Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (578)
  • Article (161)
  • Blog post (5)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 75 Next »

16%
Google+ with Business
02.09.2011
Home »  Articles  » 
 
in Kansas City, Kansas. In addition to Linux Magazine and Linux Pro Magazine, Kite has been published in Sys Admin Magazine and on UnixReview.com. She can be contacted at rkite@advancedclustering.com.
16%
News for Admins
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
 
one thing, it's multiple things, multiple layers." Barcet continues, "A single customer use case may have up to five layers of edge-related infrastructure, going from the IoT device all the way
16%
News for Admins
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
 
of the problem. According to The Hacker News , "More than 2,000 WordPress websites have once again been found infected with a piece of crypto-mining malware that not only steals the resources of visitors
16%
Is System Administration Bound for Extinction?
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © shacil, 123RF.com
that for you, you've probably found the answer to my point: What happens when a patch causes a problem for your managed systems? It does happen. I've been the victim more than once. The answer is that you
16%
News for Admins
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
 
Pokémon Go Hacked by OurMine The phenomenal success of Pokémon Go is also attracting cybercriminals. Pokémon Go experienced severe server issues on July 16; however, the company didn't mention
16%
TUI Tools for Containers
07.10.2024
Home »  HPC  »  Articles  » 
 top -like tool is written in Go, but to me, gotop  really emphasizes ASCII charts more than other tools (Figure 4). The time history charts for CPU usage, including each core in this case, appear at the top
16%
Changing Horses
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © nexusplexus, 123RF.com
along the way. Seriously, this was a "huge lift," as they say in IT shops, and it went better than expected. Hats off to the consultants, training, and phased planning and migration. A year or so later
16%
More Small Tools for HPC Admins
16.11.2017
Home »  HPC  »  Articles  » 
. Figure 2: Output from the “watch -n 1 -d uptime” command. You can see the changes that have been highlighted (I'm not using a color terminal, so they show up as characters with a black background
16%
Insider Threats
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Seasons, 123RF.com
, or when to use multifactor authentication on web-based financial transactions. The soft security approach is better than any virus, adware, spyware, trojan, or worm at compromising your security. Hackers
16%
The limits and opportunities of artificial intelligence
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © sebastien decoret, 123RF.com
and faster than a human could, but they cannot design them. © Kittipong Jirasukhanont, 123RF.com ADMIN: That would be a metaphor for powerful AI then? But even weak AI can do many things faster

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 75 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice