Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (975)
  • Article (311)
  • News (194)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 149 Next »

14%
Top Three HPC Roadblocks
12.01.2012
Home »  HPC  »  Articles  » 
. Even a quad-core desktop or laptop can present a formidable parallel programming challenge. In its long history, parallel programming tools and languages seem to be troubled by a lack of progress. Just
14%
DBaaS – How They Make Data Scale
25.06.2012
Home »  Articles  » 
 
to introduce a new concept that was sent my way. In my kitchen, with laptop perched and Skype running, I talked to David Jilk, CEO of Standing Cloud, which I wrote about recently. Jilk got in touch
14%
DBaaS – How They Make Data Scale
25.06.2012
Home »  CloudAge  »  Blogs  »  Dan Frost's Blog  » 
 
database-as-a-service (DBaaS), a couple of months ago, I looked into more DBaaS providers. However, before I get to that, I want to introduce a new concept that was sent my way. In my kitchen, with laptop
14%
Security in the network with Kali Linux
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © insima, 123RF.com
of theft of the laptop or the USB stick with Kali Linux, the existing databases will not end up in the wrong hands. The installation routine also offers the Guided – use entire disk and set up encrypted LVM
14%
JMeter tests loads and measures performance of static and dynamic resources
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by CHUTTERSNAP on Unsplash
this path, it did not take much to imagine that I might not have enough power on my laptop or that the test server could run out of connections – but none of that happened. What I did discover
14%
Managing Ubuntu with Canonical Landscape
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Kitsadakron Pongha, 123RF.com
can manage its field force's laptops via Landscape. When staff change devices or receive new ones from time to time, you would normally need to remove the obsolete devices manually from Landscape
14%
Smartphone management with Microsoft products
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Javier Brosch, 123RF.com
Intune lets admins centrally monitor not only computers and laptops, but also smartphones and tablets (Figure 1). In particular, businesses who rely on Windows Server 2012, Windows 8 and Windows Phone 8
14%
Hardening SSH authentication to the max
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © shutter999, 123RF.com
modules (HSMs) on Android devices, or Trusted Platform Modules on a laptop. The term "discoverable credential" is so called, because the client can determine a list of possible keys in the authenticator
14%
Logger in HPC System Administration
07.07.2025
Home »  Articles  » 
.g., /var/log/auth.log  or /var/log/boot.log ) or performing other specific admin tasks – including debugging problems. Permissions The user account on my laptop allows me to write to but not read from syslog . You might
14%
Sincerity: Put your Favorite Stack on Java
06.01.2014
Home »  News  » 
 
that are written in Javascript, Python, Ruby, PHP, Lua, Groovy, Clojure, and Scala. Sincerity is licensed under the Free LGPL 3.0 license.

« Previous 1 ... 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 149 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice