Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: [tippo365.com]tune its go each real money[tippo365.com]tune its go each real moneygram ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (733)
  • Article (234)
  • Blog post (6)
  • News (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 98 Next »

9%
Open source intelligence tools for pen testing
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
the hacker lifecycle and its relevance to the penetration test. Typical Hacker Lifecycle In 2011, researchers from Lockheed Martin created their version of the hacker lifecycle called the Cyber Kill Chain
9%
The New Hadoop
17.07.2013
Home »  HPC  »  Articles  » 
Manager, an ApplicationMaster, application Containers, and NodeManagers. The ResourceManager is a pure scheduler. Its sole purpose is to manage available resources among multiple applications on the cluster
9%
Manage cluster state with Ceph dashboard
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © damedeeso,123rf.com
. They are a kind of logical division: Each binary object in the Ceph cluster belongs to a pool. Pools act kind of like name tags; they also allow Ceph to implement much of its internal replication logic. In fact
9%
Open source calendar synchronization
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Photo by jason hafso on Unsplash
enter a date on your Thunderbird calendar, it automatically appears on your smartphone calendar. However, this choice comes with drawbacks: Google makes its money by collecting and evaluating your data
9%
Security boundaries in Windows
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Jan Canty on Unsplash
center. What works in the real world can also be applied to securing operating systems. Microsoft defines nine different security boundaries for its own operating systems, active services, and devices
9%
Automation Scripting with PHP
16.10.2012
Home »  Articles  » 
 
The problem faced by many system administrators is how to use a command-line scripting language, other than shell scripts, for automation. PHP, now in its fifth major version, is one of the most
9%
Planning Performance Without Running Binaries
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
these points in mind and remember that, in the real world, network communication is always a distributed system's presumptive bottleneck. Roy Batty's Tears The power of Amdahl's law is found in its analytical
9%
Integrating FreeNAS with Windows Active Directory
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Parisod@Snowmelody, Fotolia.com
this box to take separate snapshots of the volume/dataset and each of its child datasets; if unchecked, only one snapshot is taken of the specified Volume/Dataset. Lifetime How long to keep
9%
Darshan I/O Analysis for Deep Learning Frameworks
18.08.2021
Home »  HPC  »  Articles  » 
the training, which seems to be counterintuitive because DL training involves repeatedly going through the dataset in a different order for each epoch. Two things affect this: (1) TensorFlow has an efficient
9%
What's the Risk?
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Helder Almeida, 123RF.com
24/7/365, and the threats remain 24/7/365. We can protect ourselves, but there is always going to be some level of acceptable risk that we must take. It is almost impossible to operate and maintain

« Previous 1 ... 41 42 43 44 45 46 47 48 49 50 51 52 53 54 ... 98 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice