Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (701)
  • Article (118)
  • News (2)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 83 Next »

8%
A Distributed SQL Database
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Sonika Agarwal on Unsplash
, the SQL subset is still limited, although the situation improves year by year. Ultimately, you need to test it yourself and see whether it fits your requirements. Infos CockroachDB: https://www.cockroachlabs.com
8%
Monitoring Active Directory Federation Services
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Helder Almeida, 123RF.com
also contains Windows Server 2012 R2 computers, which corresponds to ADFS 3.0, you will need to integrate the Management Pack available separately. Do not try to initiate the download from the SCOM
8%
Moving HPC to the cloud
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Zarko Cvijovic, 123RF.com
.4/hour (US$ 0.15/core per hour), Cluster GPU instance is US$ 2.1/hour, and the High I/O instance is US$ 3.1/hour. Thus, using the small usage case (80 cores, 4GB of RAM per core, and basic storage of 500
8%
Comparison of forensic toolkits for reconstructing browser sessions
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © stockbksts, 123RF.com
1 OSForensics http://osforensics.com 8,417 2 DFF http://www.digital-forensic.org 524 3 Autopsy http
8%
A script for strict packet filter updates
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © french 03, photocase.com
As soon as a machine becomes accessible over the Internet, attacks start to rain down on it. Tools such as Fail2ban help against brute force attacks but are not a panacea. A DIY script offers
8%
Segmenting networks with VLANs
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Maxim Kazmin, 123RF.com
2 3 4 5 6 7 8 0 0 0 0 1 1 1 1 2 1 0 0 0 0 0 0
8%
Monitoring, alerting, and trending with the TICK Stack
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Krishna Kumar-Sivaraman, 123RF.com
and alerting, trending is also necessary; in many cases, it is the only way you can know when to add hardware to compensate for an increased base load. Soon it becomes clear that typical monitoring solutions
8%
Routing with Quagga
19.02.2013
Home »  Articles  » 
cases, between a provider and an enterprise. RIP is the oldest IGP – the first version is from 1988. The current version is version 2, which also supports IPv6 via RIPng. Despite this, RIP is considered
8%
HPC Monitoring: What Should You Monitor?
15.01.2014
Home »  HPC  »  Articles  » 
a possible method for doing this). Again, it is based on what Harvard’s FAS RC team does (see “Scientific Software as a Service Sprawl” part 1 and part 2). This type of information is also invaluable
8%
Monitoring Storage with iostat
25.02.2013
Home »  HPC  »  Articles  » 
.00 0.00 01/31/2013 09:56:03 AM avg-cpu: %user %nice %system %iowait %steal %idle 6.00 0.00 2.00 0.50 0.00 91.50 Device: rrqm/s wrqm/s r/s w/s rMB/s

« Previous 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 83 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice