Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1339)
  • Article (364)
  • News (273)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 74 75 76 77 78 79 80 81 82 83 84 85 86 87 ... 199 Next »

8%
Thread processing in Python
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © Christos Georghiou, 123RF.com
around the GIL is to run computationally intensive code outside of Python with tools such as Cython [1] and ctypes [2]. You can even use F2PY [3] with compiled C functions. All of the previously mentioned
8%
Getting the most from your cores
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © ktsdesign, 123RF.com
straightforward. If a processor was operating at a fixed frequency of 2.0GHz, CPU utilization was the percentage of time the processor spent doing work. (Not doing work is idle time.) For 50% utilization
8%
Desktops and applications with Essentials
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © krisckam, 123RF.com
, too, the costs for hardware, operating system, and operating and management costs are added. Citrix provides a very good cost calculator [2] to help you compare costs for a business case. The First
8%
Go testing frameworks
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Lucy Baldwin, 123RF.com
unparalleled at the time called CPAN [2]. Things have since changed, with Perl's popularity steadily declining in the eyes of developers and other languages rising to produce comparably large module libraries
8%
Avoiding KVM configuration errors
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © Dan Barbalata, 123RF.com
is relevant: The Quick Emulator (Qemu) [2] uses KVM to run a guest system in a largely native way on the physical hardware [3]. However, Qemu performs security-critical operations of the guest under its own
8%
Porting CUDA to HIP
15.11.2019
Home »  HPC  »  Articles  » 
use the available HIP debugging tools to troubleshoot the remaining bits. The HIP installation files are available from the GitHub website [2]. After you install HIP and the ROCm environment, you
8%
Sharing a Linux Terminal Over the Web
08.08.2022
Home »  HPC  »  Articles  » 
 will get a command line, as shown in Figure 2, where they can then enter a statement, which will show up on system 1, as on system 2 (Figure 3), typo and all
8%
Security as Code
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © bluebay, 123RF.com
benefit in both the long and the short term. One of the most satisfying of these security tools is Gauntlt [1], whose well-constructed ReadMe file [2] provides the following description: "Gauntlt
8%
News for Admins
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
 
impede the bootloading process of an operating system and can affect any version of GRUB2, prior to version 2.06. The vulnerability allows attackers to hijack and alter the GRUB2 verification process
8%
Tools for managing AWS cloud services
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Photo by elnaz asadi on Unsplash
Management (IAM) support common open identity standards – for example, Security Assertion Markup Language (SAML) 2.0, OpenID Connect, and OAuth 2.0 – to facilitate identity federation. To secure your root user

« Previous 1 ... 74 75 76 77 78 79 80 81 82 83 84 85 86 87 ... 199 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice