Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm"22 000 Llorente 13 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (52)
  • Article (11)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 Next »

15%
Keras: Getting Started with AI
03.12.2024
Home »  HPC  »  Articles  » 
, MaxPooling 2D : model.add(layers.BatchNormalization()) model.add(layers.MaxPooling2D(pool_size=(2,2))) A max pooling layer has a pool size, 2x2 in this case, that is used to scan the entire input image (left
15%
The practical benefits of network namespaces
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Morganimation, fotolia.com
via 192.168.1.1 dev eth1 13 $ ip netns exec ns1 ping -c2 8.8.8.8 14 PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data. 15 64 bytes from 8.8.8.8: icmp_seq=1 ttl=51 time=22.1 ms 16 64 bytes from 8.8.8.8: icmp
15%
S3QL filesystem for cloud backups
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © stylephotographs, 123RF.com
-r--r-- 1 root root 603068 Nov 10 15:10 s3ql_metadata 13 4 -rw-r--r-- 1 root root 602 Nov 10 15:10 s3ql_metadata_bak_0 14 4 drwxr-xr-x 4 root root 4096 Nov 10 15:10 . 15 [root@home4 Documents
14%
Distributed storage with Sheepdog
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © kateleigh, 123RF.com
Sheepdog Server in Action # ps -ef|egrep '([c]orosyn|[s]heep)' root 491 1 0 13:04 ? 00:00:30 corosync root 581 1 0 1:13 PM ? 00:00:03 sheep -p 7000 /var
14%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the X.509 standard. These are typically stored on a hardware certificate storage
14%
Let the Editor Wars Begin!
25.08.2016
Home »  HPC  »  Articles  » 
the same version on CentOS 6.x. Figure 8: Gedit 2.30 on Windows 10. The current version 3.20 (Figure 9) of gedit has a new, cleaner interface that works
14%
Managing FOSS applications on AIX
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © Nataliia Natykach, 123RF.com
the minimum requirements. DNF operates on AIX 7.1 TL5 and later versions. The openssl fileset, version 1.1.X.X (or higher), must be installed. Ideally you'll have the latest version on your system. You must
14%
Expand your sphere with a piece of Google
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© artida, 123RF.com
="**/*.jar" /> 20 21 22 23 24 25
14%
Creating SmartOS zones using UCARP
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Le Moal Olivier, 123RF.com
_mac_spoofing": true 20 } 21 ] 22 } Listing 2 ucarptest2.json 01 { 02 ... 03 "alias": "zoneB", 04 "hostname": "zoneB", 05 ... 06 "nics": [ 07 { 08 ... 09 "ip": "10
14%
High availability clustering on a budget with KVM
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Yulia Saponova, 123RF.com
/sda 20 Account information: 21 ACL information: 22 ALL Network Bonding To prevent the network cards and thus the connection to the cluster and storage network from becoming a single

« Previous 1 2 3 4 5 6 7 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice