Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1247)
  • News (231)
  • Article (226)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 171 Next »

61%
Increasing Throughput with Link Aggregation
26.10.2012
Home »  Articles  » 
 
For once, admins and users agree: They want more resiliency and higher bandwidth on the network. Link aggregation, in line with IEEE 802.1ax b-2008, offers both – with some minor restrictions. ... for IP-based iSCSI and NFS/CIFS storage systems. Servers need at least two network cards and software support from the operating system or the network card driver for link aggregation. Conditions Before ... network, link aggregation, resiliency, bandwidth, IEEE 802.1ax, b-2008, load balancing, LACP ... For once, admins and users agree: They want more resiliency and higher bandwidth on the network. Link aggregation, in line with IEEE 802.1ax b-2008, offers both – with some minor restrictions.
60%
Monitoring network traffic with ntopng
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
Administrators are well advised to monitor the availability and quality of their networks continuously. The open source ntopng tool has been tried and tested for years. In this article, I ... The open source ntopng tool provides deep insights into network traffic and supports troubleshooting when network problems occur. ... Unix, Administration, CPU, memory, network ... Monitoring network traffic with ntopng ... Eyes on the Network
59%
Virtual networks with Hyper-V in Windows Server 2016
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Tjefferson, 123RF.com
in Hyper-V. In Windows Server 2016, you can add and remove network adapters on the fly (Figure 1). You do not need to shut down VMs to shut down an adapter. This feature is particularly useful if you work ... Hyper-V Virtual Networks ... Virtual networks with Hyper-V in Windows Server 2016 ... Network in a Box
59%
SDN and the future of networking
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Stuart Miles, 123RF.com
with the arrival of VMware [1], KVM [2], and Hyper-V[3], because virtualization makes it easy to jump-start new computers. New computers nearly always require an IP address and network integration. In the past ... Networking is a central focus of IT. With all the virtual machines running on today's networks, it stands to reason that the experts would someday find a way to virtualize the network itself ... SDN and the future of networking ... New Networks
59%
Mesh Service for OSI Layers 2 and 3
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Photo by James Pond on Unsplash
Kubernetes is not necessarily the brightest star for people who operate networks, because it does not cover more complex network scenarios, such as those found in ISPs, telecommunications companies ... In early April 2018, the Cloud Native Computing Foundation accepted a new sandboxing project: Network Service Mesh. In this article, we explain how it resembles a conventional service mesh and what ... Network Service Mesh ... Network Lego
59%
Life on the Network
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Jesse lee Lang, 123RF
features of popular solutions such as Acronis Backup & Recovery, Arkeia Network Backup, EMC NetWorker, IBM Tivoli Storage Manager, SEP sesam, Symantec NetBackup, and the open source Bacula. Elsewhere up ... Life on the Network
58%
Hardening network services with DNS
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Amy Walters, 123RF.com
protocol for hardening network protocols. The best known application is probably secure email communication with Sender Policy Framework (SPF), DomainKeys Identified Mail (DKIM), and a combination of the two ... The Domain Name System, in addition to assigning IP addresses, lets you protect the network communication of servers in a domain. DNS offers further hardening of network protocols – in particular ... Hardening Network Protocols ... Hardening network services with DNS
58%
NetworkManager at the command line
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © godrick, 123RF.com
NetworkManager should be familiar to most readers, because many of today's Linux distributions use it to configure the network. One reason for changing from legacy init scripts to a system ... A variety of approaches are available for customizing the network on modern Linux systems. Here, we focus on the NetworkManager tool. ... NetworkManager ... NetworkManager at the command line
58%
Creating a redundant array of inexpensive links
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Spectral, Fotolia.com
bulldozers digging up cables, Layer 2 or 3 software failures, or routers that fail one hop downstream on the provider's network. To avoid hard disk failures, administrators have relied on RAID for a long time ... RAID for the Network
58%
Software-defined networking for the future
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Leio McLaren on Unsplash
Networks can be virtualized, just like servers, storage, or entire data centers. The technology is based on developments at Stanford University, and today, the Open Networking Foundation ... The history, technical underpinnings, and possible future standards of software-defined networking for 5G, IoT, and edge computing. ... Software-Defined Networking ... Software-defined networking for the future

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 171 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice