Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1029)
  • News (227)
  • Article (224)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 ... 149 Next »

14%
The limits and opportunities of artificial intelligence
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © sebastien decoret, 123RF.com
in Erlangen, Germany, where he headed the neural networks research group. Since 1998 he has been a full professor for automation technology at the University of Chemnitz, Germany. ADMIN: Prominent advocates
14%
Discover system vulnerabilities and exploits
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Charles on Unsplash
run Kali on a virtual machine (VM), because many admins likely do not want to use the system for everyday tasks. If the main task of Kali in the local setup is to find problems in WiFi networks
14%
Link Encryption with MACsec
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Oleksandr Omelchenko, 123RF.com
Networks are exposed to more than external attacks. Appropriate defenses need to be implemented at the entry point to the internal network or, if third parties have physical access, to access points
14%
VM and cloud management with openQRM
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Jason Murillo, 123RF.com
to classic IT infrastructure based on networks, servers, storage, virtualization, and clients, many enterprises today also rely on cloud services. In the simplest case, this just means that the web server
14%
KubeVirt integration in OpenShift and Rancher
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by Darren Halstead on Unsplash
with many drawbacks. On the one hand, two layers means additional license and subscription costs. On the other hand, both the VM and container layers virtualize resources such as networks and storage, which
14%
FreeBSD Version 10 released
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © katisa, 123RF.com
that corporations place in FreeBSD, Sony based its PlayStation 4 on FreeBSD 9. Likewise, Juniper relies on FreeBSD as a robust operating system for network routers, and Apple uses parts of FreeBSD for its Mac OS X
14%
Exploring the HPC Toolbox
04.11.2011
Home »  HPC  »  Articles  » 
. For example, the widespread Blue Gene supercomputers use a connecting network that was specially developed for use with Blue Gene systems. Cluster Setup The clustering model was originally introduced
14%
Secure Your KVM Virtual Machines
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © George Tsartsianidis, 123RF.com
. Incidentally, this practice protects you against a crashed machine running wild or using too much CPU time, or a DoS attack blocking network access to other virtual machines. Normally, libvirt automatically
14%
Preparing for cyberattacks
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
' wallet. The encryption of more than 30 servers on the computer network of University Hospital Düsseldorf in the fall of 2020 by a modified WannaCry variant attracted a great deal of attention
14%
Quick UDP Internet connections
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Jonathan Chng on Unsplash
(RIPT) for voice over IP (VoIP) networks are also based on QUIC, and both are expected to increase penetration rapidly in the near future. Specifics and Areas of Use QUIC is considered a potential TCP

« Previous 1 ... 46 47 48 49 50 51 52 53 54 55 56 57 58 59 ... 149 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice