Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1067)
  • Article (329)
  • News (245)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 93 94 95 96 97 98 99 100 101 102 103 104 105 106 ... 165 Next »

12%
Red Hat PaaS hyperconverged storage
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Oleksandr Omelchenko, 123RF.com
": "glusterfs-cluster" 06 }, 07 "subsets": [ 08 { 09 "addresses": [ 10 { 11 "ip": "192,168,121,101" 12 } 13 ], 14 "ports
12%
Planned Obsolescence Needs to be Obsolete
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
 
out the window for tech that I'll have to replace in 12 to 18 months. And now we're told that certain vendors slow down tech that is only slightly out of date. That's taking planned obsolescence a bit
12%
Into the Cloud for Security
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Tomasz Pacyna, 123RF.com
to sleep at night knowing that your network is vulnerable, unwatched for at least 12 hours a day, and probably compromised so badly and so stealthily that you won't be able to find that you've been
12%
The Dilemma of the Ten-Second Commute
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Larry Ewing (lewing@isc.tamu.edu) and The GIMP; Tux added protection by Maria
it that problematic. Yes, we spent a lot of time working. Rather than a typical eight to nine hours per day, we logged somewhere between 10 and 12 hours. We were also on call, and once the layoffs started in October
12%
Security is Everyone's Problem
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Rancz Andrei, 123RF.com
that the opposite is true. It's a little better than leaving the doors and windows unlocked but, in reality, not that much better. We assume that our 12-character complex passwords protect us, but they don't. Sure
12%
IMAP 4 protocol extensions
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Christian Draghici, 123RF.com
have been read   a002 OK [READ-WRITE] SELECT completed Client may make changes to mail a003 fetch 12 full   Client requests information about message 12
12%
Co-Design Approach to Supercomputing
12.01.2012
Home »  HPC  »  Articles  » 
and architecture are available at http://www.lbl.gov/cs/html/greenflash.html, and you can read the complete research paper online at http://james.agu.org/index.php/JAMES/article/view/v3n12/v3n12HTML.
12%
The History of Cluster HPC
15.02.2012
Home »  HPC  »  Articles  » 
by multicore systems. Results for a 12-core (dual socket with six-core processors) server can be found here. These tests, which used a variety of numerical benchmarks, resulted in a range from 41% to 98
12%
Unprecedented built-in support for diverse languages
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © Yang MingQi, 123RF.com
11). Then, add the Spanish equivalents for the title and body field (Figure 12.) Figure 11: Content editing Translate tab
12%
Centralized monitoring and intrusion detection
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by Stoochi Lam on Unsplash
and anomalies and offers alerting functions. The Security Onion web interface uses standardized tools to display content, primarily relying on Kibana [12] and Grafana [13]. Kibana displays the incoming data

« Previous 1 ... 93 94 95 96 97 98 99 100 101 102 103 104 105 106 ... 165 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice