Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (702)
  • Article (153)
  • News (97)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 96 Next »

14%
Smartphone management with Microsoft products
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Javier Brosch, 123RF.com
Intune lets admins centrally monitor not only computers and laptops, but also smartphones and tablets (Figure 1). In particular, businesses who rely on Windows Server 2012, Windows 8 and Windows Phone 8
14%
More TUI Tools for HPC Users
06.10.2025
Home »  Articles  » 
simple job can use the cpufetch  command. Figure 1 shows example output of the cpufetch  command on my laptop.  Figure 1: Output from cpufetch. Note
14%
Making Kerberoasting uneconomical
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © alphaspirit, 123RF.com
-reaching authorizations without immediately setting off the alarm bells on monitoring systems. Sometimes these techniques result from the functionality of Windows and Active Directory (AD). Stolen and Broken
14%
Data center management with Ralph
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © ffzhang, 123RF.com
functions for managing, monitoring, and planning the data center infrastructure and the IT systems installed there. DCIM in particular makes a significant contribution to the optimization and efficient
14%
IBM Might Sell Small Server Business
21.01.2014
Home »  News  » 
 
several years ago. Spreading into the server space is a natural fit for Lenovo, with its specialty in high-end laptops and workstations for business customers. One can only imagine that Lenvovo is offering
14%
Open Source VDI solution with RHEV and oVirt
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © adchariya chanpipat,123RF.com
-foreman-ui-plugin.html Nagios/Icinga monitoring http://labs.ovido.at/monitoring/wiki/ovirt-monitoring-ui-plugin RHEV-H servers provide the virtual machines. Each active VDI instance requires one. RHEV
14%
A closer look at hard drives
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Lucy Baldwin, 123RF
where I left off, I'll try find out everything that my laptop knows about its internal drive (Figure 1). Figure 1: Intel SA2M080G2GC, an Intel 320 second
14%
AMT Flaw in Intel Chips Allows Attacker to Create a Backdoor
16.01.2018
Home »  News  » 
 
F-Secure researchers have found a way to exploit the security flaw in AMT that allows a local attacker to backdoor almost any corporate laptop in a matter of seconds, even if the BIOS password, TPM
14%
Proprietary and Open Source Storage Options
09.10.2023
Home »  HPC  »  Articles  » 
How to manage storage is a very popular question with a simple, single answer: It depends. Let me explain. Because of the many aspects of managing storage – from design, to monitoring, to user
14%
OpenStack observability with Sovereign Cloud Stack
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Michaela Filipcikova on Unsplash
to develop. The first such group to be formed out of the Operations and Identity and Access Management team was the Monitoring SIG, which is dedicated to the topics of monitoring and observability

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 96 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice