Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 谷歌seo霸屏【电报e1000】google收录外推.how.0x00 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (202)
  • Article (72)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 28 Next »

82%
Run TensorFlow models on edge devices
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © leeavison, 123RF.com
--upgrade pip pip install --upgrade tensorflow=2.0 pandas numpy pathlib ## Check the setup python -c "import tensorflow as tf;print(tf.reduce_sum(tf.random.normal([1000, 1000])))" Neural Network
82%
What's your status (page)?
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Tatiana Venkova, 123RF.com
16 services.yml 01 x-tcpservice: &tcpservice 02 type: tcp 03 check_interval: 60 04 timeout: 15 05 allow_notifications: true 06 notify_after: 0 07 notify_all_changes: true 08
82%
Determining CPU Utilization
25.02.2016
Home »  HPC  »  Articles  » 
CPU utilization metrics tell you how well your applications are using your processing resources. ...  __name__ == '__main__':       # Main dictionary     d = {};       # define interval and add to dictionary     interv = 0.5;     d['interval'] = interv;          # Number of cores:     N = psutil.cpu_count();     d ... CPU utilization metrics tell you how well your applications are using your processing resources.
82%
TCP Stealth hides open ports
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © momo5287, 123RF.com
3 04 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 05 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ 06 | Source Port
82%
Monitoring Storage with iostat
25.02.2013
Home »  HPC  »  Articles  » 
/s r/s w/s rMB/s wMB/s avgrq-sz avgqu-sz await r_await w_await svctm %util md1 0.00 0.00 0.04 0.05 0.00 0.00 8.17 0.00 0.00 0.00 0.00 0
81%
Speed up your MySQL database
11.02.2016
Home »  Archive  »  2016  »  Issue 31: Tunin...  » 
Lead Image © Mikhail Dudarev, 123RF.com
Using mpstat # mpstat -P ALL 1 CPU %usr %nice %sys %iowait %irq %soft %steal %guest %gnice %idle all 26.94 0.00 0.59 1.05 0.00 0.02 0.00 0.00 0.00 71 ... Sometimes, the throughput or response time of your MySQL database does not meet expectations. In this article, we show how you can handle some MySQL performance problems.
81%
Favorite benchmarking tools
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Lucy Baldwin, 123RF.com
its execution in the real world (real), as well as how much CPU time was allocated in user and kernel (sys) modes: $ time sleep 1 real 0m1.004s user 0m0.002s sys 0m0.001s What not everyone knows
81%
PowerTOP
21.10.2011
Home »  Articles  » 
 
as experimental. To put PowerTOP 2.0 to meaningful use, you’ll need at least kernel 2.6.36 and preferably 2.6.37. If you have an older kernel, stick with PowerTOP 1.x. At this time, I had to download the source ... Many applications interrupt the CPU when it tries to sleep. PowerTOP not only identifies these evildoers but also provides tips on how to get rid of them.
81%
Monitoring in the Google Cloud Platform
20.06.2022
Home »  Archive  »  2022  »  Issue 69: Terra...  » 
Lead Image © Maksym Chornii, 123rf.com
, describing a measurable number of errors or a percentage of the time a service might not be available and still be considered a valid SLO. In this example, this value is 100 percent minus 99.5 percent, or 0.5
81%
Storage across the network with iSCSI and Synology DiskStation Manager
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Vladimir Nenov, 123RF.com
Attaching an iSCSI Device $ uname -a Linux DANSBOX 6.8.0-35-generic #35-Ubuntu SMP PREEMPT_DYNAMIC Mon May 20 15:51:52 UTC 2024 x86_64 x86_64 x86_64 GNU/Linux $ lsblk NAME MAJ:MIN RM SIZE RO TYPE ... The iSCSI protocol lets you access block storage across a network connection. We show you how to connect a Debian 12 system with a Synology storage device over iSCSI.

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 ... 28 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice