Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode"22 00s Llorente ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (307)
  • Article (110)
  • News (16)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 15 16 17 18 19 20 21 22 23 24 25 26 27 28 ... 44 Next »

16%
Strategies for routing voice calls around a firewall
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
gnohz, 123RF.com
14 15 v=0 16 o=alice 53655765 2353687637 IN IP4 20.22.24.27 17 s=- 18 t=0 0 19 c=IN IP4 20.22.24.27 20 m=audio 20333 RTP/AVP 0 1 3 99 21 a=rtpmap:0 PCMvU/8000 The RTP port causes the next issue
16%
Test your containers with the Docker Desktop one-node cluster
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Photo by Alex Kondratiev on Unsplash
instructions below 18 env: 19 - name: REDIS_HOST 20 value: "redis" 21 ports: 22 - containerPort: 5000 Listing 11 my-k8s-app/redis-deployment.yaml 01
16%
Comparing startup times of Linux distros in the cloud
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Lead Image © Lucy Baldwin, 123RF.com
ssh ubuntu@52.90.56.122; do sleep 1; done ssh: connect to host 52.90.56.122 port 22: Connection refused ssh: connect to host 52.90.56.122 port 22: Connection refused [ output truncated ] Welcome
16%
SHA-3 – The New Hash Standard
15.04.2013
Home »  Articles  » 
 
researchers were not content just to attack MD5. In 2005, Wang’s team improved known attacks on the SHA-1 standard, which was regarded as secure at the time. Although these attacks remain theoretical – nobody
16%
Data acquisition with shell tools
30.11.2025
Home »  Archive  »  2010  »  Issue 2: Backup...  » 
Dmitriy Syechin, 123RF
"------------------------------------------------------" 18 echo -n "Replace stored data line (y)? ";read we 19 if [ "$we" = "y" ]; 20 then 21 22 # Delete line and write to 23 # temporary file 24 25 # Build sed instruction 26
16%
Setting up HTTP/2 for Nginx
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Ludomil Sawicki on Unsplash
(Listing 1), which indicates a push. Listing 1 Server Push in Log 2020-11-22T12:01:10+01:00 1606042870.567 200 605 h2 "GET /index.html HTTP/2.0" 2020-11-22T12:01:10+01:00 1606042870.567 200
16%
Machine learning and security
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
.sin(periods * 2 * np.pi * t) 12 return max(value, 0.0) 13 else: 14 value = np.sin(periods * 2 * np.pi * t) 15 return max(value, 0.0) 16 17 # building the data vector 18 my_data = [] 19 i = 0 20 while
16%
CPU affinity in OpenMP and MPI applications
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © podfoto, 123RF.com
is turned on, which means 32 "real" cores and 32 SMT cores. Listing 1 lscpu $ lscpu Architecture: x86_64 CPU op-mode(s): 32-bit, 64-bit Byte Order
16%
Monitoring your cluster with a home-grown OCF agent
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Aleksey Mnogosmyslov, 123RF.com
that belong to $ASTRUNDIR, 22 # kill them. 23 if [ "$astcanary_pid" ]; then 24 for i in $astcanary_pid; do ocf_run kill -s KILL $astcanary_pid; done 25 fi 26 27 for dir in $ASTRUNDIR
16%
When are Kubernetes and containers not a sensible solution?
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Photo by Kelly Sikkema on Unsplash
Containers, Kubernetes, Rancher, OpenShift, Docker, Podman – if you have not yet worked in depth with containers and Kubernetes (aka K8s), you might sometimes get the impression that you have

« Previous 1 ... 15 16 17 18 19 20 21 22 23 24 25 26 27 28 ... 44 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice