Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb%3 00s Llorente"5432 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (304)
  • Article (102)
  • News (5)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 15 16 17 18 19 20 21 22 23 24 25 26 27 28 ... 42 Next »

28%
CPU affinity in OpenMP and MPI applications
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © podfoto, 123RF.com
MiB L1i cache: 1 MiB L2 cache: 16 MiB L3 cache: 128 MiB NUMA node0 CPU(s): 0-63 Vulnerability Itlb multihit
28%
Matlab-Like Tools for HPC
03.01.2013
Home »  HPC  »  Articles  » 
-1.el6 epel 9.1 M Installing for dependencies: GraphicsMagick x86_64 1.3.17-1.el6 epel 2.2 M GraphicsMagick-c++ x86_64 1.3.17-1.el6
28%
Building a port scanner in Python
28.07.2025
Home »  Archive  »  2025  »  Issue 88: 5 Net...  » 
Lead Image © Leo Blanchette, 123RF.com
installed on your system. If Python is not installed, you can install it with: sudo apt install python3 With VS Code and the necessary extensions set up, you are now ready to start developing your port
28%
High-Performance Python 2
22.08.2019
Home »  HPC  »  Articles  » 
the Code $ python3 Python 3.7.3 (default, Mar 27 2019, 22:11:17)  [GCC 7.3.0] :: Anaconda, Inc. on linux Type "help", "copyright", "credits" or "license" for more information. >>> import
28%
Tuning I/O Patterns in C
31.07.2013
Home »  HPC  »  Articles  » 
. The OS then takes these requests and acts upon them, returning a result to the application. Understanding the I/O pattern from an application’s perspective allows you to focus on that application. Then
28%
Network analysis with Wireshark
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© Reinhard Eisele
for the type of analysis you want to perform. Capture filters use the Libpcap syntax. To filter for a specific MAC address, you would do the following in Libpcap syntax: ether host 00:25:4b:bd:24:94 However
28%
Mocking and emulating AWS and GCP services
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Juri Samsonov, Fotolia.com
): self.name = name self.value = value def save(self): s3 = boto3.client("s3", region_name="us-east-1") s3.put_object(Bucket="mybucket", Key=self.name, Body=self.value) def test_s
28%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home »  Archive  »  2012  »  Issue 07: Xen v...  » 
© Daniela Mangiuca, 123RF.com
:add-symbol-file module.ko text_address -s .data data_address -s .bss bss_address 9. Debug: Set breakpoints and so on. In Toolchain , enable the Build gdb for the Host option; in Kernel | Kernel version , type 3
28%
Business continuity for small to medium-sized enterprises
30.11.2025
Home »  Archive  »  2012  »  Issue 08: FreeNAS  » 
© Andrea, Fotolia.com
) or even be booted in a virtual environment. This virtual boot function is perfect for smaller companies. It lets administrators boot a ShadowProtect image directly in the free VirtualBox [3] environment
28%
Accessing Fortran code with Python
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © Kheng Ho Toh, , 123RF.com
a shared object (.so) suitable for Python to import: $ ls -s total 120 112 secretcode.cpython-37m-x86_64-linux-gnu.so 4 secret.f90 4 secret.pyf To test the code, run python3 (Listing 4). Remember

« Previous 1 ... 15 16 17 18 19 20 21 22 23 24 25 26 27 28 ... 42 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice