Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (139)
  • Article (102)
  • Blog post (6)
  • News (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 25 Next »

53%
Serverless computing with AWS Lambda
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © joingate, 123RF.com
're wearing your reading glasses, you might see that the name of the function I've typed is internet-access-function . I've also chosen Python 3.7 as the preferred run time. I leave the default Author from
53%
Auditing Docker Containers in a DevOps Environment
27.12.2017
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Photo by Frank McKenna Unsplash.com
 root 4096 Dec 16 12:34 . drwxr-x--- 3 root root 4096 Dec 16 12:34 .. -rw-r----- 1 root root  373 Dec  9  2014 audit.rules Apologies that I’ve been a little “now hit the Enter key” with the directory listings
53%
Investigating container security with auditd
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image, Frank Mckenna, @unsplash.com
root 4096 Dec 16 12:34 .. -rw-r----- 1 root root 373 Dec 9 2014 audit.rules Apologies that I've been a little "now hit the Enter key" with the directory listings displayed in Listing 2. It
53%
Security in the AWS cloud with GuardDuty
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image © xcfoto, 123RF.com
examples on GitHub, I'll show you my functional code first and then point you toward a bells and whistles option. I've had both working beautifully in the past. AWS CLI Often during setup
53%
Kubernetes k3s lightweight distro
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image Photo by Josh Rakower on Unsplash
in busy production clusters at Google means it also has an unimpeachable pedigree. In this article, I look at a Kubernetes implementation equally suitable for use at the network edge, shoehorned
53%
Tuning I/O Patterns in Fortran 90
04.12.2013
Home »  HPC  »  Articles  » 
I’ve written articles in the past about I/O patterns and examined them using strace . This type of information comes from the perspective of the application – that is, what it sends to the OS
53%
The Lua Scripting Language
28.01.2014
Home »  HPC  »  Articles  » 
statement, the marker occurs directly before the loop end . Rocks Basically, I’ve covered the main language features in Lua, which can already achieve quite a lot. For further reading and a quick reference
53%
Five HPC Pitfalls – Part 2
09.04.2012
Home »  HPC  »  Articles  » 
, some might consider this an additional and unnecessary expense, but in light of the possible pitfalls I’ve mentioned, enlisting an experienced ally can actually save money in the long run. An integrator
53%
Finding Memory Bottlenecks with Stream
25.09.2013
Home »  HPC  »  Articles  » 
" to determine which one, or more, of the memory bandwidth micro-benchmarks is a good indicator of performance. Honestly, I think it's difficult to do, and I've never been too successful with this approach.   I
53%
Can Your Server Be Toppled with a Single Command?
01.10.2011
Home »  Articles  » 
 
) is that the usually built-in-as-standard multiport and state modules must be installed and available to IPtables for this ruleset to work. (I've seen a similar solution that uses the recent module, but I prefer

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 25 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice