Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (752)
  • Article (244)
  • News (24)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 94 95 96 97 98 99 100 101 102 103 Next »

26%
Zulip, Mattermost, and Rocket.Chat
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © rll, fotolia.com
Zulip [1], Mattermost [2], and Rocket.Chat [3] and discover how well these platforms integrate with other applications. Functions and Features A number of questions should be considered when looking
26%
Intelligent observability with AI and Coroot
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Gustavo Xavier on Unsplash
offer options that automatically identify and warn you about distributed denial of service (DDoS) attacks so that you can immediately block the attack at the network level. Although these solutions
26%
Windows Server 2012 Tricks
27.05.2013
Home »  Articles  » 
 
virtual servers. They use the individual virtual switches of the Hyper-V host as their basis. Trick 3: Virtual Domain Controller – Cloning and Snapshots In Windows Server 2012, Microsoft has optimized
26%
The new openAttic 1.1 storage manager
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Matty Symons, 123RF.com
the Linux kernel iSCSI target, LIO [2]. Thus far, openAttic has used the fairly ancient IET iSCSI target. Rising Tide Systems [3] and Nicholas Bellinger made a name for themselves in the Linux scene
26%
Users speak on Kubernetes in business practice
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © alphaspirit, 123RF.com
, this service is available through dealers and is called Certified Pre-Owned [3], and in the UK, Approved Used [4]. The basis of the application infrastructure for Porsche Informatik's solutions and services
26%
Managing Vim plugins
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Thomas Reichhart, 123RF.com
of responders [2]. Much of this popularity is due to the degree of customization created by its plugins – almost 1,600, according to the VimAwesome site [3], and even that number may be low. Most users
26%
The limits and opportunities of artificial intelligence
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © sebastien decoret, 123RF.com
and storage capacity. In contrast, comparatively little has happened in the core algorithms of AI. Deep learning and convolutional neural networks are still based on ideas from the 1980s and 1990s. The success
26%
Attacks on HTTPS Connections
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © almagami, 123RF.com
on the admissible certificates for certain domains, for example, the key used (public key) or the issuing CA(s). This information pins the original certificate to the domain, so to speak, which makes spoofing third
26%
Open Source Security Information and Event Management system
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Yoichi Shimizu, 123RF.com
is the community open source version of the project, and Alien Vault Unified Security Management (USM) [3] offers even more in the way of features, scalability, and support. Additionally, it is worth noting that all
26%
Where does job output go?
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Charles Forerunner on Unsplash
variables; execute the application(s); and so on. When the job finishes or the time allowed is exceeded, the job stops and releases the resources. As resources change in the system (e.g., nodes become

« Previous 1 ... 94 95 96 97 98 99 100 101 102 103 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice