Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (174)
  • Article (77)
  • News (49)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 Next »

32%
Using benchmarks to your advantage
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Tom De Spiegelaere, 123RF.com
NPB has been released three times, each undergoing several versions as bugs were found or improvements were introduced. As of this writing, the latest version is 3.3.1 for both NPB and NPB-MZ (multizone
32%
A TurnKey Linux software evaluation platform
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Orlando Rosu, 123RF.com
open source tools are provided to ensure no license problems or restrictions. TurnKey Linux (TKL) is based on Debian 7.2 and thus provides business applications and security updates for more than 37,500
32%
Quick and easy SaaS provisioning for OpenLDAP
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © scyther5, 123RF.com
not the only show in town that enables this type of provisioning, and the general principle of the integration explained here holds true for other providers, but the huge range of supported apps (approximately 5,500
32%
Bare metal deployment with OpenStack
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Anatolii Nesterov on Unsplash
and Service Manager) are used to deploy an operating system on a node. OSISM [3], the deployment and lifecycle management framework, installs and configures all the required OpenStack components on that node so
32%
Manage Windows AD with PowerShell
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Kelly Sikkema on Unsplash
accounts. You can simply disable accounts that are no longer needed: Get-ADUser -Identity svc_low_SQL3 | Disable-ADAccount This method also works with accounts belonging to external identities
32%
When I/O workloads don't perform
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Viacheslav Iakobchuk, 123RF.com
.00 TB] Logical block size: 4096 bytes LU is fully provisioned Rotation Rate: 7200 rpm Form Factor: 3.5 inches Logical Unit id: 0x6000c500a7b3ceeb0000000000000000 Serial number
32%
Professional virtualization with RHV4
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Steve Cukrov, 123RF.com
for cluster functions) that can be implemented on either the RHVH mini-footprint or RHEL. The former version was less popular with RHV insiders up to and including version 3.6 because of the heavily restricted
32%
Time-series-based monitoring with Prometheus
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Juthamas Oonhawat, 123RF.com
such as containers. In native cloud environments, Prometheus [3], with its time series database approach, has therefore blossomed into an indispensable tool. The software is related to the Kubernetes [4] container
32%
Monitoring in the Google Cloud Platform
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Maksym Chornii, 123rf.com
Installing the Ops Agent :> agents_to_install.csv && echo '"projects/playground-gs/zones/europe-west3-c/instances/test-vm1","[{""type"":""ops-agent""}]"' > agents_to_install.csv && curl -sSO https://dl
32%
Security analysis with Security Onion
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Mick Haupt on Unsplash
and patterns in the log data and then generate alarms or events from the corresponding data for further processing by analysts. Security Onion comes with more than 500 of these Plays, which you can use as

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice