Articles

Lead Image © lassedesignen, Fotolia.com

Lead Image © lassedesignen, Fotolia.com

The TensorFlow AI framework

The TensorFlow symbolic math library can help you introduce artificial intelligence, deep learning, and neural networks into your projects.
Lead Image © braverabbit; 123RF.com

Lead Image © braverabbit; 123RF.com

An overview of the Citadel BBS

Citadel is a free, compact bulletin board system that integrates email, calendar, address book, and forum functions for administrators and hobbyists that need a groupware solution for a small organization.
Lead Image © victor zastolskiy, 123RF.com

Lead Image © victor zastolskiy, 123RF.com

Elephant Shed PostgreSQL appliance

The Elephant Shed PostgreSQL appliance bundles and integrates the components needed to manage a PostgreSQL server.
Photo by Kenney Badboy on Unsplash

Photo by Kenney Badboy on Unsplash

Microsoft PowerToys for Windows 10

This collection of free tools helps you customize Windows 10 for individual workflows.
Lead Image © Dietmar Hoepfl, 123RF.com

Lead Image © Dietmar Hoepfl, 123RF.com

Windows Admin Center for managing servers and clients

Windows Admin Center consolidates Windows Server admin tools into a browser-based remote management app for physical, virtual, and on-premises servers, although it does not yet fully replace Server Manager.
Lead Image © Ildar Galeev, 123RF.com

Lead Image © Ildar Galeev, 123RF.com

Network traffic utilities bandwhich and iftop

A close look at the network traffic on a server with the bandwhich and iftop utilities can reveal exactly why an application is behaving strangely.
Lead Image © Freya Sapphire, Photocase.com

Lead Image © Freya Sapphire, Photocase.com

Stressing security with PowerShell

PowerShell is not the usual go-to tool for pentesting, but it can reveal IT vulnerabilities that suggest a more considered use of the tool.
Lead Image © leeavison, 123RF.com

Lead Image © leeavison, 123RF.com

Run TensorFlow models on edge devices

TensorFlow Lite on a mobile device predicts harvest time for a real-world vertical farming operation.
Lead Image © Zachery Blanton, 123RF.com

Lead Image © Zachery Blanton, 123RF.com

Secure access to Kubernetes

Kubernetes comes with a sophisticated system for ensuring secure access by users and system components through an API. We look at the options for authentication, authorization, and access control.
Lead Image © Franck Boston, Fotolia.com

Lead Image © Franck Boston, Fotolia.com

Export and analyze Azure AD sign-in and audit logs

The relevant sign-in and audit logs in Azure Active Directory can be exported to external data sources to provide not only long-term archiving, but also the freedom to analyze the stored data.
Subscribe to our ADMIN Newsletters
Subscribe to our Linux Newsletters
Find Linux and Open Source Jobs



Support Our Work

ADMIN content is made possible with support from readers like you. Please consider contributing when you've found an article to be beneficial.

Learn More”>
	</a>

<hr>		    
			</div>
		    		</div>

		<div class=