Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 出售part过二次账号购买(自助网站fakaID.com)-出售part过二次账号购买(自助网站fakaID.com)as ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1171)
  • Article (116)
  • News (104)
  • Blog post (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 140 Next »

36%
The limits and opportunities of artificial intelligence
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © sebastien decoret, 123RF.com
and faster than a human could, but they cannot design them. © Kittipong Jirasukhanont, 123RF.com ADMIN: That would be a metaphor for powerful AI then? But even weak AI can do many things faster
36%
Graph database Neo4j discovers fake reviews on Amazon
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Image by Gerd Altmann from Pixabay
Network Paths in Neo4j" by Mike Schilli, Linux Magazine , issue 164, June 2014, pg. 66, https://www.linuxpromagazine.com/Issues/2014/164/Perl-Neo4j/ Node similarity algorithm: https://neo4j.com
36%
Secrets and certificate management
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © phive2015, 123rf.com
concepts: https://www.vaultproject.io/docs/concepts/seal KV secrets engine version 2: https://www.vaultproject.io/docs/secrets/kv/kv-v2 Secrets engines: https://learn.hashicorp.com
36%
Static code analysis finds avoidable errors
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Andrey KOTKO, 123RF.com
Standard" by Barr Group: https://barrgroup.com/Embedded-Systems/Books/Embedded-C-Coding-Standard/Introduction Uncrustify: http://uncrustify.sourceforge.net JSLint: http://www.jslint.com Java
36%
DDoS protection in the cloud
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Amy Walters, 123RF.com
that might otherwise remain hidden to the administrator. Infos Peakflow: http://www.arbor.com Collector: http://www.flowmon.com Management information base: https
36%
Monitor applications end to end
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Adam Winger on Unsplash
that conventional monitoring does not and should always be in place, especially for web applications. Infos Grafana Faro: https://grafana.com/oss/faro/ Basic RUM: https://www.basicrum.com Open
36%
High availability with SQL Server 2012 and 2014
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © li xuejun, 123RF.com
a clear competitive advantage. Infos Free 180-day trial of SQL Server 2014: http://technet.microsoft.com/en-US/evalcenter/dn205290.aspx Microsoft License Advisor: http://mla.microsoft.com
36%
Supercharge your software upgrade routine
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by redcharlie on Unsplash
: curl git pkg-config 0 upgraded, 3 newly installed, 0 to remove and 1 not upgraded. Need to get 3,409 kB of archives. After this operation, 19.5 MB of additional disk space will be used. Get:1 http://gb.archive.ubuntu.com
36%
Recovering from a cyberattack in a hybrid environment
30.01.2024
Home »  Archive  »  2024  »  Issue 79: Monit...  » 
Photo by Kelly Sikkema on Unsplash
a REST PATCH request to the beta endpoint, $uri = "https://graph.microsoft.com/beta/organization/$OrgId" $body = @' { "onPremisesSyncEnabled": null } '@ Invoke-MgGraphRequest -uri $uri -Body $body
36%
Network security in the Google Cloud Platform
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by Jannet Serhan on Unsplash
. This method only requires appropriate DNS entries and routing. More specifically are DNS domains for which you need to set up private zones. For example, most Google APIs reside in the googleapis.com domain

« Previous 1 ... 52 53 54 55 56 57 58 59 60 61 62 63 64 65 ... 140 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice