Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (995)
  • Article (277)
  • News (260)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 138 139 140 141 142 143 144 145 146 147 148 149 150 151 ... 154 Next »

11%
Run TensorFlow models on edge devices
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © leeavison, 123RF.com
Converter. The simplest form of post-training quantization quantizes only the weights from floating-point to 8 bits of precision, which is also called "hybrid" quantization: converter.optimizations = [tf
11%
Managing Bufferbloat
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Eric Issel, 123RF.com
of the problems facing road networks is congestion. If too many cars try to use the road at once, unpredictable things happen (e.g., cars can run off the road or just break down. On the Internet, this is called
11%
Monitoring network traffic with ntopng
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
address calls up a detailed view of the system in question. As in the settings for an interface, the icon with the warning sign lets you define thresholds for generating alerts and, of course, retrieve
11%
Jenkins Configuration as Code
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Amri Wolfgang, 123RF.com
(domain-specific language), so you have to mix YAML and Groovy within a YAML file. Listing 6 shows a YAML script with a jobs section that creates a so-called seed job that is used later to deploy other jobs
11%
Samba pitfalls in daily operation
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © lightwise, 123RF.com
_USER (1) root@fs-01:~# wbinfo -i test-u1 failed to call wbcGetpwnam: WBC_ERR_DOMAIN_NOT_FOUND Could not get info for user test-u1 root@fs-01:~# getent passwd test-u1 _ Unfortunately, this error
11%
GitLab for DevOps teams
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © maroti, 123RF.com
, such as buffer overflows or insecure function calls. Dynamic Application Security Testing (DAST) tests against a running application or against the Review Apps collaboration tool [14]. These tests start with each
11%
Implementing custom security frameworks with Bro
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Yuri Arcurs, fotolia.com
source tools for data collection and presentation is the so-called "ELK" stack, which comprises: Elasticsearch: Enables sophisticated searches of large amounts of volatile data. Logstash: Collects
11%
NVDIMM and the Linux kernel
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Denis Dryashkin, 123RF.com
. A dmesg command shows free areas (Listing 1). Areas marked usable can be used by the NVDIMM driver. The last line shows an area of 50GiB usable . Calling memmap=16G!4G Listing 1 Showing Memory
11%
NFS and CIFS shares for VMs with OpenStack Manila
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Steve Everts, 123RF.com
(SDN). OpenStack provides its own component called Neutron that takes care of all aspects of SDN. Typical OpenStack clouds strictly separate the private networks of individual customers – based
11%
Focusing on security in Active Directory
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Lead Image © Mykola Velychko, Fotolia.com
of the network or carry out further attacks. This spying is also called reconnaissance, or recon. Locating administrator accounts in the network is an important step in this process. By using a pass-the-hash (Pt

« Previous 1 ... 138 139 140 141 142 143 144 145 146 147 148 149 150 151 ... 154 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice