Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm 22%390 Llorente"523 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (165)
  • Article (64)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Next »

25%
Coordinating distributed systems with ZooKeeper
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © smileus, 123RF.com
/test [zk: localhost:2181(CONNECTED) 11] get /test HelloWorld! cZxid = 0xa1f54 ctime = Sun Jul 20 15:22:57 CEST 2014 mZxid = 0xa1f54 mtime = Sun Jul 20 15:22:57 CEST 2014 pZxid = 0xa1f54 cversion = 0
25%
Kolab iRony with CalDAV and CardDAV support
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Pablo Hidalgo, 123RF.com
RewriteRule ^\.well-known/caldav / [R,L] 18 RewriteRule ^\.well-known/carddav / [R,L] 19 20 RewriteCond %{REQUEST_FILENAME} !-f 21 RewriteCond %{REQUEST_FILENAME} !-d 22 ... data available on iOS and Mac OS  X and in Thunderbird and Evolution.
25%
Encrypting files
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Yoichi Shimizu, 123RF.com
– Default; an improved and optimized version of the LZ77 algorithm. LZMA2 – An improved version of LZMA. PPMD – Dmitry Shkarin's PPMdH with small changes. PCJ – A converter for 32-bit x86 executables
25%
Automating development environments and deployment with Otto
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © baloncici, 123RF.com
happens transparently for the user, who has no contact at all with the tools. Otto is released under Mozilla Public License Version 2.0, and development is an open process on GitHub [6]. Otto has one
25%
Minifying container images with DockerSlim
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Maggie Molloy, 123RF.com
"mprotect", 19 "capget", 20 "getuid", 21 "wait4", 22 "pread64", 23 "Capset", 24 [snip...] Unfortunately, I can't go too deep into seccomp in this article ... DockerSlim minifies your Docker container images up to 30x and adds security, too.
25%
Proprietary and Open Source Storage Options
09.10.2023
Home »  HPC  »  Articles  » 
  1 loop /snap/core20/1974 loop2         7:2    0  63.5M  1 loop /snap/core20/2015 loop3         7:3    0  73.9M  1 loop /snap/core22/864 loop4         7:4    0 237.2M  1 loop /snap/firefox/3026 loop5
25%
Relational databases as containers
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © James Thew, 123RF.com
a complete loss of data is in the cards. Distributed Storage Distributed file storage, as provided by the Network File System (NFS) [19], GlusterFS [20], or Ceph [21], offers a remedy. In principle
25%
Validating Docker containers
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © 36clicks, 123RF.com
in the container? 20 - name: "mysql client exists" 21 path: '/usr/bin/mysql' 22 shouldExist: true 23 24 # Does the MySQL configuration file exist at the right place? 25 - name: "my.cnf exists and has appropriate
25%
Harden your Apache web server
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
sensible defaults (e.g., in version 2.2, RequestReadTimeout was still set to  ). LimitRequestBody also has a value of zero in the current Apache version, which means that a client is always allowed
25%
Machine learning and security
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
Every ML system (Figure 1) has an input (x ) through which it (one hopes) receives relevant information and from which it typically makes a classification (y ). In the field of cybersecurity, for example

« Previous 1 ... 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice