Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: ▶tippo365.com▶fortune gets how to win jon▶tippo365.com▶fortune gets how to win jackpotzi6 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (756)
  • Article (188)
  • Blog post (3)
  • News (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 58 59 60 61 62 63 64 65 66 67 68 69 70 71 ... 95 Next »

6%
Cloud Forensics
03.02.2012
Home »  Articles  » 
 
, be able to see how the existing pieces of evidence from the various components of the cloud system correlate. This is also true of legacy IT systems, but the cloud, with its international and cross
6%
Run TensorFlow models on edge devices
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © leeavison, 123RF.com
.invoke() # tensor_index is 0 because the output contains only a single value weight_inferred = interpreter.get_tensor(tensor_index=0) Results The time has come to evaluate the accuracy of the model and see how
6%
File access optimization discovery and visualization
27.05.2025
Home »  Archive  »  2025  »  Issue 87: Light...  » 
Photo by Barnabas Davoti on Unsplash
). Basics of File Access Before getting into the details, a good starting point is to describe how file access works internally and how several simultaneous file accesses on one file can interfere
6%
Generating information with the touch of a button
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
were also available through Yum. Surprisingly, this didn't work and it was not immediately obvious why. Fortunately, you can download an "all in one" package, which contains version 2.6.1 (currently
6%
VMware is hit by lawsuit contending GPL violation
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Sean Gladwell, Fotolia.com
alleged access to the Linux kernel, and published by the SFC in a FAQ for the proceedings against VMware [5], also come from this test. A diagram from SFC of the kernel architecture claims to show how
6%
Overview of cloud platforms and appliances
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Athiphan Chunmano, 123RF
in a theoretical definition of cloud computing. Instead, they will want to know two things: Do I already have something similar to a cloud in my server room or data center that I can use? How can cloud computing
6%
Port Knocking
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © rasslava, 123RF.com
accurately Netfilter, the built-in Linux firewall) by default. The iptables scripts were getting lengthier, and as powerful as iptables is, we didn't want to let junior members of staff break access
6%
Chef users faced with a license change might find solace in a new open source distribution, Cinc.
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by Pascal Bernardon on Unsplash
fully compatible with Chef while remaining available under a free license. This article begins by explaining what the implications of the Chef licensing model change were and how Cinc is positioning
6%
Configuration management with CFEngine 3
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © iofoto, Fotolia.com
of which perform different tasks. A short overview can be found in the official documentation [6]. Getting Started The initial setup of CFEngine 3 took place with the bootstrapping section at the end
6%
The RADOS Object Store and Ceph Filesystem
24.04.2012
Home »  HPC  »  Articles  » 
also has a rudimentary default Crush map. If you want to experiment with your own Crush map, the Ceph wiki gives you the most important information for getting started. Extending the Existing Setup How

« Previous 1 ... 58 59 60 61 62 63 64 65 66 67 68 69 70 71 ... 95 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice