Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (315)
  • Article (99)
  • News (43)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 31 32 33 34 35 36 37 38 39 40 41 42 43 44 ... 46 Next »

26%
Selecting compilers for a supercomputer
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image Photo by Michal Kmet on Unsplash
and nearly 20PB of external memory are available for data. In addition to high computing power, SuperMUC also displays impressive energy efficiency: Its hot water cooling requires 25 percent less electricity
26%
Cyber security for the weakest link
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Geran de Klerk on Unsplash
against pass-the-hash attacks in Windows 10. For systems with Windows 7 or Windows Server 2012, you have no real defense against the attacks described above, only optimized procedures
26%
Cloud Orchestration with Cloudify
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © alenavlad, 123RF.com
as PaaS GigaSpaces, the company behind Cloudify, began developing the tool in 2012. Cloudify was originally designed as a tool for Platform-as-a-Service (PaaS) applications (although the boundaries to Saa
26%
Microsoft Network Policy Server
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Lexip, Fotolia.com
Fi (IEEE 802.1X). During authentication, the service determines which user or computer wants to authenticate itself. To make sure the user or computer is who or what they claim to be, classic username
26%
Windows security with public key infrastructures
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © vlue, 123RF.com
for the first time in Windows Server 2008 R2. It became more widespread in Forefront Unified Access Gateway (UAG) and is still used as a server role in Windows Server 2012 and R2 after Microsoft discontinued
26%
Debian's quest for reproducible builds
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Author, 123RF.com
built in an entirely reproducible way since 2012. Gitian [17], a distribution method that offers a deterministic build process in a container or a virtual machine, provides the underpinnings. Using
26%
VPN clients for Android and iOS
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © fckncg, 123RF.com
or a manufacturer-specific device and those that support open protocols and remote sites. For the test, I set up the Microsoft VPN server in Windows Server 2012 R2 and an OpenVPN server in Ubuntu 14.04. I also
26%
Citrix NetScaler steps in for Microsoft TMG/ISA
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Mellimage, 123RF.com
was able to import NetScaler VPX on servers running Windows Server 2012 and Hyper-V. The performance of VPX versions, of course, depends greatly on the underlying physical server
26%
High-performance load balancing
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © meyrit, 123RF.com
, TLS termination, and so on. The advantage of using Layer 4 is very fast load balancing. Seesaw was originally developed by Google, which used two different load balancers in 2012 that proved
26%
KubeVirt integration in OpenShift and Rancher
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by Darren Halstead on Unsplash
from 2000 to 2010. After that, he worked as a solution engineer at Dell and VMware. In 2012 Andreas moved to Red Hat. There, he currently works as principal solution architect in the Technical Partner

« Previous 1 ... 31 32 33 34 35 36 37 38 39 40 41 42 43 44 ... 46 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice