECC memory can detect that the "double-bit" error occurred, but it cannot correct it. In fact, when a double-bit error
16%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
, which Andres Freund discovered by chance. The EASM market segment is home to various major players such as IBM (with the acquisition of Randori in 2022), Google Cloud (with the acquisition of Mandiant
16%
Pulumi multicloud orchestrator
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Dmitriy Shpilko, 123RF.com
is that there are so many of them, and the subject of orchestration in the cloud is no exception. AWS has a dedicated service named CloudFormation for this task. Microsoft Azure and Google Cloud services can also
16%
Quick UDP Internet connections
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Jonathan Chng on Unsplash
The Quick UDP Internet Connections (QUIC) protocol [1] originated in 2012 as a Google project led by Jim Roskind to improve security and performance over TCP. The protocol made the leap to four

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 33 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice