Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (953)
  • Article (264)
  • News (101)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 73 74 75 76 77 78 79 80 81 82 83 84 85 86 ... 133 Next »

16%
Software-defined networking in OpenStack with the Neutron module
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Michael Roder, Fotolia.com
to understand OpenStack Neutron. The Neutron server is a RESTful-based API in typical OpenStack style. The Neutron API is the point of contact for any request relating to the SDN configuration in an Open
16%
Lean Linux distribution for Kubernetes
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © joingate, 123RF.com
was greater than that for reinstalling the system. Köhntopp also pointed out that admins needed to create an internal troubleshooting ticket for every required SSH login on a system because either
16%
OpenFlow and the Floodlight OpenFlow Controller
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © aurielaki, 123RF.com
supports the concept of separating the data and control paths, which lets a central control point oversee a variety of OpenFlow-enabled network components. The SDN controller could even be a distributed
16%
Your own AWS-compatible cloud with Eucalyptus
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Author, 123RF.com
a small Eucalyptus cloud in a few mouse clicks. This FastStart installation method can also serve as a starting point for a larger cloud. Because Eucalyptus wants to have the cloud computers all to itself
16%
Distributed denial of service attacks from and against the cloud
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © leksustuss, 123RF.com
(there is no single point of failure). Global anycast DNS is already available from CloudFlare in the scope of a free basic subscription. Similar services are also offered by other commercial CDN
16%
Optimize and manage Linux-based Azure VMs
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Allan Swart, 123RF.com
and follow the interactive prompts to create a new partition. Format the partition with your chosen filesystem (e.g., ext4). Next, create a mount point and mount the disk. To ensure the disk mounts
16%
Six storage drivers for Kubernetes
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © webreporter, photocase.com
LVM comprises several components, with the controller managing the storage classes and the incoming PV claims. The node forwards the controller's requests to the lvmd driver and manages the PVs' mount points
16%
Get to know Azure Files and Azure File Sync
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © moovstock, 123RF.com
.file.core.windows.net\cloudysharethingy" -UserName "cloudyfilethings" -Password "" Folders and files that you save in the file share on Windows from this point on will also appear when you use the Browse item to view the share
16%
Introducing the NoSQL MongoDB database
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Wesley Tingey on Unsplash
performance. Another important point is the flexibility gains during development. Programmers have control over the database schema; they can customize the database schema without the help of a database
16%
Vector databases for data-driven artificial intelligence
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © sdecoret, 123RF.com
compare various data points in network traffic with normal behavior patterns to identify anomalies by the distance to the typical vectors. Particularly in business sectors such as finance and security

« Previous 1 ... 73 74 75 76 77 78 79 80 81 82 83 84 85 86 ... 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice