Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm%253%2000 Llorente%2012 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (219)
  • Article (67)
  • News (43)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 33 Next »

39%
Ease your network inventory pain with Spiceworks
07.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Paul Tobeck, fotolia.com
Windows 2012 Server Macintosh OS X Linux/Unix For SNMP discovery, the administrator needs to enter the SNMP community name into the Spiceworks application. To download the Spiceworks inventory suite
39%
Desired State Configuration for Linux
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © SORAPONG CHAIPANYA, 123RF.com
environment, the required infrastructure is set up quickly. After installing the Windows Management Framework 4 [1], included in Server 2012 R2 and Windows 8.1, you already have the tools in place. Power
39%
OpenStack: What's new in Grizzly?
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Oksana Perkins, Fotolia
advice to OpenStack admins was: Do not try to update one OpenStack version to another. The first tagged with the "Enterprise Ready" label, OpenStack Essex, became available in April 2012. At that time
39%
Checking Compliance with OpenSCAP
03.09.2012
Home »  Articles  » 
 
. The oscap --id option also gives you the ability to search a system for a specific bug fix. For example, to check to see whether the Advisory “RHSA-2012:0017: libxml2 security update” has been installed
39%
Increasing Throughput with Link Aggregation
26.10.2012
Home »  Articles  » 
 
Windows Server 2008 R2, the question of whether or not link aggregation is available has always depended on the NIC drivers. Windows Server 2012, on the other hand, will support both static and dynamic link
39%
SPDY HTTP Protocol
08.06.2012
Home »  Articles  » 
 
More than 20 years having passed since its introduction, and HTTP certainly shows some signs of age. Google’s new SPDY protocol solves some problems with HTTP without breaking existing websites. ... , Mark Nottingham, the chair of the group recently tripped a discussion relating to HTTP 2.0, the first draft of which is due May 2012. One year later, the changes are to be implemented in the scope ... More than 20 years have passed since its introduction, and HTTP certainly shows some signs of age. Google’s new SPDY protocol solves some problems with HTTP without breaking existing websites.
39%
RAM Revealed
26.04.2012
Home »  Articles  » 
 
-DIMMs act like single-rank modules. The dual-CPU systems in the Sandy Bridge microarchitecture expected in 2012 will be the first to support LR-DIMMs. Rank DIMMs always have a number of memory chips
39%
Bashtop, a Gorgeous Top-like Tool
10.06.2020
Home »  HPC  »  Articles  » 
 Nvidia K80, which was the last of the Kepler series of GPUs that started in 2012. One could argue that the Kepler series, particularly the K80, was the elbow in GPU computing popularity. Therefore, top -like
39%
Creating load for fun and profit
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Lead Image © Lucy Baldwin, 123RF.com
] and recordings [7] are readily available to those who want to learn more about this great tool. Infos "Performance Tuning Dojo" by Federico Lucifredi, ADMIN , issue 8, 2012, pp. 90-92 Amos Waterland
39%
Protect yourself from infected MS Office files
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © wamsler, 123RF.com
, the following well-known vulnerabilities were exploited for this purpose: CVE-2012-0158, CVE-2013-3906, CVE-2014-1761 (Figure 1). Today, however, an exploit that Microsoft actually closed in April 2015 (CVE-2015

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 33 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice