Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (693)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ... 99 Next »

15%
Retrieving Windows performance data in PowerShell
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © andresr, fotolia.com
for local and remote machines because it is familiar with a variety of interfaces in different Windows subsystems. The number of interfaces and connection points increases steadily with each new version
15%
Insider Threats
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Seasons, 123RF.com
can't tie their hands. We can't unplug their computers or disable their WiFi connections. We can't place a force field around their laptops. And we can't seem to successfully educate them in the ways
15%
News for Admins
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
 
market dominance, the company needs to build a case for the presence of full-featured laptop and desktop PCs, rather than lighter and simpler tablet systems. The new processors are designed to work
15%
Privacy Concerns: Beyond the GDPR
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © RAJESH RAJENDRAN NAIR, 123RF.com
over my laptop camera, but I am concerned for our collective privacy. If I know you and like you enough, I'll share the information I want you to have, but not until then. I certainly don't want to share
15%
The achievements of and plans for systemd
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lennart Poettering CC-BY-SA-3.0
on our laptops remains at least as secure in every way as, say, on a Chrome OS system. It's downright embarrassing that this is not yet the case. We need to do better, especially in this age of Pegasus
15%
Tuning your filesystem's cache
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
on Mac OS X and OpenBSD. To check out my Ubuntu 11.04 laptop's /bin caching status, I enter: $ ./vmtouch /bin Vmtouch crawled the files in /bin and reported that about half of the memory pages
15%
Welcome
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
 
ubiquitous that even my laptop can act as a VMware or Xen host. I feel vindicated for gushing over a technology that, in 1999, some industry pundits labeled "cute" or "trendy." I felt the same way when my
15%
A swap space primer
30.11.2025
Home »  Archive  »  2012  »  Issue 09: Windo...  » 
swapping well, and a laptop might hibernate (suspending to disk leverages swap area storage). On servers, swap mostly ensures that intermittent conditions will not cause a crash, as performance constraints
15%
The History of Cluster HPC
15.02.2012
Home »  HPC  »  Articles  » 
, the term Accelerated Processing Unit or APU, is used to describe these new processors. AMD has already released some desktop and laptop versions of these processors, but sharing of memory is somewhat
15%
Checking your endpoints with Stethoscope
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Ewa Walicka, fotolia.com
are usually called "endpoints." Examples of endpoints include laptops, thin clients, smartphones, tablets, and Internet of Things (IoT) devices, but a server could also qualify as an endpoint. Securing endpoint

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ... 99 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice