Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede Llorente 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (397)
  • Article (97)
  • News (15)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 51 Next »

14%
Migrating CentOS to Rocky Linux with migrate2rocky
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Ray Hennessy on Unsplash
distributions based on RHEL 8, the migration process is fairly simple. The first step is to make sure you have enough space on your partitions: 250MB on /usr , 1.5GB on /var , and 50MB on /boot . Failure
14%
Processing streaming events with Apache Kafka
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Photo by Mark Decile on Unsplash
.getId().toString(), 10 payment); 11 producer.send(record); 12 } 13 } catch (final InterruptedException e) { 14 e.printStackTrace(); 15 } 16 [...] Kafka
14%
Manage OpenVPN keys with Easy-RSA
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Orlando Rosu, 123rf.com
. By the way, easyrsa export-p12 exports a key pair in PKCS12 format. The easyrsa gen-req easyrsa sign-req commands give Easy-RSA full-fledged PKI management, and the build-client-full build
14%
Getting started with AI
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © Lightwise, 123RF.com
, the loss function, and the metrics. The optimizer to be used is adam [12], a stochastic gradient descent optimizer that makes estimation of the first and second order moments (gradients). For the model
14%
Assigning Privileges with sudo and PolicyKit
22.01.2013
Home »  Articles  » 
 
, the users from the admin group and sudo , can do everything, and the remaining users can do nothing. Listing 1: Ubuntu 12.04 /etc/​sudoers file # Redefine environmental variables: Defaults        env
14%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
to 15 web applications every day. Just think about the many social networks, webmail, banking applications, e-commerce, and information portals visited every day. Securing Google Services
14%
An IP-based load balancing solution
21.07.2011
Home »  CloudAge  »  Articles  » 
 
heartbeat = 1 07 heartbeat_port = 539 08 keepalive = 6 09 deadtime = 18 10 network = direct 11 debug_level = NONE 12 monitor_links = 1 13 syncdaemon = 1 14 virtual webs.test.com { 15 active = 1 16
14%
Desktop Blades (of Glory)
06.05.2024
Home »  HPC  »  Articles  » 
performance but with low power usage, so I can get four nodes on a normal 15 or 20A circuit. These low-power systems can come in all shapes and sizes, but most of them are born from the single-board computer
14%
Relational databases as containers
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © James Thew, 123RF.com
that – in part – are significantly older than they are themselves, some of them going back 15 or more years. This category includes relational databases [4], their best known representatives being Oracle [5], My
14%
Reducing the Windows 10 attack surface
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Dane Deaner on Unsplash
, if you want to add individual objects as exceptions to an existing list, choose the second cmdlet. 15 ASR Rules In total, Microsoft defines 15 ASR rules for the execution of content from received email

« Previous 1 ... 33 34 35 36 37 38 39 40 41 42 43 44 45 46 ... 51 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice