Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (27)
  • Article (2)
  • News (1)
Keywords

« Previous 1 2 3 Next »

29%
Getting started with AI
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © Lightwise, 123RF.com
with a 100 percent (1.0) probability in a specific class and a zero in all other classes. Neural networks generalize; they don't give you a 100 percent specific answer. However, if you look at all
29%
Getting your virtual machine dimensions right
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by ROCCO STOPPOLONI on Unsplash
increases. Figure 1 illustrates this for a two-socket system. Figure 1: A two-socket system (two NUMA nodes) showing local and remote RAM access from CPU0
28%
File Integrity Checks with AIDE
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © rudall30, 123RF.com
. Further details for each change follow this summary. If you automate the use of AIDE, you will definitely need to evaluate the program's return values. Like (virtually) any application, a return value of 0
28%
Practical SELinux
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Pavel Ignatov, 123RF.com
allow -R -M xguest_irc policy_module(xguest_irc,1.0.0) require { type xguest_t; } ## ##

a ## Allow xguest users to use IRC ##

##
gen_tunable(xguest_use_irc, true) tunable
28%
Automating repetitive tasks
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Greg Rakozy on Unsplash
desktop license provides access to process mining on desktops and 50MB of process mining data storage, which can be expanded to up to 100GB per tenant. Power Automate Premium also provides AI tools
28%
The RADOS object store and Ceph filesystem: Part 2
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Kateryna Pruchkovska, 123RF.com
? The first part of this workshop demonstrated how an additional node can be added to an existing cluster using ceph osd crush add 4 osd.4 1.0 pool=default host=daisy assuming that daisy is the hostname
28%
Open source ticket system
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Toa Heftiba on Unsplash
://github.com/RotherOSS/otobo-docker.git --branch rel-10_1 --single-branch cd otobo-docker The --branch rel-10_1 option indicates the version; versions 11 (--branch rel-11_0), 10.1 (--branch rel-10_1), and 10.0 (--branch rel-10_0) were available
28%
Pushing Raspberry Pi storage to its limit
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Lucy Baldwin, 123RF.com
, forcing filesystem sync to ignore caching effects. Random reads and random writes , run by the iozone [14] benchmark, iozone -e -I -a -s 100M -r 4k -i 0 -i 1 -i 2 [-f ] are 4K random I
28%
Identify malicious traffic with Maltrail
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © Andrea De Martin, 123RF.com
if 100 percent protection remains an illusion, organizations need to be proactive in the face of an increasingly stressful security landscape. Maltrail is a free tool that can be a useful addition in your
28%
Create a high availability VM with  DRBD9  and Reactor
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Emma Simpson on Unsplash
. Listing 1 DRBD Resource for VM # vi /etc/drbd.d/proxy.res resource proxy { device drbd0; disk /dev/drbd/proxy; meta-disk internal; on alice { address 10.42.0.100:7789; node-id 0

« Previous 1 2 3 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice