Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (306)
  • News (26)
  • Article (9)
Keywords

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 35 Next »

38%
Office 365 vs. Google Apps – Microsoft strikes back
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Helder Almeida, 123RF.com
Online. For smaller companies in particular, Office 365 provides an interesting alternative, because administration is kept very simple and the cloud services are presented to users with a familiar MS
38%
Optimizing Hyper-V network settings
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© Stefan Hermans, Fotolia.com
cards' hardware functions and improved control and configuration of the network connections. But, the current 2.0 version of Hyper-V in Windows Server 2008 R2 also provides optimization options
38%
Expand your sphere with a piece of Google
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© artida, 123RF.com
. But Google was not satisfied with providing simple disk space – it added a chic interior as well. Garnished with a couple of buzzwords, the results of this project were ready for the general public in May 2008
38%
Anonymization and pseudonymization of data
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Debby Ledet on Unsplash
after anonymization and providing protection against re-identification risks. At the same time, these techniques offer immense opportunities, particularly with a view to leveraging big data and machine
38%
What tools do intruders use to
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Wojciech Kaczkowski, 123RF.com
Intruders and penetration testers use a number of tools to obtain DNS information. Many of these tools are very familiar to IT professionals. Tools such as nslookup and dig provide information on domain names
38%
Enterprise software management with Red Hat Satellite Server
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© robbiverte, 123RF.com
and Microsoft systems as well. The Satellite Server is connected to the Internet and is registered with the Red Hat Network Server that provides patches. It is the only server connected to the Red Hat Network
38%
MAT: Monitor your infrastructure with Netdata
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
the collected metrics data. If you think Netdata is a commercial provider, you are partly right. The complete software is available under a free license. Although a charge is levied for using the Netdata
37%
Storage system with OpenSolaris and Comstar
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Aleksandr Fomenkov, 123RF.com
The advanced ZFS filesystem by Sun, and now Oracle, heralded a major change in the storage sector. ZFS's amazing qualities are an obvious choice for a storage system, but Sun failed to provide
37%
Avoiding common mistakes in high-performance computing
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Maxim Kazmin, 123RF.com
that all customers have similar experiences. Experience and ability are varied and great among the many commodity hardware and solution providers. In a post-single-vendor supercomputer market, the largest
37%
Dynamic routing in Linux with Quagga
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© petrol, 123RF.com
doesn't handle the routing (that is still the domain of the underlying operating system kernel); however, it does provide a number of routing protocols – Routing Information Protocol (RIP) [3], RIPng [4

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 ... 35 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice