search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%xcode%3 00 Llorente"5432
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(49)
Keywords
« Previous
1
2
3
4
5
26%
Tuning loops – from loop unrolling to Duff's device
28.07.2025
Home
»
Archive
»
2025
»
Issue 88: 5 Net...
»
of all evil" sums up this point of view neatly [
3
]. The reasons for such a statement are particularly apparent in the many mangling strategies one can choose to apply to loops (Table 1). These strategies
25%
Tracing applications with OProfile and SystemTap
30.11.2025
Home
»
Archive
»
2010
»
Issue 1: System...
»
opcontrol --list-events oprofile: available events for CPU type "Core 2" See Intel Architecture Developer's Manual Volume
3
B, Appendix A and Intel Architecture Optimization Reference Manual (730795-001) INST
25%
Efficient central management of Windows libraries
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
are available in the group policy management editor below User Configuration | Policies | Windows Settings | Folder Redirection (see Figure
3
). Figure
3
: Managing
25%
Managing virtual machines
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
to give you consistent results with a running system. A cleaner approach would be to use an image backup program for Linux, such as Clonezilla [2] or Partimage [
3
], which means shutting down the system
25%
Neglected IPv6 features endanger the LAN
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
::1 (all nodes; Figure
3
). The payload of this message includes all valid IPv6 prefixes on the local subnet and other flags that allow a sophisticated configuration. The RA message is also repeated
25%
Monitor applications end to end
26.01.2025
Home
»
Archive
»
2025
»
Issue 85: Monit...
»
continuously slows down after
3:00
pm, suitable extrapolation methods can be used to determine when the shopping cart will no longer respond and allow developers and administrators to take action in good time
25%
Network analysis with Wireshark
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
for the type of analysis you want to perform. Capture filters use the Libpcap syntax. To filter for a specific MAC address, you would do the following in Libpcap syntax: ether host
00
:25:4b:bd:24:94 However
25%
I/O benchmarks with Fio
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
SUSE 11.
3
, the benchmark repository offers an up-to-date package [1]. Fio is also included with Fedora. The source code from the tarball or Git repository can be compiled with a simple make, assuming you
25%
Script utilities in depth: grep, awk, and sed
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
. Here are some examples: _{
3
,} – Three or more consecutive underscores · {2,5} – Between two and five spaces in a row (where · is a space) (the·){2} – Two consecutive
« Previous
1
2
3
4
5