Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: card binnie ?

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (16)
Keywords

« Previous 1 2

49%
How vector databases work and when they're used
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © neyro2008, 123rf.com
their trump card by providing better and more accurate results at a lower cost in advanced AI applications. Infos Qdrant: https://qdrant.tech Vector search: https
49%
Monitor applications end to end
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Adam Winger on Unsplash
all possible actions and functions of an application. For example, you have to wait until a user pays by credit card if you want to cover potential performance problems with the payment service provider
49%
A feature-rich drop-in-replacement for Microsoft Exchange
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Photo by cdd20 on Unsplash
standard open protocols – from IMAP to POP (mail) and from CalDAV (calendars) to CardDAV (contacts). Your client of choice will be Mozilla Thunderbird or KDE's Kontact, whose protocols will work fine
49%
Networking strategies for Linux on Azure
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image ©pakhnyushchyy, 123RF.com
the necessary ports (e.g., 80 and 443) and block all other traffic. NSGs can be applied at both the subnet and network interface card (NIC) level. Applying NSGs at the subnet level is generally more efficient
49%
Storage across the network with iSCSI and Synology DiskStation Manager
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Vladimir Nenov, 123RF.com
SCSI naturally inherits the flaws of TCP/IP, you can enhance the transmission capacity by adding additional network interface cards (NICs). My Favorite Recipe For an example of iSCSI in the real world, I
49%
Sovereign Cloud Stack – a genuine alternative for Europe
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © solerf, 123RF.com
for graphics cards, special CPU types, and special hypervisors, as well. SCS also defines the virtual properties of the CPU and memory, which means that if they have a flavor with a V type CPU, the user can

« Previous 1 2

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice