Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (337)
  • Article (25)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 37 Next »

69%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
of all evil" sums up this point of view neatly [3]. The reasons for such a statement are particularly apparent in the many mangling strategies one can choose to apply to loops (Table 1). These strategies
69%
Cloud-native storage for Kubernetes with Rook
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © efks, 123RF.com
persistent storage can be connected without problem. Containers, on the other hand, present a different battle plan: Kubernetes [2] (Figure 1), Docker [3], and the many alternatives somehow all have
69%
Monitoring KVM instances with Opsview
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Gina Sanders, Fotolia
also frequently provides the underpinnings for a virtualization cluster that runs multiple guests in a high-availability environment, thanks to Open Source tools such as Heartbeat [2] and Pacemaker [3
69%
Serverless computing with AWS Lambda
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © joingate, 123RF.com
) traffic isn't permitted for running pings and other such network discovery services: Lambda attempts to impose as few restrictions as possible on normal language and operating system activities
69%
Hyper-V with the SMB 3 protocol
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Vladimir Kramin, 123RF.com
; there is no longer a requirement for a physical server name, as for a normal drive letter. SMB 3.0 in the Enterprise SMB 3.0 is much more robust, more powerful, and more scalable and offers more security than its ... Microsoft has introduced several improvements to Windows Server 2012 and Windows Server 2012 R2 with its Server Message Block 3. Hyper-V mainly benefits from faster and more stable access to network ... Hyper-V with SMB 3 ... Hyper-V with the SMB 3 protocol
69%
Efficiently planning and expanding the capacities of a cloud
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © digifuture, 123RF.com
want to scale clouds, you can't avoid following this path; otherwise, efficient capacity planning for a cloud is virtually impossible. Infos "Scalable Network Infrastructure in Layer 3
69%
Manage your own datawith ownCloud 2
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Ratchanida Thippayos, 123RF
in the spring of 2010 as a KDE project based on open standards but not requiring any KDE application as a dependency. It is free software released under the Affero General Public License Version 3. Version 2
69%
Workflow-based data analysis with KNIME
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Andrea De Martin, 123RF.com
Data analysts like to use flexible scripting languages such as R or Python that come with large ecosystems of libraries and extensions. But many users don't want to have to write and debug their own
69%
Setting up Exchange Server 2010 with SP1
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Francois Lariviere, 123RF.com
the available Rollup Packages. The link to, and details of, the current Rollup Package are available from the Exchange developer blog [3]. You don't need a product key to install Exchange Server 2010. If you don't
69%
Effective debugging of Docker containers
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Stuart Monk, Fotolia.com
in the worst case, the container crashes immediately after the docker run command. When starting a Docker container, two entries in the Dockerfile play a role: ENTRYPOINT and CMD. Many administrators don't

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 37 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice