Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1559)
  • News (435)
  • Article (314)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ... 232 Next »

13%
Automated Azure Kubernetes Service cluster builds
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Kittipong Jirasukhanont, 123RF.com
to cope with both predictable and unexpected increases in demand. In this article I create an AKS cluster in Azure with the platform-provided command-line tool az, which is often referred to as the Azure
13%
Determining CPU Utilization
25.02.2016
Home »  HPC  »  Articles  » 
one class to the next) was used on a laptop with 8GB of memory using two cores (OMP_NUM_THREADS=2 ). Initial tests showed that the application finished in a bit less than 60 seconds. With an interval
13%
Getting the most from your cores
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © ktsdesign, 123RF.com
and the Class B "size" standard test (a four times size increase going from one class to the next) was used on a laptop with 8GB of memory using two cores (OMP_NUM_THREADS=2). Initial tests showed
13%
Smartphone management with Microsoft products
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Javier Brosch, 123RF.com
Intune lets admins centrally monitor not only computers and laptops, but also smartphones and tablets (Figure 1). In particular, businesses who rely on Windows Server 2012, Windows 8 and Windows Phone 8
13%
Hardening SSH authentication to the max
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © shutter999, 123RF.com
representative) survey at this year's Chemnitz Linux Days. Anyone in possession of a FIDO2 stick [2] can use it for SSH authentication – provided SSH, at least version 8.2p1 or preferably version 8.3, is available
13%
Logger in HPC System Administration
07.07.2025
Home »  Articles  » 
 admins have tools that use these logs to provide notifications, they are not easy to process and understand. Wouldn't it be nice to be able to put your own information into the system log (/var/log/syslog ) so
13%
Designing a Secure Active Directory
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Samantha Sophia on Unsplash
, etc. The service is very rarely used in local environments but provides the technology basis for Azure Information Protection, which evolved into Microsoft Information Protection and finally Microsoft
13%
Let the Editor Wars Begin!
25.08.2016
Home »  HPC  »  Articles  » 
, in that it operates on individual lines or groups of lines that you have to specify at the command line. In today's *nix world, it is a “personality” of vi and provides some functionality that vi cannot, so if you have
13%
Let the editor wars begin!
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Kirill Makarov, 123RF.com
and provides some functionality that Vi cannot, so if you have learned Vi, you already know some ex commands. You can start ex on the command line in most Linux distributions by simply typing ex
13%
Security analysis with Microsoft Advanced Threat Analytics
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © fourseasons, 123RF.com
rely on stolen login credentials. For example, if a user logs on to the file server from their laptop, a large volume of data is transferred. If the user then accesses other services

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ... 232 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice