Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1260)
  • News (419)
  • Article (309)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 30 31 ... 200 Next »

14%
Protect Azure resources with Network Security Groups
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © ogm & roywylam, 123RF.com
virtual network (VNet). The Basic option provides the general switch that enables or disables access to resources on the new network from the Internet. Although this is not very granular
14%
Zero Trust as a security strategy
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Jack Dong on Unsplash
. Because the principle of a secure local network is so tempting at first glance, many companies have quickly applied it to their client landscapes, too. They are actively supported by many service providers
14%
Totally Stressed
30.09.2013
Home »  Articles  » 
 
are not sure what board you have installed, or you use a laptop with a motherboard designed specifically for mobile use, simply press the OK button to enable the first list entry, Run_sensors-detect . Your
14%
Environment Modules Using Lmod
08.08.2018
Home »  HPC  »  Articles  » 
One of the key tools for any cluster is environment modules, which allow you to define your user environment and the set of tools want to build and execute your application. They provide a simple
14%
Environment Modules Using Lmod
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Federico Caputo, 123RF.com
One of the key tools for any cluster is Environment Modules [1], which allow you to define your user environment and the toolset to build and execute your application. They provide a simple way
14%
Proprietary and Open Source Storage Options
09.10.2023
Home »  HPC  »  Articles  » 
. Although I recommend you use the tools the vendor provides, in subsequent articles I will talk about Linux tools that you can use even with proprietary solutions. Linux Storage Solutions The second
14%
Virtual Desktop
25.08.2011
Home »  Articles  » 
 
not provide enough functionality to deliver new types of content such as rich multimedia. If you add client-side software to achieve this, then you re-introduce management headaches into these endpoints
14%
Build system images with Kiwi
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © chachar, 123RF.com
is used in the platform as a service (PaaS) cloud. Other uses include preloading desktop systems and laptops or SD card images for single-board computers. You can create system images step by step
14%
Hack Uses Headphone Speakers To Record Sound
23.11.2016
Home »  News  » 
 
FBI Director James Comey and Facebook founder Mark Zuckerberg cover the webcams of their laptops with tape because they can be hacked easily. Zuckerberg, like many people concerned with privacy
14%
A Management Platform for the Internet of Things
10.12.2013
Home »  Articles  » 
 
this number, consider the devices per capita rather than the total number. In 2010 we had 1.84 devices per person, which is easy to see: At the moment, you have a phone, maybe a couple of tablets, a laptop

« Previous 1 ... 18 19 20 21 22 23 24 25 26 27 28 29 30 31 ... 200 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice