Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm"523%2009 Llorente%2012 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (229)
  • Article (74)
  • News (43)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 30 31 ... 35 Next »

26%
Assess USB performance while exploring storage caching
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
and the Cloud): https://blog.codinghorror.com/the-infinite-space-between-words/ "Tuning Your Filesystem's Cache" by Federico Lucifredi, ADMIN , issue 7, 2012, pg. 81, http://www
26%
Exchange Web Services for Mailbox Access
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Paul Herbert, 123RF.com
will be based on state-of-art authentication with Active Directory Authentication Library (ADAL) and OAuth 2.0 [3]. Getting Started with Exchange Web Services Since Exchange 2007, Microsoft has recommended
26%
Manage updates and configuration with Azure Automation
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © bagwold, 123RF.com
1, 2012 R2 Datacenter, 2016 Datacenter, and 2019 Datacenter). Essentially, Azure supports automatic guest system patching, on-demand patch assessment, and on-demand patch installation only for VMs
26%
Business continuity management
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Andrea Danti, 123RF.com
mechanisms, can be a relief. Since the release of Windows Server 2012 R2, Microsoft has offered a cloud service for BCM under the name of "Hyper-V Recovery Manager." The first version covered the enterprise
26%
Selecting compilers for a supercomputer
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image Photo by Michal Kmet on Unsplash
and nearly 20PB of external memory are available for data. In addition to high computing power, SuperMUC also displays impressive energy efficiency: Its hot water cooling requires 25 percent less electricity
26%
Cyber security for the weakest link
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Geran de Klerk on Unsplash
against pass-the-hash attacks in Windows 10. For systems with Windows 7 or Windows Server 2012, you have no real defense against the attacks described above, only optimized procedures
26%
Cloud Orchestration with Cloudify
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © alenavlad, 123RF.com
as PaaS GigaSpaces, the company behind Cloudify, began developing the tool in 2012. Cloudify was originally designed as a tool for Platform-as-a-Service (PaaS) applications (although the boundaries to Saa
26%
Microsoft Network Policy Server
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Lexip, Fotolia.com
Fi (IEEE 802.1X). During authentication, the service determines which user or computer wants to authenticate itself. To make sure the user or computer is who or what they claim to be, classic username
26%
Windows security with public key infrastructures
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © vlue, 123RF.com
for the first time in Windows Server 2008 R2. It became more widespread in Forefront Unified Access Gateway (UAG) and is still used as a server role in Windows Server 2012 and R2 after Microsoft discontinued
26%
Debian's quest for reproducible builds
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Author, 123RF.com
built in an entirely reproducible way since 2012. Gitian [17], a distribution method that offers a deterministic build process in a container or a virtual machine, provides the underpinnings. Using

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 30 31 ... 35 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice