Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1076)
  • News (230)
  • Article (226)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 87 88 89 90 91 92 93 94 95 96 97 98 99 100 ... 154 Next »

13%
Endpoint Security for Windows 10
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © Galina Peshkova, 123RF.com
features: virus and threat protection. Device performance and health: information about device drivers and Windows update states, as well as battery status on mobile devices. Firewall and network
13%
Zulip, Mattermost, and Rocket.Chat
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © rll, fotolia.com
? Unlike earlier platforms such as the Internet Relay Chat (IRC) protocol or Network News Transfer Protocol (NNTP), modern chat groupware software no longer relies on proprietary binary protocols. All
13%
Bare metal lifecycle management with six open source tools
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Beth Macdonald on Unsplash
Configuration Protocol (DHCP), and Trivial File Transfer Protocol (TFTP) – assuming the network configuration allows you to do so. Organizations that deal with large numbers of servers instead need a largely
13%
Maintaining Android in the enterprise
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Iaroslav Neliubov, 123RF.com
to the quest for better enterprise security. A main concern for many admins is the flood of insecure personal devices that are now used to check email, update calendars, and even access the home network through
13%
Group policies on Windows Server 2022
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Jack Carter on Unsplash
, accusing fingers will point at the administrator, who should always try to configure the network to the best of their ability. Administrators will not want to implement a weak configuration
13%
HPC Data Analytics
08.08.2014
Home »  HPC  »  Articles  » 
graph data structures [http://www.bioconductor.org/packages/devel/bioc/html/graph.html] neuralnet [18] Training neural networks [http
13%
Singularity – A Container for HPC
21.04.2016
Home »  HPC  »  Articles  » 
to as “hardware-level virtualization.” In hardware-level virtualization, each VM comprises an OS, libraries, and applications isolated from all others by its own complete OS, kernel, networking, users
13%
Workflow-based data analysis with KNIME
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Andrea De Martin, 123RF.com
to the integration of the latest machine learning algorithms, starting with support vector machines and simple neural networks. Today, KNIME has also mastered newer methods, such as random forests and deep learning
13%
Tool your HPC systems for data analytics
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Sergey Nivens, 123RF.com
://www.bioconductor.org/packages/devel/bioc/html/graph.html neuralnet [18] Training neural networks http://cran.r-project.org/web/packages/neuralnet/ Python is becoming one of the most popular programming languages. The language is well
13%
Software-defined storage with LizardFS
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © larisa13, 123RF.com
on the LAN can mount any share. If you want to restrict access, you can only design read-only individual shares, or define access control lists (ACLs) on the basis of the network segment, IPs, or both. You can

« Previous 1 ... 87 88 89 90 91 92 93 94 95 96 97 98 99 100 ... 154 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice