Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1537)
  • News (430)
  • Article (313)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 34 35 36 ... 229 Next »

13%
Environment Modules Using Lmod
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Federico Caputo, 123RF.com
One of the key tools for any cluster is Environment Modules [1], which allow you to define your user environment and the toolset to build and execute your application. They provide a simple way
13%
Proprietary and Open Source Storage Options
09.10.2023
Home »  HPC  »  Articles  » 
. Although I recommend you use the tools the vendor provides, in subsequent articles I will talk about Linux tools that you can use even with proprietary solutions. Linux Storage Solutions The second
13%
An IT nomad's diary
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Jasmin Merdan, 123RF.com
Friday, 5pm: I just switched off my laptop a quarter of an hour ago and I am ready to go running, when my phone rings. Two friends from California are calling to proudly tell me about a new Perl web
13%
Improve the physical security of your business
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© ginasanders, 123RF.com
the intruder's visits. Additionally, security considerations should not be restricted to the immediate workplace. Important documents and laptops may not be on the company's premises but somewhere in a hotel
13%
Virtual Desktop
25.08.2011
Home »  Articles  » 
 
not provide enough functionality to deliver new types of content such as rich multimedia. If you add client-side software to achieve this, then you re-introduce management headaches into these endpoints
13%
Build system images with Kiwi
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © chachar, 123RF.com
is used in the platform as a service (PaaS) cloud. Other uses include preloading desktop systems and laptops or SD card images for single-board computers. You can create system images step by step
13%
Hack Uses Headphone Speakers To Record Sound
23.11.2016
Home »  News  » 
 
FBI Director James Comey and Facebook founder Mark Zuckerberg cover the webcams of their laptops with tape because they can be hacked easily. Zuckerberg, like many people concerned with privacy
13%
A Management Platform for the Internet of Things
10.12.2013
Home »  Articles  » 
 
this number, consider the devices per capita rather than the total number. In 2010 we had 1.84 devices per person, which is easy to see: At the moment, you have a phone, maybe a couple of tablets, a laptop
13%
Established container solutions in Linux
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © dixiland, Photocase.com
providers in particular are affected: The more virtual machines they have running in a setup (and need to manage), the greater the overhead. Therefore, the density of virtual machines per host or rack
13%
Vulnerability assessment best practices for enterprises
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Fancycrave on Unsplash
. The members of the assessment team. Clear identification of the assessment team member who will initiate the scans as part of the VA. The tools that will be used in the VA scans, with a list provided

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 34 35 36 ... 229 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice