Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (922)
  • Article (319)
  • News (106)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 125 126 127 128 129 130 131 132 133 134 135 136 Next »

15%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
to identify an essential principle of the security analyst: As an attack occurs, certain things are left behind. This concept was first articulated by Edmond Locard [3] almost 100 years ago, well before
15%
Flatpak, Snap, and AppImage
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by Quino Al on Unsplash
its trustworthiness. However, the major share of today's widespread formats originated in the mid-1990s, when the demands on workstations and servers were far different from today. It is thus
15%
Server distributions for small businesses tested
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © wabeno, 123RF.com
of these distributions to the test: ClearOS [1], Collax Business Server [2], Koozali SME Server [3], NethServer [4], Univention Corporate Server [5], and Zentyal Server [6]. The seventh contestant was a pre-installed NAS
15%
Code IaC for provisioning of preconfigured virtual environments
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © vladnikon, 123RF.com
properties include the sku, which controls resource specifications such as capacity, VM series (e.g., Standard_D4s_v3), size, and tier (e.g., standard or premium). Other key properties are hibernate
15%
Log analysis in high-performance computing
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Kier… in Sight on Unsplash
hope to orient you in the correct direction for deploying a log analysis capability. Splunk Although I'm a big supporter of open source, Splunk [3], a commercial product, is probably the gold standard
15%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
Security analysts and providers use the term "attack surface management" (ASM) to describe tools and software-as-a-service (SaaS) offerings that are intended to enable enterprises – large corporations
15%
Interview with Gregory Kurtzer, Developer of Singularity
21.04.2016
Home »  HPC  »  Articles  » 
in the mid-90s, after I obtained my degree in biochemistry and focused early on genomics and bioinformatics. Along this path I became enamored with the idea of open source software and changed my focus from
15%
What is an IOPS Really?
24.02.2022
Home »  HPC  »  Articles  » 
or write? Despite not having a precise definition, IOPS is a very important storage performance measure for applications. Think about the serial portion of Amdahl’s Law, which typically includes I
15%
High availability with SQL Server 2012 and 2014
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © li xuejun, 123RF.com
, to the Enterprise Edition. Better Safe than Sorry High availability (HA) maximizes the accessibility of database servers by mitigating the effect of hardware damage, compensating for the failure of virtualized IaaS
15%
Introduction to HDF5
22.02.2017
Home »  HPC  »  Articles  » 
, 6 ) / ( 4, 6 ) }       DATA {          1, 2, 3, 4, 5, 6,          7, 8, 9, 10, 11, 12,          13, 14, 15, 16, 17, 18,          19, 20, 21, 22, 23, 24       }    } } } HDF5 has many ways to represent the same datatype

« Previous 1 ... 125 126 127 128 129 130 131 132 133 134 135 136 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice