Articles

Lead Image © shutter999, 123RF.com

Lead Image © shutter999, 123RF.com

Hardening SSH authentication to the max

Public key authentication further supplemented with one-time password or hardware authentication methods improves SSH security while offering genuine convenience.
Lead Image © Goran Bogicevic, Fotolia.com

Lead Image © Goran Bogicevic, Fotolia.com

Production-ready mini-Kubernetes installations

Kubernetes can be highly complex, with massive setup routines that are totally over the top for newcomers. If you want to try out Kubernetes or run it in production, you have a number of options, even if you decide not to use the comprehensive packages from established vendors.
Lead Image ©pakhnyushchyy, 123RF.com

Lead Image ©pakhnyushchyy, 123RF.com

Networking strategies for Linux on Azure

We explore advanced networking strategies tailored for Linux workloads on Azure.

Develop a simple scanning application with the NAPS2 SDK

A NAPS2 PDF scanner, the C# language, and the .NET Framework set the stage for a CLI app for scanning documents.
Lead Image © Kirill Makarov, 123RF.com

Lead Image © Kirill Makarov, 123RF.com

Comparing system rescue distros

Rescue systems play a particularly important role for desktops because they cannot simply be reinstalled on the fly. We look at venerable but outdated Knoppix and three still in development: Grml, SystemRescue, and Finnix.
Photo by Barnabas Davoti on Unsplash

Photo by Barnabas Davoti on Unsplash

File access optimization discovery and visualization

File I/O is a limiting factor for many applications and can become a bottleneck for data-intensive computing. We analyze different file access functions and present a script that visualizes and optimizes inefficient file I/O.
Lead Image © David Crockett, Fotolia.com

Lead Image © David Crockett, Fotolia.com

Quick patches with Ansible

Ansible has earned an excellent reputation as a tool for configuration management. Thanks to playbooks, updates are more or less child's play.
Photo by Debby Ledet on Unsplash

Photo by Debby Ledet on Unsplash

Anonymization and pseudonymization of data

Data anonymization and pseudonymization are two key techniques that ensure privacy while enabling the use of data for analysis and decision making; the two methods offer different approaches that vary as a function of use case.
Photo by Kier in Sight Archives on Unsplash

Photo by Kier in Sight Archives on Unsplash

Serverless applications with OpenFaaS

Use advanced techniques for automation, optimization, and security to deploy serverless applications with the OpenFaaS framework in a Linux environment.
Photo by Toby Elliott on Unsplash

Photo by Toby Elliott on Unsplash

Application-aware batch scheduler

Volcano optimizes high-performance workloads on Kubernetes to avoid deadlocks.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=