Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (898)
  • Article (272)
  • News (38)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 92 93 94 95 96 97 98 99 100 101 102 103 104 105 ... 122 Next »

16%
Detect failures and ensure high availability
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Tim Foster on Unsplash
in Listing 4. Listing 3 Sync Progress §§nonuber Every 1.0s: cat /proc/drbd ubu22042-2: Sat Apr 8 16
16%
Administering virtual machines with PowerShell Direct
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © liu liming, 123RF.com
can manage the whole deployment and hardware configuration with PowerShell commands. For instance, you can create a new machine with the command: > new-vm -Name win8 -MemoryStartupBytes 512MB -Boot
16%
Supporting WebRTC in the enterprise
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © pat138241, 123RF.com
RTC is made up of separate IETF and W3C standards, currently in Candidate Recommendation status, with each covering a different aspect of setting up a peer-to-peer connection. The essential parts include
16%
Safe Files
16.04.2015
Home »  HPC  »  Articles  » 
-encrypted hard drives (SEDs). However, not everyone is using encryption. Recent revelations about accessing the data of individuals includes the story about how the NSA and Britain’s Government Communications
16%
Fathoming the cloud
28.06.2011
Home »  CloudAge  »  Articles  » 
 
extensively covered by the CSA in Domain 6 "Portability an Interoperability" [5] of their Security Guidance for Critical Areas of Focus in Cloud Computing. Security as a Service (SecaaS) SecaaS is by far
16%
Magellan Report on Cloud Computing
15.02.2012
Home »  HPC  »  Articles  » 
– the Argonne Leadership Computing Facility (ALCF) and the National Energy Research Scientific Computing Center (NERSC) – with, according to the report, "multiple 10s of teraflops and multiple petabytes
16%
Comparison of forensic toolkits for reconstructing browser sessions
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © stockbksts, 123RF.com
\AppData\Local\Microsoft\Windows\TemporaryInternetFiles\Low\Content.IE5\S6OU8I07\view-upsell[1].html, which is the Amazon shopping cart. Figure 1: Results
16%
Docker and Podman environments on Windows and Mac machines
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bowie15 , 123RF.com
.14, although you can still resort to Docker Machine [3] in this case, which creates a virtual Linux system on the local host that you can then use to access the Docker engine. The example in Figure 1 uses
16%
Securing email communication with GnuPG
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Amol Tyagi on Unsplash_Key.jpg
for different security requirements: GnuPG Desktop [3] and Gpg4win [4] are user-friendly desktop versions. GnuPG VS-Desktop [5] is available for particularly secure use in government agencies and companies
16%
Processing the new sudo logging format
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Kelly Sikkema on Unsplash
to a file: { "accept": { "server_time": { "seconds": 1716370731, "nanoseconds": 137298080, "iso8601": "20240522093851Z", "localtime": "May 22 09

« Previous 1 ... 92 93 94 95 96 97 98 99 100 101 102 103 104 105 ... 122 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice