Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (162)
  • Article (8)
  • News (6)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 ... 18 Next »

28%
Cloudflare Introduces Tools for Agentic AI Development
11.04.2025
Home »  News  » 
 
Cloudflare has announced new tools and features to accelerate the development of AI agents. These tools let developers “easily build and deploy powerful AI agents with the industry’s first remote
28%
SC24 – Bursting at the Seams
07.01.2025
Home »  HPC  »  Articles  » 
the presenter explaining how they used their Tesla parked in their home driveway for a remote login to the cluster and then use Open OnDemand to get an interactive desktop on a compute node that displayed
28%
Supercomputing Conference 2024
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © djem, 123RF.com
presentations I've seen on Open OnDemand, had the presenter explaining how they used their Tesla parked in their home driveway for a remote login to the cluster and then use Open OnDemand to get an interactive
28%
Mobile PC Monitor: A sys admin's best friend
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Buchachon Petthanya, 123RF.com
, a tablet computer, a laptop (notebook, ultrabook, netbook), the PC Monitor application, or a web page. As long as you have access to any type of computer or smartphone, you can stay in touch with what
27%
With great PowerShell comes great responsibility
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
© imagesource, 123RF.com
from the ability to manage other systems remotely with cmdlets. PowerShell bestows great power on Windows Administrators – power that, used wisely, will save time, effort, and frustration in environments
27%
Routers Remain Top Target for IoT Attacks, Per Zscaler Report
10.11.2025
Home »  News  » 
 
methods include command injection and directory traversal techniques, which “often exploit unauthenticated remote code execution (RCE) vulnerabilities, such as CVE-2016-10174 and CVE-2018-10561 that allow
27%
Single sign-on with SSSD, LDAP, and Kerberos
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Anja Kaiser; Fotolia
locally with the kadmin.local tool or remotely with kadmin. This setup assumes that the KAdmin service is enabled on the KDC, and you also need a valid admin principal in the /var/kerberos/krb5kdc/kadm5.acl
27%
New Products
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
 
, You've Got Battery Life If you're looking for a lightweight laptop, but netbooks are too low-powered and you're not ready to invest in a MacBook Air, you might be interested in Dell's ultra
27%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© sTan, fotolia.com
.crt files on the OpenVPN server. On the client side (a laptop in this case) you only need the CA.crt and tls-auth.key files. The client.pem file belongs on the e-token. The lower part of the figure shows
26%
Julia: A new language for technical computing
30.11.2025
Home »  Archive  »  2012  »  Issue 10: Traff...  » 
is a native parallel computing model based on two primitives: remote references and remote calls. Julia uses message passing behind the scenes but does not require the user to control the environment explicitly

« Previous 1 2 3 4 5 6 7 8 9 10 ... 18 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice