Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 范德堡大学毕业证成绩单Q/微751929574办理美国vandal毕业证成绩单中留服学历认证本科毕业证硕士学位证书制作Vanderbilt University.odv ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (284)
  • News (129)
  • Article (86)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 50 Next »

44%
The limits and opportunities of artificial intelligence
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © sebastien decoret, 123RF.com
-intelligence, or are artificial narrow-band geniuses all that can be expected for the foreseeable future? ADMIN interviewed Peter Protzel, who studied Electrical Engineering and received his Ph.D. from the University
44%
Monitoring network traffic with ntopng
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
investigate how to commission the latest Enterprise version and explore its feature set. Ntopng was originally developed by Luca Deri, a scientist at the University of Pisa, under the name ntop [1], which
44%
How Open Source Helped CERN Find the Higgs Boson
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Tim Bell
CERN is on its voyage to uncover the secrets of our universe. One of the biggest discoveries at CERN, besides the creation of the web, was the Higgs boson [1]. However, that discovery
44%
Container orchestration with Kubernetes from Google
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kirsty Pargeter, Fotolia.com
project [4] have similar goals. Kubernetes, however, occupies a special position in the ranks of fleet virtualizers with container technology. It follows a superordinate goal and seeks to be a universal
44%
News for Admins
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
 
devices. There is nothing users can do to protect themselves at this time. According to an advisory by Carnegie Mellon University (https://www.kb.cert.org/vuls/id/918987/), Bluetooth host and controller
44%
Moving from Atlassian Confluence to BlueSpice
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Erda Estremera on Unsplash
might seem unrealistic, but with BlueSpice, the attempt is possible, even without the manufacturer's help, thanks to open source migration scripts. Some American universities and institutions have done so
44%
News for Admins
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
 
of researchers from the Tampere University of Technology (Finland) and Technical University of Havana (Cuba) has found a new vulnerability in Intel processors. Dubbed PortSmash (CVE-2018-5407), the exploit allows
44%
Pentest your web server with Nikto
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Mike Wilson on Unsplash
is an IT security enthusiast, scientist, author, consultant, and speaker. As a Lecturer at the University of Bonn in Germany and Researcher at Fraunhofer FKIE, he works on projects in network security, IT security
44%
OpenCanary attack detection
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
enthusiast, scientist, author, consultant, and speaker. As a lecturer at the University of Bonn in Germany and researcher at Fraunhofer FKIE, he works on projects in network security, IT security awareness
44%
DNS name resolution with HTTPS
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by saeed karimi on Unsplash
, scientist, author, consultant, and speaker. As a Lecturer at the University of Bonn in Germany and Researcher at Fraunhofer FKIE, he works on projects in network security, IT security awareness

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 50 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice