Articles
Explore automation-as-code with Ansible
The Ansible automation tool makes it really easy to implement IT scenarios as code. We use structured YAML code to roll out Ansible in the form of AWX.
File Integrity Checks with AIDE
If an attacker gains access to systems by working around your defenses, you need to discover the attacker's tracks in good time, at least to mitigate the further risk of damage. We show you how to monitor changes to files with the Linux AIDE tool.
Core Linux Commands for HPC
Many people want to get into HPC but aren’t sure how. W e consider c ommands that would be a good starting point, especially if you want to build your own home system.
Getting your virtual machine dimensions right
Massive, performance-hungry VMs require proper handling to meet their dynamic requirements. We give you some rules to help size these monsters properly.
Microsoft Exchange replacement
Grommunio is setting itself up as an open source drop-in replacement for Microsoft Exchange.
Test your containers with the Docker Desktop one-node cluster
The built-in single-node Kubernetes cluster included with Docker Desktop is a handy tool for testing your container.
Dockerizing Legacy Applications
Sooner or later, you'll want to convert your legacy application to a containerized environment. Docker offers the tools for a smooth and efficient transition.
A feature-rich drop-in-replacement for Microsoft Exchange
Grommunio is a completely open source and fully compatible drop-in replacement for Microsoft Exchange that uncouples your company from Microsoft's cloud strategy and its severe security and data protection issues.
Bridging the Gap: The First Enterprise-Grade Linux Solution for the Cloud-to-Edge Continuum
SPONSORED: As the Linux market is set to soar to nearly USD 100 billion by 2032, businesses are facing mounting challenges in managing increasingly complex workloads spanning from the cloud to the edge. Traditional Linux distributions are not built to meet the specific demands of these modern use cases, creating an urgent need for a more specialized, enterprise-grade solution.
Detecting system compromise
Runtime Integrity services provide assurance that a system is uncorrupted, offering increased confidence in core security services and the potential for enhanced security decisions across many use cases through the incorporation of integrity information in their inputs.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs
Most Popular
Support Our Work
ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.
