Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1198)
  • Article (312)
  • News (179)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 170 Next »

17%
Cross-Vendor IPsec
25.10.2011
Home »  Articles  » 
 
authentication_algorithm pre_shared_key; 08 dh_group modp1024; 09 } 10 generate_policy off; 11 } 12 13 sainfo address 192.168.2.0/24 any address 172.16.0.0/16 any { 14 pfs_group modp1024; 15
17%
Millions of Intel Processors Are Vulnerable to Attack
21.11.2017
Home »  News  » 
 
Firmware versions 11.0/11.5/11.6/11.7/11.10/11.20, SPS Firmware version 4.0, and TXE version 3.0 are impacted.” The affected products include sixth, seventh, and eighth generation Intel Core Processor
17%
Distributed Linear Algebra with Mahout
11.05.2022
Home »  HPC  »  Articles  » 
 Samsara online. Listing 1: Samsara Syntax Examples val G = B %*% B.t - C - C.t + (xi dot xi) * (s_q cross s_q) // Dense vectors: val denseVec1: Vector = (1.0, 1.1, 1.2) val denseVec2 = dvec(1, 0, 1, 1, 1, 2)   // Sparse
17%
Connecting dissimilar IPsec implementations
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© Yuri Arcurs, 123RF.com
dh_group modp1024; 09 } 10 generate_policy off; 11 } 12 13 sainfo address 192.168.2.0/24 any address 172.16.0.0/16 any { 14 pfs_group modp1024; 15 encryption_algorithm aes256; 16
17%
Automating repetitive tasks
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Greg Rakozy on Unsplash
desktop license provides access to process mining on desktops and 50MB of process mining data storage, which can be expanded to up to 100GB per tenant. Power Automate Premium also provides AI tools
17%
New Products
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
 
management engine with power optimization software, all on one piece of silicon. The EnergyCore SoC also includes a full complement of server I/O features and a large 4MB ECC L2 cache. To learn more, visit
17%
Lean on Logwatch
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © MuharremZengin, 123RF.com
NEW packages will be installed: libdate-manip-perl libyaml-syck-perl logwatch As a result, about 12.5MB of new software is installed. Logwatch gets configuration details several ways: from script
17%
The pros and cons of a virtual desktop infrastructure
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Mariia Puliaieva, 123RF.com
? What future software development takes highest priority for you? SK: We started to use VMware View 4.0 in 2010. Since then, VMware has met many of our wishes, and the product has noticeably improved
17%
Group policies on Windows Server 2022
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Jack Carter on Unsplash
at version 1.0 since it was released – the version number has never been incremented. The toolkit provides configuration defaults for any current operating system. For each build, a baseline is released
17%
Sincerity: Put your Favorite Stack on Java
06.01.2014
Home »  News  » 
 
that are written in Javascript, Python, Ruby, PHP, Lua, Groovy, Clojure, and Scala. Sincerity is licensed under the Free LGPL 3.0 license.

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 170 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice