Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (750)
  • Article (244)
  • News (23)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 94 95 96 97 98 99 100 101 102 Next »

26%
The new openAttic 1.1 storage manager
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Matty Symons, 123RF.com
the Linux kernel iSCSI target, LIO [2]. Thus far, openAttic has used the fairly ancient IET iSCSI target. Rising Tide Systems [3] and Nicholas Bellinger made a name for themselves in the Linux scene
26%
Users speak on Kubernetes in business practice
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © alphaspirit, 123RF.com
, this service is available through dealers and is called Certified Pre-Owned [3], and in the UK, Approved Used [4]. The basis of the application infrastructure for Porsche Informatik's solutions and services
26%
Managing Vim plugins
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Thomas Reichhart, 123RF.com
of responders [2]. Much of this popularity is due to the degree of customization created by its plugins – almost 1,600, according to the VimAwesome site [3], and even that number may be low. Most users
26%
The limits and opportunities of artificial intelligence
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © sebastien decoret, 123RF.com
and storage capacity. In contrast, comparatively little has happened in the core algorithms of AI. Deep learning and convolutional neural networks are still based on ideas from the 1980s and 1990s. The success
26%
Attacks on HTTPS Connections
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © almagami, 123RF.com
on the admissible certificates for certain domains, for example, the key used (public key) or the issuing CA(s). This information pins the original certificate to the domain, so to speak, which makes spoofing third
26%
Open Source Security Information and Event Management system
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Yoichi Shimizu, 123RF.com
is the community open source version of the project, and Alien Vault Unified Security Management (USM) [3] offers even more in the way of features, scalability, and support. Additionally, it is worth noting that all
26%
Where does job output go?
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Charles Forerunner on Unsplash
variables; execute the application(s); and so on. When the job finishes or the time allowed is exceeded, the job stops and releases the resources. As resources change in the system (e.g., nodes become
26%
Setting up a PXE boot server
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
area network (SAN) controller might need to run its BIOS first so that the booting operating system can find a hard disk. As early as in the 1980s, an option was introduced to run the system boot over
26%
Understanding Cybersecurity Maturity Model Certification
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Braden Collum on Unsplash
data not covered by CMMC is secret (S), top secret (TS), or top secret sensitive compartmented information (TS-SCI). Within the unclassified data and information category of material are distinct
26%
High availability with SQL Server 2012 and 2014
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © li xuejun, 123RF.com
, to the Enterprise Edition. Better Safe than Sorry High availability (HA) maximizes the accessibility of database servers by mitigating the effect of hardware damage, compensating for the failure of virtualized IaaS

« Previous 1 ... 94 95 96 97 98 99 100 101 102 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice