Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: laptop providing ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (262)
  • Article (79)
  • News (30)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 34 35 36 ... 38 Next »

6%
Windows security with public key infrastructures
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © vlue, 123RF.com
is encrypted with the EFS certificate stored in a user's profile. If EFS does not find an enterprise CA in AD, the EFS process creates a self-signed certificate with a longer lifespan. This certificate is now
6%
Ease your network inventory pain with Spiceworks
07.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Paul Tobeck, fotolia.com
and to participate in the Spiceworks community, including user forums, administrators must sign up for an account. Optionally, administrators may choose to complete a profile and take part in the extensive community
6%
OpenNebula – Open source data center virtualization
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Sternenhimmel, fotolia.com
and simultaneous central control of the environment. This separation may take the application profile into consideration but also the location or customer. Even if you group together a large number of Open
6%
Security and automation with SBOMs
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Tjefferson, Fotolia.com
on Vulnerability Exploitability eXchange (VEX), which was developed by the NTIA. VEX is implemented as a profile in the Common Security Advisory Framework (CASF) of OASIS Open and is supported by CycloneDX [5
6%
Easy configuration management with Puppet
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Warangkana Bunyarittongchai, 123RF
your my.cnf file. Setting up /etc/logrotate.d/our-logs with Puppet means you don't have to remember it. Creating /etc/profile.d/binpath.sh will mean that a customization no one can quite remember
6%
What's new in Microsoft Windows 8.1
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Doroto C-, 123RF.com
, these are not the libraries of Windows 7 but only the folders from the logged-on user's profile. Figure 5: Microsoft has redesigned the Explorer view in Windows 8
6%
Highly available Hyper-V in Windows Server 2016
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Andrea Danti, 123RF.com
for provisioning ISO files, VM templates, guest operating system profiles, and more. Integration with System Center Operations Manager. Resource optimization (dynamic optimization and power optimization
6%
A DIY HTML Engine
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
© Luca Bertolli, 123RF.com
Liquid profiler Maruku implementation Variables/modular code support Code of conduct Plugin system Collections
6%
Enterprise resource planning and customer relationship management with open source
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © ximagination, fotolia.com
with creating a requirements profile that maps all the relevant processes. The intent is to examine how to retrofit missing functionality or possibly add that functionality by integrating software packages
6%
Fundamentals of I/O benchmarking
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Kheng Ho Toh, 123RF.com
processes are I/O-generating load. Also cat and cp from the Linux toolkit can be used for real-world benchmarks, such as for copying a large file. But, they only provide guidance for throughput. Profiling

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 34 35 36 ... 38 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice