Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (475)
  • Article (139)
  • News (41)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ... 67 Next »

44%
Terraform multicloud orchestrator version 1.0
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Annie Spratt on Unsplash
you actually do with the product? Clear-Cut Architecture When you look at the schematic of the Terraform components, you will notice that the solution is pleasingly simple. If you look
44%
Security analysis with Security Onion
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Mick Haupt on Unsplash
translation (NAT) host but on an actual network. Your best option is to provide real network interface cards to the VM and connect one of the cards to your switch's monitoring port. In this way, you can quickly
44%
Alternative virtualization solutions when OpenStack is too much
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Lead Image © elnur, 123RF.com
of virtualization hosts (i.e., the actual compute nodes). The nodes communicate with their controller through a controller agent process and thus know what they have to do. The reward for this effort is a small
44%
MinIO: Amazon S3 competition
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © zelfit, 123RF.com
, the manufacturer also offers to reimburse customers for some damage that could occur to the stored data. The costing for both models refers to the actual amount of storage in use, so if you have a 200PB cluster
44%
The advantages of configuration management tools
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Galina Peshkova, 123RF.com
representatives of this species are vying for the attention of users: Etcd [1], Consul [2], and ZooKeeper [3] are just a few. What are these configuration managers actually about? What are their preferred fields
44%
Interview with Cloud Foundry CEO Sam Ramji
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
 
Governance. This is where we deal with things like budget, standards, operations, bylaws, etc. The second lane is our Technology Roadmap: How are we actually implementing technology day by day; that's our
44%
Transparent SIP communication with NAT
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © studiom1, 123RF.com
computer outside the network can be reached on a fixed port (range). The big advantage of port forwarding is that it is the only NAT traversal technique that actually works for many applications, although
44%
Linux nftables packet filter
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © alphaspirit, 123RF.com
on Layer 2, providing functions similar to the tc (traffic control) [2] tool. Unlike Netfilter, nftables has no predefined constructs for tables and chains in which the actual rules end up. Administrators
44%
Policy-based DNS in Windows Server 2016
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © mikiel, 123RF.com
of DNS policies are more like firewall rules than Group Policy. For one thing, only the first policy for which all conditions apply actually works. For another, the DNS policies do not configure any
44%
Optimizing Windows 10 for SSDs
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Sergiy Serdyuk, 123RF.com
, it remains on the hard disk and is only deleted from the file allocation table. The actual file data is still stored on the hard drive. Windows overwrites this data when the operating system needs the space

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ... 67 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice