Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1259)
  • News (417)
  • Article (308)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 57 58 59 60 61 62 63 64 65 66 67 68 69 70 ... 200 Next »

13%
Citrix NetScaler steps in for Microsoft TMG/ISA
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Mellimage, 123RF.com
] to support this claim. The main advantages of TMG were the built-in wizards that helped admins provide Exchange services, SharePoint, and Lync efficiently on the Internet. Citrix fills the void created
13%
Developments in storage management
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by DESIGNECOLOGIST on Unsplash
consists of local environments and cloud systems from different providers, which can be geographically distributed, making data management itself more difficult. Data and storage management
13%
NCAR Facility Targets Efficiency and Sustainability
14.11.2011
Home »  News  » 
 
The National Center for Atmospheric Research (NCAR), headquartered in Boulder, Colorado, has selected IBM to provide components for its new high-efficiency supercomputing facility in Cheyenne
13%
Support Our Work
23.02.2024
Home » 
 
 email newsletters.  ADMIN Update: This weekly newsletter includes links to technical articles and news from ADMIN magazine and related publications. Occasionally, we send special Spotlight newsletters providing
13%
Ongoing Cyberattack Prompts New CISA Guidance for Communications Infrastructure
05.12.2024
Home »  News  » 
 
US and international security agencies have warned that Chinese state hackers “have compromised networks of major global telecommunications providers to conduct a broad and significant cyber
13%
New security features in Windows 10
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Duncan Andison, 123RF.com
Many experts believe passwords don't provide adequate security, and, even if they did, all too many users fail to implement secure password rules and procedures. Windows 10 provides built-in support
13%
Advanced Windows security using EMET
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Andrii IURLOV, 123RF.com
security updates using Windows Firewall with Advanced Security and using User Account Control (UAC). Additionally, EMET provides a configurable function for determining the trustworthiness of SSL
13%
We interview Red Hat CEO Jim Whitehurst
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Jim Whitehurst
versions of our own curated Linux in stores to an IT vendor providing subscriptions to businesses using our open hybrid cloud technologies. More than 90% of Fortune 500 companies rely on Red Hat technologies
13%
Integrating PowerShell with Ansible for hybrid automation
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Mulyadi on Unsplash
both Windows and Linux systems, which poses a significant challenge for system administrators. Enter PowerShell and Ansible – two formidable automation tools that, when combined, provide an elegant
13%
Attacks on telephone systems
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Christos Georghiou, 123RF.com
to perform calls to previously created premium numbers that are only available for a limited time. Some providers have proactive anomaly detection in place and can use this to determine an above-average number

« Previous 1 ... 57 58 59 60 61 62 63 64 65 66 67 68 69 70 ... 200 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice