Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1270)
  • News (231)
  • Article (228)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ... 174 Next »

22%
Computational storage that supports storage operations
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © sdecoret, 123RF.com
for the connected devices and RAM, which often makes the storage devices the bottleneck. The storage device manufacturers then follow suit and launch faster devices so that the network suddenly becomes ... ScaleFlux delivers performance gains of 50 percent and more with computing power built directly into the network card to relieve the burden on the CPU.
22%
Monitoring Active Directory Federation Services
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Helder Almeida, 123RF.com
on the other side. In most cases, a WAP (Web Application Proxy) server comes into play in the perimeter network (DMZ); it knows the ADFS server in the neighboring Active Directory and controls access from ... Problems with ADFS trusts can affect network access for Office 365 or associated partner companies. Fortunately, administrators have various monitoring options.
22%
LDAP integration with popular groupware suites
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Sergey Tryapitsyn, 123RF.com
these services to a database of users and manages these users through user profiles, login credentials, and other identifying information. But many organizations today already maintain a network-wide user ... Your LDAP directory holds user data for the whole network. Why not save time and avoid duplication by integrating the LDAP directory with your groupware environment?
22%
Free backup tool for data centers
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© andresr, fotolia.com
your attention: In the Bacula system, each task is handled by a separate program. Tasks can include reading the data to be backed up and transferring them across the network, writing to the backup media ... Everybody needs backups; if you are looking for an open source program that will back up heterogeneous networks, you should check out Bacula.
22%
Redo Backup
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
USB hard drive, a network drive, or an FTP server. Restore does precisely that with a previously created backup on one of these sources. This process is easy and reliable through the GUI; however ... Redo Backup backs up complete hard drives locally or over a network. The focus is on simple operation and high reliability in a variety of deployment scenarios.
22%
Managing Active Directory sites and subnets
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Allan Swart, 123RF.com
to reflect this. For example, AD replication between sites uses data compression and occurs far less frequently than on a local network. Figure 1: Replication ... Active Directory domains distributed across multiple physical locations with IP subnetting and network configuration allows for replication and universal user logins.
22%
Data deduplication on Windows Server 2022
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © iofoto, Fotolia.com
. The tool resides in the \Windows\System32 directory and supports both local drives and network shares. The syntax of the tool is ddpeval , as in: ddpeval E:\ ddpeval \\nas\data The ddpeval tool ... Data deduplication tools boost efficiency in storage management by improving storage utilization and saving network bandwidth during backup and replication processes.
20%
Understanding the Spanning Tree protocol family
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Joellen Armstrong, Fotolia.com
The Spanning Tree protocol, which was designed to provide a loop-free Ethernet network topology, has been around for more than 30 years and has been through many iterations. The various versions ... Several versions of the venerable Spanning Tree protocol have appeared through the years. We'll help you sort through the acronyms and show you which version is right for your network.
20%
Monitoring IPv6 with Wireshark
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © Suzanne Tucker, 123RF.com
Sys admins around the world use the free network protocol analyzer Wireshark to monitor traffic and troubleshoot problems on TCP/IP networks. If you're wondering whether you'll still be able to use ... Although IPv6 is still waiting for its big breakthrough, on many networks, admins can no longer avoid it. Luckily, the free Wireshark tool can provide valuable error analysis.
20%
Security analysis with Microsoft Advanced Threat Analytics
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © fourseasons, 123RF.com
Microsoft Advanced Threat Analytics (ATA) is an extension of the Enterprise Mobility Suite (EMS). The purpose of this on-premises system is to detect suspicious activities on the network ... Classic security safeguards, like antivirus and firewall products, are imperative for system protection. To search proactively for network intruders, as well, Microsoft offers Advanced Threat

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 29 30 ... 174 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice