Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (62)
  • Article (9)
  • News (4)
Keywords

« Previous 1 2 3 4 5 6 7 8 Next »

93%
Compressed Archives for User Projects
11.08.2025
Home »  Articles  » 
will use that in a bit. Listing 1: Check Directory Content $ ls -lstar total 62310 31150 drwxrwxr-x  0 laytonjb laytonjb 31897275 Dec 31  1969 DATA1 31152 -rw-rw-r--  1 laytonjb laytonjb 31897275 Aug  2
93%
Getting your virtual machine dimensions right
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by ROCCO STOPPOLONI on Unsplash
have 26 cores or 52 hyperthreads per NUMA node for the VM. Figure 2 shows a four-socket server with 28 cores per socket and 6TB of RAM. Figure 2: A four
93%
How vector databases work and when they're used
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © neyro2008, 123rf.com
.1, -0.2, 0.91, 0.7, -0.21, 0.1 -0.7, 0.4] This numerical expression contains the coordinates of the words in a multidimensional space. When a sentence, an image, or a video is converted into a vector
92%
Purdue Model for industrial networking
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © James Thew, Fotolia.com
represents different aspects and functions within an industrial network. Levels 0, 1, and 2 relate to direct production control. Level 0 includes sensors and actuators that interact directly with the physical
92%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
Advanced Threat Protection (ATP) portal [2], which is the place to go for in-depth information on potential attacks and to pick up scripts or code snippets that simulate attacks, and determine the effects
92%
Application-aware batch scheduler
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Toby Elliott on Unsplash
, so kube-scheduler excludes those nodes. (2) It ranks the remaining nodes according to several criteria (e.g., the node that has the most available capacity) and binds the pod to the highest scoring
92%
HPCCM with Docker and Podman
09.09.2024
Home »  HPC  »  Articles  » 
to be a good start toward creating a development environment. dev2  – Add Compilers The container image just built is ready for adding compilers or whatever tools you need to develop applications. You have
92%
El Capitan Heads the Latest TOP500 Supercomputer List
02.12.2024
Home »  News  » 
 
moved to the No. 2 and No. 3 spots, respectively. Here are the top five systems: El Capitan (Lawrence Livermore National Laboratory in California) – The HPE Cray EX255a system has 11
92%
AI/ML Tool Usage Increased 3000% in 2024, Says Zscaler Report
27.03.2025
Home »  News  » 
 
. ChatGPT accounted for nearly half (45.2%) of all AI/ML transactions. A total of 3624TB of data was transferred by AI/ML applications. The top five countries generating the most AI/ML transactions
92%
Post-Quantum Cryptography with TutaCrypt
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Lead Image © pitinan, 123RF.com
cryptography (ECC). For symmetric encryption techniques such as AES, the quantum algorithm known as Grover's algorithm [2] halves the effective key length, thus requiring longer keys to maintain security

« Previous 1 2 3 4 5 6 7 8 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice