Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1238)
  • Article (265)
  • News (87)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 139 140 141 142 143 144 145 146 147 148 149 150 151 152 ... 160 Next »

37%
Supercharge your software upgrade routine
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by redcharlie on Unsplash
] stanza contains some options for Arch, Red Hat, and SUSE, among others. Troubleshooting as a Job No matter how good your intentions, sooner or later something will go haywire, and when it does
37%
Manage Windows images with the Windows ADK
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Maksym Yemelyanov, 123RF.com
the data. If the system fails to acquire the test data and reports that the resources are busy, a restart will typically help. If this does not do the trick, I recommend taking a look at a discussion online
37%
News for Admins
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
 
system." The agency will coordinate with government stakeholders, partners, and international standards organizations to "establish a time standard at the Moon to ensure the critical time difference does
37%
Vector databases for data-driven artificial intelligence
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © sdecoret, 123RF.com
behavior) generally does not lend itself to approaches that use legacy database models, where "legacy" means databases that use B-tree and hash indexes, which are not ideal for storing and retrieving high
37%
Recovering from a cyberattack in a hybrid environment
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Kelly Sikkema on Unsplash
experts recommend enabling PHS – at least as an additional authentication procedure. The frequently cited angst prompted by synchronizing passwords with the cloud is unfounded, because hashing more than 1,000
37%
Versatile network and system monitoring
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © erythropterus, 123RF.com
to ignore and install an agent there. An example of an exclusion configuration is: lnms config:set autodiscovery.nets-exclude.+ '192.168.0.1/32' By default, LibreNMS does not use IP addresses for device
37%
Open source forensics for adaptive detection of threats on CRITIS networks
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © kreminska, 123RF.com
BlackEnergy { meta: description = "Detects VBS Agent from BlackEnergy Report - file Dropbearrun.vbs" author = "Florian Roth" reference = "http://feedproxy.google.com/~r/eset/blog/~3/BXJbn
37%
Network load balancing on Windows Server
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Nathan Cima on Unsplash
address of the name, the server always responds with the next IP address on the list. However, this does not take the host utilization level into account; instead, clients gradually connect to other hosts
37%
Energy efficiency in the data center
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Ussama Azam on Unsplash
does not offer significant capacity gains; again, everything depends on the use case. Compression: It Depends Data compression is based on an algorithm that allows more data to be stored in less space
37%
Domain-driven design and agile development
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © omnimages, 123RF.com
compared with its competitors. An example of a generic subdomain could be invoicing, which although it is equally important because, without invoices you have no revenue, it does not further the cause

« Previous 1 ... 139 140 141 142 143 144 145 146 147 148 149 150 151 152 ... 160 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice