Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1550)
  • News (737)
  • Article (313)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 56 57 58 59 60 61 62 63 64 65 66 67 68 69 ... 261 Next »

41%
Security is Everyone's Problem
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Rancz Andrei, 123RF.com
I attended a security seminar a few weeks ago, and one of the slides read, "Security is not an IT problem." I laughed when I saw it and gave a smirk to our Security Manager at my new job. He smiled ... I attended a security seminar a few weeks ago, and one of the slides read, "Security is not an IT problem." I laughed when I saw it and gave a smirk to our Security Manager at my new job.
41%
Mesh Service for OSI Layers 2 and 3
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Photo by James Pond on Unsplash
. The Network Service Manager daemon receives a request from the client pod looking for a connection to the VPN gateway over Google's remote procedure call (gRPC) framework [7]. The manager forwards the request ... In early April 2018, the Cloud Native Computing Foundation accepted a new sandboxing project: Network Service Mesh. In this article, we explain how it resembles a conventional service mesh and what
41%
Cloud Orchestration with Cloudify
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © alenavlad, 123RF.com
A new generation of orchestration tools is rising to the challenge of configuring VMs in complex, real-world scenarios. Cloudify [1] is an orchestration solution that promises customers an easy ... Cloud computing is forcing admins to rethink automation because classic tools like Puppet do not provide a sufficient range of configuration options. Cloudify offers a new direction for orchestration
41%
Resolving problems with DNS, Active Directory, and Group Policy
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Fernando Gregory, 123RF.com
the child to the parent domain, and forwarding is the best option: 1. Start by right-clicking Conditional Forwarders in the DNS Manager snap-in. 2. In the context menu, select New Conditional Forwarder ... Upgrading domain controllers or installing new servers can cause problems with name resolution, Active Directory replication, and Group Policy. A coordinated approach can isolate these errors
41%
Security compliance with OpenSCAP
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Dmitriy Pchelintsev, 123RF.com
well because IT systems change constantly and are thus in a dynamic state. Issuing new guidelines and configuration recommendations involves an enormous amount of effort. Thus, it comes as little ... Testing the system landscape for compliance requirements is not typically an administrator's favorite task. The fairly new open source framework called OpenSCAP helps take some of the pain out
41%
Beyond monitoring: Mathematical load simulation in Perl
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© kudryashka, 123RF.com
a monitoring solution and completing the installation and configuration isn't the end; it's just a new starting point. The core requirement is to collect monitored performance data. Without that, the performance ... Simulations and the ability to predict the future can show what effect adding new hardware, or changing the load, can have. Armed with the right know-how, anybody can use this tool.
41%
Extended detection and response in networks, endpoint devices, and the cloud
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Kritiya, 123RF.com
this information immediately when analyzing the acquired data to respond quickly to new threats. Integrated XDR XDR environments should provide a wide range of capabilities and not just a mere bundling of separate ... Extended detection and response (XDR) integrates security functions across endpoint devices and networks. But is XDR the only integrated approach to cybersecurity challenges? We investigate the new
41%
Distributed Linear Algebra with Apache Mahout
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Peter Galbraith, Fotolia.com
, rather than bringing in costly consultants to port business-critical algorithms and methods from an old system to a new one. The Mahout project lived through the migration from Hadoop to Spark ... The Apache Mahout distributed linear algebra framework delivers new tools and methods for performing data analysis, building machine learning data pipelines, and implementing machine learning models
41%
Tools for automation in the cloud
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Cytonn Photography on Unsplash
the Amazon Web Services (AWS), Azure, and Google Cloud Platform (GCP) public clouds. In terms of private cloud support, I will also be taking a look at the OpenStack capabilities of the applications. Puppet ... Automation in the cloud does not require expensive new acquisitions when tools such as Ansible, Salt, Puppet, or Chef are already in use locally and can contribute to the automatic management
41%
DebOps delivers easy Ansible automation for Debian-based systems
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Chris Dorney, 123RF.com
packages: With Debian, only developers whose GPG key is included in the Debian keyring are allowed to upload new packages to the official Debian archive. To join up as a Debian developer or as a package ... Ansible is a simple and sensible automation solution, except for the time needed to create new roles and playbooks. The DebOps collection of Ansible playbooks for Debian-based Linux systems solves

« Previous 1 ... 56 57 58 59 60 61 62 63 64 65 66 67 68 69 ... 261 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice