Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1345)
  • Article (364)
  • News (273)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 165 166 167 168 169 170 171 172 173 174 175 176 177 178 ... 200 Next »

8%
Highly available storage virtualization
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Les Cunliffe, 123RF.com
"M 2.354 Use of a highly available SAN solution" [1] as follows: The term "highly available" refers here to a high level of resistance to loss events. Highly available solutions are also commonly
8%
Attacks on HTTPS Connections
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © almagami, 123RF.com
by attacking the CA. There are two possibilities: Either the attacker has only procured a certificate for the domain www.bank.example , or it has an intermediate certificate (Figure 2). This would allow
8%
Dealing with Job  Burnout
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
 
to an increased risk of mental health conditions such as depression, anxiety, ADHD, and suicide [2]. Studies have shown that vitamin D supplementation can improve depression and other mental health symptoms
8%
Looking Backward, Looking Forward
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Image © thvideo, 123RF.com
– the best since OS/2. I was wrong, of course, because I wasn't a regular user. Regular users work with many different applications and with the inherent bugs, user error, and usual problems associated
8%
Artificial admin
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Maxim Basinski, 123RF.com
and firewall (Figure 2). Figure 2: Red Hat's Prometheus Anomaly Detector [2] comes with a model that can be trained with existing attack data, giving it superior
8%
Six storage drivers for Kubernetes
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © webreporter, photocase.com
, the user can define a series of empty PVs that can then be used by a claim. Hostpath Hostpath [2] is the simplest CSI driver for Kubernetes. As the name suggests, this storage class creates subdirectories
8%
News for Admins
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
 
is paramount. 2. Knowledge of the business is crucial. 3. OT data is extremely valuable and needs to be protected. 4. Segment and segregate OT from all other networks. 5. The supply chain must be secure. 6
8%
Recovering from a cyberattack in a hybrid environment
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Kelly Sikkema on Unsplash
; you will find many references to this with an online search. Therefore, this article focuses on the cmdlets from the Microsoft Graph Suite [2], which will be the only PowerShell interface to Microsoft
8%
Welcome
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © rendeeplumia, 123RF.com
intelligence (AI) adoption across all business sectors. 2. Technology companies will make more "tough decisions" and perform more quiet cutting of their US-based workforce. 3. An industry pundit will predict
8%
Network load balancing on Windows Server
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Nathan Cima on Unsplash
, each node in the cluster uses the same MAC address, which can lead to problems because it causes the Layer 2 switch to send outgoing traffic to all ports. However, the setting could be suitable

« Previous 1 ... 165 166 167 168 169 170 171 172 173 174 175 176 177 178 ... 200 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice