Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (578)
  • Article (161)
  • Blog post (5)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ... 75 Next »

15%
Getting Ready for the New Ceph Object Store
19.05.2016
Home »  HPC  »  Articles  » 
The Ceph object store remains a project in transition: The developers announced a new GUI, a new storage back end, and CephFS stability in the just released Ceph v10.2.x, Jewel. ... , which is one of the main reasons CephFS has not yet been released for production. The good news: In the newest version of Ceph (Jewel v10.2.x), the developers were looking to stabilize CephFS. Although ... The Ceph object store remains a project in transition: The developers announced a new GUI, a new storage back end, and CephFS stability in the just released Ceph v10.2.x, Jewel.
15%
Ceph object store innovations
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Max, fotolia.com
, which is one of the main reasons CephFS has not yet been released for production. The good news: In the newest version of Ceph (Jewel v10.2.x), the developers were looking to stabilize CephFS. Although ... The Ceph object store remains a project in transition: The developers announced a new GUI, a new storage back end, and CephFS stability in the just released Ceph c10.2.x, Jewel.
15%
Time-series-based monitoring with Prometheus
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Juthamas Oonhawat, 123RF.com
and easy installation, Prometheus, written in Go, is easy to try out. To install the software, first download Prometheus [8] and then unpack and launch: tar xzvf prometheus-1.5.2.linux-*.tar.gz cd
15%
Fedora 16
01.03.2012
Home »  Articles  » 
 
information. At the same time, a fairly large patch has been applied to the new kernel to upgrade the iSCSI target framework LIO, which was introduced in kernel 2.6.38, to LIO 4.1. The kernel code for software
15%
CrowdSec crowd security service
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Dan Burton on Unsplash
is a freelance IT consultant and has been working in IT for more than 20 years. In addition, he writes hands-on books and papers on Windows and other Microsoft topics. Online you can meet him on http://thomasjoos.spaces.live.com.
15%
Fedora 16 dials up cloud and virtualization capabilities.
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
desktop. The Gnome version that comes with Fedora 16 is definitely a more convincing package than Unity; however, from an administrator's point of view, the pillars of Gnome 3.2.1, including desktop
15%
Getting Started with HPC Clusters
05.06.2013
Home »  HPC  »  Articles  » 
$74.99 $74.99 1600MHz dual-channel memory 4x4GB = 16GB total memory 2 $49.99 $99.98 ZION XON-720P mATX/ITX slim desktop case 300W power supply
15%
Comparing PowerShell and Python
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Beboy, Fotolia.com
.x versions belong to Python's legacy branch. In mid-2010, the last major release appeared as version number 2.7. Since then, changes have been introduced, but these are mainly intended to allow
15%
SHA-3 – The new hash standard
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Warakorn Harnprasop, 133RF.com
has been able to cause a real collision up to the present day  – one thing was clear: SHA-1 was not secure for the long term. This just left the previously little-used hash functions of the SHA-2 ... NIST has chosen the Keccak algorithm as the new cryptographic hash standard but, in real life, many users are still waiting to move to its predecessor SHA-2.
15%
Port Knocking
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © rasslava, 123RF.com
, lightweight Android app that conveniently sends the knocking sequence from your smartphone. Other than adjusting the secret knock sequences, one final piece of config needs to change, which means going back

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ... 75 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice