Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (709)
  • Article (212)
  • News (103)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 78 79 80 81 82 83 84 85 86 87 88 89 90 91 ... 103 Next »

13%
Web applications with Julia
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © sony sivanandan, 123RF.com
, improving on the concept by fixing [12] several problems in Jupyter's design. Whereas Jupyter can serve as an interface to many different languages (the name is a mashup of Julia, Python, and R, its original
13%
PC over IP
03.09.2013
Home »  Articles  » 
 
with the software client. The connection between the client software and workstation host card is encrypted by default using SSL/TLS (AES 256-bit). Conclusions The use of remote workstations with zero clients
13%
The Cloud’s Role in HPC
05.04.2013
Home »  HPC  »  Articles  » 
-socket server that has 16 cores per socket has a total of 64 cores per server, and you can run perhaps 128 or 256 VMs on the system as long as each VM has enough memory to run the application. Remember
13%
Hardware suitable for cloud environments
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Orlando Rosu, 123RF.com
, which needs to be equipped with dual multicore CPUs and have at least 256GB of RAM and several terabytes of disk space to run multiple VMs for different services, if necessary. At this point, compliance
13%
Synchronize passwords in KeePass
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
the database to store your credentials on multiple devices. The associated file is only a few kilobytes in size, even if it contains many entries, and the content is securely encrypted by 256-bit AES. Kee
13%
When are Kubernetes and containers not a sensible solution?
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Kelly Sikkema on Unsplash
256 checksums of the individual files match). This way of tracking whether any local changes have been made to the package content is both excellent and compliant. The situation is quite different
13%
Software instead of appliances: load balancers compared
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Patrick Fore on Unsplash
by designing for hardware redundancy. However, now that the infamous half-height pizza boxes come with 256GB of RAM and multicore CPUs, the financial outlay is manageable. Moreover, the software load balancers
13%
Safely integrating and running Office 365
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Matty Sysmons, 123RF.com
a few tools in this area can help with encrypting data. For example, you can use the Boxcryptor tool [5] to encrypt data using AES-256 and RSA. The data is encrypted with a password and a keyfile
13%
Legally compliant blockchain archiving
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Photo by Jade Masri on Unsplash
of a raw data hash (SHA256) and a UUID (per document) and is valid for all processes in the system (Figure 2). Thus, it is possible at any time to restore individual data records or even the entire database
13%
Cloud protection with Windows Azure Backup
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Oleksiy-Mark, 123RF.com
change the settings for the backup at any time, of course. You can also use Properties/Bandwidth Throttling to limit the bandwidth available to the online backup. You can enter data from 256Kbps to 1Gbps

« Previous 1 ... 78 79 80 81 82 83 84 85 86 87 88 89 90 91 ... 103 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice