Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6mb 100 Llorente"523 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (110)
  • Article (41)
  • News (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 8 9 10 11 12 13 14 15 16 Next »

38%
Profiling Python Code
09.12.2019
Home »  HPC  »  Articles  » 
|     0.745732|     0.745732|  0.04%|# :978 _find_and_load      6|         1|  2.57492e-05|  2.57492e-05|  0.00%|from sys import exit (call)|         1|   1.7643e-05|   1.7643e-05|  0.00%|# :1009 _handle_fromlist      7|         1|  7.86781e-06
38%
Profiling Python code
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image ©-Yong Hian Lim, Fotolia.com
.00%|# :1009 _handle_fromlist 5| 1| 2.55108e-05| 2.55108e-05| 0.00%|import numpy as np (call)| 1| 0.745732| 0.745732| 0.04%|# :978 _find_and_load 6| 1| 2.57492e-05
38%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© maigi, 123rf.com
authentication on the basis of text messages. Zyxel [6], the Taiwanese network equipment manufacturer, has a two-factor authentication solution in its portfolio. It provides VPN access to the company's own Zy
38%
Kafka: Scaling producers and consumers
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
Photo by Patrick Schneider on Unsplash
are generally pretty cheap – go you!). That means you could easily be mirroring 1000+ partitions into your central Kafka for each edge cluster. Figure 1: The data
37%
OpenACC – Porting Code
07.03.2019
Home »  HPC  »  Articles  » 
relative to the data values. For example, if the difference between two numbers is 100.0, but you are working with values of 10^8, then the difference (0.001%) might not be important. It’s really up
37%
Processing streaming events with Apache Kafka
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Photo by Mark Decile on Unsplash
payment = new Payment(orderId,**1000.00d); 07 final ProducerRecord record = 08 new ProducerRecord("transactions", 09 payment
37%
RESTful APIs in practice
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Michal Bednarek, 123RF.com
and follower data. The OAuth protocol [6] authenticates the API client, and JSON is the data format. A separate streaming API is available for real-time monitoring of tweets. If you want to use the Twitter API
37%
Open Source Security Information and Event Management system
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Yoichi Shimizu, 123RF.com
25GB hard drive 32- or 64-bit processor Two NICs that support the e1000 driver on Debian Linux OSSIM is designed to be installed in a virtual environment, so you should consider a few more
37%
Save money with Samba as the domain controller on a legacy Windows NT-style domain
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© Bernad, fotolia.com
privileges. This means domain administrators must assign themselves this privilege. Listing 6 shows how a domain administrator would go about this. Listing 6 Assigning Privileges root
37%
Understanding the Status of Your Filesystem
18.06.2014
Home »  HPC  »  Articles  » 
is it? Which user has the largest capacity? Which user has the most files? What is the oldest file and how old is it? These are deceptively easy questions to answer, but what if you have 1,000 users

« Previous 1 ... 8 9 10 11 12 13 14 15 16 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice