Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1550)
  • News (737)
  • Article (313)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 215 216 217 218 219 220 221 222 223 224 225 226 227 228 ... 261 Next »

36%
Why Good Applications Don't Scale
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © man64, 123RF.com
You just bought a new system with lots and lots of cores (e.g., a desktop with 64 cores or a server with 128 cores). Now that you have all of these cores, why not take advantage of them
36%
Tinkerbell life-cycle management
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Bee Felten-Leidel on Unsplash
environment is not new either. As an admin, you will always encounter the same old acquaintances: DHCP, PXE, TFTP, HTTP or FTP, NTP – that's it. This begs the question: What does Tinkerbell do differently than
36%
Kubernetes clusters within AWS EKS
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Zlatko Guzmic, 123RF.com
, courtesy of the popular cloud platforms, it has become easier to test more thoroughly on a managed Kubernetes service. These managed services include the Google Kubernetes Engine (GKE) [1], Azure Kubernetes
36%
Persistent storage management for Kubernetes
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by CHUTTERSNAP on Unsplash
from Azure, AWS, or Google. All PVs of a storage class are accessible through the same API or are coupled to the pod. PVCs, on the other hand, are requested by the application manager as a storage class
36%
Use Linux Containers with WSL2 on Windows
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Muneeb Syed on Unsplash
in parallel. Prepare WSL for Container Operation To run Linux containers in the best possible way on Windows, you need to install WSL2. The new version uses virtualization technologies from Hyper-V, its own
36%
Secure SSH connections the right way
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Olivier Le Moal, 123RF.com
of a spoofing attack, which still takes place on the web today. However, new, better ways can validate the authenticity of the parties involved. As the best possible compromise between security and convenience
36%
Secure Your KVM Virtual Machines
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © George Tsartsianidis, 123RF.com
infect the new host system. If you boot to the virtual machine over the network via PXE, the server contacted for this purpose must be trustworthy. This is especially true if you automated the process
36%
Disaster recovery for Windows servers
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © joseasreyes, 123RF.com
drive that is formatted automatically by the backup program so that all previously stored data is lost. To create a new job, select Action | Backup Schedule . For a custom backup, you can select which
36%
Relational databases as containers
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © James Thew, 123RF.com
there from the duration of the containers. Therefore, when you terminate a Docker instance, you still keep the data in that volume or directory. When you start a new container, you mount the host directory
36%
Correctly integrating containers
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Beboy, Fotolia.com
in June 2017 [5]. Kubernetes abstraction enables completely new concepts. Network policy [6] regulates how groups of pods talk with each other and with other network endpoints. With this feature, you can

« Previous 1 ... 215 216 217 218 219 220 221 222 223 224 225 226 227 228 ... 261 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice