Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1339)
  • Article (364)
  • News (273)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 184 185 186 187 188 189 190 191 192 193 194 195 196 197 ... 199 Next »

8%
The pros and cons of a virtual desktop infrastructure
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Mariia Puliaieva, 123RF.com
and materials, and they are easier to transport. According to a study by the Fraunhofer Institute for Environmental, Safety and Energy Technology (UMSICHT) the CO2 footprint of a thin client is 41 percent smaller
8%
Exploring the New OpenMP Specification
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
from NVidia, or AMD, or DSP, that adds another whopping 2,500GFLOPS that you're not able to access unless you drop down into some proprietary code. OpenMP 4.0 will let you address the entire machine
8%
New Products
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
 
scalable database platform. The Galera Cluster is available now under the General Public License (GPLv2) with 24-hour support provided by SkySQL. For more information, visit the MariaDB website. http://mariadb.org/
8%
Secure email communication
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Simon Moog on Unsplash
authorized outbound mail servers. Although designed in 2004, SPF only became the standard recommended by the Internet Engineering Task Force (IETF) in 2014 [2]. From a sample of more than 3,000 domains
8%
eSIMs in the enterprise
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Glen Carrie on Unsplash
New software (e.g., the eSIM Business Manager, which EBF developed in cooperation with Deutsche Telekom [2]) can help in these scenarios. In conjunction with a UEM system, an eSIM manager makes
8%
Attack and defense techniques
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Artem Bryzgalov on Unsplash
[2]. For the Enterprise Matrix, you'll find preparatory techniques in the Reconnaissance phase on the left. On the far right, you'll find an attacker's potential activities after successfully hijacking
8%
Denial of Service in the Cloud
12.11.2013
Home »  Articles  » 
level in the OSI Reference Model; Figure 2). Figure 2: Data volumes of typical DDoS attacks against network resources (red) and server applications (blue
8%
Tricking Intruders with HoneypotMe
26.10.2012
Home »  Articles  » 
 
are transparently forwarded by HoneypotMe from the production systems to the analysis component, where they are logged and analyzed in detail (Figure 2). Figure 2
8%
Cloud Forensics
03.02.2012
Home »  Articles  » 
 
pointed out as early as 2009 a lack of publications on the cloud security problem and on corresponding legal issues [1]. This paucity of information was confirmed by other publications [2] [3]. Despite this
8%
What is an IOPS Really?
24.02.2022
Home »  HPC  »  Articles  » 
numbers grounded in base 2, or 1,024 bytes (2^10). This usage is incorrect. The correct notation for 1,024 bytes is kibibyte (KiB). In this article I use the correct kibibyte unit notation to mean 1

« Previous 1 ... 184 185 186 187 188 189 190 191 192 193 194 195 196 197 ... 199 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice