Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %200mb 12%A9n Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (224)
  • Article (87)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 32 Next »

19%
Serverless computing with AWS Lambda
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © joingate, 123RF.com
Id: 4e90b424-95d9-4453-a2f4-8f5259f5f263 Duration: 70.72 ms Billed Duration: 100 ms Memory Size: 128 MB Max Memory Used: 55 MB Init Duration: 129.20 ms More or Less
19%
Many Clouds, One API
22.08.2011
Home »  Articles  » 
 
machines with a fixed 1GB of RAM, whereas another could allow the user to set up memory of between 1 and 8GB in increments of 512MB. The Deltacloud API bundles all these different possibilities
19%
An IP-based load balancing solution
21.07.2011
Home »  CloudAge  »  Articles  » 
 
address = 192.168.1.250 eth0:0 17 vip_nmask = 255.255.255.0 18 port = 80 19 send = "GET / HTTP/1.0\r\n\r\n" 20 expect = "HTTP" 21 use_regex = 0 22 load_monitor = rup 23
19%
Desktop Blades (of Glory)
06.05.2024
Home »  HPC  »  Articles  » 
). Figure 4: LattePanda Mu (image credit: DFRobot). The Intel N100 peaks around 22-23W under load, although DFRobot says up to 35W. The Raspberry Pi 5 under load peaks around 12W, so the power draw
19%
Encrypting files
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Yoichi Shimizu, 123RF.com
to encrypt my data with a very long cipher key (almost as large as I can get). According to the Evil 32 website [9], using modern GPUs, 32-bit key IDs can be decoded. They say that it only takes four seconds
19%
Service mesh for Kubernetes microservices
09.04.2019
Home »  Archive  »  2019  »  Issue 50: Bpfilter  » 
Lead Image by Ricardo Gomez Angel on Unsplash.com
functions for the application using the mesh. These typically include: Traffic management – routing user requests to services according to criteria such as user identity, request URL, weightings (for A
19%
Julia Distributed Arrays
15.08.2012
Home »  HPC  »  Articles  » 
, elements of the distributed array, j (created above) can be changed (not just the local references; in this case, rows 1-2 and columns 1-8): julia> j[2,2]=0; julia> j[8,8]=0; julia> print(j); 8x8 Float
19%
DevSecOps with DefectDojo
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
call up the application (line 6). You need to specify a profile to save the tool's configuration. As soon as the software has launched, you will find the password in the logs (line 9); it is generated
19%
A Hands-on Look at Kubernetes with OpenAI
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Luxuz, photocase.com
Timestamp: 2017-06-07T08:15:30Z labels: openai.org/location: azure-us-east-v2 name: 10.126.22.9 spec: externalID: 10.126.22.9 providerID: azure:////62823750-1942-A94F-822E-E6BF3C9EDCC4 status
19%
OpenStack workshop, part 3:Gimmicks, extensions, and high availability
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Steven Frame, 123RF
a9a6615fb5c045693 | root@alice:~# quantum port-list +--------------------------------------+------+-------------------+ | 0c478fa6-c12c-... | | fa:16:3e:29

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 32 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice