Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (467)
  • News (194)
  • Article (80)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 57 58 59 60 61 62 63 64 65 66 67 68 69 70 ... 75 Next »

15%
An introduction to FreeNAS
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Mario Lopes, fotolia.com
in the system as the primary Adaptive Replacement Cache (ARC). A common rule of thumb for ARC is to allow 1GB of RAM for each 1TB of data the system will store. Although solid state drives represent the leading
15%
News for Admins
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
 
-remote-unauthenticated-code-execution-vulnerability-in-openssh-server. IT Pros See Shrinking Job-Related Benefits Despite Salary Increases The demand for IT expertise remains strong, leading to a general increase in base compensation levels, according to the 2024 IT Salary
15%
Managing GPT-4 on the Network
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by Cécile Brasseur on Unsplash
, this chain of events can lead to a company's competitors gaining access to internal information and profiting from it because employees have passed on the data voluntarily. Many company managers are not yet
15%
Managing infrastructure as code with Spacelift
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Konstantin Shaklein, 123RF.com
entire command sequences at this point: A Git commit then initially leads to a proposed run taking place. A run completing without error in turn triggers an update of the tracked run. In combination
15%
Get to know Azure Files and Azure File Sync
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © moovstock, 123RF.com
is already available both locally and in the cloud before the initial sync, Azure File Sync keeps both files in the event of conflicts. Alternatively, you can define the local server as the lead, which means
15%
Building a defense against DDoS attacks
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
will eventually lead to success unless a form of website protection puts a stop to it. The website protector works like this: It sends a work order to the client's web browser and only displays the requested web
15%
Self-hosted remote support
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by Karsten Würth on Unsplash
. On Windows, you can alternatively include the server and key in the file name of the portable client, which, however, leads to very long file names in excess of 80 characters. For Linux, macOS, and the mobile
15%
Manage user accounts with MS Entra lifecycle workflows
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Lead Image © Aliaksandr Marko, 123RF.com
be very efficient, which might lead to undesirable side effects in some cases. In a cloud setup (i.e., when user management resides entirely in Azure), you need to consider whether it makes more sense
15%
What's new in Ceph
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Domenico Loia on Unsplash
anyway. Although the typical all-in contracts are still widespread in the US, in many other countries arrangements can be more individual, which, in some cases, leads to independent service providers
15%
Sharding and scale-out for databases
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Photo by Dan Dennis on Unsplash
– also lead to tougher requirements for databases. In a scalable environment, the database also needs to be able to scale; single instances of MySQL or PostgreSQL are no longer sufficient. Out

« Previous 1 ... 57 58 59 60 61 62 63 64 65 66 67 68 69 70 ... 75 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice