Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: cach hand Play Together 1.22 0(711bmw.com)cach hand Play Together 1.22 0(711bmw.com)w0e ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (210)
  • Article (20)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 24 Next »

11%
How vector databases work and when they're used
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © neyro2008, 123rf.com
algorithms for the search. For example, a stored three-dimensional vector could be assigned the values [1.4, 3.8, -0.8]. Each query to the database is also translated into a vector (e.g., [1.3, 3.5, -0
11%
Hardening mail servers, clients, and connections
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Photo by jesse ramirez on Unsplash
to port 22 (i.e., the SSH port). Simple Mail Transfer Protocol (SMTP) ports 25 and 587 should be open. If you also intend to operate with Internet Message Access Protocol (IMAP) on the system, you need
11%
Running OpenStack in a data center
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © lassedesignen - Fotolia.com
If you have tried OpenStack – as recommended in the second article of this series [1] – you may be thinking: If you can roll out metal as a service (MaaS) and Juju OpenStack within a few hours
10%
Web Cryptography API
26.11.2013
Home »  Articles  » 
method, for instance, is suitable for protecting application data in a cloud. Listing 1 shows how to use AES together with the Web Cryptography API. Listing 1: Encrypting Application Data 01 var enc
10%
Hybrid public/private cloud
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Photo by JJ Ying on Unsplash
::Instance" 04 Properties: 05 ImageId: "ami-0e1ab783dc9489f34" # Centos7 for paris 06 InstanceType: t3.2xlarge 07 AvailabilityZone: !GetAtt FortiVPCFrontNet.AvailabilityZone 08 Key
10%
Software-defined networking with Windows Server 2016
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Kirill Cherezov, 123RF.com
. Listing 2 Automated Installation of the Network Controller 01 $a = New-NetworkControllerNodeObject -Name Node1 -Server NCNode1.contoso.com -FaultDomain fd:/rack1/host1 -RestInterface Internal 02
10%
Update your Docker containers safely
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © yelenayemchuk, 123RF.com
6d2feb5e84bad9184441170d4898 mariadb latest mariadb@sha256:12e32f8d1e8958cd076660bc22d19aa74f2da63f286e100fb58d41b740c57006 RepoId mariadb latest b468922dbbd73bdc874c751778f1ec0ec10817691624976865cb3
10%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
WALLs. Figure 1: DIGIPASS Nano is a thin film that can be placed, together with the SIM card, into a cellphone, thus turning the phone into a hardware OTP token. Special USB sticks or smart cards
10%
Managing Linux Memory
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © J.R. Bale, 123RF.com
SAP HANA Enterprise Platform 1.0 Product Availability Matrix: http://www.saphana.com/docs/DOC-4611 Siberschatz, A., G. Gagne, and P.B. Galvin. Operating System Concepts . Wiley, 2005. Magenheimer
10%
The achievements of and plans for systemd
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lennart Poettering CC-BY-SA-3.0
are expensive, with only 1,000 of them (or sometimes only 100 or 500, depending on the distribution), and they are allocated individually during package installation. So traditionally they can only be used

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 24 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice