Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1270)
  • News (232)
  • Article (229)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 110 111 112 113 114 115 116 117 118 119 120 121 122 123 ... 174 Next »

12%
Aggregate alerts from various monitoring systems
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Chittima Kasa, 123RF.com
in the first line. If you do not have a public domain or are trying out the setup on your local network, remove the hash in line 3. Caddy will then use self-signed certificates. Alerta is then accessible
12%
Five HPC Pitfalls (Part 1)
13.03.2012
Home »  HPC  »  Articles  » 
of a Network Area Storage (NAS) appliance. Each appliance will adhere to the NFS protocol, but poor performance can greatly limit the true potential of a cluster. A similar situation exists for network
12%
Stopping Side Channel Attacks
16.10.2012
Home »  Articles  » 
 
, the network components, or any active applications. The study might also include file paths to confidential data or configuration files. Of course, the security of encryption and cryptographic signatures
12%
Interview: Hardware or Cloudware?
10.04.2012
Home »  HPC  »  Articles  » 
to seamlessly create the illusion that there was just one computer. And that went through multiple iterations – in the ’70s with distributed computing, in the ’80s with network computing, in the ’90s with network
12%
AMD’s Greg Stoner on ROCm
31.10.2017
Home »  HPC  »  Articles  » 
-learning library, which supports GPU acceleration for deep convolution networks. We’re in the process of porting several machine-learning libraries and tools. Many of these tools were written with CUDA, and we can
12%
Trivy security scanner
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Lead Image © MPower, photocase.com
.zones 27 network = data.terraform_remote_state.vpc.outputs.network_name 28 subnetwork = data.terraform_remote_state.vpc.outputs.subnets_names[0] 29 ip
12%
A Password Protection Service
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © bluebay, 123RF.com
intrusion prevention monitoring on any service port that uses username/password combinations for authentication. And while Fail2ban runs as a daemon, it does not expose any new listening network ports
12%
Radeon Open Compute Ecosystem
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
machine-learning library, which supports GPU acceleration for deep convolution networks. We're in the process of porting several machine-learning libraries and tools. Many of these tools were written
12%
Accelerate web applications with Varnish Cache
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Aleksandr Frolov, 123RF.com
Varnish Cache, you can speed up the delivery of web pages with performance that is usually limited only by the speed of the network itself. Classic Apart from optimizing the cache functions
12%
Advanced Windows security using EMET
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Andrii IURLOV, 123RF.com
to distribute EMET using group policies. You can centralize configuration using group policies and administrative template files if you have successfully distributed EMET in your network. Copy the files EMET

« Previous 1 ... 110 111 112 113 114 115 116 117 118 119 120 121 122 123 ... 174 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice