Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (528)
  • Article (170)
  • News (53)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 76 Next »

10%
Build and host Docker images
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Lead Image © Sebastian Duda, 123RF.com
. The following example assumes a system with Ubuntu 22.04. To begin, you need to install some required software management packages (Listing 1, line 1); download the GPG key used to sign Docker's package lists
10%
Freeing your data from ransomware
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Fernando Gregory, 123RF.com
generated SHA1, the master key and payment key are generated using a proprietary algorithm and SHA256 and written to the key.dat file. Each key has a length of 32 bytes (256 bits). Encryption
10%
The end of SHA-1
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © destinacigdem, 123RF.com
in 2001, and the hash algorithms belonging to this family have a far longer checksum than SHA-1 – 256 bits (SHA-256) or 512 bits (SHA-512). In 2011, NIST even officially classified the SHA-1 algorithm
10%
Profiling Python code
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image ©-Yong Hian Lim, Fotolia.com
[k,i] = force[k,i] - rij[k] * np.sin(2.0 * d2) / d 256| 0| 0| 0| 0.00%| # end for 257| 0| 0| 0| 0.00%| # end if 258
10%
Space – The Final Frontier
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
of "I remember my first disk was only 30MB and it cost $200" comes flying over the bow, and someone returns fire with "Our first server had two mirrored 90MB disks for a company of 100 people." And
10%
Digital signatures in package management
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Igor Stevanovic, 123RF.com
Armed with a checksum, users can determine whether a package has passed through the Internet without error. The MD5, SHA1, and SHA256 hash methods are popular ways to calculate a checksum for a package
10%
Keras: Getting Started with AI
03.12.2024
Home »  HPC  »  Articles  » 
, MaxPooling 2D : model.add(layers.BatchNormalization()) model.add(layers.MaxPooling2D(pool_size=(2,2))) A max pooling layer has a pool size, 2x2 in this case, that is used to scan the entire input image (left
10%
Getting started with AI
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © Lightwise, 123RF.com
this second 2D convolution layer, you have another batch normalization layer followed by a new layer type, MaxPooling2D: model.add(layers.BatchNormalization()) model.add(layers.MaxPooling2D(pool_size=(2,2
10%
Monitoring Storage with iostat
25.02.2013
Home »  HPC  »  Articles  » 
/s r/s w/s rMB/s wMB/s avgrq-sz avgqu-sz await r_await w_await svctm %util md1 0.00 0.00 0.04 0.05 0.00 0.00 8.17 0.00 0.00 0.00 0.00 0
10%
A watchdog for every modern *ix server
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Sudhith Xavier on Unsplash
up a container machine running Monit. Listing 1 [2] creates the Ubuntu 22.04 LTS base image used to create further images for the test container machines. To generate the base image, go to your

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 32 33 34 35 ... 76 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice