Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop providing ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (262)
  • Article (79)
  • News (30)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 38 Next »

6%
Managing GPT-4 on the Network
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by Cécile Brasseur on Unsplash
Intune by creating a new device profile; you can then use this profile to configure Copilot on the connected computers. The settings are under Devices | Windows | Configuration Profiles . Use Create
6%
Sync identities with Microsoft Identity Manager
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © alphaspirit, 123RF.com
with the connector space. This depends on how the "run profiles" are set up – another important element for the administrator. Via a scheduling service, run profiles are executed regularly; they define imports
6%
Build system images with Kiwi
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © chachar, 123RF.com
Kiwi XML Profile 1.15.2
6%
Remote access with ThinLinc 4.12
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Clem Onojeghuo on Unsplash
Linc configuration file opt/thinlinc/etc/conf.d. To do so, generate a new profile by editing the profiles.hconf file, which could look as follows in an instance where Firefox is the only permitted application
6%
A GUI for Warewulf 4
06.05.2025
Home »  Articles  » 
provisioned by Warewulf Profiles : categories of nodes with a shared configuration Images : operating system payloads for deployment Overlays : built-in and site-specific customizations layered onto
6%
Monitoring network traffic with ntopng
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
there, you can either specify the exact time period you want to analyze or use shortcuts to select, say, an hour, day, or month as the period. Traffic Profiles With the help of traffic profiles, network
6%
VMware AirWatch mobile device management
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Sychugina Elena, 123RF.com
with Windows Phone 8.1, and a Google Nexus 7 with Android 5.0.2 – integrated without difficulties, as well. If a device is already integrated into another MDM structure, the profile install does not work
6%
Software-defined wide area networks
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © ktsdesign, 123RF.com
not include any security features (e.g., encryption) and therefore only ensures logical separation of the data paths. These overlay tunnels are configured and optimized, depending on the application profile
6%
Automatically terminate OpenSSH sessions
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Jon Tyson on Unsplash
for a desktop system, which explains why protection profiles are different. The Protection Profile for general-purpose operating systems [2] clearly stipulates that user sessions must either be terminated or
6%
More Best Practices for HPC Containers
19.02.2020
Home »  HPC  »  Articles  » 
to be on the system. If you want to build or run containers, you need to be part of that group. Adding someone to an existing group is not difficult: $ sudo usermod -a -G docker layton Chris Hoffman wrote an article

« Previous 1 ... 8 9 10 11 12 13 14 15 16 17 18 19 20 21 ... 38 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice