Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (568)
  • Article (187)
  • News (99)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 21 22 23 24 25 26 27 28 29 30 31 32 33 34 ... 86 Next »

26%
Data loss prevention with Microsoft Purview
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Antonio Guillem Fernandez, 123RF.com
/11 and macOS, and local file shares are available for selection. Note that some locations are monitored directly after selection, but others have requirements that need to be met first. For example, monitoring
26%
Synchronize passwords in KeePass
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
credentials, including notes, links, and other information you need for access. To use this information, you only need the password for the password safe itself, making it far easier to manage passwords
26%
Active Directory management with NetTools
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Hush Naidoo Jade Photography on Unsplash
then shows the differences between the two user objects in tabular form. This view contains a column header at the top. Worth noting is the column with the asterisk (* ) header (Figure 1) that shows
26%
Automating development environments and deployment with Otto
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © baloncici, 123RF.com
.1.2 contained only a small portion of the intended functionality. On a brighter note, Otto handled the functions that are implemented perfectly in our lab – with one minor exception. Instant Web Hashi
26%
Encrypted backup with Duplicity
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Boing, Photocase.com
(scp) to store the results on the server at example.com below a directory named /var/backup (Figure 1). Note the double slashes after the domain name: duplicity --progress /etc scp
26%
Building a low-powered NAS
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © vesuv, photocase.com
on the amount of data you want to house and the number of users that will be using it. Also note that Rockstor requires about 8GB for installation. Again, remember that Rockstor will take over this entire
26%
Run TensorFlow models on edge devices
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © leeavison, 123RF.com
and preprocessing tasks on lab computers with pandas [2] or NumPy [3] libraries, before using TensorFlow to design and train a deep learning model. Note that the training phase can be offloaded to a GPU in the cloud
26%
High-performance Python – compiled code and C interface
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Konrad Bak, 123RF.com
nogil=true. Consequently, Numba will release the GIL when entering a compiled function. Note that you can't use nogil when you are in object mode. A third argument that can be used with the @jit
26%
Docker image security analysis
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Rodolfo Sanches Carvalho on Unsplash
build time so as not to fall foul of nasty container image content. You'll find much more advice, so I'd recommend you watch the video and note some of the attack vectors when it comes to container images
26%
Persistent volumes for Docker containers
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by Alexander Redl on Unsplash
to Docker, you should note one important point in this scenario: Because the available memory is usually managed by OpenStack, but Docker runs in a VM, it cannot directly access the Cinder memory, so

« Previous 1 ... 21 22 23 24 25 26 27 28 29 30 31 32 33 34 ... 86 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice