Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: bring calling -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (879)
  • Article (252)
  • News (183)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 132 Next »

28%
Accessing Fortran code with Python
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Kheng Ho Toh, , 123RF.com
wrapper for the Fortran functions and subroutines that you want to use in Python. Then, you build the Python function around the C wrapper and use it as a Python module. Calling the C function calls ... Fortran functions called from Python bring complex computations to a scriptable language.
28%
Container orchestration with Kubernetes from Google
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kirsty Pargeter, Fotolia.com
is the standard command for Kubernetes. You can use it to issue the platform commands directly. A kubectl call leads to a request to the Kubernetes API, which is based on the REST principle. The clients register ... Google created a special Linux distribution called Kubernetes to simplify life with Docker.
28%
Ransomware: Prepare for emergencies
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Photo by Michael Geiger on Unsplash
The danger of ransomware attacks calls for a robust backup and monitoring strategy.
26%
Privacy Concerns: Beyond the GDPR
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Lead Image © RAJESH RAJENDRAN NAIR, 123RF.com
May 25, 2018, marked a significant milestone for privacy advocates around the world. It was General Data Protection Regulation (GDPR) Day. I'm not sure anyone calls it that officially, but I ... May 25, 2018, marked a significant milestone for privacy advocates around the world. It was General Data Protection Regulation (GDPR) Day. I'm not sure anyone calls it that officially, but I
26%
Slow Down on SPDY?
27.05.2014
Home »  News  » 
 
A prominent FOSS programmer has called for a reset of the adoption process for the new HTTP 2.0 web protocol. Poul-Henning Kamp, who is most closely associated with the FreeBSD project but also ... An important FOSS developer calls for a reset on efforts to build Google's SPDY protocol into HTTP 2.0.
26%
Dangerous New Attack Could Compromise One Third of All HTTPS Servers
01.03.2016
Home »  News  » 
 
A team of security researchers has uncovered a high-severity new attack that could make up to one third of all HTTPS web traffic vulnerable to compromise. The so-called DROWN attack (CVE-2016 ... OpenSSL project calls the DROWN attack high severity and recommends immediate action.
26%
Malware Discovered in npm Registry that can Affect Linux
15.04.2021
Home »  News  » 
 
If you work with npm, you should be warned of a piece of malware that was discovered, called web-browserify. This new piece of malicious software imitates the official Browserify component, which ... Sonatype has discovered a unique malware within the npm registry, called web-browserify.
25%
A decentralized communication platform
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Mipan, Fotolia.com
, you can alternatively set up the connection using a QR code, which you call up by clicking the button next to the ID (or name) and then scanning the code using the Jami mobile app. When the first ... With clients for all popular distributions, the decentralized messaging app Jami promises maximum anonymity for chats, voice calls, and videoconferencing.
24%
Quantum Computing Milestone Achieved
06.12.2018
Home »  HPC  »  News  » 
 
of control over photons encoded with quantum information." According to the announcement, “Joseph Lukens, Brian Williams, Nicholas Peters, and Pavel Lougovski, research scientists with ORNL’s Quantum
24%
A ptrace-based tracing mechanism for syscalls
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Nadjib BR on Unsplash
the executable to be loaded into memory and executed as a new process. All the dynamic libraries (so-called shared objects) on which the program depends are loaded into the process. Once all libraries are part ... The libiotrace library monitors running, static and dynamically linked programs and collects detailed data for many file-I/O-related function calls.

« Previous 1 2 3 4 5 6 7 8 9 10 11 ... 132 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice