Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 凭手机号怎么查身份证号-(⏭查询网站gpio17.com⏮)-身份证号查新办手机号怎么办-公安局身份证号查手机号码-查手机身份证号按什么后果-(⏭查询网站gpio17.com⏮)-查身份证有几个手机gw ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (797)
  • Article (71)
  • News (8)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 48 49 50 51 52 53 54 55 56 57 58 59 60 61 ... 88 Next »

80%
Run TensorFlow models on edge devices
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © leeavison, 123RF.com
install https://dl.google.com/coral/python/tflite_runtime-2.1.0-cp37-cp37m-linux_armv7l.whl Then, executing the model and making a prediction with the Python API is quite easy. Because I am working
80%
Booting Windows from a compressed image
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © ximagination, 123RF.com
.0 is initially in this folder. Now update it to version 5.1. To do so, download the MSU files for Windows 8.1 Update [6] and the update for Windows 8.1 [7]. Then, copy the seven MSU files into their own directory
80%
SSL/TLS best practices for websites
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Yevgeniya Ponomareva, Fotolia.com
impression, but they hardly increase the technical security. The certificate needs to contain all the hostnames – including the versions with and without the WWW prefix, as in, example.com and www.example.com
80%
Multifactor authentication from FIDO
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © John McAllister, 123RF.com
], and Yubico [7] were highlighted. Note that this technology, various vendor offerings, and the core protocol are still evolving, and deployment isn't seen in as many live implementations today as will be seen
80%
Running OpenStack in a data center
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © lassedesignen - Fotolia.com
to a solution based on Open vSwitch. The bad news is that a clear recommendation for a product is simply impossible. The selection of SDN solutions is huge. MidoNet [6] (Figure 2) by Midokura, VMware's NSX [7
80%
A Hands-on Look at Kubernetes with OpenAI
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Luxuz, photocase.com
. The company relies on Docker containers [5] and Kubernetes [6] to master this balancing act between usability and performance. Containers let you describe all the dependencies and packages (e.g., TensorFlow [7
80%
Documentation Tools for Admins
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Sorin Colac, 123RF.com
, such as images, PDFs, or various kinds of text documents, also makes sense. You can find many alternatives [7] to the popular MediaWiki, including DokuWiki [8], MoinMoin [9], and Tiki Wiki [10], as well as TWiki
80%
Citrix XenServer 6.2 goes open source
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © George Tsartsianidis, 123RF.com
in the cloud, which is otherwise traditionally occupied by Linux and OpenStack [7]. To make matters worse, the database giant Oracle also offers its own virtualization solution that is also based on Xen. Even
80%
Get to know Azure Files and Azure File Sync
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © moovstock, 123RF.com
. If you want to transfer large volumes of data, Microsoft also supports the Data Box and Data Box Heavy methods [7] as alternatives to network-based synchronization. In this case, the data then finds its
80%
The basics of domain-driven design
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Christos Georghiou, 123RF.com
for the analysis of domains and the design of application-oriented software was filled by others. Popular methods include event storming [6], domain storytelling [7], or example mapping [8]. These methods have

« Previous 1 ... 48 49 50 51 52 53 54 55 56 57 58 59 60 61 ... 88 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice