Articles

Lead Image © jager, 123RF.com

Lead Image © jager, 123RF.com

VMware connections to the Kubernetes market

VMware Tanzu comprises several tools and services that make it easy to build, run, and manage a Kubernetes environment from a single point of control.
Lead Image © Russell Shively, 123RF.com

Lead Image © Russell Shively, 123RF.com

A versatile proxy for microservice architectures

The nimble Envoy proxy server addresses modern container environments, but does it outperform its rival Istio, which has Envoy at its core?
Lead Image © Ewa Walicka, fotolia.com

Lead Image © Ewa Walicka, fotolia.com

Checking your endpoints with Stethoscope

Intruders slip in when end users get sloppy. Check the health of your endpoint devices with Stethoscope.
Lead Image © sdecoret, 123RF.com

Lead Image © sdecoret, 123RF.com

Storage cluster management with LINSTOR

LINSTOR is a toolkit for automated cluster management that takes the complexity out of DRBD management and offers a wide range of functions, including provisioning and snapshots.
Image by Gerd Altmann from Pixabay

Image by Gerd Altmann from Pixabay

Graph database Neo4j discovers fake reviews on Amazon

A Neo4j graph database example shows how to uncover fraudulent reviews on Amazon.
Lead Image © Natalia Lukiyanova, 123RF.com

Lead Image © Natalia Lukiyanova, 123RF.com

Monitoring network traffic with ntopng

The open source ntopng tool provides deep insights into network traffic and supports troubleshooting when network problems occur.
Lead Image © Endrille, Fotolia

Lead Image © Endrille, Fotolia

Monitor your network

Use the open source Pandora FMS monitoring server to keep an eye on all the computers and network devices in your realm.
Lead Image © Maggie Molloy, 123RF.com

Lead Image © Maggie Molloy, 123RF.com

Minifying container images with DockerSlim

DockerSlim minifies your Docker container images up to 30x and adds security, too.
Lead Image © bilderbox, fotolia.com

Lead Image © bilderbox, fotolia.com

Goodbye Google Cloud Print

With the discontinuation of Google Cloud Print, we look at printing going forward in the enterprise.
Lead Image © Amy Walters, 123RF.com

Lead Image © Amy Walters, 123RF.com

Cloud security with AWS GuardDuty

AWS GuardDuty uses machine learning and threat intelligence to identify malicious activity for continuous security monitoring in the cloud.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=