Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (953)
  • Article (264)
  • News (101)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 54 55 56 57 58 59 60 61 62 63 64 65 66 67 ... 133 Next »

16%
Data center networking with OpenSwitch
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © higyou, 123RF.com
Switch as a user, you need compatible hardware, such as a suitable switch. For the developer, the entry point is the OpenSwitch Gerrit page [6]. For development work, the prospective programmer needs a Git
16%
New features in jQuery 3
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Marc Dietrich, 123RF.com
and changes the behavior of some interfaces. Above all, the developers wanted to make jQuery 3 leaner and faster in response to two commonly cited points of criticism. First, they have removed a few
16%
New Exchange standard
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © sermax55, 123RF.com
. It supports the continuation of an interrupted connection, meaning that short interruptions no longer lead to a reconnect. The client continues the communication at the point before it broke down
16%
Discover ransomware with PowerShell
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Andrea Danti, 123RF.com
with the /convert parameter. A glance at the _noRansom-mini.txt file shows the filenames included and the calculated test values. This step completes the data acquisition and conversion. The last point is to check
16%
Infrastructure as Code with Terraform
20.06.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
© fotolia.com
, along with the last bit of the jigsaw (i.e., testing the setup to make sure it is performing as designed), which I still need to get my head around and will at some point in the future turn into Terraform
16%
Desktops and applications with Essentials
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © krisckam, 123RF.com
point, and NetScaler Service. All services are, of course, fail-safe. Complete provisioning of the components is automated through the Citrix Cloud. The provider also installs updates for both Windows
16%
Ease your network inventory pain with Spiceworks
07.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Paul Tobeck, fotolia.com
Network device inventory is one of those common pain points that affects every system administrator who has ever tried to script or invent a custom solution. System inventory escapes even the most
16%
What's new in SQL Server 2016
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © alphaspirit, 123RF.com
encrypted in the working memory. If you use encrypted data, for example, with local SQL servers and replicate the data on the cloud via the Internet, the data is not decrypted at any point. The data remains
16%
IoT for IT
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Bruce Rolff, 123RF.com
another, more important mistake at some other point will probably be relatively small. This is a question for social scientists. Finally, a point that I have not even addressed is how much energy IoE would
16%
Monitor Linux with Red Hat Insights
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Rgbspace, Fotolia.com
-a -o At this point, it is also interesting to note that the RHC system consists of a server component as part of the Insights service and a client component

« Previous 1 ... 54 55 56 57 58 59 60 61 62 63 64 65 66 67 ... 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice