Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1559)
  • News (435)
  • Article (314)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 169 170 171 172 173 174 175 176 177 178 179 180 181 182 ... 232 Next »

12%
Build and host Docker images
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Sebastian Duda, 123RF.com
image by a provider – Ubuntu in this case. If you prefer a specific version, you can specify it after a colon (e.g., ubuntu:22.04). The RUN command initiates a command that Docker executes during
12%
Recovering from a cyberattack in a hybrid environment
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Kelly Sikkema on Unsplash
to provide an online identity but keep the authentication process entirely on-premises and rely on pass-through authentication (PTA) or locally installed instances of Active Directory Federation Services (ADFS
12%
Versatile network and system monitoring
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © erythropterus, 123RF.com
to the auto-discovery function, and the web-based interface provides a wide range of customization options for visualizing information. The auto-update mechanism also ensures that the monitoring environment
12%
Fast email server deployments with iRedMail
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Konstantin Inozemtcev, 123RF.com
a third party host their email service, and they end up purchasing plans with email providers such as Google or Microsoft. Family businesses in particular have a tendency to use free email plans from big
12%
News for Admins
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
 
-integrity/software-composition-analysis-tools/black-duck-sca.html) "combines multiple open source detection technologies, automated third-party software bill of materials (SBOM) analysis, and malware detection to provide a comprehensive view of software risks inherited from
12%
Energy efficiency in the data center
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Ussama Azam on Unsplash
usually vary depending on the regional costs levied by the cloud provider. That said, container technologies do make it relatively easy to move cloud resources to lower cost locations and flexibly drive
12%
Where does job output go?
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Charles Forerunner on Unsplash
– perform I/O. Consequently, a shared filesystem wasn't needed, and I/O could happen locally on one node. For many applications, local node storage provided enough I/O performance that the overall
12%
Sharding and scale-out for databases
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Dan Dennis on Unsplash
down a database namespace into its logical elements and distributing them to different databases in the background. DBMS sharding is therefore ultimately just an abstraction layer that provides a uniform
12%
Domain-driven design and agile development
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © omnimages, 123RF.com
software together. However, systems often turn out to be so large that a single team cannot handle the work involved, so you will end up coordinating several teams. In this case, DDD provides
12%
Profiling application resource usage
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© fauxware, fotolia.com
risen in popularity. These accelerators have the potential to provide much better performance in applications and algorithms that can take advantage of them compared with conventional CPUs. And

« Previous 1 ... 169 170 171 172 173 174 175 176 177 178 179 180 181 182 ... 232 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice