Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1280)
  • Article (314)
  • News (208)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 181 Next »

18%
Profiling Python Code
09.12.2019
Home »  HPC  »  Articles  » 
 to check follows a, b = 1,2 c = a + b # Code to check ends end_time = time.time() time_taken = (end_time- start_time)   print(" Time taken in seconds: {0} s").format(time_taken_in_micro) If a section of code
18%
Profiling Python code
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image ©-Yong Hian Lim, Fotolia.com
_time) print(" Time taken in seconds: {0} s").format(time_taken_in_micro) If a section of code is called repeatedly, just sum the elapsed times for the section and sum the number of times that section
18%
Tested – Tenable Nessus v6
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Author, 123RF.com
sounds very much like open source, Nessus became a proprietary product by Tenable Network Security 10 years ago. Up to version 3.0, the product was released under the GPL, but this stopped in October 2005
17%
Dispatches from the world of IT
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
 
tune into financial reports from iconic Linux vendor Red Hat as an indicator of industry health. The fourth quarter of 2012 shows some promising results for Red Hat, with revenue up 17% over the year
17%
Criminal Crypto Defeated Cops Nine Times in 2013
09.07.2014
Home »  News  » 
 
successful criminal crypto episodes in 2012. Before 2012, there were no reported cases of police failing to recover original text. Federal and state agencies were successful in breaking crypto in 32 cases
17%
Desired State Configuration for Linux
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © SORAPONG CHAIPANYA, 123RF.com
environment, the required infrastructure is set up quickly. After installing the Windows Management Framework 4 [1], included in Server 2012 R2 and Windows 8.1, you already have the tools in place. Power
17%
SPDY HTTP Protocol
08.06.2012
Home »  Articles  » 
 
, Mark Nottingham, the chair of the group recently tripped a discussion relating to HTTP 2.0, the first draft of which is due May 2012. One year later, the changes are to be implemented in the scope
17%
When I/O Workloads Don’t Perform
12.05.2021
Home »  HPC  »  Articles  » 
you are interested (Listing 1). Listing 1: sg_logs $ sudo sg_logs /dev/sdc     SEAGATE   ST14000NM0001     K001 Supported log pages  [0x0]:     0x00        Supported log pages [sp]     0x02
17%
When I/O workloads don't perform
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © Viacheslav Iakobchuk, 123RF.com
14000NM0001 K001 Supported log pages [0x0]: 0x00 Supported log pages [sp] 0x02 Write error [we] 0x03 Read error [re] 0x05 Verify error [ve] 0x06
17%
Hybrid public/private cloud
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Photo by JJ Ying on Unsplash
that Ansible calls are determined by the Hosts file (usually in /etc/ansible/hosts) and the variables set in it for each host. Listing 1 shows the original file. Listing 1 ELK Stack Hosts File 10.0

« Previous 1 ... 28 29 30 31 32 33 34 35 36 37 38 39 40 41 ... 181 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice