Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (358)
  • Article (109)
  • News (5)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 20 21 22 23 24 25 26 27 28 29 30 31 32 33 ... 48 Next »

18%
Managing access credentials
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Marcel Goldbach, photocase.com
PassXC database in various applications and services. In addition, KeePassXC pays attention to security. It stores all data with AES-256 encryption, which makes it virtually impossible for unauthorized third
18%
Manage software apps publicly and privately
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Akurhan, 123RF.com
msstore Search repo(s) for matching packages by nameLimit search to a particular package source list ls winget listwinget list - n 12winget list --upgrade-availablewinget list
18%
New features in jQuery 3
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Marc Dietrich, 123RF.com
Query team is now focused on further developing jQuery 3. However, the old versions 1.12 and 2.2 still receive bug fixes, so developers can address the migration in peace. Infos jQuery: https
18%
Modern Fortran – Part 2
15.12.2016
Home »  HPC  »  Articles  » 
are over i = 2,n − 1 and j = 2,n −1. Here is how you can write the iteration over the domain using array notation: a(2:n-1,2:n-1) = 0.25 * &     (a(1:n-2,2:n) + a(3:n,2:n) + a(2:n,1:n-2) + a(2:n,3:n
18%
We compare four popular NAS appliances
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Alejandro Mendoza, 123RF.com
  Model TS-251 DS-214 N5550 ReadyNAS RN31400 Manufacturer QNAP Inc. Synology Thecus Netgear Operating System QTS 4.1.1 (Linux 3.12
18%
Migrating CentOS to Rocky Linux with migrate2rocky
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Ray Hennessy on Unsplash
distributions based on RHEL 8, the migration process is fairly simple. The first step is to make sure you have enough space on your partitions: 250MB on /usr , 1.5GB on /var , and 50MB on /boot . Failure
18%
Web Cryptography API
26.11.2013
Home »  Articles  » 
(text) { 11 polycrypt.importKey("raw", hex2bin(encRawKey)).oncomplete = function(e) { 12 var key = e.target.result; 13 polycrypt.encrypt(encAlg, key, str2bin(text)).oncomplete = function(e) { 14 var
18%
Thread processing in Python
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Christos Georghiou, 123RF.com
= sol.copy() 10 11 for j in range(0,ny-1): 12 sol[0,j] = 10.0 13 sol[nx-1,j] = 1.0 14 # end for 15 16 for i in range(0,nx-1): 17 sol[i,0] = 0.0 18 sol[i,ny-1] = 0.0 19 # end for 20 21 # Iterate 22
18%
Keras: Getting Started with AI
03.12.2024
Home »  HPC  »  Articles  » 
, MaxPooling 2D : model.add(layers.BatchNormalization()) model.add(layers.MaxPooling2D(pool_size=(2,2))) A max pooling layer has a pool size, 2x2 in this case, that is used to scan the entire input image (left
18%
Getting started with Prometheus
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Clay LeConey on Unsplash
.53 node_cpu_seconds_total{cpu="0",mode="nice"} 187.19 node_cpu_seconds_total{cpu="0",mode="softirq"} 1029.12 node_cpu_seconds_total{cpu="0",mode="steal"} 0 node_cpu_seconds_total{cpu="0",mode="system"} 2991

« Previous 1 ... 20 21 22 23 24 25 26 27 28 29 30 31 32 33 ... 48 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice