Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (978)
  • Article (306)
  • News (84)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 59 60 61 62 63 64 65 66 67 68 69 70 71 72 ... 138 Next »

28%
Distributed denial of service attacks from and against the cloud
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © leksustuss, 123RF.com
, although the attackers were bent on disruption rather than robbery, cost over a billion dollars to clean up. Many Vectors and DNS Floods Today's DDoS attacks in the cloud have very little in common
28%
Manage Windows images with the Windows ADK
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Maksym Yemelyanov, 123RF.com
these tools in September 2023. The new features are not the main focus here, but I will point them out for more experienced ADK admins. Installing Windows ADK Microsoft's deployment SDK is very closely tied
28%
Vector databases for data-driven artificial intelligence
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © sdecoret, 123RF.com
library with millions of text items and articles, conventional databases with exact match retrieval can quickly prove to be quite inefficient. However, a vector database equipped with embeddings would very
28%
Synchronizing repository changes with GitOps
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
is currently very popular, it only makes sense to use it instead of, say, SVN or Subversion; however, nobody forbids you from creating a GitOps solution with these legacy VCS options. Finally, just because Git
28%
Fight Windows ransomware with on-board tools
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by John Cameron on Unsplash
to the company can be executed. In other words, malicious code has to be very carefully crafted if it is to work. You might still have gaps in the rules, but if so, you should establish software allowlisting
28%
AppScale AWS clone for private clouds
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Karel Mistrik on Unsplash
. For just south of EUR20,000, and that's what a powerful virtual machine will cost over two years, you can pick up a very respectable physical machine from, for example, Supermicro. Moreover, bare metal
28%
Open Source VDI solution with RHEV and oVirt
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © adchariya chanpipat,123RF.com
with modern devices. SPICE usually creates very little network load; the protocol compares very well with other VDI protocols. Templates and Pools Templates and pools are essential components in a VDI setup
28%
Ralph, the open asset management tool
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Sebastian Duda, 123RF.com
there as a lump sum. But network and IT administrators gain very little knowledge from this lump-sum information. Admins need to learn about the lifecycle of a single asset and be able to track it. Benefits
28%
The utility of native cloud applications
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © krisckam, 123RF.com
Many standard applications are very difficult to roll out in a cloud, and the more specific the use case (i.e., software developed in your own organization years ago and adapted to your requirements
28%
Keeping container updates under control
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by nikko osaka on Unsplash
and only communicates with the other containers through the network. However, this consideration criminally ignores a few very pertinent facts. An attacker who has successfully broken into a container

« Previous 1 ... 59 60 61 62 63 64 65 66 67 68 69 70 71 72 ... 138 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice