Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (381)
  • News (193)
  • Article (79)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 ... 66 Next »

16%
Useful tools for automating network devices
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
© Sila Nimkittikul, 123RF.com
architectures follow this classical approach, consequently leading to vendor lock-in. If you are planning a new scalable setup on a greenfield, you have one distinct advantage in this regard: You can decide
16%
Highly available storage virtualization
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Les Cunliffe, 123RF.com
implementing such a project, all existing storage systems can continue to be used. Virtualization slots in between the existing storage infrastructure and the servers. All leading memory manufacturers have
16%
Interview with the developer of Singularity
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © wu ruiyun, 123RF.com
and private agendas undermined the structure of the group, and I decided to resign my lead and dissociate Centos from the project in which it was born. The final straw was as follows: I maintained
16%
Key-value stores: an alternative to relational databases
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © islander11, 123RF.com
, without being significantly less reliable in terms of data consistency. Etcd leads the way in this category, which explains why it is no longer used only for Kubernetes metadata in Kubernetes clusters
16%
How vector databases work and when they're used
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © neyro2008, 123rf.com
with a similar meaning and in a similar context are grouped together and lead to similar vectors. You can also compute the mean value of all the words in a query, sentence, or paragraph (Figure 2
16%
High availability with SQL Server 2012 and 2014
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © li xuejun, 123RF.com
the same shared SAN storage. A hardware defect here can thus easily lead to the loss of all data. To mitigate the risk of data loss, SAN replication can be used. In the case of a primary SAN storage failure
16%
Artificial admin
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Maxim Basinski, 123RF.com
, IT service providers will either specialize in individual services or mutate into platform providers themselves. Everything in between will disappear, leading to decreasing numbers of IT corporations grabbing
16%
Optimize and manage Linux-based Azure VMs
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Allan Swart, 123RF.com
these approaches can lead to a well-optimized environment, balancing performance and cost efficiency. Advanced Storage Management Azure VMs offer a variety of storage options to cater to the diverse needs
16%
Synchronizing repository changes with GitOps
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
they arise. Second, it supports rollback capabilities. If a new configuration leads to issues, it's often straightforward to revert to a previous version, reducing downtime and mitigating risks – unless
16%
Network load balancing on Windows Server
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Nathan Cima on Unsplash
individual server being overtaxed. This aspect is particularly important for high-traffic websites and applications, where peaks in network traffic can lead to noticeable performance losses or even downtime

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 ... 66 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice