Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1238)
  • Article (265)
  • News (87)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 160 Next »

38%
Build your own cloud with antMan
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Jorge Coromina on Unsplash
Building a private cloud is time consuming and complex. Some use OpenStack, but many OpenStack projects fail because companies underestimate its complexity. antMan does not rely on Open
38%
Sharding and scale-out for databases
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Dan Dennis on Unsplash
and seamlessly taking over the tasks of a failed instance in an emergency. Anyone who has ever faced the challenge of achieving high availability for MySQL will be aware that, out of the box, MySQL does not come
38%
Generate VM Images with virt-builder
15.04.2014
Home »  Articles  » 
 
.24, but the distribution is currently beta. Conveniently, libguestfs does not need to be installed throughout the system just to try out the new tools. With special run scripts, you can run the programs directly
38%
DataStax Announces DataStax Enterprise 2.0
04.04.2012
Home »  HPC  »  News  » 
 
contention standpoint. The platform does not require time-consuming or expensive ETL software to move data between systems, because everything is automatically and transparently replicated in the cluster, even
38%
Totally Stressed
30.09.2013
Home »  Articles  » 
 
; this does not require administrative privileges. Because the programs do not usually output anything on screen, you should run your hardware tests in the background, so you can work at the console while
38%
Secret Windows Attack Exists Only in the Registry
05.08.2014
Home »  News  » 
 
, you can’t use the Regedit registry editor to look for the presence of the malicious autostart registry key, because the key does not begin with an ASCII character and is thus hidden from the registry
38%
Google Forks OpenSSL
24.06.2014
Home »  News  » 
 
political, but it is possible that if these customizations are already built into Chrome and Android, Google does not want to risk the instability that might follow a major upgrade to the OpenSSL code base ... Google Forks OpenSSL
38%
5 Million Google Passwords Leaked
16.09.2014
Home »  News  » 
 
Account names and passwords for 5 million Gmail accounts were leaked to Russian forums. A 50MB zip file containing the account names and clear-text passwords has appeared on various sites. Google ... Cyber-snoopers post a 50MB zip file with account names and passwords for millions of Google accounts. ... 5 Million Google Passwords Leaked
38%
Web Creator: Web Was Built for Simplicity, Not Security
13.10.2014
Home »  News  » 
 
.” The World Wide Web began as an effort to merge hypertext technology with DNS-based Internet networking. Security depended on the underlying security of the network – much as it still does to this day
38%
IBM Stops Making Chips
22.10.2014
Home »  HPC  »  News  » 
 
. Interestingly, IBM does not see the move as an exit from the chip business, only from the headaches of manufacturing. The company will continue to invest in semiconductor research and will presumably license its

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 160 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice