Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (60)
  • Article (2)
  • News (1)
Keywords

« Previous 1 2 3 4 5 6 7 Next »

16%
News for Admins
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
 
Open Source AI Definition Now Available Version 1.0 of the Open Source AI Definition (OSAID – https://opensource.org/ai) is now available. The definition, which was developed through a year
16%
Anonymization and pseudonymization of data
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Debby Ledet on Unsplash
M 12345 5 36 F 12346 6 34 M 12347 Anonymized Data (k=3) 1 30-40 * 123## 2 30
16%
Supercomputing Conference 2024
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © djem, 123RF.com
's Perlmutter Supercomputer. IEEE, 2024: DOI 10.1109/SCW63240.2024.00180: https://conferences.computer.org/sc-wpub/pdfs/SC-W2024-6oZmigAQfgJ1GhPL0yE3pS/555400b391/555400b391.pdf Open OnDemand: https
16%
Mobile hacking tool
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Valentina Curini on Unsplash
(e.g., which you can use to read passwords in the scope of a pentest) are available for download from GitHub [5] [6]. Flipper Zero is designed for interaction with a smartphone. During the initial
16%
Inventory and manage your IT systems
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Edryc James P. Binoya on Unsplash
customers a more comprehensive suite of IT management tools. The most recent version 5.6.2 was released in January 2025 by Mark Unwin, who is still actively involved in the project. The software is available
16%
How vector databases work and when they're used
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © neyro2008, 123rf.com
space. © Qdrant [6] Figure 5: The encoder calculates vectors that refer to points closer together if the designated objects are more similar to each
16%
Securing email communication with GnuPG
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Amol Tyagi on Unsplash_Key.jpg
in which security and data integrity are paramount, especially when it comes to information with EU-RESTRICTED and NATO-RESTRICTED information [6]. Provisioning Keys in the WKD A Web Key Directory (WKD
16%
Create a high availability VM with  DRBD9  and Reactor
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Emma Simpson on Unsplash
consuming and expensive, which is what prompted Linbit to build an alternative to Pacemaker that specializes in handling simple use cases: DRBD Reactor [6]. In this article, I describe how DRBD and DRBD
16%
Aggregate alerts from various monitoring systems
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Chittima Kasa, 123RF.com
of the failure. Nagios and M/Monit are just two examples of how Alerta can be used in combination with other tools. The documentation [6] has a long list of compatible providers and software projects under
16%
How Kanban helps improve IT processes
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© NYUL, 123RF.com
. The Agile Solution More than 10 years ago, lack of capacity, no overview, insufficient planning certainty, and general dissatisfaction lead software developers to depart from the established waterfall model

« Previous 1 2 3 4 5 6 7 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice