Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (350)
  • Article (121)
  • News (3)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 48 Next »

16%
The RADOS object store and Ceph filesystem
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Brigida Soriano, Fotolia.com
Cloud computing is, without a doubt, the IT topic of our time. No issue pushes infrastructure managers with large-scale enterprises as hard as how to best implement the cloud. The IaaS principle
16%
Building Big Iron in the Cloud with Google Compute Engine
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Zavalnyuk Sergey, 123RF.com
, and infinitely performant. It's the best of both worlds for technical people and bean counters alike. Google Compute Engine is a stellar IaaS (Infrastructure as a Service) example that is part of a larger suite
16%
Monitoring container clusters with Prometheus
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Guido Vrola, 123RF.com
in turn stores as a separate time series. The software can already cope with millions of time series, yet version 2.0 [6] should cover more extreme Kubernetes environments with thousands of nodes
16%
Managing Linux Memory
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © J.R. Bale, 123RF.com
application server. On a system in a stable state, throughput initially is not affected by file operations, but after a certain value (e.g., 16,384MB), performance collapses. As Figure 1 shows
16%
Protecting your web application infrastructure with the Nginx Naxsi firewall
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Pansiri Pikunkaew, 123RF
] 03 04 enabled = true 05 port = http,https 06 filter = naxsi 07 logpath = /var/log/nginx/error.log 08 maxretry = 6 09 banaction = iptables-multiport-log 10 action = %(action_mwl)s 11 12 # filter
16%
Security data analytics and visualization with R
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Rancz Andrei, 123RF.com
and document the evidence Principle 6: Content is king The subtext of each of these principles is that a graphic should tell a complete, credible story while recognizing that "analytical presentations
16%
Jenkins Configuration as Code
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Amri Wolfgang, 123RF.com
-p ${CASC_JENKINS_CONFIG} && mkdir -p ${JENKINS_HOME}/plugins && adduser -h ${JENKINS_HOME} -u ${UID} -s /bin/bash -D ${JENKINS_USER} && chown -R ${UID} ${JENKINS_HOME} ${CASC_JENKINS_CONFIG} 20 21
16%
Tuning SSD RAID for optimal performance
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © ELEN, Fotolia.com
to form a page (e.g., 8KB). Several pages then form a block (~2MB). At this level, the first peculiarity of flash memory already comes to light: Whereas new data can be written to unused pages, subsequent
16%
Desktop Supercomputers: Past, Present, and Future
17.03.2021
Home »  HPC  »  Articles  » 
in a custom deskside chassis. A third system, from Cray, used commodity processors with custom motherboards and chassis. It focused on incorporating Cray’s high-performance computing (HPC) expertise
16%
New versions of the Endian and Sophos UTM solutions
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Dmitriy Cherevko, 123RF.com
, it lacks all proxy-based features such as HTTP(S), SMTP, and POP3 and thus antivirus scanning, URL filtering, and application control. In terms of VPN protocols, however, IPsec and OpenVPN are missing; only

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 48 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice