Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1495)
  • Article (334)
  • News (169)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 49 50 51 52 53 54 55 56 57 58 59 60 61 62 ... 201 Next »

18%
VPN clients for Android and iOS
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © fckncg, 123RF.com
established connections to a third-party server using the IPsec protocol. The test devices were an Apple iPad with the latest iOS 9 and a Samsung smartphone with Android 4.0.4, which at the time were the most
18%
Security and automation with SBOMs
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Tjefferson, Fotolia.com
Heartbleed in 2014, a vulnerability in OpenSSL, and Log4j in 2021. In both cases, innumerable systems were affected. Back in May 2021, the United States introduced an obligation to provide a software bill
18%
Five multipurpose thin clients compared
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © David Grigg, 123RF.com
4GB 1GB Flash 1GB 2GB 2GB 8GB 0GB Speaker Yes Yes Yes Yes Yes Card reader No Yes
18%
Client management in the domain using PowerShell
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Maurizio Ascione, Fotolia.com
on the client and PowerShell v4 on the server. Administration via a CSV File In PowerShell remoting, a distinction is made between 1:1 and 1:n (fan-out) relationships. 1:1 remote management is implemented
18%
Monitoring virtualization environments with Nagios and Icinga
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Sergej Khackimullin, 123RF
will typically need to monitor the system load and I/O performance on Windows systems, too. The typical approach here is to use NSClient++ agents [3] and the matching server plugins: check_nt [4] or check
18%
Data Analysis with Panda
12.03.2014
Home »  HPC  »  Articles  » 
by convention – but not necessarily – is imported using: import numpy as np Multidimensional matrices are created in a similar way, that is, with nested lists: np.array([[1, 2, 3], [4, 5, 6]]) If the content
18%
Ceph and OpenStack Join Forces
04.06.2014
Home »  HPC  »  Articles  » 
. Lower down in the file, you will also see some parameters that determine the behavior of Glance’s rbd back end. For example, you can set the name of the pool that Glance will use (Figure 4). The example
18%
Server Virtualization with VirtualBox
18.09.2012
Home »  Articles  » 
 
to VRDP support, you can access the virtual machine consoles in your browser with phpVirtualBox. Free or Not Free? Up to version 4.0 of VirtualBox, both a commercial and an open source edition (OSE
18%
CephX Encryption
27.03.2013
Home »  HPC  »  Articles  » 
). The example assumes a username of admin ; first you need to discover admin’s password: ceph-authtool --name client.admin --print-key /etc/ceph/keyring.admin The example uses AQBNTxZRWId7JxAA/Ac4ToR7Zf
18%
ClusterHAT
10.07.2017
Home »  HPC  »  Articles  » 
be in the Pixel desktop (Figure 4). A few “classic” configurations are called for at this point with the help of the raspi-config command: Expand the storage to use the entire microSD card Change

« Previous 1 ... 49 50 51 52 53 54 55 56 57 58 59 60 61 62 ... 201 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice