Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1263)
  • News (419)
  • Article (310)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 90 91 92 93 94 95 96 97 98 99 100 101 102 103 ... 200 Next »

12%
OS10 and Dell's open networking offensive
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Pei Ling Hoo, 123RF.com
. Also, Dell provides the operating system expressly with the promise of decoupling: OS10 works not only on devices by Dell, but also on generic network hardware. In contrast to proprietary switch
12%
Hyper-V containers with Windows Server 2016
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © scyther5, 123RF.com
in complex environments. Additions to the extensible virtual switch are more complex. Compared with the previous generation, this virtual switch now provides an interface for modules that can expand
12%
Analyzing tricky database problems
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Photo by Quino Al on Unsplash
of networking, Switch depends on a powerful cloud infrastructure. The foundation provides tens of thousands of users with the Switch Drive file-sharing service, which is based on ownCloud, is hosted 100 percent
12%
Software-defined networking in OpenStack with the Neutron module
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Michael Roder, Fotolia.com
is provided by the individual computers of the installation. Whatever runs on the computers of the cloud can be configured and automated from the cloud. The key to SDN is two cloud components: On the one hand
12%
NVMe-oF gears up to replace iSCSI
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Mathew Browne on Unsplash
find a device whose sole task it is to provide persistent storage to the other systems. From the administrator's point of view, it makes sense to handle central tasks such as redundancy and backup
12%
Monitor applications end to end
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Adam Winger on Unsplash
all possible actions and functions of an application. For example, you have to wait until a user pays by credit card if you want to cover potential performance problems with the payment service provider
12%
Managing infrastructure as code with Spacelift
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Konstantin Shaklein, 123RF.com
involves checking out the solution's terminology. You will find a whole host of Spacelift-specific terms, although you do not need to know them all (which would contradict the provider's mantra
12%
Hardening mail servers, clients, and connections
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by jesse ramirez on Unsplash
on any popular Linux distribution – provided you know what you are doing. In this article, I list the basic considerations that play a role in securing mail servers or that relate to the IT environment
12%
Simple, small-scale Kubernetes distributions for the edge
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © grafner, 123RF.com
Hostpath driver as the storage provider. Although it only supports filesystem storage and does not offer redundancy, it works fine for edge operation. Hostpath has no special requirements in terms
12%
Fight Windows ransomware with on-board tools
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by John Cameron on Unsplash
attachments come first, but external access to the mailbox is also conceivable, with the manipulation of existing attachments. Many companies also have holes in the firewall that provide a direct route

« Previous 1 ... 90 91 92 93 94 95 96 97 98 99 100 101 102 103 ... 200 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice