Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (31)
  • Article (18)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5

26%
Kubernetes networking in the kernel
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © balein, 123RF.com
and choice in this vital area. I focus on the open source Cilium network plugin, which is one of a few CNI choices that leverages eBPF (the successor to the Berkeley Packet Filter) to provide high performance ... Cilium and eBPF put Kubernetes networking down in the kernel where it belongs. ... Cilium and eBPF Networking
26%
Processor and Memory Metrics
12.02.2014
Home »  HPC  »  Articles  » 
to compute the “rate” statistics. On my desktop, if I use anything quicker (i.e., <0.5 seconds), I don’t always see the load vary much. Listing 2: Top-like Information #!/usr/bin/python   try:   import
26%
Proactive Monitoring
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Tom Wang, 123RF.com
: Monitored hosts send metrics to Riemann, and they assess their status themselves, rather than leaving this decision to a central instance [2]. In addition to the server, which is implemented in Clojure
26%
Security in the AWS cloud with GuardDuty
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © xcfoto, 123RF.com
the resulting alerts into a security operations center (e.g., Splunk), I'll demonstrate an end-to-end DevSecOps solution. Cloud technologies have brought a number of significant advances in the ways we create
26%
Secure cloud-native services with Prisma Cloud Compute
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © alexmillos, 123RF.com
. After the introduction of multiple new features (e.g., the ability to protect host machines that aren't running containers, serverless function protection, and improvements in continuous integration
26%
Lean on Logwatch
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © MuharremZengin, 123RF.com
reasons. In the future, logwatch supposedly will accommodate standalone SMTP-speaking utilities (e.g., mail, mailx, and heirloom-mailx, a.k.a. nail) that will be able to slot into the mailer = config
26%
Installing and operating the Graylog SIEM solution
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
between the sender and receiver. The script reads the original logfile and forwards the content. Listing 10 Editing Oracle Logs 01 #!/bin/bash 02 #set -x 03 file=/tmp/listner.log 04 if [ ! -e
26%
Look for Bottlenecks with Open|SpeedShop
21.12.2011
Home »  HPC  »  Articles  » 
function calls. Output is optionally a line of trace per MPI function call. All calls are accounted for by wrapping, (i.e., no sampling). The time reported is wall clock time.
Call path information also
26%
Ergonomics and security of graphical email clients
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Vlad Kochelaevskiy, Fotolia.com
it speeds up processes compared with snail mail; also, you can send arbitrary attachments. However, modern email programs can do more than read, write, and send messages. They can also integrate the messages

« Previous 1 2 3 4 5

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice