Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (58)
  • News (10)
  • Article (9)
Keywords

« Previous 1 2 3 4 5 6 7 8

20%
Vector databases for data-driven artificial intelligence
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © sdecoret, 123RF.com
compare various data points in network traffic with normal behavior patterns to identify anomalies by the distance to the typical vectors. Particularly in business sectors such as finance and security
20%
Kick-start your AI projects with Kubeflow
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © austler, 123RF.com
AWS account, it's time for the first real task. To access the Kubeflow instance to be built, Kubeflow needs to be accessible from the network. The deployment tools available for Kubeflow deployment
20%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
networks), classified as optimization because it reduces overall cycles. Sentinel Extending a data structure to eliminate code testing for a special case condition. Code motion
20%
Compressed Archives for User Projects
11.08.2025
Home »  Articles  » 
networks (CNNs); however, assume you’re doing something else with the images. A main directory cats_dogs_light  has two subdirectories, train  and test . The train  subdirectory has 1,000 images, and the
20%
Open source ticket system
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Toa Heftiba on Unsplash
Integrated Windows Authentication . In Firefox, you need to set network.negotiate-auth.trusted-uris to the OTOBO URL. Kerberos SSO requires precisely defined settings and the correct configuration of all
20%
Application-aware batch scheduler
26.03.2025
Home »  Archive  »  2025  »  Issue 86: Data...  » 
Photo by Toby Elliott on Unsplash
to succeed. Another example is the Kubeflow Training Operator, which is designed to work closely with the PyTorch library to train AI models – neural networks – on large datasets with multiple GPU
20%
Securing email communication with GnuPG
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Photo by Amol Tyagi on Unsplash_Key.jpg
=keyserver,DC=demo,DC=orga,DC=de) to integrate the entries into the specific AD structure. Finally, you will need to define permissions such that domain users on the network can access the key server. To do this, use the ldp.exe tool to manage

« Previous 1 2 3 4 5 6 7 8

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice