Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (299)
  • News (21)
  • Article (10)
Keywords

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 33 Next »

42%
An IT nomad's diary
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Jasmin Merdan, 123RF.com
Friday, 5pm: I just switched off my laptop a quarter of an hour ago and I am ready to go running, when my phone rings. Two friends from California are calling to proudly tell me about a new Perl web
42%
Improve the physical security of your business
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© ginasanders, 123RF.com
the intruder's visits. Additionally, security considerations should not be restricted to the immediate workplace. Important documents and laptops may not be on the company's premises but somewhere in a hotel
42%
I/O benchmarks with Fio
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Kheng Ho Toh, 123RF.com
teaches performance analysis and tuning for various training service providers. Thanks to Jens Axboe for answering many questions and to Teamix for providing the test laptop.
41%
Mobile PC Monitor: A sys admin's best friend
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Buchachon Petthanya, 123RF.com
, a tablet computer, a laptop (notebook, ultrabook, netbook), the PC Monitor application, or a web page. As long as you have access to any type of computer or smartphone, you can stay in touch with what
41%
Top three HPC roadblocks
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Alexey Bogatyrev, 123RF.com
their responsibility ends and the customer's begins. It can be the cable modem or a phone box, but one side is the user's responsibility and the other is that of the service provider. In general, installers try
41%
Demystified: The facts about green IT
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Iakov Kalinin, 123RF
equipment, as detailed in Table 1. In the case of the sole proprietorship, they assumed a desktop PC and a laptop. Table 1 Equipment per Size Class   Large Corp. Mid
41%
Professional backup solutions compared
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Kamil Macniak, 123RF
) Proprietary product (RealTime) or features bare-metal recovery with separate license Bandwidth controls/Throttling Yes Yes, two methods Yes For laptop backups with TSM Fast
41%
SSH Administration – Windows in a Unix World
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Gino Santa Maria, 123RF.com
in your possession a corporate laptop conveniently loaded with Windows XP, Vista, or 7: You need an introduction to PuTTY and Xming and a short refresher on Cygwin. Windows-to-Windows connectivity comes
40%
Logger in HPC System Administration
07.07.2025
Home »  Articles  » 
 admins have tools that use these logs to provide notifications, they are not easy to process and understand. Wouldn't it be nice to be able to put your own information into the system log (/var/log/syslog ) so
40%
Designing a Secure Active Directory
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Samantha Sophia on Unsplash
, etc. The service is very rarely used in local environments but provides the technology basis for Azure Information Protection, which evolved into Microsoft Information Protection and finally Microsoft

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 ... 33 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice