Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1270)
  • News (231)
  • Article (228)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 174 Next »

26%
NCSA Fellow Develops New Deep Learning Tool
20.12.2017
Home »  HPC  »  News  » 
 
tool, which “… automatically leverages local information and multiple features to discover patterns in contact map space and embeds this knowledge within the neural network.” Misfolding proteins can ... The DeepContact tool uses neural network techniques to predict protein structures
26%
Red Hat Releases RHEL 7.2
25.11.2015
Home »  News  » 
 
.2 includes security updates and some significant network performance improvements. Red Hat also continues its drive for better container and cloud support, with updates to Kubernetes, Cockpit, and the Docker ... Newest enterprise system comes with faster networking, better container support, and compatibility with the new Insight analytics tool.
26%
Red Hat Announces Enterprise OpenStack Platform 6
17.02.2015
Home »  News  » 
 
environments. The platform is designed as a production-ready cloud solution for any environment, but Red Hat is especially targeting customers who have existing Red Hat networks and would like a seamless, well ... New release will help existing Red Hat networks integrate OpenStack cloud technology.
26%
Poor Cloud Security Practices Put Organizations at Risk
26.04.2023
Home »  News  » 
 
Many organizations are failing to implement basic cloud security practices and address known vulnerabilities in a timely fashion, according to a new report from Palo Alto Networks’ Unit 42. The ... New report from Palo Alto Networks’ Unit 42 details cloud security issues.
26%
Quantum AI Gets Easier
12.09.2022
Home »  HPC  »  News  » 
 
Los Alamos researchers prove that training a quantum neural network will require less data than originally assumed.
26%
Exploring Apache CloudStack
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Utemov, fotolia.com
manages the network, storage, and compute nodes that make up a Cloud infrastructure. CloudStack started life as VMOps, a company founded in 2008 with product development spearheaded by Sheng Liang, who ... Apache's CloudStack offers flexibility and some powerful networking features.
26%
Building a low-powered NAS
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © vesuv, photocase.com
flexibility to your data storage and retrieval policy is a network-attached storage (NAS) solution. With NAS, you can essentially share the storage with everyone on the network. More often than not, a typical ... Build a network-attached storage box with Rockstor to manage your data.
26%
Better monitoring for websites and certificates
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © amasterpics123, 123RF.com
, click Networking | Check HTTP web service . Don't confuse this option with the old check (check_http), which is still available under Check HTTP service (deprecated) . In the simplest version ... Checkmk offers a new open source monitoring implementation for network services.
24%
OpenFlow and the Floodlight OpenFlow Controller
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © aurielaki, 123RF.com
Today's communication networks are designed around the original mechanisms of Ethernet and TCP/IP. Because of the success of these early technologies, networks grew bigger and more complex, which ... Software Defined Networking (SDN) marks a paradigm shift toward a more holistic approach for managing networking hardware. The Floodlight OpenFlow controller offers an easy and inexpensive way
24%
ARP cache poisoning and packet sniffing
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
© elisanth, 123RF.com
In a switched network environment, packets are sent to their destination port by MAC address. This process requires that the systems on the network maintain a table associating MAC addresses ... Intruders rely on ARP cache poisoning to conceal their presence on a local network. We'll show you some tools an attacker might use to poison the ARP cache and gather information on your network.

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 174 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice