Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1495)
  • Article (334)
  • News (169)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 171 172 173 174 175 176 177 178 179 180 181 182 183 184 ... 201 Next »

17%
Confessions of a Patchaholic
17.10.2011
Home »  Articles  » 
 
environment.” It just doesn’t happen that way. The more likely scenario is that the designated team leader sends out an email blast at 4:00am to notify his email distribution list that the latest patch session
17%
Co-Design Approach to Supercomputing
12.01.2012
Home »  HPC  »  Articles  » 
in at 10 petaflops and 1.4PB. The co-design study offers an alternative strategy. In their paper, the researchers present a detailed overview of their proposed co-designed system and demonstrate
17%
AMD’s Greg Stoner on ROCm
31.10.2017
Home »  HPC  »  Articles  » 
’s how I see what we’re doing with ROCm. We planted a flag, and now it’s an evolution. Resources [1] ROCm [2] ROCm – A New Era in Open GPU Computing [3] ROCm documentation [4] ROCm video [5] HIP [6
17%
News for Admins
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
by using single-tenant, bare-metal AWS infrastructure. "Each SDDC (Software-Defined Data Center) consists of 4 to 16 instances, each with 36 cores, 512GB of memory, and 15.2TB of NVMe storage. Clusters
17%
News for Admins
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
events that marked the past year, whether geopolitical (war in Ukraine) or technical (Log4j crisis)." Specifically, the report's vulnerability scan data shows that: Twenty-eight percent of all
17%
Attackers, defenders, and Windows Subsystem for Linux
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Alistair MacRobert on Unsplash
integrated desktop experience [4]. The stated goal of WSL is to enable users to use their favorite Linux tools on Windows. However, WSL can also be misused for attacks. To do so, cybercriminals resort
17%
VM and cloud management with openQRM
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Jason Murillo, 123RF.com
(Figure 4). Figure 4: Logical volume management can be handled in openQRM. You can press Select | Add new logical volume to add new logical volume
17%
New security features in Windows 10
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Duncan Andison, 123RF.com
for hardware technologies that offer alternative authentication options. The Windows Hello [4] feature uses facial recognition to log in a user with a familiar face. Eyes or fingers can also serve
17%
Exchange Online migration with the Hybrid Agent
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Natee Srisuk, 123RF.com
Framework 4.6.2 or higher. If Hybrid Agent and Exchange are set up on a server, you need to ensure compatibility between Exchange and .NET [1] to avoid the use of an unsupported combination. Beyond this
17%
Reducing your attack surface
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © dimaberkut, 123RF.com
will find in C:\Windows\Schemas\CodeIntegrity\ExamplePolicies [4]. To begin, look at the policy named DenyAllAudit.xml as an example. Here, Enabled:Audit Mode enables logging of application access; Enabled

« Previous 1 ... 171 172 173 174 175 176 177 178 179 180 181 182 183 184 ... 201 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice