Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (43)
  • Article (7)
Keywords

« Previous 1 2 3 4 5 Next »

18%
IO500
02.02.2025
Home »  HPC  »  Articles  » 
500 that people don't always consider is the IO500, perhaps it's because it’s storage focused – not one of the more exciting topics in HPC according to many people – or perhaps because it doesn’t get
18%
Getting started with AI
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © Lightwise, 123RF.com
a new "language." Which framework should I select and why? Was one a clear leader? I didn't see any pointers that said, "go this way," and I didn't see any articles that explained the trade-offs, but I
18%
Improved logging in Samba Winbind
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © monsit jangariyawong, 123RF.com
security services daemon (SSSD) is used to join a domain. Cluttered Logfiles The primary Winbind process creates a separate child process for each logical AD domain that the service wants to access. Each
17%
Lean Linux distribution for Kubernetes
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © joingate, 123RF.com
and it will take a long time to discover their existence, which is why they advocate making the Linux kernel more robust in its handling of security issues by defining special configurations and introducing
17%
Better monitoring for websites and certificates
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © amasterpics123, 123RF.com
place, and which status code it returns. However, for a real browser to display the page, one more value must be checked – the validity of the certificate: ./check_httpv2 --url https://www.checkmk.com
17%
Storage trends for taming the flood of data
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Natalia Lukiyanova, 123RF.com
expect from it. However, each hyperscaler uses different tools, some of which might be specific to a manufacturer, leading to gaps in the test suite. Moreover, the existing SSD error correction functions
17%
Anonymization and pseudonymization of data
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Debby Ledet on Unsplash
after anonymization and providing protection against re-identification risks. At the same time, these techniques offer immense opportunities, particularly with a view to leveraging big data and machine
17%
Self-hosted Pritunl VPN server with MFA
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Darko Novakovic, fotolia.com
inside your network to update the dynamic DNS hostname each time your public IP address changes. This client can be installed on Windows, Mac, and Linux and can often be found as an inbuilt client on your
17%
A GUI for Warewulf 4
06.05.2025
Home »  Articles  » 
laboratories, and commercial environments. It is easy to use, has great flexibility, and is stateless (no installation on a drive in each node). You can use it to boot groups of nodes with a particular
17%
Networking strategies for Linux on Azure
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image ©pakhnyushchyy, 123RF.com
, it's important to consider advanced patterns that address the specific requirements of these environments. A typical VNet can be structured to include multiple subnets, each tailored to the different

« Previous 1 2 3 4 5 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice