search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(531)
Article
(153)
News
(34)
Blog post
(4)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
...
12
13
14
15
16
17
18
19
20
21
22
23
24
25
...
73
Next »
18%
Multiprocessing in Python with Fortran and OpenMP
22.12.2017
Home
»
Archive
»
2017
»
Issue 42: Secur...
»
_ext, build commands --fcompiler options running build_src build_src building extension "hw" sources f2py options: [] f2py:> /tmp/tmpKa8
a
4p/src.linux-x86_64-2.7/hwmodule.
c
creating /tmp/tmpKa8
a
4p/src.linux-x86
18%
Securing the container environment
01.06.2024
Home
»
Archive
»
2024
»
Issue 81: Load...
»
Running kube-proxy 1 5bf2de2
a
3
af
3
c
kube-proxy-b65
c
9
The mitigations for the above technique could be used to ensure that no containers mount docker
18%
Pandas: Data analysis with Python
20.03.2014
Home
»
Archive
»
2014
»
Issue 19: Perim...
»
dictionary: Series({'
a
': 1, 'b': 2, '
c
':
3
}) In this use case, too, you can pass in a list separately as an index argument so that only those elements that exist in the index make their way from
18%
Data Analysis with Panda
12.03.2014
Home
»
HPC
»
Articles
»
]}) An optional index list determines the indices, as for a Series. In: DataFrame({'
a
': [1, 2], 'b': [
3
, 4]}, columns=['
a
', '
c
'], index=['top', 'bottom']) Out: a
c
top 1 Na
N
bottom 2 Na
N
18%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
, appearing in alphabetical order but allowing intervening letters, you can use the search expression: "
a
.*e.*i.*o.*u" This would match lines 1, 2, and
3
. If you want lines containing all five vowels in order
18%
Docker image security analysis
01.08.2019
Home
»
Archive
»
2019
»
Issue 52: Stop...
»
exists, renaming the old one with ID sha256: f09fe80eb0e75e97b04b
9
dfb065ac
3
fda37
a
8fac0161f42fca1e6fe4d0977
c
80 to empty string Loaded image: nginx:latest With the docker images command, you can see
18%
Saving Storage Space with Reduced Precision
19.06.2023
Home
»
HPC
»
Articles
»
object O Python object A simple example from nkmk creates
a
float64 data type (64-bit floating-point number): import numpy as np a = np.array([1, 2,
3
], dtype=np.float64
18%
Ansible collections simplify AIX automation
05.08.2024
Home
»
Archive
»
2024
»
Issue 82: Sover...
»
/bin/ksh' user_gecos: 'AIX guest user' user_pgrp: 'staff' user_groups: 'staff' user_fsize: '-1' user_passwd: "{ssha256}06$FkFHd0q1hxVon
C
2
a
$sa1WA0G
3
mPNWtz2GAhUkfcQ7BkD/mNngBu0Tn2.
N
.cl" collections
18%
Automate CentOS and RHEL installation with PXE
02.02.2021
Home
»
Archive
»
2021
»
Issue 61: Secur...
»
timezone 19 timezone Europe/Vienna --isUtc --ntpservers 172.23.48.8,172.23.48.
9
20 # user setup 21 user --name=example-user --password=
--iscrypted --gecos="example-user"
22
# Disk partitioning
18%
The fine art of allocating memory
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
); i+= 4096) newblock[i] = 'Y'; 12 printf("Allocated %d
MB\n
", allocation); 13 } 14 } Things are more interesting when memory is being used. Uncommenting line 11 does just that. The OOM
« Previous
1
...
12
13
14
15
16
17
18
19
20
21
22
23
24
25
...
73
Next »