Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1076)
  • News (230)
  • Article (226)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 154 Next »

15%
Supercomputers Take Down Ecological Theory
22.10.2015
Home »  HPC  »  News  » 
 
The Botanical Information and Ecological Network (BEIN), working with the iPlant Collaborative and the Texas Advanced Computing Center (TACC), has overturned a popular theory in ecology
15%
Bleedingbit: Two New Bluetooth Vulnerabilities
06.11.2018
Home »  News  » 
 
enterprises using vulnerable access points in their networks. Beyond access points, the health sector is potentially affected by these vulnerabilities, because the affected BLE chips are used in many medical
15%
Deadlines Extended for SuperComputing Asia
06.12.2018
Home »  HPC  »  News  » 
 
and System Software Architecture, Network, Communications, and Management See the Call for Papers for more on submission requirements.
15%
New Mirai Botnet Variant Discovered
27.03.2019
Home »  News  » 
 
hosting provider OVH and DNS provider Dyn. The new variant targets embedded devices like routers, network storage devices, NVRs, and IP cameras. Unit 42 found this new variant targeting enterprise We
15%
Overview of Automation Engineering
02.09.2022
Home »  News  » 
 
:  Infrastructure  Networking Cloud provisioning Application deployment Configuration management Learn more at FOSSlife.
15%
10 Ways to Use Event-Driven Ansible
09.03.2023
Home »  News  » 
 
describes 10 ways you can apply Event-Driven Ansible for tasks related to networking, DevOps, and more, including: User request management Security automation Installation and provisioning
15%
CISA Warns of Widespread Exploitation of Known Confluence Vulnerability
18.10.2023
Home »  News  » 
 
Confluence administrator accounts,” and network administrators are urged to patch the flaw immediately. Read more at Decipher.            
15%
Vulnerability assessment best practices for enterprises
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Fancycrave on Unsplash
if something bad occurs. Given that most enterprise networks have hundreds or thousands of networked information systems, vulnerability analysis and assessment by manual methods are virtually impossible
15%
Ubuntu Server 15.10
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
as resources are added. The LXD container hypervisor hosts Linux guests, providing image management, snapshots, live migration, Fan overlay networking for increasing the number of addressable Docker and LXD
15%
Managing Bufferbloat
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Eric Issel, 123RF.com
Data sent on a journey across the Internet often takes different amounts of time to travel the same distance. This delay time, which a packet experiences on the network, comprises: transmission

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 154 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice