Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (953)
  • Article (264)
  • News (101)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 133 Next »

16%
Apache OpenMeetings video conferencing platform
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Chris Montgomery on Unsplash
the webcam in the web interface from Check setup on the dashboard. The microphone and the webcam resolution can also be tested and adjusted at this point. The Start recording test button lets participants
16%
Users speak on Kubernetes in business practice
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © alphaspirit, 123RF.com
it into the network infrastructure, to setting up the certificates. From a technical point of view, the benefits of the new infrastructure are also reflected in the greater freedom for development teams. In principle
16%
Diving into infrastructure security
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © JPaget RFphotos, 123RF.com
security. These terms primarily relate to where a security system is deployed. Firewalls or network intrusion detection systems (NIDS) are deployed at central points on the network, and antivirus programs
16%
SoftEther VPN software
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Marc Sendra Martorell on Unsplash
Ether" points to the architecture of the VPN software: Virtualization creates a virtual Ethernet adapter and generates a switch that emulates a conventional Ethernet switch – in SoftEther terminology
16%
Cloud-native storage with OpenEBS
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
selling point because other cloud-native offerings (e.g., Rook) also work in this way; however, in the case of classic storage providers or cloud providers, the storage management runs outside the cluster
16%
Network virtualization with OpenDaylight
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Juthamas Oonhawat, 123RF.com
to find out whether buying new OpenFlow-capable devices to leverage the benefits of SDN is actually worthwhile. For the sake of completeness, I will point out that there are intermediate solutions in SDN
16%
Linux Storage Stack
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © arsgera, 123RF.com
that bypasses the page cache). The advantages of BIOs is in handling multiple segments involved in the current I/O operation. BIOs consist of a list or a vector of segments that points to different pages
16%
Monitoring containers
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © kangshutters, 123RF.com
of information related to the containers [2], but only as a starting point for tools with more complex monitoring approaches. Docker does not format the data, but it does support a couple of commands that at least
16%
Selecting compilers for a supercomputer
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image Photo by Michal Kmet on Unsplash
with approximately 8,200 cores each, and six newer islands with 14,300 cores each. It achieves a speed of around 6 petaFLOPS (10^15 floating-point operations per second). In total, almost 500TB of main memory
16%
Detecting security threats with Apache Spot
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Photo by Geran de Klerk on Unsplash
, IP address, rating, type of traffic, port, and protocol. The starting point of the visualization is the dashboard, which presents a summary of the network infrastructure to be monitored and shows

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice