Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: viral ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (577)
  • Article (113)
  • News (30)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 73 Next »

16%
Container technology and work organization
13.06.2016
Home »  Archive  »  2016  »  Issue 33: IPv6...  » 
Lead Image © lightwise, 123RF.com
Some people consider container systems like Docker [1] a new form of virtualization – a natural continuation of KVM [2], Xen [3], VMware [4], Hyper-V [5], and the Zones concept in Solaris [6
16%
Blending Java with other programming languages
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Ivan Mikhaylov, 123RF.com
. This is still the case with complex enterprise applications based on J2EE. Integration capability: Java applications can act as one component in the greater context and may need to adapt to match the look
16%
The OpenResty distribution for Nginx
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Kirill Kurashov, 123RF.com
OpenResty [1] is the Nginx server [2] bundled with many useful modules. Developed almost single-handedly by Yichun "agentzh" Zhang while living and working in Beijing, China, then San Francisco
16%
Microsoft Network Policy Server
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Lexip, Fotolia.com
, such as MS-CHAP (Challenge-Handshake Authentication Protocol), MS-CHAP v2, or PAP (Password Authentication Protocol). You can also specify EAP. EAP types include, for example, protected EAP (PEAP), secured
16%
Migrate your Git repositories to Gitea
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Ray Hennessy on Unsplash
.*)' | grep -v ' -> ' | cut -f3 -d'/') do git checkout "${mybranch}" git pull done The git branch -a command in the first line returns the names of all branches in the repository. For the purpose
16%
Safely integrating and running Office 365
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Matty Sysmons, 123RF.com
, you can use Microsoft Forefront Identity Manager (FIM) 2012 R2 or, even better, Microsoft Azure Active Directory Connector [2]. The data must be synchronized before you configure the hybrid deployment
16%
Simplify integration of S3 storage with local resources
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Photo by Christopher Burns on Unsplash
download the gateway appliance. For local use, AWS provides a VM as an image for ESXi (OVA), Hyper-V 2008 R2, or Hyper-V 2012. The suitable gateway Amazon Machine Image (AMI) for use under EC2 is available
16%
IPv6 Tables
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © gepard1979, 123RF.com
kernel version 2.6.20, ip6tables has supported stateful inspection, wherein the firewall automatically assigns response packets to a communication channel and allows communication where appropriate
16%
How vector databases work and when they're used
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © neyro2008, 123rf.com
.1, -0.2, 0.91, 0.7, -0.21, 0.1 -0.7, 0.4] This numerical expression contains the coordinates of the words in a multidimensional space. When a sentence, an image, or a video is converted into a vector
16%
Darshan I/O analysis for Deep Learning frameworks
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Michaela Murphy on Unsplash
additional libraries and options into the linker command line to intercept relevant I/O calls" [2] (section 5.1). For MPI applications, you can also profile pre-compiled binaries. It uses the LD

« Previous 1 ... 35 36 37 38 39 40 41 42 43 44 45 46 47 48 ... 73 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice