Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode%3 00s Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1047)
  • Article (333)
  • News (112)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 73 74 75 76 77 78 79 80 81 82 83 84 85 86 ... 150 Next »

16%
AlmaLinux and HPC
31.01.2024
Home »  HPC  »  Articles  » 
Information Process Standard (FIPS) 140-3 validation, which means AlmaLinux 9 is using approved algorithms for encryption, hashing, assigning, and so on. AlmaLinux’s move to ABI compatibility has freed it from
16%
Data Analysis with Panda
12.03.2014
Home »  HPC  »  Articles  » 
speeds than in a native Python implementation. The easiest approach is to generate NumPy arrays from existing Python lists: np.array([1, 2, 3]) The np stands for the module name of NumPy, which
16%
Infrastructure as Code with Terraform
20.06.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
© fotolia.com
of the market leaders. It’s not a particularly new technological offering, in that it’s more than two years old, but it’s still absolutely key to running infrastructure in the cloud in an effective and efficient
16%
Lua for Apache
10.07.2012
Home »  Articles  » 
 
to their respective variables in Listing 3, the string.format() function concatenates to create a new string. The %s placeholder replaces string.format() with the content of the firstname and lastname variables
16%
RAM Revealed
26.04.2012
Home »  Articles  » 
 
with their data. Back in the 1980s, operating systems started to use excess RAM as a page cache for caching disk access. The technology used since the start of the millennium, however, is Double Data Rate
16%
Common DevOps Mistakes
29.11.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © leeavison, 123RF.com
, there’s building construction, in which software has “architects” that help with the “blueprint” of the code and then turn it over to the software developers who “build” it. The second metaphor is complex
16%
Docker image security analysis
01.08.2019
Home »  Archive  »  2019  »  Issue 52: Stop...  » 
Photo by Rodolfo Sanches Carvalho on Unsplash
Docker Scan tool [3], which primarily deals with container images. Checkers As you might have guessed from its name, you'll look at Docker as the run time. Docker Scan classes itself, according to its
16%
Pandas: Data analysis with Python
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © yang chao, 123RF.com
speeds than in a native Python implementation. The easiest approach is to generate NumPy arrays from existing Python lists: np.array([1, 2, 3]) The np stands for the module name of NumPy, which
16%
A Real-World Look at Scaling to the Amazon Cloud
04.10.2011
Home »  CloudAge  »  Articles  » 
 
of command-line tools for EC2. S3 [6] (Simple Storage Service) offers permanent storage independent of EC2 virtual machines being deployed and shut down. Specifically, we use S3 to store the code that gets
16%
Advanced MySQL security tips (a complete guide)
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © alphaspirit, 123RF.com
service mysql restart Once backed up, log in to the server and check the SSL status by typing \s or by checking the value of the have_ssl variable (Listing 3). Listing 3 Checking have

« Previous 1 ... 73 74 75 76 77 78 79 80 81 82 83 84 85 86 ... 150 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice