Articles
IoT for IT
The Internet of Everything, a fully networked and analyzed society, seeks to enhance the quality of life of all people and drive new technologies, products, services, and markets. But where are developments headed, and what are the driving factors, fields of application, and challenges?
What's new in SQL Server 2016
The focus in SQL Server 2016 is on mobility, cloud usage, and speed, with improvements to in-memory processing and security.
Protect yourself from infected MS Office files
Attacks on Microsoft Office files are increasing. A multilayered approach is your best protection against this malware.
Affordable hardware switch for SDN
Most OpenFlow-ready hardware switches are prohibitively expensive if you just want to set up a small-scale test lab. Northbound Networks has stepped in with a Kickstarter campaign, filling the gap with the Zodiac FX switch.
Swagger and OpenAPI Specification for documents
A REST API is especially useful for a developer if the API provider extensively documents the methods used. The Swagger tools not only semiautomatically generate an API reference, but a matching client SDK for many programming languages, as well.
The practical benefits of network namespaces
With network namespaces, you can create very sophisticated and resource-saving setups using the tools inside a running Linux system – without the use of containers.
Visualizing data captured by nmon
When speed, ease of use, and time to answer are paramount in performance monitoring and assessment of nmon logfiles, onTune nmon Analyzer Plus for Windows can help.
DDoS protection in the cloud
OpenFlow and other software-defined networking controllers can discover and combat DDoS attacks, even from within your own network.
Systemd network management and container handling
Version 219 of the controversial systemd init system introduces a number of comprehensive changes. We take a closer look at the innovations in network management and container handling.
Attacks on HTTPS Connections
HTTPS protects a connection from both tapping and manipulation, but only if a man in the middle hasn't already infiltrated the Internet connection. We highlight the weaknesses in HTTPS and demonstrate how to protect your client and server.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.