Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1550)
  • News (737)
  • Article (313)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 196 197 198 199 200 201 202 203 204 205 206 207 208 209 ... 261 Next »

36%
Managing Bufferbloat
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Eric Issel, 123RF.com
: The relationship between throughput and delay for a packet-switched network. Discovery of Bufferbloat A few years ago, a Google programmer working at home uploaded a large file to his work server. His
36%
OCI containers with Podman
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Ray Aucott on Unsplash
on microservices deployed in containers with an orchestrator (to help manage multiple containers running at once) in the cloud. At this point, Google drew on an unparalleled 15 years of production experience
36%
Discover system vulnerabilities and exploits
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Charles on Unsplash
perfectly integrated into the system. Without further ado, the makers decided to retire BackTrack, and Raphael Hertzog, a long-time Debian developer and expert, was brought into the team. From then on, a new
36%
Useful tools for automating network devices
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
© Sila Nimkittikul, 123RF.com
architectures follow this classical approach, consequently leading to vendor lock-in. If you are planning a new scalable setup on a greenfield, you have one distinct advantage in this regard: You can decide
36%
Analyzing tricky database problems
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Photo by Quino Al on Unsplash
the original server has been restored. Although the database cluster solved urgent problems, it unfortunately also created new ones. The admins observed massive performance hits in the ownCloud instance
36%
Private cloud with Microsoft Azure Stack
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © Mikko J. Pitkänen, Fotolia.com
of physical resources – even if these resources, with Azure Stack, would be idle after use. Another fallacy is that all the new Windows Server 2016 features have been added to Azure Stack. Although the closed
36%
Highly available storage virtualization
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Les Cunliffe, 123RF.com
with extremely fast access times. SDS as a relatively new virtualization technology is generally considered to have the greatest potential for the future. However, it remains to be seen to what extent
36%
Build storage pools with GlusterFS
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © jala, Fotolia.com
of RAID 5 configuration, is relatively new. For fault tolerance and high availability, you also can mirror a storage volume to a remote site by means of georeplication. If disaster strikes and a server
36%
Key-value stores: an alternative to relational databases
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © islander11, 123RF.com
a few basic rules, the RocksDB developers significantly tuned their product for data store applications. RocksDB was inspired by Google's LevelDB [7], a key-value store capable of running exclusively
36%
How vector databases work and when they're used
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © neyro2008, 123rf.com
projects. Databases are ideal in this case because of their focus on real-time storage. How Vector Searches Work Vector databases do not rely on conventional search methods, but use new, specialized

« Previous 1 ... 196 197 198 199 200 201 202 203 204 205 206 207 208 209 ... 261 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice