Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (705)
  • Article (160)
  • News (135)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 65 66 67 68 69 70 71 72 73 74 75 76 77 78 ... 101 Next »

15%
End-to-end monitoring – Measuring what the user perceives
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © complize, photocase.com
to track, record, and compare application performance at all locations, applications can be tested for access by Citrix users or remote desktop web access. If you visualize the measurements on a timescale
15%
New security features in Windows 10
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Duncan Andison, 123RF.com
and remote sites with low bandwidth for local distribution. This technique removes the need to run a Windows Update distribution solution such as Windows Server Update Services (WSUS) at all locations. Storing
15%
A buyer's guide to NVMe-based storage
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Photo by Oscar Sutton on Unsplash
are great early adopters that take advantage of NVMeOF on Remote Direct Memory Access over Converged Ethernet (RoCE). VMware has introduced NVMeOF capabilities, but has not yet publicly announced when support
15%
Automatic data encryption and decryption with Clevis and Tang
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by London Scout on Unsplash
– usually using a TLS connection, which in turn requires X.509 certificates, which means a PKI is also required to manage the certificates. Certificates can also be used to authenticate the remote station
15%
Advanced Windows security using EMET
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © Andrii IURLOV, 123RF.com
.ADMX and EMET.ADML from the installation directory into the PolicyDefinitions directory on a domain controller or a workstation with the Remote Server Administration Tools (RSAT) installed. Then, use the central
15%
Landscape
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Kitsadakron Pongha, 123RF.com
use scripts to perform remote queries via Landscape. To complete the configuration, the client sends a registration request to the specified Landscape account. In the web interface, you just click
15%
Live snapshots with Virtual Machine Manager
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Iryna Denysova, 123RF.com
. Conclusions Virtual Machine Manager is a useful helper for many system administrators; in particular, it is an obvious choice for managing remote hypervisors. However, the development rate is relatively
15%
Mesh Service for OSI Layers 2 and 3
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Photo by James Pond on Unsplash
. The Network Service Manager daemon receives a request from the client pod looking for a connection to the VPN gateway over Google's remote procedure call (gRPC) framework [7]. The manager forwards the request
15%
VMware AirWatch mobile device management
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Sychugina Elena, 123RF.com
devices remotely, update apps and operating systems, and check security settings. AirWatch itself runs on a Windows server system. Multiple Servers For test purposes, you can install all the components
15%
Backup and replicate VMs on VMware ESXi
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © urbanhearts, fotolia.com
-mode=true In addition to any errors and warnings, XSIBackup also shows the space required to replicate the VMs and the free disk space on the target host. If the target is a remote host, a simple path definition

« Previous 1 ... 65 66 67 68 69 70 71 72 73 74 75 76 77 78 ... 101 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice