Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (222)
  • Article (70)
  • News (43)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 34 Next »

24%
Hadoop Market Will Grow to $50 Billion by 2020
11.03.2014
Home »  HPC  »  News  » 
 
industry by 2020. The global Hadoop market was valued at $1.5 Billion in 2012. The report divides the global Hadoop market into software, hardware, and services. Although all parts of the market are slated
24%
Red Hat Announces Commercial OpenShift PaaS
11.06.2013
Home »  News  » 
 
tool, and it released as an open source project in May 2012. The idea behind PaaS solution such as OpenShift is that the developer just writes the code and the vendor (in this case, Red Hat) provides
24%
Microsoft Announces "BlueHat" Prize for Better Security Solutions
05.08.2011
Home »  News  » 
 
technology designed to prevent the exploitation of memory safety vulnerabilities.The deadline for entries is April 1st 2012. More information can be found on the web page http://www.microsoft.com/security/bluehatprize.
24%
Dealing with VHDX files
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Alina Pavlova, 123RF.com
files can be destroyed very quickly when the host system encounters problems – but not so with VHDX files. If you use Windows Server 2012, you normally create VHD files as an iSCSI target; Windows Server
24%
Wireshark
27.11.2011
Home »  Articles  » 
 
needs direct access to the hardware and thus typically runs with root privileges. The exceptions are Mac OS X and Solaris, where the user only needs access privileges for the network interface card device
24%
Use Linux Containers with WSL2 on Windows
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Muneeb Syed on Unsplash
After installing WSL for container operation, you should always check for and install any Windows updates to be on the safe side. To use the new WSL2 version, the WSL2 Linux kernel update package for x64
24%
Server virtualization with Citrix XenServer
04.08.2011
Home »  CloudAge  »  Articles  » 
 
virtualized guest systems use the advanced features of modern x86 CPUs (Intel's VT-x or AMD-V). Paravirtualization works without these processor capabilities but does involve modifying the guest system itself
24%
Linux Essentials for Windows Admins – Part 2
06.08.2012
Home »  Articles  » 
 
2 khess khess 4096 2012-07-03 15:59 Desktop drwxr-xr-x 2 khess khess 4096 2012-07-03 15:58 Documents -rw-r--r-- 1 root root 0 2012-07-07 15:04 goo.txt -rw-r--r-- 1 khess khess 49 2012
23%
Cloud protection with Windows Azure Backup
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Oleksiy-Mark, 123RF.com
in the dashboard. Separate agents are available for integration with DPM and Windows Server Backup. If you want to set up Windows Azure Backup in other editions of Windows Server 2008 or Windows Server 2012/2012 R2
23%
Critical Linux Kernel Bug Discovered
20.01.2016
Home »  News  » 
 
Security researchers at Perception Point Software have identified a 0-day privilege escalation vulnerability in the Linux kernel. According to the report, the problem has existed since 2012

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 13 14 15 16 ... 34 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice