Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1029)
  • News (227)
  • Article (224)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 78 79 80 81 82 83 84 85 86 87 88 89 90 91 ... 149 Next »

13%
Log analysis in high-performance computing
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Kier… in Sight on Unsplash
really aren't just talking about system logs. Log ingestion also means logs from network devices, storage systems, and even applications that don't always write to /var/log. A key factor that can
13%
Managing Ubuntu with Canonical Landscape
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Kitsadakron Pongha, 123RF.com
network as the computers you need to set up. In this article, I look at the SaaS solution. To create an account, you only need an email address, which is verified by the system. After registering
13%
Ansible as an alternative to the Puppet configuration tool
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Jenzig, photocase.com
System administrators love harking back to the good old days when IT setups consisted of a manageable number of servers that you could easily maintain manually. On today's networks, admins
13%
News for Admins
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
 
/newly-discovered-cyber-espionage-malware-abuses-windows-bits-service/). BITS is used by software updaters, messengers, and other services and applications that need to transfer a large amount of data without chomping on network bandwidth, like when a user is not using
13%
VPN clients for Android and iOS
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © fckncg, 123RF.com
the tunnel, which should be assigned to the secure network according to the IP routing. Android The range of VPN clients is more diverse with Android. Here, I focused on Google Play and, for security reasons
13%
Preparing to move to the cloud
02.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © mikdam, 123RF.com
, network, and compute. Why Move? Companies that want to move to the cloud should clarify a number of questions before making the switch. Among them: What problems relating to the local IT infrastructure do
13%
Monitoring with System Center 2012 R2 Operations Manager
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © dotshock, 123RF.com
In the System Center Suite, the Operations Manager is responsible for monitoring. Add-on Management Packs let you monitor a full range of services running on your Microsoft network. If you connect
13%
OpenNebula – Open source data center virtualization
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Sternenhimmel, fotolia.com
resources in the areas of virtualization, networking, and storage. This demonstrates a significant difference from alternative solutions like OpenStack and Eucalyptus, both of which favor their own concepts
13%
Dos and don'ts of backing up Kubernetes storage
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Alexander Bedrin, 123rf.com
with; they are simply part of the filesystem. In principle, Kubernetes understands two types of PVs: block and filesystem. Block PVs can be network drives that use the Internet Small Computer Systems
13%
News for Admins
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
 
-cluster deployments on shared flat networks, full gateway API conformance, and much more. Shared flat network architecture is increasingly common in enterprise environments, according to the announcement (https

« Previous 1 ... 78 79 80 81 82 83 84 85 86 87 88 89 90 91 ... 149 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice