Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1263)
  • News (419)
  • Article (310)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 126 127 128 129 130 131 132 133 134 135 136 137 138 139 ... 200 Next »

12%
SDS configuration and performance
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Jakub Jirsak, 123RF.com
with dedicated servers and combinations of SSDs and traditional hard drives. Usually, the components connect with each other and the clients over a 10Gb network. However, SDS now also provides added value
12%
Maintaining Android in the enterprise
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Iaroslav Neliubov, 123RF.com
the same because of Android's vulnerabilities. Superuser Apps The approaches to gaining root access are so diverse that providing a generic guide is impossible. The only solution here is to search for each
12%
An open source object storage solution
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Pat Whelen on Unsplash
or clusters as your data storage requirements grow. Also, both MinIO and Amazon S3 provide data protection mechanisms, such as erasure coding and replication, to ensure the durability and availability of your
12%
Data Visualization Tools
07.01.2014
Home »  Articles  » 
integrate the already aging XMMS audio player. All told, Conky offers more than 250 data sources. For more features and information providers, users can turn to Shell or Lua scripts. By default, Conky only
12%
Stopping SQL Injection
21.06.2013
Home »  Articles  » 
 
provides good base protection. The firewall solution is implemented in C++. Using the example of a Linux server with the free Koha library system, I will take a closer look at the GreenSQL Security variant
12%
BackTrack Linux: The Ultimate Hacker's Arsenal
20.09.2011
Home »  Articles  » 
 
it have any evil purpose. Its developers provide it to you at no cost for the purpose of legitimate penetration testing. You could use BackTrack to illegally hack into lots of things: websites, systems
12%
Server virtualization with Citrix XenServer
04.08.2011
Home »  CloudAge  »  Articles  » 
 
), a Windows-based management application for the host and virtualized guest systems. XenCenter provides a GUI and thus facilitates management of one or more XenServers. To help you migrate physical and virtual
12%
Parallel Julia – Jumping Right In
29.06.2012
Home »  HPC  »  Articles  » 
crowd and because parallel computing is an integral part of technical computing, I’ll jump right into how Julia expresses parallelism. Diving Into the Deep End Before I begin, however, let me provide my
12%
AlmaLinux and HPC
31.01.2024
Home »  HPC  »  Articles  » 
) compatible in the summer of 2023 when Red Hat announced restrictions to RHEL-related source code. Today, AlmaLinux provides HPC users with a production grade, enterprise operating system that offers
12%
An Active Directory management solution for everyone
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
only be possible with scripted jobs (e.g., importing user data from CSV files with automatic creation and configuration of group memberships). Integrated reporting provides IT managers the basis

« Previous 1 ... 126 127 128 129 130 131 132 133 134 135 136 137 138 139 ... 200 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice