Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (909)
  • Article (318)
  • News (106)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 49 50 51 52 53 54 55 56 57 58 59 60 61 62 ... 134 Next »

26%
RAM Revealed
26.04.2012
Home »  Articles  » 
 
with their data. Back in the 1980s, operating systems started to use excess RAM as a page cache for caching disk access. The technology used since the start of the millennium, however, is Double Data Rate
26%
Common DevOps Mistakes
29.11.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © leeavison, 123RF.com
, there’s building construction, in which software has “architects” that help with the “blueprint” of the code and then turn it over to the software developers who “build” it. The second metaphor is complex
26%
Docker image security analysis
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Rodolfo Sanches Carvalho on Unsplash
Docker Scan tool [3], which primarily deals with container images. Checkers As you might have guessed from its name, you'll look at Docker as the run time. Docker Scan classes itself, according to its
26%
Mocking and emulating AWS and GCP services
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Juri Samsonov, Fotolia.com
): self.name = name self.value = value def save(self): s3 = boto3.client("s3", region_name="us-east-1") s3.put_object(Bucket="mybucket", Key=self.name, Body=self.value) def test_s
26%
Pandas: Data analysis with Python
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © yang chao, 123RF.com
speeds than in a native Python implementation. The easiest approach is to generate NumPy arrays from existing Python lists: np.array([1, 2, 3]) The np stands for the module name of NumPy, which
26%
A Real-World Look at Scaling to the Amazon Cloud
04.10.2011
Home »  CloudAge  »  Articles  » 
 
of command-line tools for EC2. S3 [6] (Simple Storage Service) offers permanent storage independent of EC2 virtual machines being deployed and shut down. Specifically, we use S3 to store the code that gets
26%
High-performance Python – compiled code and C interface
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Lead Image © Konrad Bak, 123RF.com
source JIT compiler that translates a subset of Python and NumPy [2] code into fast machine code at run time; hence, the "JIT" designation. Numba uses the LLVM [3] compiler library for ultimately compiling
26%
Advanced MySQL security tips (a complete guide)
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © alphaspirit, 123RF.com
service mysql restart Once backed up, log in to the server and check the SSL status by typing \s or by checking the value of the have_ssl variable (Listing 3). Listing 3 Checking have
26%
How to Hide a Malicious File
09.01.2012
Home »  Articles  » 
 
the executable, will open a meterpreter shell on the victim’s Windows box (see Figure 3). Figure 3: msfcli multi/handler options (above) and executing the listener
26%
Graph database Neo4j discovers fake reviews on Amazon
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Image by Gerd Altmann from Pixabay
with the official API or a scraper. Listing 1 reviews.yaml reviews: product1: - reviewer1 - reviewer2 - reviewer3 - reviewer7 product2: - reviewer1 - reviewer2

« Previous 1 ... 49 50 51 52 53 54 55 56 57 58 59 60 61 62 ... 134 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice