Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (953)
  • Article (264)
  • News (101)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 36 37 38 39 40 41 42 43 44 45 46 47 48 49 ... 133 Next »

16%
End-to-end monitoring – Measuring what the user perceives
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © complize, photocase.com
the performance and availability of business-critical applications from the user's point of view. Quality checks thus take place when the program is running in production mode. The objective is to ensure not only
16%
A new approach to more attractive histograms in Prometheus
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Markus Winkler on Unsplash
, if needed, to reduce memory useage. Results Figure 3 shows a comparison for computing the 95th percentile of a specific query for identical data. At each point on the x axis, the corresponding y value
16%
OpenStack observability with Sovereign Cloud Stack
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Michaela Filipcikova on Unsplash
at this point. Initially, the idea of integrating it directly was considered; however, for the time being, Alert Manager was deemed sufficient. Alert rules are an important part of Prometheus monitoring
16%
Automatic data encryption and decryption with Clevis and Tang
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by London Scout on Unsplash
needs to authenticate itself to the service, so that no one can read the secrets from the vault. Because the vault service now has all the secrets stored in its database, it is also a single point
16%
Asset tracking with RFID
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Vasiliy-Yakobchuk, 123RF.com
is placed. A mobile reader is not necessarily part of the solution. Behind the concept of the "choke point" hides the relatively simple idea that readers are placed at critical points. In a hospital
16%
Meet the CTO of Red Hat
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo courtesy of Swapnil Bhartiya
's relatively easy to find emerging trends and technologies, but the real challenge is to identify the projects which are healthy and then try to find the intersection point into our product world," said Wright
16%
What's new in Ansible 2.0
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Viktor Gladkov, 123RF.com
if dependencies could lead to inconsistent states, however. At this point, you can't forget the serial parameter, which has been around longer. This parameter define how many hosts Ansible targets at the same time
16%
Tested: Barracuda firewall X201
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
of the current product activation state. More importantly, several powerful setup wizards were added that guide the user through the initial setup process, including DHCP or WiFi Access Point setup (models X101
16%
Network monitoring with Total Network Monitor
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Tono Balaguer, 123RF.com
on the device or server.At this point, you can already see whether the devices are responding to pings. Besides automatic integration, you can also enter servers manually via the context menu of a group. Start
16%
Operating system virtualization with OpenVZ
28.06.2011
Home »  CloudAge  »  Articles  » 
 
a different principle based on the fact that – from the application's point of view – every operating system comprises a filesystem with installed software, space for data, and a number of functions

« Previous 1 ... 36 37 38 39 40 41 42 43 44 45 46 47 48 49 ... 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice