Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1345)
  • Article (364)
  • News (273)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 125 126 127 128 129 130 131 132 133 134 135 136 137 138 ... 200 Next »

8%
Computational storage that supports storage operations
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © sdecoret, 123RF.com
in three forms: as an add-in card (AiC) with a PCIe connector, as a solid-state drive (SSD) with a U.2 interface, or as SFX 3000, which allows vendors to build their own hardware with ScaleFlux features
8%
Border Gateway Protocol
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Rachael Arnott, 123RF.com
). If router A in AS 64496 with an IP address of 192.0.2.1 wants to peer with router B in AS 64500 and IP address 192.0.2.2, router A must store the neighbor 192.0.2.2 with AS 64500 and router B the peer 192.0.2
8%
Sustainable Kubernetes with Project Kepler
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Hassan Pasha on Unsplash
represents hundreds of terawatt hours and, potentially, 90 million tons of CO2 released into the atmosphere [1]. Although data center efficiency and sustainability have advanced in leaps and bounds over
8%
Comparison of forensic toolkits for reconstructing browser sessions
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © stockbksts, 123RF.com
(renamed, deleted, hidden, or encrypted files). On the basis of this scenario, researchers mutually define general and scenario-specific requirements for a collection of forensic tools [2] that allow
8%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
of the card with a magnetic strip/chip and the associated PIN. Even more secure is a process in which three factors are used – knowledge, possession, biometrics. For example, "QTrust 2go Smart" [1] combines
8%
Forensic Tools
04.02.2014
Home »  Articles  » 
 
and postmortem analysis. For this comparison, we looked at version 1.2 (build 1003); version 2.0 has been released in the meantime (build 1003). Forensic duplication is implemented as an additional virtual disk
8%
The Cloud’s Role in HPC
05.04.2013
Home »  HPC  »  Articles  » 
workload, a number of centers fit this scenario, and this number is growing rapidly. 2. Web Services Another popular scenario in HPC centers that I’ve seen and heard about is the increasing need
8%
Access Anywhere with Mobile IPv6
16.04.2013
Home »  Articles  » 
unicast address. The home agent means that the MN is accessible everywhere via its home address (Figure 2). Figure 2: Mobile IPv6 terminology. The MN
8%
Red Hat’s Cloud Tools
08.07.2013
Home »  Articles  » 
 
-party cloud technologies with the help of its Delta Cloud API. After all, CloudForms 1.1, DeltaCloud 1.0, Storage Server 2.0, JBoss Middleware, and Enterprise Virtualization 3.1 form the foundation
8%
How Old is That Data?
20.04.2017
Home »  HPC  »  Articles  » 
either to display the graphic output, as in the second command. or to query the output. Figure 2 shows the resulting web page when mtime is used as the metric

« Previous 1 ... 125 126 127 128 129 130 131 132 133 134 135 136 137 138 ... 200 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice