Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (48)
  • Article (10)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 Next »

25%
Jira, Confluence, and GitLab
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Iaroslav Neliubov, 123RF.com
When investigating DevOps, you will come across various definitions that ultimately refer to an agile work approach. DevOps, it's said, is ultimately quite simple: Admins take over responsibility
25%
Migrating your network to IPv6
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Jarts, PHOTOCASE.com
of the existing IT systems. In the best case, you will have a well-maintained, up-to-date Configuration Management Database (CMDB). In addition to other information, your list should include the following data
24%
When are Kubernetes and containers not a sensible solution?
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Kelly Sikkema on Unsplash
256 checksums of the individual files match). This way of tracking whether any local changes have been made to the package content is both excellent and compliant. The situation is quite different
24%
Manage projects in SMEs with OpenProject
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Pedro Miranda on Unsplash
on the market make it possible to plan and keep track of projects, especially in the open source world. Central Aspects Project management is a bit like the cloud: Everyone who uses the word associates
24%
Secure Kubernetes with Kubescape
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © limbi007, 123RF.com
stack combines so many components from so many different sources, in a more or less meaningful way, that it is not easy to keep track of and identify security updates for the various sources, finding
24%
Zero Trust as a security strategy
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Jack Dong on Unsplash
consistency at all levels of the company's IT. Most admins still encounter this basic idea in the data center today (e.g., when there is an internal zone containing the most important systems that do not have
24%
Moving HPC to the Cloud
19.10.2012
Home »  HPC  »  Articles  » 
., these are “on the wire” data transfers that are hard to virtualize). If high-performance networks are not available, many HPC applications run slowly and suffer from poor scalability (i.e., they see
24%
Automating network hardware
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Lead Image © Rajesh Rajendran Nair, 123RF.com
automation. On top of that, ACI can be dovetailed very closely with software, if desired (e.g., with a cloud tool such as OpenStack). However, a setup built in this way no longer offers the option
24%
Multifactor authentication from FIDO
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © John McAllister, 123RF.com
Research notes the cost of password breaches reached more than US$ 200 billion in annual losses. According to the Verizon 2013 Data Breach Report, weak or stolen credentials account for 76 percent
24%
Managing network connections in container environments
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Oudom Pravat on Unsplashx
hoc into a black hole (e.g., if the load is light at the moment and the resources are needed to handle other tasks). Therefore, it is enormously difficult to keep track of all the paths for inter

« Previous 1 2 3 4 5 6 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice