Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1339)
  • Article (364)
  • News (273)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 199 Next »

13%
New features in MariaDB 10.3
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image by Adarsh Kummur on Unsplash
to specific data for reporting and business intelligence queries. In the MariaDB 10.2 version, the XtraDB storage engine by Percona was replaced by the InnoDB 5.7 storage engine from MySQL, which allowed ... What lacked maturity in MariaDB 10.2 has now been sorted out in version 10.3. We look at the benefits you can reap now.
13%
Ceph object store innovations
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Max, fotolia.com
competitor to Ceph in its portfolio in the form of GlusterFS [2], and on the other because Inktank was a such a young company – for which Red Hat had laid out a large sum of cash. Nearly two years later ... The Ceph object store remains a project in transition: The developers announced a new GUI, a new storage back end, and CephFS stability in the just released Ceph c10.2.x, Jewel.
12%
News for Admins
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
 
kernel review and testing." Other kernels in the program include 4.4-cip, 4.19-cip, and 5.10-cip. HTTP/2 Protocol Exploited in Largest DDoS Attack Ever Google, Cloudflare, and Amazon Web Services have ... Technology Environments; Civil Infrastructure Platform Adds New Super-Long-Term Linux Kernel; HTTP/2 Protocol Exploited in Largest DDoS Attack Ever; Docker Announces Three New Products for Secure App Delivery
12%
What Happens with WebOS?
02.09.2011
Home »  News  » 
 
it inherited in the $1.2 billion purchase of Palm in April 2010. Sluggish sales and complaints from retailers about unsold inventories led HP to cut prices on the tablets several times, eventually slashing them ... it inherited in the $1.2 billion purchase of Palm in April 2010. But what will happen to webOS, the smartphone OS that many still consider an alternative to Android and the iPhone?
12%
What Happens with WebOS?
11.11.2011
Home »  HPC  »  News  » 
 
it inherited in the $1.2 billion purchase of Palm in April 2010. Sluggish sales and complaints from retailers about unsold inventories led HP to cut prices on the tablets several times, eventually slashing them ... it inherited in the $1.2 billion purchase of Palm in April 2010. But what will happen to webOS, the smartphone OS that many still consider an alternative to Android and the iPhone?
12%
Keep your edge with these powerful Linux administration tools:
08.01.2019
Home »  News  » 
 
Restoring Deleted Files in Linux  FOG: Clone and Deploy Desktop Computers Getting to Know Firewalld Manage logs with logrotate Fail2ban: A Password Protection Service Cross-Platform Database
12%
Hyper-V with the SMB 3 protocol
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Vladimir Kramin, 123RF.com
The SMB protocol is mainly known as the basis for file sharing in Windows and is familiar to Samba and Linux users, too. Windows 8.1 and Windows Server 2012 R2 use the new Server Message Block 3 ... Microsoft has introduced several improvements to Windows Server 2012 and Windows Server 2012 R2 with its Server Message Block 3. Hyper-V mainly benefits from faster and more stable access to network
12%
Exploiting, detecting, and correcting IAM security misconfigurations
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Kyle Head on Unsplash
sensitive data, or use the account for their own purpose (e.g., crypto mining [2]). In this article, I put security best practices aside and have some fun focusing attention on real-world scenarios of IAM ... Three IAM security misconfiguration scenarios are rather common: allowing the creation of a new policy version, the modification of a role trust policy, and the creation of EC2 instances with role
12%
New features in jQuery 3
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Marc Dietrich, 123RF.com
Query themselves. A W3Techs [2] statistic even suggests that jQuery is used on two-thirds of all websites worldwide. Dismantling On June 9, 2016, the developers released jQuery version 3.0 [3]; an update followed ... The functions and objects of the jQuery JavaScript library make the work of web developers much easier. Although jQuery 3 remains largely compatible with version 2, some changes might prevent its use.
12%
OpenNebula – Open source data center virtualization
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Sternenhimmel, fotolia.com
OpenNebula [1] separates existing cloud solutions into two application categories – infrastructure provisioning and data center virtualization [2]  – and places itself in the latter group ... The OpenNebula enterprise cloud management platform emerged in 2005, so it has been on the market longer than many comparable products. In the current version 4.2 (code-named Flame), it has presented

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 199 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice