NUMA Programming on Red Hat Enterprise Linux 6 Part 3 - Bitmask Operations
In part three of the NUMA video series, George Hacker looks at common bitmask operations such as bitmask allocation/destruction, manipulation and modification, and query and comparison.
Other videos in the series:
Part 1 - Introduction to NUMA
Part 2 - Getting Started with libnuma
Part 4 - Policy Operations & Memory Allocation
Part 5 - Miscellaneous NUMA Functions
