Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1263)
  • News (419)
  • Article (310)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 ... 200 Next »

22%
Cray Announces Shasta
21.08.2019
Home »  HPC  »  News  » 
 
platform, which was developed through Cray’s work on exascale systems for the US government, integrates HPC batch workflow scheduling with containerized services, supporting multitenancy and providing a rich ... New software platform will provide support for exascale computing.
22%
Symantec Code Exposed
19.01.2012
Home »  News  » 
 
** See update to this story ** According to a report issued by Reuters, Symantec Corp. said hackers had exposed source code for two of its security products, potentially providing some insight ... Stolen code could provide insight into Symantec technology.
22%
Linux Foundation Forms High Performance Software Foundation
16.05.2024
Home »  News  » 
 
,” the announcement states. Initial open source projects in the foundation include: Apptainer: Formerly known as Singularity, Apptainer is a Linux Foundation project providing a full-featured HPC and computing ... The foundation will provide a neutral home for key HPC projects.
22%
HP Expands Security Offerings
13.09.2012
Home »  News  » 
 
Security Information and Event Management (SIEM) product powered by the breakthrough Correlation Optimized Retention and Retrieval Engine (CORR-Engine). Reputation Security Monitor – provides HP Arc ... New tools provide risk management and security testing.
22%
Forensic Tools
04.02.2014
Home »  Articles  » 
 
Criminals often focus on browsers for various attacks because they are a worthwhile, attractive, and often easy target. However, admins can investigate such attacks with forensic tools that provide ... for restricting the relevant data. Additionally, the forensics tools need to provide a way to combine data, thereby allowing processes to be reproduced and relationships between different data sources identified ... Criminals often focus on browsers for various attacks because they are a worthwhile, attractive, and often easy target. However, admins can investigate such attacks with forensic tools that provide
22%
MySQL as a Service
21.12.2012
Home »  CloudAge  »  Articles  » 
 
If you need a hosted solution that provides all the features of MySQL, a MySQL-as-a-service product might be the database option you’re looking for. ... SQL as a Service – because if you’re looking for a hosted product that provides you with all the features of MySQL, it isn’t necessarily going to be running MySQL on the back end, as you saw with Xeround. Because I ... If you need a hosted solution that provides all the features of MySQL, a MySQL-as-a-service product might be the database option you’re looking for.
22%
Achieving More Harmonious Cloud Orchestration
01.04.2014
Home »  Articles  » 
Cloud computing is forcing admins to rethink automation because classic tools like Puppet do not provide a sufficient range of configuration options. Cloudify offers a new direction ... bootstrapping of its own local cloud, which does not require access to a public cloud provider and thus imposes very few requirements. The Cloudify tarball is a heavyweight at 160MB, but the user initially only ... Cloud computing is forcing admins to rethink automation because classic tools like Puppet do not provide a sufficient range of configuration options. Cloudify offers a new direction
22%
IPRoute2: arp, route, and ifconfig in a Single Tool
06.08.2013
Home »  Articles  » 
 
Traditional administration command-line tools such as ifconfig, route, and arp are almost as old as TCP/IP itself. We provide an overview of how the IPRoute2 toolkit now unifies the management ... for the individual tools are located in /etc/iproute2 and contain some values that are required only in advanced scenarios. Most of the programs provided by IPRoute2 have a special task, and all of them play ... Traditional administration command-line tools such as ifconfig, route, and arp are almost as old as TCP/IP itself. We provide an overview of how the IPRoute2 toolkit now unifies the management
22%
Remora – Resource Monitoring for Users
08.12.2020
Home »  HPC  »  Articles  » 
Remora provides per-node and per-job resource utilization data that can be used to understand how an application performs on the system through a combination of profiling and system monitoring. ... Remora. REMORA: REsource MOnitoring for Remote Applications, from the University of Texas Advanced Computing Center (TACC), combines monitoring and profiling to provide information about your application ... Remora provides per-node and per-job resource utilization data that can be used to understand how an application performs on the system through a combination of profiling and system monitoring.
22%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
Making your systems really secure can be a bit more complicated than resorting to the use of regular passwords. In this article, we provide an overview of authentication solutions and present ... be used, whereas smart cards require an additional card reader. One-time password generators (OTP tokens) provide an alternative to certificates. OTPs are available in various form factors: hardware ... Making your systems really secure can be a bit more complicated than resorting to the use of regular passwords. In this article, we provide an overview of authentication solutions and present

« Previous 1 2 3 4 5 6 7 8 9 10 ... 200 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice