Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (195)
  • Article (97)
  • News (5)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 30 Next »

20%
Reading and understanding database execution plans
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Gunnar Pippel, 123RF.com
"."EUR_VALUE">=10) 26 3 - access<+>6<+>( "S"."SALE_DATE">TRUNC(SYSDATE@!) 27 -INTERVAL'+00-06' YEAR(2) TO MONTH) 1  The explain plan for command only stores the execution plan in the PLAN_TABLE. 2  The DBMS
20%
Linux device mapper writecache
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © lightwise, 123R.com
=test test: (g=0): rw=randwrite, bs=(R) 4096B-4096B, (W) 4096B-4096B, (T) 4096B-4096B, ioengine=libaio, iodepth=32 fio-3.12 Starting 1 process Jobs: 1 (f=1): [w(1)][100.0%][w=654MiB/s][w=167k IOPS][eta 00m:00s
20%
Warewulf Cluster Manager – Completing the Environment
20.06.2012
Home »  HPC  »  Articles  » 
| 3.5 kB 00:00 elrepo | 1.9 kB 00:00 rpmforge
20%
Warewulf Cluster Manager – Master and Compute Nodes
22.05.2012
Home »  HPC  »  Articles  » 
/group_gz | 212 kB 00:00 Package flex-2.5.35-8.el6.x86_64 already installed and latest version Package gcc-4.4.6-3.el6.x86_64 already installed and latest version Package autoconf-2.63-5.1.el6.noarch
20%
Intruder Detection with tcpdump
28.11.2011
Home »  Articles  » 
 
to show seconds and microseconds since the beginning of the Unix epoch (00:00:00 UTC on January 1, 1970) (Figure 3). Figure 3: Reporting time since
20%
Visualizing time series data
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Maxim Kazmin, 123RF.com
application then grabs the data from this database and creates charts. The client can be programmed by the user or it can come as a prepared daemon (e.g., collectd [3]). If you like to measure your own
20%
Logical Bombs for Fun and Benchmarking
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
such invocation is essentially a pure processor workload that will maximally use up to one CPU core while taking up close to zero I/O or memory resources. The top [3] command displays a perfect 1.00 load average
20%
Understanding Layer 2 switch port security
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Taffi, Fotolia.com
by the fake record so that all traffic with destination address ABCD.EF00.0001 will go to the attacker's port. The Ettercap [3] utility, also available on Kali Linux, is often used to launch a MAC
20%
Linux Writecache
19.11.2019
Home »  HPC  »  Articles  » 
, ioengine=libaio, iodepth=32 fio-3.1 Starting 1 process Jobs: 1 (f=1): [w(1)][100.0%][r=0KiB/s,w=1401KiB/s][r=0,w=350 IOPS][eta 00m:00s] test: (groupid=0, jobs=1): err= 0: pid=3104: Sat Oct 12 14:39:08 2019   write: IOPS=352
20%
Resource Management with Slurm
05.11.2018
Home »  HPC  »  Articles  » 
nodes, and make sure to do this as a user and not as root. 3. To make life easier, use shared storage between the controller and the compute nodes. 4. Make sure the UIDs and GIDs are consistent

« Previous 1 ... 4 5 6 7 8 9 10 11 12 13 14 15 16 17 ... 30 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice