Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 00s Llorente"478 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (909)
  • Article (318)
  • News (100)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 Next »

24%
The limits and opportunities of artificial intelligence
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © sebastien decoret, 123RF.com
and storage capacity. In contrast, comparatively little has happened in the core algorithms of AI. Deep learning and convolutional neural networks are still based on ideas from the 1980s and 1990s. The success
24%
Attacks on HTTPS Connections
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © almagami, 123RF.com
on the admissible certificates for certain domains, for example, the key used (public key) or the issuing CA(s). This information pins the original certificate to the domain, so to speak, which makes spoofing third
24%
Speed up Your Name Server with a MySQL Back End
23.07.2013
Home »  Articles  » 
 
be IP addresses to much more humanly digestible addresses. Thankfully, we no longer live in the early days of the Arpanet (precursor to today’s Internet), where we had to transfer large host files from
24%
OpenACC – Porting Code
07.03.2019
Home »  HPC  »  Articles  » 
relative to the data values. For example, if the difference between two numbers is 100.0, but you are working with values of 10^8, then the difference (0.001%) might not be important. It’s really up
24%
Resolving problems with DNS, Active Directory, and Group Policy
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Fernando Gregory, 123RF.com
hostnames for the microsoft.com zone. Next, an attempt is made to resolve the same server (dc02.microsoft.com ) using the default server of the nslookup command line (area 3). The default server can easily
24%
The AWS CDK for software-defined deployments
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © krisckam, 123RF.com
Kubernetes Service (AKS) [3], make it possible to provision immensely complex orchestration platforms and tools with point-and-click web interfaces or a simple command-line invocation. In this dimension, many
24%
Packaging Apps To Run on Any Linux Device
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Amawasri Naksakul, 123RF.com
runtime daemon as rkt [2] and the Open Container Initiative [3] take off. Since 2014, a major player in the Linux market has been touting a different type of container that is a real eye-opener. I'll take
24%
Create a high availability VM with  DRBD9  and Reactor
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Emma Simpson on Unsplash
to this component as Horrorsync. Corosync was later split up again. Whereas Corosync now primarily handles the exchange of data between the different systems in a cluster, Kronosnet [3] ensures that the information
24%
Data virtualization using JBoss and Teiid
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © J.R. Bale, 123RF.com
and run through the graphical installation process. You will find a detailed description of all the configuration options in the very comprehensive installation manual [3]. The installer automatically
24%
11 Tricks for Windows servers
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Kati Molin, Fotolia
-WindowsOptionalFeature -Online -FeatureName WindowsMediaPlayer 3. Configuring LDAP Priorities and Weighting Checking that the LDAP SRV entries are correct in the domain name system (DNS) can help you detect Active Directory (AD

« Previous 1 ... 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice