Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm"5432%2000s Llorente%2013 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (273)
  • News (38)
  • Article (36)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 35 Next »

55%
New Products
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
big offers capacity up to 20TB and speeds up to 785MB/s. The LaCie 5big lets users create custom RAID configurations. According to the announcement, users can create a lightning-fast volume with three ... 2013
55%
Unicode migration with an Oracle database
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© joingate, 123RF.com
, NCLOB), because you do not want to convert binary data, of course. Conversion takes place automatically in transit (via Oracle Net); for example, a Euro sign typed on a Windows machine (0x80 in WIN-1252 ... 2013
55%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Corina Rosu, 123RF.com
(pr->pr_path), 0); 17 [...] 18 error = copyinstr(j.hostname, 19 &pr->pr_host, sizeof(pr->pr_host), 0); 20 [...] 21 pr->pr_ip = j.ip_number; 22 pr->pr_linux = NULL; 23 pr->pr_securelevel = securelevel ... 2013
55%
The 12 best tricks for Windows Server 2012
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Graphic Designer, Fotolia.com
define the size and the location of the VHD(x) file. Additionally, you can use the wizard to control which server on the network is allowed to access the iSCSI target. You can also use an iSCSI target ... 2013
55%
IPv6 tunnel technologies
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Tramper2, fotolia.com
: 64-bit Unicast prefix:200:5EFE:w.x.y.z Private addresses: 64-bit Unicast prefix:0:5EFE:w.x.y.z Here, w.x.y.z stands for an IPv4 address in the normal dotted decimal notation. A possible ISATAP ... 2013
55%
All you ever wanted to know about hard drives but never dared ask
16.05.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
Lucy Baldwin, 123RF
a spinning disk drive resemble the race between a rocket and a turtle: Whereas the CPU can access data in the L1 cache at effectively zero latency, RAM can as be much as 20 times slower than the L2 cache ... 2013
55%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the X.509 standard. These are typically stored on a hardware certificate storage ... 2013
55%
The IT Dilemma – A Serious Lack of Vision
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
2013
55%
Matlab-like tools for high-performance computing
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
://wiki.scilab.org/Linalg%20performances Compiling http://wiki.scilab.org/Compiling%20Scilab%205.x%20under%20GNU-Linux%20Unix Parallel computing http ... 2013
55%
Managing cluster software packages
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© victoroancea, 123RF.com
2013

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 35 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice