Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %252522Rub%2012%2525A9n Llorente%2012 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (203)
  • News (35)
  • Article (12)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 Next »

38%
ISC 2024 from a Distance
10.06.2024
Home »  HPC  »  Articles  » 
Livermore National Labs also generated some excitement. It uses AMD MI300A accelerated processing units (APUs), and the HPE Slingshot network will be used in a Dragonfly topology. Much of the discussion
38%
Setting up secure RDP connections
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © asphoto777, 123RF.com
directly from the desktop. Most of the settings described in this article also work on Windows Server 2016 and 2019, and on Windows 10 and 11, but I focus on Windows Server 2022 for the configuration
38%
Simple, small-scale Kubernetes distributions for the edge
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © grafner, 123RF.com
and running on a computer within a few minutes (Figure  1). To manage the setup, you can use the command line or client admin tools such as k9s or Open
38%
Energy efficiency in the data center
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Ussama Azam on Unsplash
.lbl.gov/sites/default/files/DataCenterEnergyReport2016_0_0.pdf Bizo, D. Silicon heatwave: the looming change in data center climates. Uptime Institute Intelligence report 74, 2022: https://uptimeinstitute.com/uptime_assets/4cf0d2135dc460d5e9d22f028f
38%
Secure and seamless server access
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Michael D on Unsplash
a DNS entry of type CNAME (Listing 3). Cloudflare generates a special random hostname for the tunnel, .cfargotunnel.com , where is something like: f99fbf8ba1945738cc292667441e6858e69d8f9f
38%
Intelligent observability with AI and Coroot
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Gustavo Xavier on Unsplash
in terms of tapping data is the Coroot node agent, which relies on the extended Berkeley Packet Filter (eBPF) technology [9]. This technology has already been the subject of several articles [10
38%
Testing the Samsung MU-PA500B 500GB SSD
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Lucy Baldwin, 123RF.com
(Figure 3). hdparm [9] also includes a built-in benchmark that is aware of caching and buffering [10]. hdparm is also a powerful resource to configure internal drives, but although this is not possible over
38%
Tech News
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
 
considerations. For more information on acceptable algorithms, see NSA's Network Infrastructure Security Guide: https://media.defense.gov/2022/Jun/15/2003018261/-1/-1/0/CTR
38%
News for Admins
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
 
Vim 9.1 Now Available The Vim project has announced the release of version 9.1 of the popular text editor. "This release is dedicated to Bram Moolenaar, Vim's lead developer for more than 30 years ... In the news: Vim 9.1 Now Available; Microsoft Introduces Copilot Key to PC Keyboards; Google Announces AI Hypercomputer; Best Practices to Prepare for Post-Quantum Security Challenges; Open
38%
Have a Bash with the Zing network utility
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Micah Tindell on Unsplash
265, December 2022, pg. 54, https://www.linux-magazine.com/Issues/2022/265/Zing Stiawan, D., Suryani, M.E., Susanto, I., Mohd, Y., Aldalaien, M.N., Alsharif, N., and Budiarto, R. Ping flood attack

« Previous 1 ... 14 15 16 17 18 19 20 21 22 23 24 25 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice