Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (92)
  • News (5)
  • Article (2)
Keywords

« Previous 1 2 3 4 5 6 7 8 ... 10 Next »

28%
New Products
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
Azaleos Announces MDM Service Azaleos Corporation has announced the new Azaleos Mobile Device Management (MDM) service to help enterprises centrally secure and control all leading mobile devices
28%
How Kanban helps improve IT processes
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© NYUL, 123RF.com
, leading to more tasks begun than can be completed and personnel shifted to deal with unplanned incidents. Under such circumstances, the admin needs an overview of all projects: who is working on which task
28%
Welcome
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © xtrekx, 123RF.com
this time leads to feelings of a sense of purpose and fulfillment. However, if you don't find success during these years, you might feel that you have no purpose or that you're unproductive. You might also
28%
Hyper-V 3.0 in Windows Server 2012
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Nico Smit, 123RF.com
. Until now, resetting to a snapshot on a domain controller (DC) could lead to inconsistencies in the AD database, which also influenced other domain controllers because, in an Active Directory, all objects
28%
Linux filesystem performance tested
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© nyul, 123rf.com
. Figure 4: Random write combines the weaknesses of traditional hard disks. SSDs take the lead; Btrfs has major weaknesses in the case of small blocks, and ReiserFS surprises with good values. All
28%
Improve the physical security of your business
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© ginasanders, 123RF.com
from some doors in a fire protection environment, this method is not typically going to work. If a door isn't used on an everyday basis – like an emergency exit that leads outdoors – an acoustic alarm
28%
Securing AI model deployments with SELinux
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Kirsty Pargeter, 123RF.com
with SELinux enforcing mode enabled leads to a tangible improvement in overall security resilience. It is strongly recommended that AI models, particularly those handling proprietary or sensitive information
27%
Anonymization and pseudonymization of data
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Debby Ledet on Unsplash
and the protection it provides against re-identification. However, it can lead to a loss of information and reduced data quality if the generalization is not sufficiently granular. Table 1 k
27%
Programming with Go
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Dimitar Dimitrov, 123RF.com
the variable. At the same time, this is only a statement, not an expression that can be used downstream. Although this leads to a little more typing, it does ensure clear semantics and less confusion. Go
27%
Avoiding chaos in clusters with fencing
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© kobra78, Fotolia.com
simultaneous write access to sensitive data leading to inconsistency. Is the Cluster Doing What it Should? Fencing mechanisms are important in the context of clusters whenever you need to ensure data integrity

« Previous 1 2 3 4 5 6 7 8 ... 10 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice