Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 00s Llorente"478 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (909)
  • Article (318)
  • News (100)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 82 83 84 85 86 87 88 89 90 91 92 93 94 95 ... 134 Next »

25%
Total Network Monitor
20.08.2013
Home »  Articles  » 
 
(Figure 3). In this way, you can also query websites, Outlook Web App, intranet sites, and SharePoint libraries. Figure 3: Monitoring various protocols
25%
Co-Design Approach to Supercomputing
12.01.2012
Home »  HPC  »  Articles  » 
In consumer electronics such as microwave ovens, cameras, and cellphones, every component is optimized to that particular device’s application. This approach is known as co-design, whereby systems
25%
Certificate security
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Jennifer Huls, 123RF.com
hash value, F1lYgMAWJed1UM9BWAk3PKUxZhtSATn8LV17W9Uw6MKA=, verifies the authenticity of the public key of the host system in production use. The second hash value, UGNuJ8wOBY9qt6K4eulsEY6vC0sOhhf1FoJVT1
25%
Mail Helpers: Improve Your Email Experience with These Handy IMAP Extensions
08.07.2013
Home »  Articles  » 
 
. Under this umbrella, RFC 4550 gathered more than 20 IMAP protocol extensions explicitly to improve communication with mobile clients. Although it’s possible that no server has implemented the more exotic
25%
Fathoming the cloud
28.06.2011
Home »  CloudAge  »  Articles  » 
 
is based on the CSA Security Guidance document [3]. The CSA Security Guidance, in turn, is designed to provide high-level coverage of cloud security issues and some methods to address them, ranging from
25%
Magellan Report on Cloud Computing
15.02.2012
Home »  HPC  »  Articles  » 
– the Argonne Leadership Computing Facility (ALCF) and the National Energy Research Scientific Computing Center (NERSC) – with, according to the report, "multiple 10s of teraflops and multiple petabytes
25%
DNS name resolution with HTTPS
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by saeed karimi on Unsplash
the question of trusting or mistrusting your own Internet provider; associations that provide protection against censorship [1] or offer data protection [2]; or large DNS providers such as Cloudflare [3], Google
25%
IBM offers a sensational $34 billion for Red Hat
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
 
. As Oracle's main competitor in the database market in the 1990s, it now ranks 26th, and falling, among database engines under IBM's auspices. Lotus Notes, purchased in 1996 for $4 billion has been starving
25%
Port Knocking
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © rasslava, 123RF.com
to its GPRS and 3G customers, this approach opened up our servers to many more IP addresses than in our old system, with its 10 or 20 authorized IP addresses at the company offices and at the homes
25%
Next-generation terminal UI tools
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Lucy Baldwin, 123RF.com
of terminal user interface (TUI) libraries, including Ncurses [3] and Newt [4]. Jeff Layton has previously graced these pages with a tutorial on how TUI tools are developed today [5], and yours truly followed

« Previous 1 ... 82 83 84 85 86 87 88 89 90 91 92 93 94 95 ... 134 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice