Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: [tippo365.com]tune its go each real money[tippo365.com]tune its go each real moneygram ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (733)
  • Article (234)
  • Blog post (6)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 98 Next »

17%
Processing streaming events with Apache Kafka
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Photo by Mark Decile on Unsplash
developed by the career platform LinkedIn to process massive volumes of data in real time. Today, Kafka is used by more than 80 percent of the Fortune 100 companies, according to the project's own information ... Apache Kafka reads and writes events virtually in real time, and you can extend it to take on a wide range of roles in today's world of big data and event streaming.
17%
Creating a redundant array of inexpensive links
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Spectral, Fotolia.com
achieve redundancy far less expensively by opting for Linux and the Fault Tolerant (FT) Router [1]. A Linux host typically sends its packets with the help of a routing table. All packets that do not belong ... The Fault Tolerant Router daemon uses multipath routing among multiple Internet connections to keep you connected, even when some connections go down.
16%
SDS configuration and performance
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Jakub Jirsak, 123RF.com
with dedicated servers and combinations of SSDs and traditional hard drives. Usually, the components connect with each other and the clients over a 10Gb network. However, SDS now also provides added value ... shows which operations each system is best at tackling.
16%
VPN clients for Android and iOS
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © fckncg, 123RF.com
to perform the setup manually on each device. OpenVPN Client Free Android from 4.0 Colucci https://play.google.com/store/apps/details?id=it.colucciweb.free.openvpn&hl=en Open ... Smartphones and tablets using hotspots and mobile data connections are susceptible to spying. iOS and Android each supply a tunneled VPN connection out of the box. We take a look at their apps
16%
How persistent memory will change computing
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © rangizzz, 123RF.com
by the width of the level – the cost per gigabyte of each level increases, and performance decreases compared with the level above it. The data storage is also volatile until you reach the final disk layer ... Persistent memory is non-volatile data storage in DIMM format. Losing power means that you won't lose data. What is it, and how can you use it?
16%
Set up and operate security monitoring throughout the enterprise
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Sergey Nivens, 123RF.com
when choosing a SIEM system and designing its interaction with data sources and downstream systems. Well-organized monitoring does not just cover classic indicators such as availability, use levels ... We describe some basic considerations for choosing a Security Information and Event Management system and designing its implementation.
16%
Web and Mail Servers with IPv6
13.12.2011
Home »  Articles  » 
 
addresses and the NameVirtualHost is redundant. With this method, each virtual host can use its own SSL certificate. This approach is useful in practical terms if you do the same thing for IPv4, because ... If you run a web server and a mail server and anticipate that users from Asia will access your system, it’s time to get it ready for IPv6.
16%
Zentyal Server 3.5
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © PozitivStudija, fotolia.com
with near real-time graphical representations using the "hard" data from your computer system, while the log services module monitors each individual active server module. Log services and monitoring ... Some users may struggle when setting up various services, such as web servers, email servers, firewalls, and the like. Zentyal simplifies configuration of all those things, thanks to its intuitive
15%
Coming to grips with grep
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Andrey Lavrushov, 123RF.com
made a conscious decision to start again and effectively go back to basics with some of the core shell commands; that is, I wanted a timely way to improve my understanding of a few key packages so that I ... Now is the time to re-examine and consider again the power of grep and its relatives.
15%
An introduction to FreeNAS
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Mario Lopes, fotolia.com
and resources to keep the FreeNAS project going, so he transferred control of it to iXsystems [2], a company well-known for its support of open source software in general and FreeBSD [3] in particular. A period ... We provide an overview of FreeNAS and ZFS, its main filesystem, then show how to set up and maintain a FreeNAS installation.

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice