Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (898)
  • Article (272)
  • News (38)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 ... 122 Next »

42%
Distributed denial of service attacks from and against the cloud
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © leksustuss, 123RF.com
, the DDoS attack on Spamhaus was triggered by 36-byte data packets, each of which triggered a 3,000-byte response. Although a normal desktop PC can handle about 1,000 DNS requests per second, a single DNS ... In some particularly sophisticated DDoS attacks, the attackers rely on and target the cloud, allowing attackers to work around conventional defense mechanisms. We explain how a DDoS attack ... DDoS in the Cloud
41%
Zero-Ops Kubernetes with MicroK8s
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Among the number of burgeoning Kubernetes distributions available today is the excellent production-ready K3s [1], which squeezes into a tiny footprint and is suitable for Internet of Things (Io ... A zero-ops installation of Kubernetes with MicroK8s operates on almost no compute capacity and roughly 700MB of RAM. ... MicroK8s ... Zero-Ops Kubernetes with MicroK8s
39%
Red Hat’s Cloud Tools
08.07.2013
Home »  Articles  » 
 
Red Hat massively expanded its cloud portfolio during 2012. This overview can help you evaluate Red Hat’s products in the context of VMware and others. ... of increasing complexity become visible. The Red Hat Cloud with Virtualization Bundle is a package consisting of RHEV Version 3.1 and CloudForms 1.1 that sets out to facilitate an enterprise’s entry into cloud ... Red Hat massively expanded its cloud portfolio during 2012. This overview can help you evaluate Red Hat’s products in the context of VMware and others. ... Red Hat’s Cloud Tools ... Red Hat’s Cloud and Virtualization Portfolio
38%
Deis combines Docker and CoreOS
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © jager, 123RF.com
efficiency, along with simpler management, explains the meteoric rise of Docker [3], LXD [4], OpenStack [5], and other container-based tools: Everything called a "container" is currently very popular ... Deis PaaS Platform
38%
AMD’s Greg Stoner on ROCm
31.10.2017
Home »  HPC  »  Articles  » 
Exploring AMD’s ambitious Radeon Open Compute Ecosystem with ROCm senior director Greg Stoner. ... how I see what we’re doing with ROCm. We planted a flag, and now it’s an evolution. Resources [1] ROCm [2] ROCm – A New Era in Open GPU Computing [3] ROCm documentation [4] ROCm video [5] HIP [6 ... Exploring AMD’s ambitious Radeon Open Compute Ecosystem with ROCm senior director Greg Stoner. ... AMD’s Greg Stoner on ROCm
37%
Warewulf Cluster Manager – Development and Run Time
18.07.2012
Home »  HPC  »  Articles  » 
The Warewulf cluster is ready to run HPC applications. Now, it’s time to build a development environment. ... that come with the package. In this case, hwloc itself is 1.0MB, but the sum of it and all of the dependencies is 11MB. Again, this might or might not seem like a large amount to you. It’s your decision ... The Warewulf cluster is ready to run HPC applications. Now, it’s time to build a development environment. ... Warewulf Cluster Manager – Part 3
37%
DDoS protection in the cloud
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Amy Walters, 123RF.com
to fend off a DDoS attack, you need to filter for both IPv4 and IPv6 addresses, the IP protocol, and the destination port. With OpenFlow, you not only can drop packets, but change addresses and virtual ... OpenFlow and other software-defined networking controllers can discover and combat DDoS attacks, even from within your own network. ... DDoS protection in the cloud
37%
ISC 2024 from a Distance
10.06.2024
Home »  HPC  »  Articles  » 
What’s new at the 2024 International Supercomputing Conference and in the TOP500. ... , Aurora took the number 1 spot for the mixed-precision HPL-MxP benchmark, reaching 10.6 exaflops and passing Frontier’s performance of 10.2 exaflops. Using power numbers, this means Aurora has a performance ... What’s new at the 2024 International Supercomputing Conference and in the TOP500.
37%
Listing 5
21.08.2012
Home »  HPC  »  Articles  »  Warewulf 4 Code  » 
 
-14.el6_3.x86_64.rpm                                | 2.2 MB     00:01 (3/4): php-common-5.3.3-14.el6_3.x86_64.rpm                             | 522 kB     00:00 (4/4): php-gd-5.3.3-14.el6_3.x86_64.rpm
37%
Exploring OpenShift – Red Hat's next-generation PaaS tool
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
(C) Markus Feilner, CC-BY-SA 4.0
cloud offerings from Red Hat. Gears and Cartridges Like other PaaS technologies, OpenShift is generally focused on web development. Only Ports 22, 80, 443, 8000, and 8443 are available from the outside ... Exploring OpenShift – Red Hat's next-generation PaaS tool

« Previous 1 2 3 4 5 6 7 8 9 10 ... 122 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice