Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (995)
  • Article (277)
  • News (260)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 81 82 83 84 85 86 87 88 89 90 91 92 93 94 ... 154 Next »

11%
RFID technologies and risks
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Photo by Claudio Schwarz on Unsplash
various RFID scanners with very long ranges to enable "permanent location fixing" of assets. I am still looking at the associated problems in relation to bring your own device (BYOD) and home office
11%
News for Admins
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
 
the focus on the emerging role of platform engineering, which "brings together multiple roles such as site reliability engineers (SREs), DevOps engineers, security teams, product managers, and operations
11%
Open source cloud technologies at a glance
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
alhovik, 123RF
by a change in the license for the CloudStack platform to the Apache 2 license, while Citrix still remained the main sponsor. According to Citrix, the license change was meant to bring about the fastest
11%
Server update with Azure Update Management
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Pablo Heimplatz on Unsplash
Update Management account and click Update management ; then, select Add Azure VMs to connect VMs in Azure, regardless of whether they are Windows or Linux machines. If you want to bring servers outside
11%
Workspace ONE for endpoint management
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Davorr, Fotolia.com
operating systems, a clear-cut tool for endpoint management is essential. VMware's Workspace ONE [1] aims to integrate all of a company's devices, including devices belonging to employees (bring
11%
Purdue Model for industrial networking
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © James Thew, Fotolia.com
to the ambient conditions and the presence of people, all of which helps to optimize power consumption and improve user comfort. Of course, this convergence brings with it specific security problems that simply do
11%
Filesystem Encryption
12.05.2014
Home »  Articles  » 
 
it shows how to do what is called a substitution cipher. The classic example for people reading this article and who remember usenet is called ROT13. This is a really simple example of encryption (but
11%
Monitor Your Nodes with collectl
28.03.2012
Home »  HPC  »  Articles  » 
or an interaction of both. One of the most popular tools for this is called sar. Although sar has been around for a long time and is fairly well known to Linux administrators, it is lacking in some areas
11%
Building an HPC Cluster
16.06.2015
Home »  HPC  »  Articles  » 
: Generic cluster layout. Almost always you have a node that serves the role of a “master node” (sometimes also called a “head node”). The master node is the “controller” node or “management” node
11%
Singularity – A Container for HPC
21.04.2016
Home »  HPC  »  Articles  » 
Ops. In full virtualization, a system has a host operating system (OS) that runs something called a hypervisor (Figure 1, right side). Figure 1: Virtual machine

« Previous 1 ... 81 82 83 84 85 86 87 88 89 90 91 92 93 94 ... 154 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice