Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 谷歌seo外推【电报e103】google seo代发.run ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1520)
  • Article (349)
  • News (274)
  • Blog post (10)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 201 202 203 204 205 206 207 208 209 210 211 212 213 214 ... 216 Next »

42%
Denial of Service in the Cloud
12.11.2013
Home »  Articles  » 
leverage, and enable their attackers to hide their identity behind a third party. DNS servers are designed to provide information. Some providers run their DNS servers as open DNS resolvers
42%
VMware Tools
15.10.2013
Home »  Articles  » 
surprised everyone by announcing a hybrid cloud solution under the name “VMware vCloud Hybrid Service” that targets established products from leading manufacturers (e.g., Amazon Web Services, Google Compute
42%
Refurbished: Windows 2012 Active Directory
10.12.2012
Home »  Articles  » 
 
are found in the normal Start menu. If you want to manage a server running Windows Server 2008 R2 or 2012 services that are not activated, you can also install the management tools there. No patches
42%
Red Hat’s Cloud Tools
08.07.2013
Home »  Articles  » 
 
on Linux hosts running RHEL or Fedora. Figure 6: The oVirt framework as a management tool. Red Hat only achieved a concept comparable to VMware
42%
Floodlight: Welcome to the World of Software-Defined Networking
15.10.2013
Home »  Articles  » 
.168.1.0/24 | * | DENY | 2 Initial Steps As a Java application, Floodlight runs on a Java VM and is therefore available on virtually all operating systems. Many popular Linux distributions, including Ubuntu, actually
42%
Eat. Pray. Script.
23.12.2011
Home »  Articles  » 
 
, you’ve Googled to see whether some clever sys admin has already created the script you need. There’s no use reinventing the wheel or writing and debugging your own script if someone else has gone
42%
Cloud Forensics
03.02.2012
Home »  Articles  » 
 
. Offerings from Google and Salesforce, for example, show how efficiently and easily applications can be migrated out into the cloud. In terms of application security, CSPs increasingly understand that users
42%
Persistent Memory
14.01.2016
Home »  HPC  »  Articles  » 
, it is also the slowest and has the highest latency. An issue developers face every day is how to move data efficiently through these storage layers so that applications can run with the best possible
42%
Log Management
10.10.2022
Home »  HPC  »  Articles  » 
and the size of the logs was manageable. I liked mixing them because I could easily use grep  to parse through the logs first. However, you do run the risk of these logs becoming very large. You might also want
42%
ISC 2024 from a Distance
10.06.2024
Home »  HPC  »  Articles  » 
. One comment made on the announced list is that Aurora submitted a result that finished third, but only 40% of the system was used. The expectation is that once Aurora is fully up and running, the entire

« Previous 1 ... 201 202 203 204 205 206 207 208 209 210 211 212 213 214 ... 216 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice