Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1260)
  • News (419)
  • Article (309)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 200 Next »

15%
Single sign-on with Keycloak
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Kirsty Pargeter, 123RF.com
Single sign-on (SSO) offers many advantages, and SSO providers can provide valuable services in terms of user account security. Although each user only needs to remember one password to access ... Google and Facebook are two of the biggest providers for single sign-on on the web, with OAuth2 and OpenID, but if you don't want to put your customers' or employees' data in their hands, Red Hat
15%
openSUSE LEAP 42.1 and ClearOS 7.2
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
 
hybrid distro," which combines source from SUSE Linux Enterprise (SLE) with community contributions in an effort to provide a balance between innovation and maturity. The SLE contributions in Leap now ... The openSUSE community offers the "first Linux hybrid distro," which combines source from SUSE Linux Enterprise (SLE) with community contributions in an effort to provide a balance between innovation
15%
Checking your endpoints with Stethoscope
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Ewa Walicka, fotolia.com
are usually called "endpoints." Examples of endpoints include laptops, thin clients, smartphones, tablets, and Internet of Things (IoT) devices, but a server could also qualify as an endpoint. Securing endpoint
15%
Run One Program at any Scale with Legate
08.06.2021
Home »  HPC  »  Articles  » 
installed into /usr/local/anaconda3  by root . The startup definitions for Anaconda were in my .bashrc file, so it ran just fine before building legate.core . The laptop I used has the following
15%
Data center management with Ralph
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © ffzhang, 123RF.com
the menubar. Ralph provides full data center and back-office support, including printers, laptops, desktop computers, and cell phones. IT asset management dashboards visualize the acquired data in real time
15%
News for Admins
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
 
bundled with PHP. Red Hat released an advisory stating that the vulnerability "allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing
14%
News for Admins
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
 
/Meltdown, Intel is asking users to stop installing these patches until a better version is out. "We recommend that OEMs, cloud service providers, system manufacturers, software vendors, and end users stop
14%
REMORA
18.09.2017
Home »  HPC  »  Articles  » 
for Remote Applications; hereafter referred to as Remora ) from the University of Texas Advanced Computing Center (TACC), combines monitoring and profiling to provide information about an application. Unlike
14%
Resource monitoring for remote applications
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image Gustavo Quepón on Unsplash.com
(REsource MOnitoring for Remote Applications; hereafter referred to as Remora ) [4] from the University of Texas Advanced Computing Center (TACC) [5] combines monitoring and profiling to provide information
14%
Mocking and emulating AWS and GCP services
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Juri Samsonov, Fotolia.com
Modern software-as-a-service (SaaS) offerings are highly dependent on external cloud providers to run and work reliably, but nothing comes without conditions or comes free, especially public cloud

« Previous 1 ... 13 14 15 16 17 18 19 20 21 22 23 24 25 26 ... 200 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice