Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1272)
  • Article (297)
  • News (158)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 174 Next »

17%
Professional backup solutions compared
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Kamil Macniak, 123RF
Symantec   Backup & Recovery Network Backup NetWorker Tivoli Storage Manager Bacula SEP sesam NetBackup   v10 v8.2.6.1 v7.6
17%
Web applications with Julia
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © sony sivanandan, 123RF.com
others are Fortran, C, and C++). Because of the emphasis on technical computing in the Julia community, most of the books [6] and online documentation and tutorials are aimed at scientists and engineers
17%
Managing FOSS applications on AIX
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © Nataliia Natykach, 123RF.com
Internet access for security reasons, in which case you have to download the DNF TAR bundle (dnf_bundle_aix_73.tar) manually from the AIX Toolbox PPC repository [6]. If you install DNF from the TAR bundle
17%
Modern implementation of DHCP with Kea
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Lead Image © Cheryl Ann Quigley, Fotolia.com
to existing management systems and databases. Some outdated solutions also lack functions for IPv6. The Kea project, launched in 2014, modernizes the DHCP server. Kea was designed as a successor
16%
Run One Program at any Scale with Legate
08.06.2021
Home »  HPC  »  Articles  » 
power (TDP) 8GB DDR4-2933 memory Maximum of two memory channels Memory bandwidth: 45.8GBps Nvidia GeForce 1650 GPU Architecture: Turing (TU117) Memory: 4GB GDDR5 Memory
16%
Private 5G networks for industry and business
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Tyler Nix on Unsplash
, and devices. Data is the fuel for digital transformation, and 5G will transmit data at up to 10Gbps in the future – which is 100 times faster than the current 4G/LTE standard. Additionally, the transmission
16%
SSH on Windows
17.09.2013
Home »  Articles  » 
iptables.service , or create a rule for port 22 (SSH). Administrators typically do not need to make any adjustments to the main configuration file – usually /etc/ssh/sshd_config – with one exception
16%
Where Does Job Output Go?
11.09.2023
Home »  HPC  »  Articles  » 
factors to little NVMe drives that are only a few millimeters thick and very short. The M.2 SSDs are approximately 22mm wide and 60-80mm long. It became obvious that putting a fair number of SSDs
16%
Secure containers with a hypervisor DMZ
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © lightwise, 123RF.com
of Kata Containers go back further than 2017, and the project brings together efforts from Intel and the Hyper.sh secure container hosting service: Clear Containers [6] or runV [7]. Kata Containers use
16%
SSL/TLS best practices for websites
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Yevgeniya Ponomareva, Fotolia.com
, the attacker cannot use the preference mechanism to stipulate weaker encryption. 6. Choice ofCipher Suite I recommend strong ciphers that implement 128-bit encryption. This list includes AES and Camellia

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 174 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice