Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (702)
  • Article (153)
  • News (97)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 32 33 34 35 36 37 38 39 40 41 42 43 44 45 ... 96 Next »

12%
Privacy Concerns: Beyond the GDPR
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © RAJESH RAJENDRAN NAIR, 123RF.com
over my laptop camera, but I am concerned for our collective privacy. If I know you and like you enough, I'll share the information I want you to have, but not until then. I certainly don't want to share
12%
The achievements of and plans for systemd
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lennart Poettering CC-BY-SA-3.0
on our laptops remains at least as secure in every way as, say, on a Chrome OS system. It's downright embarrassing that this is not yet the case. We need to do better, especially in this age of Pegasus
12%
The History of Cluster HPC
15.02.2012
Home »  HPC  »  Articles  » 
, the term Accelerated Processing Unit or APU, is used to describe these new processors. AMD has already released some desktop and laptop versions of these processors, but sharing of memory is somewhat
12%
Checking your endpoints with Stethoscope
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Ewa Walicka, fotolia.com
are usually called "endpoints." Examples of endpoints include laptops, thin clients, smartphones, tablets, and Internet of Things (IoT) devices, but a server could also qualify as an endpoint. Securing endpoint
12%
Tools for troubleshooting the network
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Photographer, 123RF.com
, a laptop and an extra cable tester will be more helpful. This mix of equipment, however, is more unwieldy, heavier, more complex, and less robust than a specialized network tester. In contrast, Lan
12%
An IP-based load balancing solution
21.07.2011
Home »  CloudAge  »  Articles  » 
 
concept. It includes the IPVS kernel code, cluster monitoring tool and web-based cluster configuration tool. The Piranha monitoring tool has two main features: Heartbeating between active and backup
12%
Link aggregation with kernel bonding and the Team daemon
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Steven Cukrov, 123rf.com
parameters but attempt to define custom values (e.g., for the MII link monitoring frequency). In the worst case, only a modinfo against the bonding module will help you find the required parameter – combined
12%
A versatile proxy for microservice architectures
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Russell Shively, 123RF.com
their own filters. More specifically, these filters have access to the entire HTTP flow and can monitor or modify it according to the tools provided by the HTTP filter. The developers cite HTTP packet
12%
Persistent storage management for Kubernetes
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by CHUTTERSNAP on Unsplash
Distributed Object Store (RADOS). The ceph-mon cluster monitor monitors the function and configuration of the cluster nodes. It stores information about the placement of data and the general state
12%
Manage cluster state with Ceph dashboard
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © damedeeso,123rf.com
to make sense of the individual commands that Ceph now handles. The dashboard provides a much-needed bridge for the most basic tasks. Monitoring Hard Disks Although most administrators today want a flash

« Previous 1 ... 32 33 34 35 36 37 38 39 40 41 42 43 44 45 ... 96 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice