Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (551)
  • Article (182)
  • News (6)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 75 Next »

23%
Goodbye virtual machines, hello container machines
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Erik Odiin on Unsplash
the number of desired container machines to be created. The names of the created container machines are a combination of the cluster name, the machines name, and the count index starting from 0. The image
23%
Forensic main memory analysis with Volatility
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © Bruce Rolff, 123RF.com
manipulate it? One simple approach to spoofing can be found in the base.c file in the sources of older kernel versions: res = access_process_vm(task, mm->arg_start, buffer, len, 0); For each entry
23%
VTP for VLAN management
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © bluedarkat, 123RF.com
active Fa0/1, Fa0/2, Fa0/3, Fa0/4, Fa0/5, Fa0/6, Fa0/7, Fa0/8, Fa0/9, Fa0/10, Fa0/11, Fa0/12 10
23%
Production-ready mini-Kubernetes installations
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © Goran Bogicevic, Fotolia.com
virtual instance for development and test purposes on which to carry out the work. Again, Ubuntu 22.04 is a good choice. The steps are quickly completed: Use curl to download the k0s binary, which you
23%
News for Admins
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
 
release to the encryption toolkit to address a "certificate forgery" issue. The problem affects OpenSSL versions 1.0.2c, 1.0.2b, 1.0.1n, and 1.0.1o. According to the security advisory (CVE-2015
23%
Generate VM Images with virt-builder
15.04.2014
Home »  Articles  » 
 
the following command when you get there: wget http://libguestfs.org/download/builder/fedora-19.xz The image is only 164MB in size, so the download is done quickly. Back in the main directory of the libguestfs
23%
Virt-builder generates VM images in a flash
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Petris, fotolia.com
you get there: wget http://libguestfs.org/download/builder/fedora-19.xz The image is only 164MB in size, so the download is done quickly. Back in the main directory of the libguestfs distribution, you
23%
Optimizing utilization with the EDF scheduler
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © SV-Luma, 123RF.com
unsigned int flags = 0; 066 067 printf("deadline thread start %ld\n", 068 gettid()); 069 070 attr.size = sizeof(attr); 071 attr.sched_flags = 0; 072 attr.sched_nice = 0; 073 attr
23%
Keras: Getting Started with AI
03.12.2024
Home »  HPC  »  Articles  » 
(pool_size=(2,2))) model.add(layers.Dropout(0.3)) The next size layers of the model (Listing 4) are the same except for some small changes: input_shape  does not need to be specified in the first 2D
23%
Getting started with AI
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © Lightwise, 123RF.com
.add(layers.BatchNormalization()) model.add(layers.Conv2D(32, (3,3), padding='same', activation='relu')) model.add(layers.BatchNormalization()) model.add(layers.MaxPooling2D(pool_size=(2,2))) model.add(layers.Dropout(0.3)) The next

« Previous 1 ... 34 35 36 37 38 39 40 41 42 43 44 45 46 47 ... 75 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice