Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (276)
  • Article (45)
  • News (6)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 Next »

16%
HPC resource monitoring for users
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © Andrey_Russinkovskiy, 123RF.com
-performance computing (HPC) system, and the readings are resource aspects of the system (e.g., CPU, memory, network and storage usage, etc.). Here, the telemetry is used to help the user understand what their application
16%
Network virtualization with OpenDaylight
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Juthamas Oonhawat, 123RF.com
introduces you to the structure based on a sample scenario. Google and Facebook provide examples of the need to manage data streams on networks in a targeted way. The legacy network architecture was unable
16%
Linux alternatives to Windows software
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
, proprietary alternative is also available in the form of Vivaldi. Even Google was able to gain a foothold on Linux with its Chrome browser and its free counterpart Chromium. If you prefer a text-based browser
16%
Dialing up security for Docker containers
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © Dmytro Demianenko, 123RF.com
example is the seccomp function, which is part of the Linux kernel and was originally developed for Google Chrome. Seccomp is designed to limit the permitted system calls (syscalls) to the absolute minimum
16%
Supercomputing Conference 2024
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © djem, 123RF.com
to volunteer. While attending SC24, I learned that SCinet uses 1MW/day. After a little Google search, I discoverd that's enough power for 1,000 American homes. This number led me to think about liquid
16%
Monitor Linux with Red Hat Insights
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Rgbspace, Fotolia.com
. Connectors are currently available for Amazon Web Services, Microsoft Azure, and the Google Cloud Platform. After provisioning the system, you will automatically have access to all other Insights services
16%
Linux infrastructure servers for small and midsize businesses
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Lead Image © stillfix, 123RF.com
not manage some services (e.g., the print server) with its own GUI but simply redirects you to the UI of the respective service (e.g., CUPS). Figure 1: Clear
16%
Remote maintenance and automation with RPort
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Claudia Soraya on Unsplash
server in Azure, Amazon Elastic Compute Cloud (AWS EC2), or Google Compute, you have to pay attention to the correct firewall settings when creating the VM. In addition to SSH port 22, you need to allow
16%
Many Clouds, One API
22.08.2011
Home »  Articles  » 
 
cloud to cloud. Differences exist not only in the naming of logically equivalent states and operations, but also in the quantity and sequence of the states (Figure 3). Because of this, Deltacloud provides
16%
Kali Linux is the complete toolbox for penetration testing
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Tatiana Venkova, 123RF.com
. An incorrect configuration of security settings can occur at all levels of the application stack (i.e., on web servers, application servers, and in databases and the web applications that use them). To detect

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice