Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (263)
  • Article (50)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 32 Next »

27%
Protecting your web application infrastructure with the Nginx Naxsi firewall
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Pansiri Pikunkaew, 123RF
backend3.example.com server; 05 backend4.example.com server down; 06 backend5.example.com backup server; 07 } 08 09 upstream fallback { 10 fallback1.example.com server: 8081; 11 } 12 13 14 server { 15 % 16
27%
An introduction to a special tool for transforming data formats
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Artsem Martysiuk, 123RF.com
version 6.0.1 of Jaspersoft ETL, which is available as a free download [1]. Data Gold Panning for gold is tedious. Nuggets of precious metal don't simply sit around on a riverbed. Instead, the prospector
27%
Graph database Neo4j discovers fake reviews on Amazon
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Image by Gerd Altmann from Pixabay
- reviewer4 - reviewer8 product3: - reviewer3 product4: - reviewer4 - reviewer7 product5: - reviewer5 - reviewer8 product6: - reviewer6 The human eye immediately
27%
How vector databases work and when they're used
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © neyro2008, 123rf.com
_result = client.search(collection_name="test_collection", query_vector=[0.2, 0.1, 0.9, 0.7], limit=3) print(search_result) ### Output: ScoredPoint(id=4, version=0, score=1.362, payload={"city": "New York"}, vector
27%
Getting started with the Apache Cassandra database
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Photo by Almos Bechtold on Unsplash
) VALUES('978-3836262477', 2018, 'Objektorientierte Programmierung', 'Rheinwerk', {1 :'Bernhard Lahres', 2 : 'Gregor Rayman', 3 : 'Stefan Strich'}, 4, '18/09'); 16 17 # SELECT Title FROM titles WHERE authors
27%
Writing SELinux modules
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Amy Walters, 123RF.com
policy modules that are available and active on the system. The file is stored below /etc/selinux: # ls -lh /etc/selinux/targeted/policy/total 3.6M -rw-r--r--. 1 root root 3.6M Mar 3 13:28 policy.29
27%
The practical benefits of network namespaces
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Morganimation, fotolia.com
,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP mode DEFAULT group default qlen 1000 09 link/ether 52:54:00:02:e3:f1 brd ff:ff:ff:ff:ff:ff 10 7: veth2: mtu 1500 qdisc noop state DOWN mode
27%
Security data analytics and visualization with R
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Rancz Andrei, 123RF.com
Worksheet(patchstats, sheet = 2) 013 sheet3 <- readWorksheet(patchstats, sheet = 3) 014 sheet4 <- readWorksheet(patchstats, sheet = 4) 015 sheet5 <- readWorksheet(patchstats, sheet = 5) 016 sheet6 <- read
27%
Secure your data channel with stunnel
25.03.2020
Home »  Archive  »  2020  »  Issue 56: Secur...  » 
Lead Image © Petr Vaclavek, 123RF.com
ZJOUoUsZGlkk client2:q0eL78zFrbnESW6c/F0qit5MNCpS8IBgyh1BdXiyyuI client3:zkq8eT31Nib3IHWfp0yyu15BCW52VMbY8+LhVUt3ylA The client uses the appropriate password in the /etc/stunnel/psk-client1.txt file: client1:Wf
27%
Measuring the performance of code
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Lucy Baldwin, 123RF.com
in the standard Python built-ins [2] and in the NumPy library [3]. Figure 1: IPython session comparing two implementations of a round routine. Unless you

« Previous 1 ... 11 12 13 14 15 16 17 18 19 20 21 22 23 24 ... 32 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice