Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 谷歌seo霸屏【电报e1000】google收录外推.how.0x05 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (329)
  • Article (126)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 46 Next »

73%
Nine home clouds compared
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © inertia@intuitivmedia.net
.21 –   EUR5.95 EUR1.00 (with French VAT) EUR2.78 (half price as of year two) – $2.92 License(s) AGPL, commercial GPL, LGPL, AGPL Commercial GPLv3
73%
HPC Monitoring: What Should You Monitor?
15.01.2014
Home »  HPC  »  Articles  » 
well, because they were part of a production-level HPC installation. The clusters were about a 40x price/performance improvement over the Origins, so everyone wanted to see just how well these systems
73%
Optimizing utilization with the EDF scheduler
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © SV-Luma, 123RF.com
, unsigned int flags) 057 { 058 return syscall(__NR_sched_getattr, pid, attr, size, flags); 059 } 060 061 void *run_deadline(void *data) 062 { 063 struct sched_attr attr; 064 int x = 0, ret; 065
73%
Profiling application resource usage
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© fauxware, fotolia.com
Franklin Some big changes are happening in the processor world right now. For the past 15 years or so, both the HPC world and the enterprise world have settled on, for the most part, x86 as the processor ... Computing hardware is constantly changing, with new CPUs and accelerators, and the integration of both. How do you know which processors are right for your code?
73%
Gatling load-testing tool
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by NoWah Bartscher on Unsplash
class BlazeDemoV1 extends Simulation { 08 09 var qualifiedhost = "http://blazedemo.com" 10 var proxyport = 0 11 var proxyhost = "not set" 12 13 // headers for HTTP call 14 val headers = Map( 15
73%
Analysis tour with Binary Ninja
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Lead Image © Igor Kovalchuk, 123RF.com
and eax with  . Instead of xor eax, eax, you could also use mov eax, 0x0. In fact, this is already a compiler optimization, because the opcode is two bytes shorter, which prepares the arguments for __printf ... Binary analysis is an advanced technique used to work through cyberattacks and malware infestations and is also known as reverse engineering. We show you how to statically analyze binary programs
73%
Linux Essentials for Windows Admins – Part 2
06.08.2012
Home »  Articles  » 
 
2 khess khess 4096 2012-07-03 15:59 Desktop drwxr-xr-x 2 khess khess 4096 2012-07-03 15:58 Documents -rw-r--r-- 1 root root 0 2012-07-07 15:04 goo.txt -rw-r--r-- 1 khess khess 49 2012
73%
Adding high availability to a Linux VoIP PBX
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Lead Image © MIR, Fotolia.com
. The same HA technology in use at these critical call centers is also freely available to home users and small offices. In this article, I explore how to create a HA cluster out of any two Linux-based Vo
73%
Let the editor wars begin!
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Kirill Makarov, 123RF.com
, interesting, and worthwhile exercise. I argue that systems administration needs a command-line editor, because it can be used even if X windows isn't working or isn't installed on the servers. Knowing how
73%
Filesystem Encryption
12.05.2014
Home »  Articles  » 
 
]$ cd ~/encrypted [laytonjb@test1 encrypted]$ ls -l total 8 lrwxrwxrwx 1 laytonjb laytonjb 24 Sep  4 15:12 acS5u3K9TJ,9FWTDUq0yWqx6 -> XuD50Mah2kp2vukDeo04cOv, -rw-rw-r-- 1 laytonjb laytonjb 18 Sep  4 15:12 WvPjlWtCaq5g9hE1

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 46 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice