Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: Internet case situation 2 hand(711bmw.com)Internet case situation 2 hand(711bmw.com)w0s ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (465)
  • Article (88)
  • News (3)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 56 Next »

6%
Installing applications in OpenStack with Murano
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © stylephotographs, 123RF.com
] command-line tool. Provided there is a connection to the Internet, of course, the necessary Glance images [8] also end up where they belong (Figure 2
6%
Recovering from a cyberattack in a hybrid environment
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Kelly Sikkema on Unsplash
be derived), the sAMAccountName, the UPN, and even the complex attribute OnPremisesExtensionAttributes, which contains ExtensionAttribute ranging from x =1 to 15 . On the other hand, you will see fewer
6%
New versions of the Endian and Sophos UTM solutions
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Dmitriy Cherevko, 123RF.com
 –  – UTM 220  – FullGuard Bundle  – US$ 2,870 Endian 3.0 Endian released the new version of its firewall in January. The version jump from 2.5.2 to 3.0 already shows
6%
Keeping Docker containers safe
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Irina Tischenko, 123RF.com
://en.wikipedia.org/wiki/Principle_of_least_privilege Docker user guide: http://docs.oracle.com/cd/E52668_01/E75728/html/section_rdz_hmw_2q.html Jenkins: https://jenkins.io Privilege separation: https
6%
Manage Windows images with the Windows ADK
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Maksym Yemelyanov, 123RF.com
/windows/forum/all/windows-performance-recorder-wont-start-recording/958c45c9-dd4f-4ba2-bbe2-b90ba0b01e56 Assessment Platform command-line options: https://learn.microsoft.com/en-us/windows-hardware/test/assessments/assessment-platform-command-line-syntax Windows ... Tools at Hand
6%
Managing GPT-4 on the Network
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by Cécile Brasseur on Unsplash
when interacting with the AI, this is equivalent to transferring the data to the Internet and releasing the data to the AI, which then learns by processing the information. In a worst case scenario
6%
How vector databases work and when they're used
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © neyro2008, 123rf.com
.1, -0.2, 0.91, 0.7, -0.21, 0.1 -0.7, 0.4] This numerical expression contains the coordinates of the words in a multidimensional space. When a sentence, an image, or a video is converted into a vector
6%
Supporting WebRTC in the enterprise
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © pat138241, 123RF.com
MTR can help you establish which router hop is causing packet loss (e.g., hop 2, in this case). Of course, the problem could be at either end of the connection – in the sending browser's upload
6%
Security and automation with SBOMs
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Tjefferson, Fotolia.com
Heartbleed in 2014, a vulnerability in OpenSSL, and Log4j in 2021. In both cases, innumerable systems were affected. Back in May 2021, the United States introduced an obligation to provide a software bill
6%
How to back up in the cloud
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Sgursozlu, Fotolia.com
would be just the bare bones; the data would be missing. Persistent Data As is often the case in a cloud context, it is essential to distinguish between two types of data. On the one hand, the cloud

« Previous 1 ... 24 25 26 27 28 29 30 31 32 33 34 35 36 37 ... 56 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice