Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: notes ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (466)
  • Article (174)
  • News (50)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 70 Next »

14%
Efficient password management in distributed teams
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Sergey Nivens, 123RF.com
to manage a service called web. The service consists of a Node.js process that executes the index.js file. web: node index.js For the JavaScript application to run on Heroku, it requires a package
14%
Automatically install and configure systems
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © maroti, 123RF.com
is the basis for economies of scale as a result of the synergistic effects it generates. The initial work that flows into the automation of a platform then pays dividends with each new node that is added
14%
OS10 and Dell's open networking offensive
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Pei Ling Hoo, 123RF.com
instead of on individual servers. All common cloud approaches envisage network nodes, which provide VMs in the cloud with external connectivity and take care of VXLAN tunneling and packet separation. Thus
14%
Persistent volumes for Docker containers
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by Alexander Redl on Unsplash
an important role in classic virtualization. Without redundancy at the storage level, for example, such a setup cannot operate effectively; otherwise, the failure of a single container node would mean that many
14%
Setting up and managing IPv6 on Windows Server 2016
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Photo by mathyas kurmann Unsplash.com
IPv6 nodes automatically configure a local address with the fe80::/64 prefix for each physical or logical IPv6 interface. These addresses can only be used for communication with neighboring nodes
14%
Distributed denial of service attacks from and against the cloud
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © leksustuss, 123RF.com
its customer with a clever trick: With the help of anycast addressing with load balancers and a private CDN using nodes in a total of 23 data centers, they managed to intercept the flood of data
14%
Secure Kubernetes with Kubescape
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © limbi007, 123RF.com
useless without a runtime environment for containers on a compute node, which means you need either the Docker Community Edition or Podman, which also offers the compatible CRI-O runtime environment
14%
Sharding and scale-out for databases
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Dan Dennis on Unsplash
, for example, can replicate the individual shards of a node to other nodes and seamlessly exchange each of these during operation. The same is true for the key-value database at the heart of YugabyteDB. Future
14%
Profiling application resource usage
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© fauxware, fotolia.com
://www.sarcheck.com/ Monitor Your Nodes with collectl: http://www.admin-magazine.com/HPC/Articles/Monitor-Your-Nodes-with-collectl MPE: http://www.mcs.anl.gov/research/projects/perfvis/download/index.htm#MPE Paraver: http
14%
Keeping container updates under control
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by nikko osaka on Unsplash
is left in the lurch. For example, a container might be restarted, not at your behest, but because the provider needs to reboot the node for a security update (e.g., of the kernel). From the point of view

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 70 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice