Articles
Secret Sauce
AMD senior architect Ben Sander explains how the HIP interface integrates existing CUDA programs with the ROCm open development environment.
Nagios on a Rasp Pi 3 with NEMS
We show you how to install and use the NEMS distribution of Nagios network monitoring on a Raspberry Pi.
Monitoring container clusters with Prometheus
In native cloud environments, classic monitoring tools reach their limits when monitoring transient objects such as containers. Prometheus closes this gap, which Kubernetes complements, thanks to its conceptual similarity, simple structure, and far-reaching automation.
Windows 10 Updates with WSUS
WSUS simplifies updating Windows 10 computers over the network, but first, you need to modify some settings and add new Group Policy templates to insure successful installation of the updates.
Getting data from AWS S3 via Python scripts
Data on AWS S3 is not necessarily stuck there. If you want your data back, you can siphon it out all at once with a little Python pump.
Credential management with HashiCorp Vault
Admin teams can use secret sharing to centrally manage shared access to user accounts and services. HashiCorp Vault is one of the few tools that has proven effective when it comes to implementing this solution. Here's how to use this open source tool and keep important credentials safe.
A Hands-on Look at Kubernetes with OpenAI
For research into deep learning algorithms that automatically acquire new skills, OpenAI operates some of the largest Kubernetes clusters worldwide, with up to 36,000 CPU cores. We look at some practical experience with the container management system.
Packaging Apps To Run on Any Linux Device
Canonical's Snapcraft (Snappy) package manager creates a self-contained application that works across Linux distributions. We show you how to install, publish, and run a simple snap.
Scalable network infrastructure in Layer 3 with BGP
Large environments such as clouds pose demands on the network, some of which cannot be met with Layer 2 solutions. The Border Gateway Protocol jumps into the breach in Layer 3 and ensures seamlessly scalable networks.
End-to-end monitoring – Measuring what the user perceives
Continuously monitoring the performance of applications helps ensure the service quality in multilayered cloud services.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.