Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1020)
  • News (227)
  • Article (223)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 34 35 36 ... 148 Next »

15%
Deadlines Extended for SuperComputing Asia
06.12.2018
Home »  HPC  »  News  » 
 
and System Software Architecture, Network, Communications, and Management See the Call for Papers for more on submission requirements.
15%
New Mirai Botnet Variant Discovered
27.03.2019
Home »  News  » 
 
hosting provider OVH and DNS provider Dyn. The new variant targets embedded devices like routers, network storage devices, NVRs, and IP cameras. Unit 42 found this new variant targeting enterprise We
15%
Overview of Automation Engineering
02.09.2022
Home »  News  » 
 
:  Infrastructure  Networking Cloud provisioning Application deployment Configuration management Learn more at FOSSlife.
15%
10 Ways to Use Event-Driven Ansible
09.03.2023
Home »  News  » 
 
describes 10 ways you can apply Event-Driven Ansible for tasks related to networking, DevOps, and more, including: User request management Security automation Installation and provisioning
15%
CISA Warns of Widespread Exploitation of Known Confluence Vulnerability
18.10.2023
Home »  News  » 
 
Confluence administrator accounts,” and network administrators are urged to patch the flaw immediately. Read more at Decipher.            
15%
Vulnerability assessment best practices for enterprises
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Fancycrave on Unsplash
if something bad occurs. Given that most enterprise networks have hundreds or thousands of networked information systems, vulnerability analysis and assessment by manual methods are virtually impossible
15%
Ubuntu Server 15.10
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
as resources are added. The LXD container hypervisor hosts Linux guests, providing image management, snapshots, live migration, Fan overlay networking for increasing the number of addressable Docker and LXD
15%
Managing Bufferbloat
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Eric Issel, 123RF.com
Data sent on a journey across the Internet often takes different amounts of time to travel the same distance. This delay time, which a packet experiences on the network, comprises: transmission
15%
Neglected IPv6 Features
06.08.2012
Home »  Articles  » 
 
The most common operating systems on the LAN are Windows, Linux, and Mac OS X. They all run IPv6 in parallel with IPv4. IPv6 is enabled and active by default, and the systems on the network communicate via
15%
Bare metal deployment with OpenStack
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Photo by Anatolii Nesterov on Unsplash
that another node can subsequently be installed by Ironic (Figure 1). Figure 1: The sample setup for this article includes three servers with two networks each

« Previous 1 ... 23 24 25 26 27 28 29 30 31 32 33 34 35 36 ... 148 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice