Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (735)
  • Article (234)
  • Blog post (6)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 58 59 60 61 62 63 64 65 66 67 68 69 70 71 ... 98 Next »

7%
How vector databases work and when they're used
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © neyro2008, 123rf.com
projects. Databases are ideal in this case because of their focus on real-time storage. How Vector Searches Work Vector databases do not rely on conventional search methods, but use new, specialized
7%
The utility of native cloud applications
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © krisckam, 123RF.com
), the more likely it will run only within its original environment. Native cloud applications distinguish themselves from traditional applications, in that you can roll them out easily in almost any cloud
7%
News for Admins
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
 
Authentication Container Image repository, Docker Hub, has added Two Factor Authentication (2FA, https://docs.docker.com/docker-hub/2fa/) to its feature list. The feature falls in line with many other services
7%
Access Anywhere with Mobile IPv6
16.04.2013
Home »  Articles  » 
Fi hotspot, on which you can check the time of departure and check in to your flight. While all this happened, you were connected all the time to your corporate network via a secure tunnel. This scenario
7%
Accessibility wherever you are with Mobile IPv6
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Fotograf, 123RF.com
Fi hotspot, on which you can check the time of departure and check in to your flight. While all this happened, you were connected all the time to your corporate network via a secure tunnel. This scenario
7%
Automating development environments and deployment with Otto
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © baloncici, 123RF.com
drawback: It is still very much at the start of its development path. When this article was written, the latest version was 0.1.2, and at the time of press, version 0.2.0 had been released. Version 0
7%
IT automation with SaltStack
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Harry Cunningham on Unsplash
is why the only solution was one that could be used in parallel. After some comparisons, the decision was made to go with SaltStack, which even then came with its own Puppet module, allowing us to control
7%
The RADOS Object Store and Ceph Filesystem
24.04.2012
Home »  HPC  »  Articles  » 
the packages, it’s time to prepare RADOS. Figure 2: After loading the ceph kernel module, the filesystem is available on Linux. Ceph was first introduced
7%
Open Network Operating System
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Rade Lukovic, Fotolia.com
. Floodlight [13] is another example of a well-known SDN controller. Its main disadvantage is that it does not activate applications dynamically at run time. Thanks to the Karaf container, ONOS controls
7%
Kickstack: OpenStack with Puppet
22.06.2014
Home »  Articles  » 
operations several times. If this makes you think of automation, you are right on track, and Kickstack provides an approach to solving this problem: Based on Puppet, it offers meaningful and efficient

« Previous 1 ... 58 59 60 61 62 63 64 65 66 67 68 69 70 71 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice