Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (381)
  • News (193)
  • Article (79)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 66 Next »

16%
An overview of the Citadel BBS
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © braverabbit; 123RF.com
people. The Floor and Rooms paradigm might sound strange at first, but once the workflow is understood, it leads to a very productive use of the BBS. Those who want to try out the software can visit
16%
Cloud Foundry realizes a service mesh
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © lightwise, 123RF.com
language and, for example, the database on a case-by-case basis and in line with the purpose of the application. This capability creates local autonomy, leads to better design decisions, and ultimately
16%
Build a honeypot with real-world alerts
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Bruce Rolff, 123RF.com
coming in overwhelms you, the systems are left to run in the dark recesses of your data center. During the 2013 hack of Target, numerous warnings from the IDS were ignored, which lead to a judge ruling
16%
Credential harvesting at the network interstice
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Galyna Andrushko, 123RF
in the browser. Flaws occur in two ways: first, through the browser code itself. Chances are, you've received dire warnings to update your browser because of flaws in the internal code that can lead
16%
An interview with CoreOS cofounder Brandon Philips
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Brandon Philips
: What lead to the creation of CoreOS? BP: I want to start with a clarification: We have CoreOS, the company, and CoreOS Linux, the operating system. We started CoreOS with the mission to fundamentally
16%
New Exchange standard
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © sermax55, 123RF.com
. It supports the continuation of an interrupted connection, meaning that short interruptions no longer lead to a reconnect. The client continues the communication at the point before it broke down
16%
Linux alternatives to Windows software
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
. That is something you have to consider in this field. Scribus has firmly established itself in the Linux environment after 15 years of development, and it is now deemed the leading software on the free operating
16%
Boosting Performance with Intel’s QuickAssist Technology
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Wayne Daniels, 123RF.com
such as stateful compression and Batch and Pack, QuickAssist lets storage providers take advantage of leading-edge encryption and data compression capabilities. Infos Intel QuickAssist:http://www.intel
16%
IoT for IT
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Bruce Rolff, 123RF.com
with the speed of technological innovation. This leads to two possible scenarios: Politics either inevitably lags behind and quasi-governs in the wake of laws, or innovative policies avoid interfering
16%
Monitor Linux with Red Hat Insights
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Rgbspace, Fotolia.com
The Author Thorsten Scherf is the global Product Lead for Identity Management and Platform Security in Red Hat's Product Experience group. He

« Previous 1 ... 38 39 40 41 42 43 44 45 46 47 48 49 50 51 ... 66 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice