Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (272)
  • Article (10)
  • News (10)
Keywords

« Previous 1 ... 20 21 22 23 24 25 26 27 28 29 30 Next »

17%
Introduction to behavior-driven monitoring
30.11.2025
Home »  Archive  »  2011  »  Issue 3: Are yo...  » 
Mariya Herasymenko, 123RF
: Then I should see "What's new in your network" The But keyword is very similar to And but defines exclusion criteria: But I should not see "Join XING for free" Listing 3 shows a feature for checking
17%
Flexible user authentication with PAM
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Ana Vasileva, Fotolia.com
for the application. PAM can use various authentication methods. Besides popular network-based methods like LDAP, NIS, or Winbind, PAM can use more recent libraries to access a variety of hardware devices, thus
17%
High-availability workshop: GFS with DRBD and Pacemaker
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Maxim Borovkov, 123RF.com
access to all storage media within a storage network. They have their own mechanisms for avoiding concurrent writes and thus do not rely on DRBD protection. For GFS or OCFS2 to work on DRBD resources, DRBD
17%
Protecting web servers with ModSecurity
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© KrishnaKumar Sivaraman, 123RF.com
. Firewalls for the Web In contrast to legacy packet filters, Web Application Firewalls (WAFs) don't inspect data in the network or transport layer, but rather at the HTTP protocol level (i.e., in OSI Layer 7
17%
Designing a Secure Active Directory
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Samantha Sophia on Unsplash
Are Connected The eighth law of the Immutable Laws of Security Administration I mentioned earlier states that the more complex the network design, the more difficult it will be to defend. In terms of Active
17%
Web applications with Julia
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © sony sivanandan, 123RF.com
processors, which are factors that can improve responsiveness over the web. I discovered that Julia has excellent libraries for network communication, most critically for talking over WebSockets, which turned
17%
Kick-start your AI projects with Kubeflow
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © austler, 123RF.com
AWS account, it's time for the first real task. To access the Kubeflow instance to be built, Kubeflow needs to be accessible from the network. The deployment tools available for Kubeflow deployment
17%
Compressed Archives for User Projects
11.08.2025
Home »  Articles  » 
networks (CNNs); however, assume you’re doing something else with the images. A main directory cats_dogs_light  has two subdirectories, train  and test . The train  subdirectory has 1,000 images, and the
17%
Application-aware batch scheduler
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Toby Elliott on Unsplash
to succeed. Another example is the Kubeflow Training Operator, which is designed to work closely with the PyTorch library to train AI models – neural networks – on large datasets with multiple GPU
17%
Using Expect scripts to automate tasks
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Kheng Ho Toh, 123RF.com
the remote system has time to respond. You have to think about network delays, shell responses, and system timing when scripting in Expect. Like any scripting language, Expect has its quirks, but you'll find

« Previous 1 ... 20 21 22 23 24 25 26 27 28 29 30 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice