Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last three months
Sort order
  • Date
  • Score
Content type
  • Article (Print) (205)
  • News (9)
  • Article (3)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 ... 22 Next »

60%
Tuning your filesystem's cache
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
of a new application, the system will evict caches as required to provide working memory for the new process – the illusion of free memory is preserved, even though those chips were most likely hard at work
59%
The System Security Services Daemon
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© Nikita Sobolkov, 123RF.com
be used for this, and communication with the client is handled by classic PAM and NSS interfaces. Different security providers are then on the back end to handle, for example, communications with an LDAP
58%
A swap space primer
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
'll provide some sizing guidance. A larger swap area is generally recommended for desktops than servers, sized at up to twice the available RAM. Desktops are likely to have idling applications that can leverage
58%
Living with Limits in the Post-PC Era
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
 
of when we imagine a traditional desktop computer. But, when contemporary analysts write and speak about the Post-PC Era, they're talking about desktop computers and standard laptops as well. By my
58%
Client management and configuration
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Wamsler, Fotolia
users or computers from a specific profile. Additionally, you can specify whether the assignment should apply to workstations, laptops, or servers or just to machines with specific versions of Windows
57%
DBaaS – How they make data scale
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
© Rungaroon TAWEEAPIRADEEMUNKONG, 123RF.com
on the cloud better than installing it yourself? After I looked at Xeround, a cloud database-as-a-service (DBaaS), a couple of months ago, I looked into more DBaaS providers. However, before I get to that, I
56%
Using a tablet as a portable management console
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Peter Bernik, 123RF.com
. In the Toolbox System administrators require a complete set of tools on any device used for support. Up to now, the support burden rested on the laptop computer. The tablet, as a support device, must have
56%
Techniques for archiving email
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
.marqs, photocase.com
that give the users a limited amount of space for their inboxes are an initial approach, but quotas only really work in the real world for hosting platforms, Internet service providers, and web mail providers
56%
Welcome
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
 
ubiquitous that even my laptop can act as a VMware or Xen host. I feel vindicated for gushing over a technology that, in 1999, some industry pundits labeled "cute" or "trendy." I felt the same way when my
56%
Overview of cloud platforms and appliances
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Athiphan Chunmano, 123RF
More or less every virtualization provider defines the term cloud to match their own offerings. These offerings are then promoted as Cloud Services or Cloud Servers. Public Cloud, Private Cloud

« Previous 1 2 3 4 5 6 7 8 9 10 ... 22 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice