Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (702)
  • Article (153)
  • News (97)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 96 Next »

12%
MariaDB MaxScale: A smart proxy for MySQL
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © lightwise, 123RF.com
with the monitor plugin, which keeps track of the configured back ends and their availability; it also knows whether it is a master or slave. On the basis of this information, the MySQL back-end module finally sends
12%
Apache Storm
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergei Tryapitsyn, 123RF.com
the cluster nodes. It assigns tasks to the available nodes and monitors their accessibility and availability. Figure 1: The architecture of a simple Storm
12%
Efficiently planning and expanding the capacities of a cloud
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © digifuture, 123RF.com
volume. Metering solutions such as PNP4Nagios attached to monitoring systems can hardly cope with such amounts of data, especially if classical databases such as MySQL are responsible for storing
12%
Tools for testing container vulnerability
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by mari lezhava on Unsplash
for automatically monitoring a container fleet for security problems. They promise no less than an all-in package: The tools on offer check individual containers or connect directly to a local continuous integration
12%
VMware vRealize Automation 7
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Dmitriy Shpilko, 123RF.com
VMware products, such as NSX (for virtualization and security automation), vRealize Operations (for monitoring and capacity planning) or vRealize Log Insight (for log analysis). To be able to manage cloud
12%
Data security and data governance
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Maksim Kabakou, 123RF.com
protection: encryption, tagging, and other technologies for both storage and data transfer. Monitoring and analysis: continuous monitoring of access to and the use of data, and analysis to detect
12%
Common DevOps Mistakes
29.11.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © leeavison, 123RF.com
, configuration, and monitoring. This process is called DevOps. It’s new, broad in scope, and often confusing. This means that DevOps adoption comes with a minefield of potential mistakes. I’ll look at some common
12%
Windows Server 2016 for small servers
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © blas, Fotolia.com
Session Host, formerly Terminal Server, for small businesses or training centers that provides a way for users to connect a monitor, keyboard, and mouse directly to the server. The virtual desktops
12%
Turning machine state into a database
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Lucy Baldwin, 123RF.com
with monitoring system state. Osquery encapsulates the state of the system as a relational database and then allows users to use SQL queries to explore this data from any angle. The results can be tailored
12%
Microsoft Active Directory Rights Management Services
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © vska, 123RF.com
. Logging AD RMS writes important information to the application, security, system, and AD RMS event logs on the AD RMS server. Some specific events that are critical to monitor are shown in Table 1

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 96 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice