Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1285)
  • Article (342)
  • News (220)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 171 172 173 174 175 176 177 178 179 180 181 182 183 184 ... 186 Next »

13%
An Active Directory management solution for everyone
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
is required for use: IE 8 or higher, Mozilla Firefox 3 and higher; Google Chrome and Microsoft Edge are also supported. A minimum resolution of 1024x768 is required for smooth operation. Single-core CPU 1.0GHz
13%
How Open Source Helped CERN Find the Higgs Boson
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Tim Bell
activities better and then quickly scale back to using the on-premises resources." Collaboration Another massive science project that operates at the scale of CERN is Square Kilometer Array (SKA) [3
13%
Security risks from insufficient logging and monitoring
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Ryoji Iwata on Unsplash
) to be detected, and the attack took an average of 66 days [3]. Both are more than enough time for the attacker to cause massive damage. Monitoring Protects Figure 1 shows a sample network, including a DMZ, where
13%
Exchange Web Services for Mailbox Access
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Paul Herbert, 123RF.com
will be based on state-of-art authentication with Active Directory Authentication Library (ADAL) and OAuth 2.0 [3]. Getting Started with Exchange Web Services Since Exchange 2007, Microsoft has recommended
13%
Building better software on schedule with DevOps
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
© J. Allspaw and P. Hammond 2009
between development and operations (© J. Allspaw and P. Hammond 2009). A YouTube video from Rackspace offers a succinct introduction to DevOps [3]. The short film explains that DevOps focuses
13%
Security issues when dealing with Docker images
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Kae Horng Mau, 123RF.com
, and the registry is usually TLS encrypted and protected by SSL certificates without requiring too much work from the user. The Docker Notary [3] project offers an approach for verifying end-to-end whether an image
13%
Performance troubleshooting on Microsoft SQL Server
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Anna, Fotolia.com
the popular Unified Plan Explorer [3] tool, which the creator, SQL Sentry, now offers free of charge. Determine the Baseline, Identify Bottlenecks To begin, it is a good idea to know the performance behavior
13%
Azure AD and AD Domain Services for SMEs
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Alessandro Erbetta on Unsplash
of Article 44 [3] is transferred to a third country that either has not agreed to uphold the GDPR or with which a comparable agreement on data protection does not exist. In the context of Azure AD DS
13%
Azure AD with Conditional Access
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Jeffrey Dungen on Unsplash
can take place. Microsoft calls this continuous access evaluation [3], and the technology is already integrated into Exchange, Teams, and SharePoint and will be offered to other manufacturers
13%
Users speak on Kubernetes in business practice
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © alphaspirit, 123RF.com
, this service is available through dealers and is called Certified Pre-Owned [3], and in the UK, Approved Used [4]. The basis of the application infrastructure for Porsche Informatik's solutions and services

« Previous 1 ... 171 172 173 174 175 176 177 178 179 180 181 182 183 184 ... 186 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice