Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm 12 000 Llorente 13 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (68)
  • Article (19)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 Next »

13%
Distributed storage with Sheepdog
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © kateleigh, 123RF.com
/lib/sheepdog root 582 581 0 13:13 ? 12:00:00 AM sheep -p 7000 /var/lib/sheepdog # grep sheep /proc/mounts /dev/sdb1 /var/lib/sheepdog ext4 rw,relatime,data=ordered 0 0 # grep sheep /etc/fstab /dev
13%
Building a port scanner in Python
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Leo Blanchette, 123RF.com
(socket.timeout, ConnectionRefusedError): 12 pass 13 14 def port_scanner(host, start_port, end_port, threads=10): 15 print(f"Scanning {host} from port{start_port} to {end_port}") 16 17 for port
13%
News for Admins
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
 
doubled from $46,000 per day to more than $100,000 daily, the report notes. Sysdig notes that whereas cryptomining attacks are fairly easy to identify based on CPU resource consumption, LLM usage cannot
13%
The practical benefits of network namespaces
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Morganimation, fotolia.com
ns2 10 $ ip netns exec ns2 ip link 11 1: lo: mtu 65536 qdisc noop state DOWN mode DEFAULT group default 12 link/loopback 00:00:00:00:00:00 brd 00:00:00:00:00:00 13 2: veth2:
13%
Fundamentals of I/O benchmarking
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Kheng Ho Toh, 123RF.com
Example # iostat -xmt 1 /dev/sda Linux 3.16.7-21-desktop (tweedleburg) 08/07/15 _x86_64_ (8 CPU) 08/07/15 17:25:13 avg-cpu: %user %nice %system %iowait %steal %idle 1
13%
Zuul 3, a modern solution for CI/CD
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © lightwise, 123RF.com
vars: 11 hardware: x86_64 12 technology: legacy 13 require: 14 - clang Ansible To run the job – where the job hits the metal, as it were – the Zuul launcher
13%
Expand your sphere with a piece of Google
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© artida, 123RF.com
-name>helloworld 09 helloworld.HelloworldServlet 10 11 12 helloworld 13 /helloworld 14
13%
Managing FOSS applications on AIX
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Lead Image © Nataliia Natykach, 123RF.com
]SRPMS/ * [9]contrib/ * [10]docs/ * [11]ezinstall/ * [12]installp/ * [13]usr/ ...etc... The output from lynx confirms the HTTPd server is functioning. DNF clients can now
13%
Build secure IoT applications with open source
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Maksim Kabakou, 123RF.com
: Mbed TLS [4]: The new name of PolarSSL after the acquisition by ARM. It's an embedded-friendly TLS (DTLS since version 2.0) library. Implemented in C and easy to port to new targets. TinyDTLS [5
13%
Getting started with AI
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © Lightwise, 123RF.com
and developed ideas with Keras. Keras and VGG16 Getting started with Keras is not difficult. Rather than use the MNIST [2] dataset of 60,000 grayscale images as an example, I'll use a VGG16 [3] model

« Previous 1 2 3 4 5 6 7 8 9 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice