Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1572)
  • Article (347)
  • News (225)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 167 168 169 170 171 172 173 174 175 176 177 178 179 180 ... 215 Next »

18%
Make better use of Prometheus with  Grafana, Telegraf, and Alerta
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Valerie Elash on Unsplash
& Container Overview, for example (Figure 3), shows which containers run on a host and the resources they consume. Figure 3: Even if you use Docker, you
18%
Highly available storage virtualization
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Les Cunliffe, 123RF.com
-link configuration, the LUNs from the other location are also presented to all cluster nodes (Figure 3). If the local LUNs are lost, the node can access the LUNs at the other location without interruption through
18%
Security analysis with Microsoft Advanced Threat Analytics
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © fourseasons, 123RF.com
/sec and EntityTransfer Activity Transfers/sec features. For more information, check out the TechNet forum on ATA [3]. The next step is to configure a first ATA gateway (Figure 3). To log in to the ATA Center
18%
Opportunities and risks: Containers for DevOps
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Ping Han, 123RF.com
the benefits imparted by using Docker. Therefore, a look at alternatives couldn't hurt. OverlayFS and LXC Linux containers (LXC) also has an OverlayFS driver (Figure 3) and is hardly less potent than Docker
18%
Live migration of virtual machines with KVM
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © SV-Luma, 123RF.com
-or-less sophisticated alternatives, which the KVM project lists on its own page [3]. One highlight here is Proxmox VE; openQRM  [4] takes a further step in the direction of cloud management. One interesting and much
18%
Ceph object store innovations
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Max, fotolia.com
, that version was not available at the time of this review, the work on the DSPs was largely completed. Recently, the Jewel version of CephFS was announced to be stable – "with caveats" [3]. New Functions
18%
Distributed denial of service attacks from and against the cloud
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © leksustuss, 123RF.com
on the Internet. After Spamhaus commissioned cloud security provider CloudFlare [3] to defend its infrastructure, it was able to resume its usual services. The attackers, however, didn't give up. A week later
18%
Manage Windows images with the Windows ADK
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Maksym Yemelyanov, 123RF.com
be found online [3], although it is targeted at system administrators who are familiar with Windows development. Performance data acquisition is split into two parts: Windows Performance Recorder
18%
Six storage drivers for Kubernetes
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © webreporter, photocase.com
-node setups. Both MicroK8s and K3s use Hostpath in the basic installation. Hostpath can do little more than create and delete file-based PVs. Also, the driver cannot control or limit the memory quota. Nothing
18%
News for Admins
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
 
percent of the vulnerable versions have safer alternatives available. 3.6 percent of dependencies are still vulnerable because they were updated to another insecure version. Reliance on end

« Previous 1 ... 167 168 169 170 171 172 173 174 175 176 177 178 179 180 ... 215 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice