Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1339)
  • Article (364)
  • News (273)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 199 Next »

14%
News for Admins
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
 
1.2 depends on lazy page table entry (PTE) enforcement, the same mechanism on which the Meltdown flaw exploitation relies. Spectre is not a single vulnerability; it's a class or family of flaws ... Two New Variants of Spectre Discovered, SUSE Sold for $2.5 Billion, Sonic and Ultrasonic Signals Can Crash Your Hard Drive
13%
Tokutek Open Sourcing Code for TokuDB v7
26.04.2013
Home »  HPC  »  News  » 
 
Tokutek announces that the source code for TokuDB v7, the newest version of the company’s high-performance MySQL storage engine, is now freely available under the GPL License v2.
13%
Open source tools for workgroup collaboration
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © Setsiri Silapasuwanchai, 123RF.com
introduces a few of the leading alternatives, including: RetroShare SparkleShare I2P These tools provide collaboration and data sharing for dispersed workgroups and offer some advanced security ... Want to keep your teams connected even when they are disconnected? RetroShare, SparkleShare, and I2P are free tools that support chat, data sharing, and other collaboration services.
13%
SHA-3 – The new hash standard
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Warakorn Harnprasop, 133RF.com
standard. In October of 2012, the winner was chosen: the Keccak [2] algorithm, which was developed by a team of Belgian scientists. This is the second competition of this type: The symmetrical encryption ... NIST has chosen the Keccak algorithm as the new cryptographic hash standard but, in real life, many users are still waiting to move to its predecessor SHA-2.
13%
New features in PHP 7.3
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © MIR, Fotolia.com
. In everyday life, programmers may particularly notice the switch to PCRE2 (Perl-compatible regular expressions, version 2), the changed behavior in multibyte string functions, and the more flexible Heredoc ... The new PHP 7.3 simplifies string handling, supports PCRE version 2, adds LDAP controls, improves logging, and deprecates some features, functions, and syntax elements.
13%
Big data tools for midcaps and others
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Roman Gorielov, 123RF.com
, whereas Hadoop 2.x relies on either MapReduce or its successor YARN [2] (discussed later). The role of HDFS is to provide the most efficient, fastest possible fail-safe storage of the data. HDFS ... Hadoop 2.x and its associated tools promise to deliver big data solutions not just to the IT-heavy big players, but to anyone with unstructured data and the need for multidimensional data analysis.
13%
Mailman 3.0 – a long time coming
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Andrey Bayda, 123RF.com
is a professional software tool, and the fan base appreciates its solid operating principles. Version 1.0 was released in mid-1999 [1], followed by 2.0 in 2000. The latest stable branch 2.1 appeared about 12 years ... Mailman 3.0 is a new major version, released 15 years after version 2.0. We put the new version through its paces and explain the installation procedure and new features.
13%
TLS 1.3 and the return of common sense
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image Creative Commons CC0 TheDigitalArtist Pixabay
a novel threat to pre-quantum encryption, like the ciphers used in TLS. After a decade in service, TLS 1.2 is showing many signs of aging. The cryptographic building blocks of current versions of the TLS ... After a decade in service, TLS 1.2 is showing many signs of aging. Its immediate successor, TLS 1.3, has earned the approval of the IETF. Some major changes are on the way.
13%
News for Admins
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
© Elnur Amiskishiyev, 123RF.com
stories continue to evolve, these companies will be on their toes to keep up with new discoveries. Docker EE 2.0 Announced Docker Inc. has announced the release of Docker Enterprise Edition (EE) 2 ... Meltdown and Spectre revisit Intel, AMD, and ARM processors, Orangeworm, a new hacking group, targets the healthcare industry, Docker EE 2.0 announced, Remote code execution vulnerability found
13%
Scalable network infrastructure in Layer 3 with BGP
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © artqu, 123RF.com
central switches and adding more switches if the number of ports on a switch is not sufficient. Together, the switches and network adapters form a large physical segment in OSI Layer 2 ... Large environments such as clouds pose demands on the network, some of which cannot be met with Layer 2 solutions. The Border Gateway Protocol jumps into the breach in Layer 3 and ensures seamlessly

« Previous 1 ... 6 7 8 9 10 11 12 13 14 15 16 17 18 19 ... 199 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice