Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (483)
  • Article (84)
  • News (6)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 58 Next »

31%
The RADOS Object Store and Ceph Filesystem
24.04.2012
Home »  HPC  »  Articles  » 
cluster, MONs also ensure RADOS’s functionality in terms of respecting quorum rules. Metadata servers (MDS): MDSs provide POSIX metadata for objects in the RADOS object store for Ceph clients. What
31%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
. After all, practically any software product offers this method free of charge as a standard procedure. However, admins should bear in mind a rule of thumb for information protection and access rights
31%
Kickstack: OpenStack with Puppet
22.06.2014
Home »  Articles  » 
in Table 2 by default. Table 2:Kickstack Roles Role Function Infrastructure Node This system provides support services for OpenStack: RabbitMQ and MySQL. API Node
31%
Top Top-Like Tools
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
of five lines. The first line, shown in Figure 2, presents a quick status of the system overall. The first number is the current time (10:47:03). The second number is how long the system has been up (28
31%
Software instead of appliances: load balancers compared
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Patrick Fore on Unsplash
on the scene for such a long time, it offers several features that often are not needed in many use cases. However, HAProxy has no weaknesses in terms of basic functions. It supports HTTP/2 as well as compressed
31%
VMware vRealize Automation 7
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Dmitriy Shpilko, 123RF.com
requirements, the number of nodes in the vRealize Automation environment increases significantly. Figure 2 illustrates this logical design for an enterprise deployment: In addition to a cluster of Linux
31%
Create secure simple containers with the systemd tools Nspawnd and Portabled
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Ian Taylor on Unsplash
logically separate individual parts of the system (Figure 2). A network namespace, for example, lets you create virtual network cards without giving them direct access to the physical NICs of the host
31%
Troubleshooting and analyzing VoIP networks
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Ioannis Kounadeas, Fotolia.com
problems on Open Systems Interconnection (OSI) model Layer 2 or 3 is almost trivial compared with VoIP analysis. In Internet telephony, the sources of error migrate to higher OSI Layers 4 through 7. Vo
31%
Parallel I/O Chases Amdahl Away
12.09.2022
Home »  HPC  »  Articles  » 
rule of thumb is to try not  having more than one process write to the same file at the same time. Although people have told me they can do it, you must be amazingly cautious, and you have to understand
31%
Open source multipoint VPN with VyOS
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Damon Lam on Unsplash
on SourceForge [2]. Now all parts of the puzzle are freely available and usable on Linux. The Vyatta router distribution combines all pieces into the formula: DMVPN=GRE+OpenNHRP+IPsec The developers have

« Previous 1 ... 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 58 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice