Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (833)
  • Article (178)
  • News (109)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 83 84 85 86 87 88 89 90 91 92 93 94 95 96 ... 113 Next »

10%
Questions about the present and future of OpenStack
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Julien DI MAJO on Unsplash
focused on high efficiency and performance of the networking data plane for very large scale clouds or clouds with high network throughput demands. Local IP is a virtual IP that can be shared across
10%
IAM for midmarket companies
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Robert Anasch on Unsplash
by (and applications for) business partners and, especially, customers and consumers. Virtually all organizations are facing growing demand to provide more digital services, which are increasingly
10%
Versioned backups of local drives with Git
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
relies on SSH encryption anyway, the cloud backup to the in-house Git server is secure even without a virtual private network (VPN). Either the web interface of the Gitea server on port 3000 should
10%
Machine learning and security
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
by malware and by a harmless program to distinguish between the two cases. To do this, you set up an identified malware program on a separate virtual machine and track which logfiles it generates. Similarly
10%
Central logging for Kubernetes users
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © zlajo, 123RF.com
Prometheus and its Cortex fork are easy to configure dynamically, Loki is far better suited for operation in containers, as well. Loki in Practice Loki can be virtualized easily and that was even one
10%
An interview with SUSE CEO Nils Brauckmann
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Photos Courtesy of Swapnil Bhartiya
, including legacy workload, that is not containerized. There is a lot of workload that is not cloud native; it continues to run on an operating system in a virtualized environment. We do see that
10%
LibreOffice in the workplace
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © mipan, 123RF.com
: Document Formats Document formats are one of the biggest challenges. If Microsoft Office has been used exclusively for many years, no one has had to worry about file formats. Virtually every business
10%
Detecting security threats with Apache Spot
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Photo by Geran de Klerk on Unsplash
more complex data schemas. The number of threat vectors resulting from mobility, social media, and virtualized cloud networks does not make things any easier. For example, it takes an average of 146 days
10%
Shifting Drupal to Amazon's cloud
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Devaev Dmitry, 123RF.com
/efs-create.config creates an Elastic Filesystem (EFS) and mount points in each AZ and subnet in the Virtual Private Cloud (VPC) [5]. You can look up the VPCs and subnet IDs used in Amazon's VPC console. If you have changed
10%
Scale Your Docker Containers with Docker Swarm
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Author, 123RF.com
as if it were a single, virtual system. Why is this important? In a word, redundancy. Should you deploy a single container for a system and that container were to go down, so, too, would follow the system

« Previous 1 ... 83 84 85 86 87 88 89 90 91 92 93 94 95 96 ... 113 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice