Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1029)
  • News (227)
  • Article (224)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 149 Next »

14%
SC24 – Bursting at the Seams
07.01.2025
Home »  HPC  »  Articles  » 
the conference, uses quite a bit of power. I don’t know how SCinet started, but it demonstrates what it takes to build the most powerful and advanced network anywhere, including power and cooling, monitoring
14%
OpenFlow-capable Zodiac WX access point
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Florian Biedermann on Unsplash
Zodiac FX is an affordable software-defined network (SDN)-enabled hardware switch [1] that was launched by Northbound Networks of Australia in a Kickstarter campaign. The company invited me to join
14%
Security risks from insufficient logging and monitoring
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Ryoji Iwata on Unsplash
) to be detected, and the attack took an average of 66 days [3]. Both are more than enough time for the attacker to cause massive damage. Monitoring Protects Figure 1 shows a sample network, including a DMZ, where
14%
U-Move backs up, restores, and migrates Active Directory environments
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Erda Estremera on Unsplash
, a user with appropriate permissions can also write the backup directly to a network share, which the local system itself is not able to do. In this case, I specified the destination path for the backup
14%
HPC resource monitoring for users
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © Andrey_Russinkovskiy, 123RF.com
-performance computing (HPC) system, and the readings are resource aspects of the system (e.g., CPU, memory, network and storage usage, etc.). Here, the telemetry is used to help the user understand what their application
14%
Business continuity management
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Andrea Danti, 123RF.com
center? Moreover, how will the underlying network configuration, IP addresses, and DNS cope with this? Simplifications in the form of system monitoring and intelligence, in combination with automatic
14%
Container orchestration with Kubernetes from Google
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kirsty Pargeter, Fotolia.com
and extending Docker [2] to include many useful functions for large computing networks. SUSE and Red Hat now also participate in Kubernetes' development. How does Kubernetes fare in a market in which Core
14%
Windows security with public key infrastructures
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © vlue, 123RF.com
by the IT department on your local network, and the trust extends only to the computers that are located on the corporate network. In the case of an enterprise CA with a Windows server, for example, all the members
14%
Supercomputing Conference 2024
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © djem, 123RF.com
the conference, uses quite a bit of power. I don't know how SCinet started, but it demonstrates what it takes to build the most powerful and advanced network anywhere, including power and cooling, monitoring
14%
DeepLocker: An AI Powered Malware
14.08.2018
Home »  News  » 
 
the “trigger conditions” to unlock the attack almost impossible to reverse engineer. The malicious payload will only be unlocked if the intended target is reached. It achieves this by using a deep neural network

« Previous 1 ... 44 45 46 47 48 49 50 51 52 53 54 55 56 57 ... 149 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice