Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (995)
  • Article (277)
  • News (260)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 83 84 85 86 87 88 89 90 91 92 93 94 95 96 ... 154 Next »

11%
A Container for HPC
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © orson, 123RF.com
system virtualization. In full virtualization, a system has a host operating system (OS) that runs something called a hypervisor (Figure 1, right side). The hypervisor is capable of communicating directly
11%
Getting started with AI
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © Lightwise, 123RF.com
frameworks, including TensorFlow, PyTorch, and JAX. Fundamentally, Keras abstracts away the details of the back-end frameworks so that you call functions from Keras to build and train models. The application
11%
Hacking Mutillidae II
03.08.2023
Home »  Archive  »  2023  »  Issue 76: Energ...  » 
Photo by USGS on Unsplash
at the end. I'll also just look at the more obvious routes to exploitation (security level 0) to leave the good stuff for you to try later. The first vulnerability is called directory traversal, which can
11%
SDS configuration and performance
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Jakub Jirsak, 123RF.com
to install the software on the Ubuntu client and the two storage servers. For the installation on CentOS, I added the EPEL repository [7] and called yum update. Version 3.8.5 of the software then installed
11%
Build a Network Attached Storage System with FreeNAS
10.12.2013
Home »  Articles  » 
resides in a pool, which may contain one or more groups of devices called vdevs. The possible types of vdev are individual disks, mirrors, RAID-Z1, RAID-Z2, and RAID-Z3 sets. All of the component groups
11%
Data Analysis with Panda
12.03.2014
Home »  HPC  »  Articles  » 
directly into Pandas data structures: read_csv() , read_table() , and read_fwf() . Figure 1 shows an example of a session with the advanced Python shell, IPython, and a call to read_csv() ; Figure 2 shows
11%
Analyzing Kernel Crash Dumps
25.11.2012
Home »  Articles  » 
 
in memory. Fortunately, the administrator does not need to worry about this seemingly hopeless mission. This job is handled by the kexec command and the kexec_load system call. The former loads the new
11%
CephX Encryption
27.03.2013
Home »  HPC  »  Articles  » 
– in this example it is called ubuntu-amd64-alice.xml – would look like Listing 1. Listing 1: VM Storage as a Block Device
11%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
of additional authentication factors. Authentication Methods Various authentication methods can be categorized into the groups “knowledge,” “possession,” and “biometrics” (Table 1). These groups, also called
11%
Access Anywhere with Mobile IPv6
16.04.2013
Home »  Articles  » 
between two communication partners will be maintained as a matter of course, despite a changing network connection. This principle is called roaming (Figure 1

« Previous 1 ... 83 84 85 86 87 88 89 90 91 92 93 94 95 96 ... 154 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice