Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %25x20mm"22%2000 Llorente%2013 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (363)
  • Article (71)
  • News (38)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 ... 48 Next »

21%
PC over IP
03.09.2013
Home »  Articles  » 
 
already familiar with PCoIP from VMware’s VDI solution, VMware Horizon View; VMware licensed PCoIP from Teradici and integrated it into their own product
21%
Hardware MFA: Death to the password!
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © alphaspirit, 123RF.com
Before I begin, I'll explore why a change is needed: According to the Verizon 2013 Data Breach Report [1], weak or stolen credentials account for 76% of network intrusions, and more than 50% use some ... Around since the 1960s, passwords are still the mainstay for authentication. The good news is you have alternatives in hardware multifactor authentication. ... 22
21%
Multifactor authentication from FIDO
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © John McAllister, 123RF.com
Research notes the cost of password breaches reached more than US$ 200 billion in annual losses. According to the Verizon 2013 Data Breach Report, weak or stolen credentials account for 76 percent
21%
Working with Microsoft Azure RemoteApp
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © bloomua, 123RF.com
in the cloud via Microsoft's Remote Desktop Protocol (RDP). All operating systems for which Microsoft offers RDP clients therefore come into play on the end devices. This applies to Apple's iOS and Mac OS X
21%
Red Hat Storage Server 2.1
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © avian, 123RF.com
the expense and annoyance of the vendor lock-in associated with so many SAN solutions. In 2013, Red Hat introduced an SDS product designed to give users a viable alternative to a SAN: Red Hat Storage Server
21%
Web Cryptography API
26.11.2013
Home »  Articles  » 
, like any other JavaScript file. For the polyfill to work, it needs to load the HTML document via a web server. Figure 1 shows PolyCrypt in use in the browser’s JavaScript console
21%
DIME and Dark Mail seek to change the world of digital mail
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Orlando Rosu, 123RF.com
Ladar Levison may be an unfamiliar figure except to a few people in the community, but many are familiar with his former company: Lavabit, which was in business from 2004 to 2013. Lavabit ... 25
21%
Mobile device management with Microsoft System Center 2012 R2
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © konstantynov, 123RF.com
Server 2013 and are easily on a par with many other commercial mobile device management offerings. Conclusions Thanks to the integration of Windows Intune and System Center Configuration Manager, admins
21%
Installing applications in OpenStack with Murano
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © stylephotographs, 123RF.com
. Figure 1: Murano interacting with other OpenStack components. Murano has evolved since its launch in 2013 and is now much more than just a catalog. For example, it manages the entire lifecycle
21%
Linux Storage Stack
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © arsgera, 123RF.com
gives preference to read over write accesses (the default is 500ms for reads compared with 5s for writes). A "sorted queue" keeps all requests sorted by disk sector, to minimize seek time, and feeds

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 ... 48 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice