Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6gbps Llorente"523 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (935)
  • Article (274)
  • News (114)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 118 119 120 121 122 123 124 125 126 127 128 129 130 131 ... 133 Next »

26%
Pandas: Data analysis with Python
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © yang chao, 123RF.com
by convention – but not necessarily – is imported using: import numpy as np Multidimensional matrices are created in a similar way, that is, with nested lists: np.array([[1, 2, 3], [4, 5, 6]]) If the content
26%
Cloud protection with Windows Azure Backup
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Oleksiy-Mark, 123RF.com
:\Program Files (x86)\Windows Kits\8.0\bin\x64 directory. You can create a certificate like this: makecert.exe -r -pe -nCN= -ssmy -sr localmachine-eku \ 1.3.6.1.5.5.7.3.2 -len 2048 -e01
26%
Managing Office 365 in PowerShell
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © sellingpix, 123RF.com
directly: Set-MsolUserLicense -UserPrincipalName "UPN" -AddLicenses "" For a detailed list of the options of Set-MsolUserLicense see the TechNet library [6]. Information on batch changing
26%
Programming with Node.js and JavaScript
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © lightwise 123rf.com
. The most popular is Express [6], which is used in most web applications and offers even more practical capabilities. An alternative would be Director from the Flatiron project, for example. Node Packages
26%
Documentation Tools for Admins
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Sorin Colac, 123RF.com
that employees authenticate before creating entries, making it clear later who posted an entry. Less computer-savvy users are supported by a WYSIWYG editor [6] or at least a help link for the wiki syntax
26%
Container Virtualization Comeback with Docker
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © ping han, 123RF.com
of Linux kernel version 2.6.24, and over the years, the kernel developers have significantly expanded the Cgroup functions. Besides the above-mentioned resource quotas, Cgroups can now also be prioritized
26%
OPNids: Suricata with built-in machine learning
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © sarah maher, 123RF.com
tap into those sinks and derive their sets of rules from them. This functionality is exactly what Suricata offers. If you throw a Lua sink [6] to the tool, it automatically adopts it, including
26%
The limits and opportunities of artificial intelligence
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © sebastien decoret, 123RF.com
pioneers of neural networks, expressed it in an interview as follows: "My view is throw it all away and start again" [6]. ADMIN: If the mood among scientists is fairly sober, then where did all this hype
26%
A self-healing VM system
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © THISSATAN KOTIRAT , 123RF.com
the same exit status conditions. Line 6 declares another check program, sync_all_node_5, that runs an Ansible playbook called sync_files.yml with webbox5 as the target. This program is run every 15 cycles
26%
How to back up in the cloud
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Sgursozlu, Fotolia.com
, you can also use a trick based on erasure coding: With a 5PB gross capacity, only 1.6PB are effectively available if you have enabled double redundancy in Ceph. In a backup, redundancy is theoretically

« Previous 1 ... 118 119 120 121 122 123 124 125 126 127 128 129 130 131 ... 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice