Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1345)
  • Article (364)
  • News (273)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 135 136 137 138 139 140 141 142 143 144 145 146 147 148 ... 200 Next »

8%
Mobile hacking tool
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Valentina Curini on Unsplash
of the Kickstarter campaign in 2020, which raised the impressive sum of $4.8 million according to the Hackaday platform [2], an active community has sprung up around this practical device, helping to drive the project
8%
Moving Your Data – It’s Not Always Pleasant
08.05.2013
Home »  HPC  »  Articles  » 
the list of files across the cores). A second way to take advantage of the extra cores is to use a distributed file copy tool. 2. dcp You’re an HPC person and you’re used to the power of many cores
8%
Optimizing SQL with Execution Plans
11.06.2013
Home »  Articles  » 
 
order (as shown in Example 2). The query only uses the index optimally if the access predicate or seek predicate is displayed
8%
Exploring the Linux Tuning Guide for AMD Opteron 6200 Series Processors
16.07.2012
Home »  HPC  »  Articles  » 
, and Ubuntu 10.10) and enabled systems that support some or all new features of the “Bulldozer” core architecture (e.g., RHEL 6.2, SLES 11 SP2, and Ubuntu 11.04). See the sidebar titled “Bulldozer
8%
Office 365 vs. Google Apps
19.01.2012
Home »  Articles  » 
 
(Figure 2). Figure 2: First steps with the web-based management interface of Office 365. After checking broad legitimation for the domain by manually
8%
More Small Tools for HPC Admins
16.11.2017
Home »  HPC  »  Articles  » 
with watch is -d , which highlights differences between iterations (Figure 2). This option gives you a wonderful way to view the output of time-varying commands like uptime
8%
A decentralized communication platform
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Mipan, Fotolia.com
with Jami's search function – but this does not require providing any personal information. Jami is available for Linux, macOS, and Windows; smartphones with Android [2] and iOS [3]; and TVs with Android TV
8%
Choosing between the leading open source configuration managers
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Giuseppe Ramos, 123RF.com and Paulus Rusyanto, Fotolia.com
admins prefer to invest their time up front in labor-saving custom tools that will save time and energy on repetitive tasks. Puppet [1] and Chef [2] are two open source configuration management tools
8%
News for Admins
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
 
NIST Updates Cybersecurity Framework Major updates to NIST's Cybersecurity Framework (CSF) are underway, with the new CSF 2.0 expected in 2024. "Based on stakeholder feedback, in order to reflect
8%
Professional protection for small and mid-size enterprises
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © Guido Vrola, 123RF.com
on the Untangle VM (Figure 1). Figure 1: The path of data through the Untangle NG Firewall or, in special cases, past it. Image from the Untangle wiki [2

« Previous 1 ... 135 136 137 138 139 140 141 142 143 144 145 146 147 148 ... 200 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice