Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm 12 00 Llorente 13 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (68)
  • Article (27)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 3 4 5 6 7 8 9 10

13%
VAX emulation with OpenVMS
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Ole Houen, 123RF
rq2 ra92 08 set rq3 cdrom 09 10 attach rq0 d0.dsk 11 attach rq1 d1.dsk 12 attach rq2 d2.dsk 13 14 attach -r rq3 cdrom.iso 15 16 set rl disable 17 set ts disable 18 19 set xq mac=08-00-2B-AA-BB-CC 20
13%
Nine home clouds compared
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © inertia@intuitivmedia.net
businesses, FileCloud addresses business customers with 20 users or more. Both versions are packetized or available as archives for various Linux distributions, Mac OS X, and Windows. Tonido is also available
13%
Moving HPC to the Cloud
19.10.2012
Home »  HPC  »  Articles  » 
12-core AMD processors ranging in speed from 2.2 to 2.9GHz with 24 to 128GB of RAM per server and up to 1TB of scratch local storage per node. Getting applications running POD HPC clouds can be quite
13%
Manage software apps publicly and privately
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Akurhan, 123RF.com
{ "$schema" : "https://aka.ms/winget-packages.schema.2.0.json", "CreationDate" : "2024-03-05T03:41:14.411-00:00", "Sources" : [ { "Packages" : [ { "PackageIdentifier" : "Microsoft.VisualStudio.2022.Community
12%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the X.509 standard. These are typically stored on a hardware certificate storage

« Previous 1 ... 3 4 5 6 7 8 9 10

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice