Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1260)
  • News (419)
  • Article (309)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 200 Next »

16%
Managing Linux systems with Spacewalk
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © NASA
The Spacewalk server provides a comprehensive framework for managing Linux systems, and if you need to automate tasks, the XML-RPC-based API and the spacecmd tool are useful aids. We compare the two
16%
Hands-on Exchange rights management
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Isaac Marzioli, 123RF.com
Exchange Server 2013 provides a comprehensive, role-based rights management feature. Rights and roles can be managed in the Exchange console, with PowerShell, or with additional tools. We demonstrate
16%
This Linux hardware company puts the emphasis on freedom and privacy
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Image courtesy Swapnil Bhartiya
PureOS that runs on the Librem laptops and 2-in-1 detachable laptop-and-tablet devices. The company is also working on a Linux based smartphone called Librem 5. The Brief History of Purism As a long
16%
Tuning Your Filesystem’s Cache
16.02.2012
Home »  Articles  » 
 
page cache here. If system load increases at the start of a new application, the system will evict caches as required to provide working memory for the new process – the illusion of free memory
16%
Workspace ONE for endpoint management
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Davorr, Fotolia.com
provides a connector to other identity (ID) providers such as Ping, Okta, and Microsoft Azure, providing a common catalog interface for all applications. The AirWatch Cloud Connector, in turn, securely ... VMware Workspace ONE provides a secure and user-friendly digital workplace. We look at the features, components, and architecture of Workspace ONE, as well as application management
16%
Ubuntu 21.10 Server Edition (Live)
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
With an eye toward artificial intelligence (AI) and machine learning (ML), Ubuntu 21.10 "Impish Indri" Ubuntu Server provides improved efficiency with host and guest drivers for Nvidia vGPU software ... With an eye toward artificial intelligence (AI) and machine learning (ML), Ubuntu 21.10 "Impish Indri" Ubuntu Server provides improved efficiency with host and guest drivers for Nvidia vGPU software
16%
Test mechanisms for best practices in cloud design
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Lead Image © Zlatko_Guzmic, 123RF.com
An architecture review is a good way to determine whether best practices are being followed in cloud design and, if so, whether your design or approach carries risks. As a cloud provider, Amazon Web ... terms by providing an introduction to the AWS Well-Architected tool with an example.
16%
CentOS 7-1708 and Tails 3.5
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
CentOS 7-1708 CentOS describes itself as "… a community-supported distribution derived from sources freely provided to the public by Red Hat for Red Hat Enterprise Linux (RHEL)." The goal ... CentOS describes itself as "… a community-supported distribution derived from sources freely provided to the public by Red Hat for Red Hat Enterprise Linux (RHEL)." Tails is a specialty Live Linux
16%
Malware analysis in the sandbox
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Rostislav Zatonskiy, 123RF.com
? The answers to these questions provide valuable information on how the malware works. Sandboxes are used in this case, because, of course, the malicious software must not run unprotected on the analysis system ... In malware analysis, a sandbox can provide insight into the software and its run-time environment. While a sandbox can prevent the execution of malicious code with built-in detection mechanisms
16%
Questions about the present and future of OpenStack
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Julien DI MAJO on Unsplash
in the concept of using open source solutions to provide infrastructure. With such an audience, it is only natural that we support and host other projects that are relevant for the same audience ... OpenStack has been on the market for 12 years and is generally considered one of the great open source projects. Thierry Carrez and Jeremy Stanley both work on the software and provide information

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 200 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice