Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1339)
  • Article (364)
  • News (273)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 192 193 194 195 196 197 198 199

8%
Vector databases for data-driven artificial intelligence
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © sdecoret, 123RF.com
and that seamlessly scales to billions of data objects. Pinecone [2] is specially developed for ML applications. It is fast and scalable and supports a variety of ML algorithms. Pinecone is based on Faiss, a library
8%
Secure status and event monitoring of tier 0 systems
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Brian Jackson, 123RF.com
– whether to obtain additional information about the system status or react to a status that has been identified as faulty. This approach is the one taken by PRTG Network Monitor [2] by Paessler, for example
8%
Privacy Policy
24.05.2018
Home »  HPC  » 
 
how to exercise your options in this regard. 2. General information and mandatory information Data protection The operators of this website take the protection of your personal data very seriously
8%
Privacy Policy
24.05.2018
Home » 
 
how to exercise your options in this regard. 2. General information and mandatory information Data protection The operators of this website take the protection of your personal data very seriously
8%
Vulnerability assessment best practices for enterprises
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Fancycrave on Unsplash
's security status. Therefore, scanning needs to be conducted regularly because new vulnerabilities can emerge or system configuration changes can introduce new security holes. (2) They can only report

« Previous 1 ... 192 193 194 195 196 197 198 199

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice