Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1060)
  • Article (311)
  • News (197)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 130 131 132 133 134 135 136 137 138 139 140 141 142 143 ... 158 Next »

11%
Scale-out with PostgreSQL
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Alberto Andrei Rosu, 123RF.com
to sorted sequence table (SST) files as soon as it reaches a certain size (128MB by default), creating many SST files with all intermediate versions. To limit the amount of data, these files are compressed
11%
Kafka: Scaling producers and consumers
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Patrick Schneider on Unsplash
.request.size Limit the number and size of batches (record-size-max). Time spent waiting for I/O Are you really waiting (io-wait-ratio)? buffer.memory + queued requests 32MB default (roughly
11%
PC over IP
03.09.2013
Home »  Articles  » 
 
. In the Manage Devices section, all Teradici PCoIP devices on the network are detected and listed automatically (Figure 6). Figure 6: Simple but functional
11%
SSH on Windows
17.09.2013
Home »  Articles  » 
with ssh-agent ; the -l option lists the currently stored keys. With the Windows MobaXterm SSH client, you can easily enable the SSH agent, for example, in the program settings (Figure 6). The PuTTY Suite
11%
OpenStack: Shooting star in the cloud
21.05.2014
Home »  Articles  » 
Stack definitely allows users to collect data on VMs and store the data persistently beyond a restart of the virtual machine. This is where Cinder enters the game (Figure 6): Cinder equips virtual machines
11%
Tricking Intruders with HoneypotMe
26.10.2012
Home »  Articles  » 
 
that the frequently forwarded ports belong to services typically used by malware to infect new systems (Figure 6). Figure 6: Registered attacks on various ports
11%
Ceph Maintenance
12.08.2013
Home »  HPC  »  Articles  » 
.tool The output is given in JSON format (Figure 5), so piping it to python -m json.tool makes the output readable (Figure 6). Figure 5: Performance data queried
11%
Cloud Forensics
03.02.2012
Home »  Articles  » 
 
be sure that the evidence is genuine and has not been injected by a malicious third-party? In this context, the term data provenance [6] becomes extremely meaningful: It covers the origins of the piece
11%
High-Performance Python 1
16.07.2019
Home »  HPC  »  Articles  » 
a “wrapper function” for the library in Python (Listing 6). Listing 6: Wrapper Function import ctypes   _sum = ctypes.CDLL('libsum.so') _sum.sum_function
11%
OpenMP – Parallelizing Loops
03.04.2019
Home »  HPC  »  Articles  » 
) by each thread, you would probably put the parallel region around the outside loop (Table 6); otherwise, the work on each thread is less (fewer loops), and you aren't taking advantage of parallelism

« Previous 1 ... 130 131 132 133 134 135 136 137 138 139 140 141 142 143 ... 158 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice