Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %252522Rub%26253%2525A9n Llorente"500 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (144)
  • Article (62)
  • News (49)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 26 Next »

32%
JMeter tests loads and measures performance of static and dynamic resources
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by CHUTTERSNAP on Unsplash
Even if you know your website can handle a load of 30 users a second or that more than 500 users causes a small fire in the data center, the big question is: Will the next release work under
32%
Users speak on Kubernetes in business practice
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Lead Image © alphaspirit, 123RF.com
500 developers. The clusters are broken down into testing and production environments. The infrastructure allows the deployment of a new cluster within a few hours. Administrators can easily implement
32%
Machine learning and security
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
it was successful and will receive a reward. Figure 3: The reinforcement learning approach: An agent (A) interacts with the environment (U), performing actions
32%
Business continuity management
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © Andrea Danti, 123RF.com
to Microsoft Azure (E2A) is possible. If you decide to rely on a cloud storage provider who can also host virtual machines, you can also recover your virtual disks via a storage provider (E2SP). If you are only
32%
Linux Storage Stack
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © arsgera, 123RF.com
gives preference to read over write accesses (the default is 500ms for reads compared with 5s for writes). A "sorted queue" keeps all requests sorted by disk sector, to minimize seek time, and feeds
32%
Profiling Python code
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image ©-Yong Hian Lim, Fotolia.com
of code. Listing 1 Time to Execute import time start_time = time.time() # Code to check follows a, b = 1,2 c = a + b # Code to check ends end_time = time.time() time_taken = (end_time- start
32%
Visualizing data captured by nmon
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Orlando Rosu, 123RF.com
(Figure 9) shows that at the time of the CPU spike, the CPU resource was being consumed by a dd task that had nothing to do with the load test program per se
32%
Debian's quest for reproducible builds
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Author, 123RF.com
again taken up this basic idea known as reproducible builds [1]. After about two years of intensive work, by 2017 with Debian 9 "stretch," the project reached a point at which Debian could be built
32%
Outfitting an IT training environment with Docker containers
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Kamonrat Meunklad, 123RF.com
/bash After creating the container, Rama (the user) needs to start the container and run it to get the container access by executing the command: $docker start -a -i Rama The -a option is to attach standard
32%
Citrix NetScaler steps in for Microsoft TMG/ISA
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © Mellimage, 123RF.com
Server, and Hyper-V. The hardware-based appliances are labeled NetScaler MPX and offer a throughput of 500Mbps to 120Gbps (according to the manufacturer). Different devices are targeted at different applications

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 ... 26 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice