Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: googles ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1046)
  • Article (286)
  • News (206)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 155 Next »

27%
Server virtualization with Citrix XenServer
04.08.2011
Home »  CloudAge  »  Articles  » 
 
the biggest rentable cloud today: the Amazon Web Service. Based on this extremely mature technology, Citrix launched Version 5.6 of its XenServer product family in May 2010. XenServer, the product built around ... Version 5.6 of Citrix XenServer is a feature-stripped version of the virtualization product and is available free, in addition to the commercial Advanced, Enterprise, and Platinum editions.
26%
Privacy Policy
24.05.2018
Home »  HPC  » 
 
generated by the cookie about your use of this website is usually transmitted to a Google server in the USA and stored there. Google Analytics cookies are stored based on Art. 6 (1) (f) GDPR. The website
26%
Privacy Policy
24.05.2018
Home » 
 
generated by the cookie about your use of this website is usually transmitted to a Google server in the USA and stored there. Google Analytics cookies are stored based on Art. 6 (1) (f) GDPR. The website
26%
Zero Trust as a security strategy
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Jack Dong on Unsplash
for real opportunities. Once again, industry leader Google has shown how this can look. At Google, the idea of the secure network became obsolete years ago. Instead, the company is pursuing a strategy known ... Acceptance of zero trust models like BeyondCorp by Google or LISA by Netflix lags in Europe, where endpoint security is king. We examine why this situation must change by looking into the principles
26%
Zulip, Mattermost, and Rocket.Chat
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © rll, fotolia.com
as a containerized solution on Docker, Podman, or Kubernetes. I used a classic VM in this example. The installation on CentOS Stream 9 is very simple, involving just two steps – database preparation [6] and service ... Chat servers likely send confidential data to the cloud, so if you don't want to see your business talks on Google or Amazon, you can keep your information safely in your own data center with self
26%
News for Admins
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
 
-3786), which affect OpenSSL version 3.0.0. These vulnerabilities have been addressed with the release of OpenSSL 3.0.7, so users should update now. "Users of OpenSSL 3.0.0--3.0.6 are encouraged to upgrade to 3
26%
Razer Releases Linux Laptop Specifically for Deep Learning
18.04.2022
Home »  News  » 
 
-Q 16GB), which offers industry-standard ML performance and delivers model training performance that's up to 4x faster than Apple's MX1 Max and 10x faster than a Google Colab instance. The included
25%
CoreOS 1122.2.0 (64-bit) & NethServer (multiarch)
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
 
software automatically [2]. NethServer (multiarch) NethServer is a Linux distribution for servers based on CentOS 6.8 and licensed under the GPLv3. It is advertised as "scalable, secure, cloud ready ... CoreOS is a lightweight Linux operating system for managing and running containers at scale with low overhead. NethServer is a Linux distribution for servers based on CentOS 6.8 and licensed under
25%
Millions of Android Devices Affected by Chinese Malware
06.07.2016
Home »  News  » 
 
are from India (1.35 million) and China (1.6 million). The US is not immune to HummingBad, with over 288,800 infected devices. The way this malware operates is that it tries to root Android devices
25%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
-factor authentication is probably Google Authenticator. Two-factor authentication solutions are in principle not limited to specific application scenarios. In practical applications, however, their use has proved

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 155 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice