Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (31)
  • Article (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4

29%
Software-defined networking for the future
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Leio McLaren on Unsplash
.0 was released in December 2009. The interface allows an SDN controller to reach beyond routers and switches, which was previously impossible. SDN is controlled in infrastructures by OpenFlow with Open
29%
Many Clouds, One API
22.08.2011
Home »  Articles  » 
 
’s cloud projects such as EC2 and S3 providing fully functional APIs for their own activities, they are in no way a workable solution for other public clouds. In fall 2009, Red Hat decided to address
29%
Monitoring Memory Errors
17.09.2013
Home »  Articles  » 
 
of background radiation – primarily neutrons from cosmic rays. The same Wikipedia article reports that the error rates reported from 2007 to 2009 varied all over the map, ranging from 10–10 (errors/bit-hr) to 10
29%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © AndreaDanti, 123RF.com
generic-service 21 host_name ubuntusrv 22 service_description Current Users 23 check_command check_nrpe!check_users!20!50 24 } 25 26 define ... 25
29%
Operating systems for the cloud and containers
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © leeavison, 123RF.com
to manage them disappeared. Container Linux ruthlessly replaces the entire /usr directory instead of individual files (Figure 3). The main work is handled by Linux containers à la Docker [20], or Rkt [21
29%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
connecting several IPsec alternatives to see which versions worked best (and worst) together. My tests included the following: Kame/Racoon on Mac OS X and Linux Solaris 10 Windows Server 2008
29%
Distributed storage with Sheepdog
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © kateleigh, 123RF.com
Kazutaka Morita launched the Sheepdog project [1] in 2009. The primary driver was the lack of an open source implementation of a cloud-enabled storage solution – as a kind of counterpart to Amazon
29%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the X.509 standard. These are typically stored on a hardware certificate storage
29%
WiFi 6 in the Enterprise
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Daniel Schönen, photocase.com
802.11ax Year of publication 1999 1999 2003 2009 2013 2020 Frequency (GHz) 2.4 5 2.4 2.4 and 5 5 2
29%
Keeping Docker containers safe
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Irina Tischenko, 123RF.com
of your development life cycle. Containers are far from being a new addition to server hosting. I was using Linux containers (OpenVZ) in production in 2009 and automatically backing up container images

« Previous 1 2 3 4

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice