Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (265)
  • Article (47)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 Next »

26%
Docker and Podman environments on Windows and Mac machines
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bowie15 , 123RF.com
.14, although you can still resort to Docker Machine [3] in this case, which creates a virtual Linux system on the local host that you can then use to access the Docker engine. The example in Figure 1 uses
26%
Processing streaming events with Apache Kafka
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Photo by Mark Decile on Unsplash
Connect [3], the Confluent Schema Registry [4], Kafka Streams [5], and ksqlDB [6] are examples of this kind of infrastructure code. Here, I look at each of these examples in turn. Data Integration
26%
MySQL is gearing up with its own high-availability Group Replication solution
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © lassedesignen, 123RF.com
One important reason for the success of MySQL [1] is asynchronous replication, introduced in the 2001 release 3.23, which allows admins to set up replica instances (slaves) that receive all data
26%
News for Admins
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
 
is, the fewer vulnerabilities it is likely to have. According to the report, container images smaller than 100MB had 4.4 high or critical vulnerabilities, versus 42.2 for images between 250 and 500MB ... and Management Software; LPI Launches Open Source Essentials Program; Apache Software Foundation Celebrates 25 Years; SUSE Announces Rancher Prime 3.0; NSA Issues Zero Trust Guidelines for Network Security
26%
Keep an eye on your network
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © damedeeso, 123RF.com
://pkg.osquery.io/rpm/GPG | sudo tee /etc/pki/rpm-gpg/RPM-GPG-KEY-osquery Now add and enable the repository with: $ sudo yum-config-manager --add-repo https://pkg.osquery.io/rpm/osquery-s3-rpm.repo $ sudo yum
26%
Efficient password management in distributed teams
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Sergey Nivens, 123RF.com
in source code, such as: var PASSWORD = 'sn4k3oil' This method tackles the challenge of keeping secret information synchronized between all team members in a simple, although not secure, way. On the one
26%
Visualizing log and other data
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Gennadiy Poznyakov, 123RF.com
it as an "experiment in organic software visualization" [3]. Similarly to Gource, code_swarm animates project changes in a version control system. Files appear as dots; their colors again indicate the file type (Figure
26%
Scale-out with PostgreSQL
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Alberto Andrei Rosu, 123RF.com
--name yb2 --hostname yb2 --net=yb -p5432:5433-p7002:7000 yugabytedb/yugabyte:latest yugabyted start --daemon=false --listen yb2 --join yb1 $ docker run -d --name yb3 --hostname yb3 --net=yb-p5433:5433 -p
26%
A Container for HPC
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © orson, 123RF.com
. A container consists of the application itself and any library or system dependencies and is referred to as "operating system virtualization" [3]. This higher level of virtualization may allow you to use
26%
Darshan I/O analysis for Deep Learning frameworks
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Michaela Murphy on Unsplash
[2] (section 3.2). Next, I built the Darshan utilities (darshan-util) with the command: ./configure CC=gcc --prefix=[binary location] Because I'm running these tests on an Ubuntu 20.04 system, I had

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice