Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (363)
  • Article (98)
  • News (7)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 40 41 42 43 44 45 46 47

24%
Processing streaming events with Apache Kafka
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Photo by Mark Decile on Unsplash
developed by the career platform LinkedIn to process massive volumes of data in real time. Today, Kafka is used by more than 80 percent of the Fortune 100 companies, according to the project's own information
24%
Detect failures and ensure high availability
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Tim Foster on Unsplash
, on the secondary node, enter: $ watch -n1 cat /proc/drbd You should see something similar to the output shown in Listing 3. When synchronization is 100 percent complete, the same file will showcase the output
24%
Open Source Security Information and Event Management system
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Yoichi Shimizu, 123RF.com
management and threat intelligence from AlienVault Labs, a service that provides continuous intelligence on IP reputation, which helps you make more informed decisions. The All-In-One option includes 100
24%
Warding off the rise of VoIP spam
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Izaokas Sapiro, 123RF.com
, and to provide protection against VoIP spam by various means. Additionally, other initiatives are SpITAssassin [6], an extension of SpamAssassin functionality, and the SPIT defense solution (SPIT AL). SPIT AL
24%
PostgreSQL 9.3
04.02.2014
Home »  Articles  » 
 
process (Commitfest) that ensures the quality of the source code. Typically, Commitfests see up to 100 patches; because of the sheer volume, the feature freeze deadline was regularly postponed
24%
Parallel I/O Chases Amdahl Away
12.09.2022
Home »  HPC  »  Articles  » 
 = np.random.rand(nx,ny)*100.0   # Random data in arrayy       np.save(filename, a) # Write data to file       print("    Just finished writing file, ",filename,".npy") # end for The code in Listing 2 reads the five files
24%
TLS 1.3 and the return of common sense
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image Creative Commons CC0 TheDigitalArtist Pixabay
]). Figure 2: A vulnerable majority: Only a tiny number of sites surveyed in May 2018 (7.6%) support a 3,072-bit key exchange (image source: Qualys SSL Labs [2]). On discovering the ROBOT exploit against
24%
New in PostgreSQL 9.3
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Nuno Andre, 123RF.com
process (Commitfest) that ensures the quality of the source code. Typically, Commitfests see up to 100 patches; because of the sheer volume, the feature freeze deadline was regularly postponed
24%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home »  Archive  »  2011  »  Issue 4: Secure...  » 
© jirkaejc, 123RF.com
). The following command finds all lines that begin with an opening tag and end with the corresponding closing tag: grep "^<([^/ >]+)[^>]*>.*$" something.htm The command displays lines 1, 2, 6, 7, and 10

« Previous 1 ... 40 41 42 43 44 45 46 47

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice