Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (381)
  • News (193)
  • Article (79)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 66 Next »

17%
Tech News
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
 
in 112 countries. In recent years, attackers have begun to employ IoT devices in their botnets, leading to a vast increase in the number of available devices. At the same time, the extortion market has
17%
Software inventory with PowerShell
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Andrea De Martin, 123RF.com
the installation of a Systems Management Server (SMS)/System Center Configuration Manager (SCCM) client. A query without an SMS/SCCM client installation leads to the Invalid class error message. If Win32Reg
17%
News for Admins
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
 
by Internet-scale computing." Founding members include a number of leading Internet companies, such as AT&T, Cisco, CoreOS, Docker, eBay, Google, IBM, Intel, Red Hat, Twitter, VMware, and others. The goal
17%
News for Admins
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
may lead to arbitrary code execution." In addition to fixing the JPEG security hole, the iOS 10.1 update fixed some other flaws in iOS, including a bug in FaceTime that allows an attacker to listen
17%
Dispatches from the world of IT
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
 
regarding future Java development and updates. In a post at the Oracle Security Assurance blog, lead Java developer Nandini Ramani outlined the changes. The first change described in the post is an effort
17%
IPv6 security on IPv4-only networks
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © foottoo, 123RF.com
, missing configurations, or missing support for the appropriate IPv6 functions can lead to vulnerabilities. They include: Network-based intrusion detection systems (NIDS) that are incapable of detecting
17%
LibreOffice in the workplace
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © mipan, 123RF.com
lead to an improvement in processes and overall productivity. The wide range of options for configuring and maintaining an open source product such as LibreOffice to suit your company and your own
17%
Artificial intelligence improves monitoring
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Photo by Ivan F on Unsplash
correlations that would otherwise have remained undiscovered. However, the application of complex methods does not always lead to better results. In general, you can imagine a machine learning method as a two
17%
IBM Open Technology Group
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Red Hat's acquisition by IBM was surprising to many, not only because of the economics of the transaction, but also because it propels Big Blue into position as a leading contender in the open
17%
Coping with Regional Failure
12.10.2011
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
is the same. That said, some cloud providers are smaller, and if a data center fails for them, it's going to have an impact on how you can recover... which leads us to the nastier levels of failure. A failure

« Previous 1 ... 16 17 18 19 20 21 22 23 24 25 26 27 28 29 ... 66 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice