Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (756)
  • Article (188)
  • Blog post (3)
  • News (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 95 Next »

13%
WiFi 6 in the Enterprise
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Daniel Schönen, photocase.com
at all [3]. This problem gets worse the more devices you connect. Therefore, a management tool based on machine learning is essential for the success of WiFi 6. 4. In many enterprises, closed networks ... The 802.11ax WiFi 6 standard uses LTE technology to solve the congestion problems experienced with older standards. ... WiFi 6 ... WiFi 6 in the Enterprise
12%
Simplify your migration from Docker to Podman
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Oli Zubenko on Unsplash
for Linux computers, and an installer and a portable environment for Windows users. WinGet-based installation is also possible. If you opt for the installer version, the setup wizard offers to set up ... Podman has become an attractive alternative to Docker, not least because it does not require a central daemon. In this article, we look at how to set about changing the guard and how you can use
12%
Comparing 5 to 50TB NAS storage boxes
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Franck Boston, fotolia.com
of important features). All of the NAS devices in our lab used Intel processors and supported popular RAID levels, at least 1 and 5; the better devices also offered a dual-parity variant like RAID 6. (See ... RAID technologies are ubiquitous, but how do they fit in centralized storage devices for workgroups, branch offices, or small businesses? We compared six models.
12%
Setting up secure RDP connections
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © asphoto777, 123RF.com
the network or locally with PowerShell: $rdp = Get-CimInstance -Namespace "root/cimv2/TerminalServices" -ClassName "Win32_TerminalServiceSetting" -ComputerName $rdp | Invoke-CimMethod -Method Name ... Know when to make RDP available on the Internet for remote access to Windows Server and how to configure connections securely when you do.
12%
Monitoring HPC Systems
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Alexander Rivosh, 123RF.com
turned on, please refer to Sharma's blog [14] and go to the bottom for details on how to configure iptables rules for Ganglia. If you get stuck, please email the Ganglia mailing list and ask for help. Now ... Ganglia is probably the most popular monitoring framework and tool, in that HPC, Big Data, and even cloud systems are using it. In this article, we show you how to install and configure Ganglia
12%
Exploring SQL Server on Linux
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © yewkeo, 123RF.com
, and it is an important development for many sys admins who operate Linux servers in heterogeneous environments. This article describes how Microsoft got SQL Server to run on Linux and show you how to set up your own SQL ... SQL Server runs on Linux now. We'll show you how Microsoft developers made their massive database system Linux ready, and we'll help you get started with setting up SQL Server on your own Linux
12%
Optimizing Windows 10 for SSDs
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Sergiy Serdyuk, 123RF.com
pretty quickly determine the performance. Next, display the result in PowerShell with: Get-WmiObject -Class Win32_WinSAT The performance measurement provides information in the following areas ... Not all PC settings – traditionally optimized for magnetic hard disks – are suitable for solid state drives. We show you how to configure Windows 10 for optimal operation with SSDs.
12%
Resource monitoring for remote applications
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image Gustavo Quepón on Unsplash.com
of profiling [2], I have focused on individual applications, either serial or parallel [3]. Profiling usually means trying to understand application resource usage patterns by answering questions such as: "How ... Remora combines profiling and system monitoring to help you get to the root of application problems by revealing its use of resources.
12%
Environment Modules
23.02.2012
Home »  HPC  »  Articles  » 
libraries, so how do you handle situations in which you need to change tool sets or applications? You can do it the hard way, or you can do it the easy way with Environment Modules. ... or MPI libraries so they can test them with their code. So this forces a question: How do you have multiple compilers and multiple MPI libraries on the cluster at the same time and not get them confused? I ... libraries, so how do you handle situations in which you need to change tool sets or applications? You can do it the hard way, or you can do it the easy way with Environment Modules.
12%
Wireshark
27.11.2011
Home »  Articles  » 
 
An administrator can only gain useful insights from network analysis if they understand the underlying procedures and protocols. The new version of Wireshark, 1.6, formerly known as Ethereal, can ... -click the installer file (wireshark‑win32‑1.6.1.exe ). The Wireshark installation wizard also launches a helper for installing WinPcap, which needs to complete first. Wireshark Basics Before you start analyzing your

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 95 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice