Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: Internet case situation 2 hand(711bmw.com)Internet case situation 2 hand(711bmw.com)w0s ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (571)
  • Article (88)
  • News (3)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 67 Next »

12%
Creating a redundant array of inexpensive links
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Spectral, Fotolia.com
; in the simplest case, this means simply doubling the number of disks in a mirroring RAID [2]. This isn't quite as easy for access lines. In the classic setup for this scenario, at least two Internet providers ... The Fault Tolerant Router daemon uses multipath routing among multiple Internet connections to keep you connected, even when some connections go down.
12%
Tricking Intruders with HoneypotMe
26.10.2012
Home »  Articles  » 
 
. On the other hand, it is possible for simulated services to be detected by individual attackers, and the attacker might then switch to another service as a result. In this case, the manual attack might
11%
Google Cloud Storage for backups
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © lightwise, 123RF.com
anywhere on the Internet with a REST-flavored API (AWS S3 historically also supports SOAP and BitTorrent) or with a program based on one of the supported SDKs. In fact, GCS buckets and objects ... We compare Google Cloud Storage for Internet-based backups with Amazon S3.
11%
End-to-end monitoring – Measuring what the user perceives
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © complize, photocase.com
Keys function, which simulates keyboard input. Figure 2: A test case launches the Notepad editor on Windows. The Alyvix Screenshot keyword tells
11%
Using the MQTT IoT protocol for unusual but useful purposes
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Heiko Küverling, 123RF.com
again a minute later anyway (QoS 0 is fine). Users might want to transmit the position of a mobile device with a bit more reliability (QoS 1 or 2), although the network traffic and costs rise, too ... Although the MQTT protocol is usually associated with the Internet of Things, it also works in some very different situations, such as monitoring, for example.
11%
Foundries.io IoT development platform
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Photo by Juan Rumimpunu on Unsplash
access to the Internet at its location, which is not a problem in most cases. Most providers integrate their IoT devices into existing WiFi networks that have a connection to the Internet. The provider ... Foundries.io is a modular system for companies wanting to develop Internet of Things applications for devices.
11%
TLS 1.3 and the return of common sense
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image Creative Commons CC0 TheDigitalArtist Pixabay
.), the Internet Engineering Task Force (IETF) has disallowed RSA-based key transport in TLS 1.3. The key exchange now relies on elliptic curve Diffie-Hellman key exchange (ECDHE) or DHE, in either case ... After a decade in service, TLS 1.2 is showing many signs of aging. Its immediate successor, TLS 1.3, has earned the approval of the IETF. Some major changes are on the way.
11%
Kea, the ISC's successor to the DHCP daemon
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Markus Winkler on Unsplash
" }, { "name": "domain-search", "data": "mydomain.example.com, example.com" }], "subnet4": [{ "subnet": "192.168.2.0/24", "pools": [{"pool":"192.168.2.1 - 192.168.2.50"}], "option-data": [{ "name ... The Internet Systems Consortium announced the end of life for the standard DHCP daemon in Fall 2022. Its designated successor Kea has been in development for years.
11%
JMeter tests loads and measures performance of static and dynamic resources
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by CHUTTERSNAP on Unsplash
[2] that simulates a travel agency. Much like any travel site, it has drop-down boxes containing various origin and destination cities; when chosen, the website displays the various flights and costs ... The JMeter specialized integrated development environment applies test scripts for load testing and performance evaluation and supports various protocols that come in handy for Internet
11%
Can “Transparent” AI Eliminate Bias?
20.03.2023
Home »  HPC  »  News  » 
 
for humans to understand. The research, which used the Bridges-2 system at the Pittsburgh Supercomputing Center (PSC), used multilevel Bayesian statistical models to simulate the properties of a conventional

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 67 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice