Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (169)
  • Article (56)
  • News (7)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 24 Next »

88%
LibreOffice in the workplace
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © mipan, 123RF.com
, consider the possibility of checking for an update and downloading it directly – not a good option for 1,000 individual users. If you want to use LibreOffice in your company on a comprehensive
88%
Isolate workloads from Docker and Kubernetes with Kata Containers
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Stephen Pedersen on Unsplash
variable. Upper limits for N are about 1,000 containers, because more than 1,024 IP addresses will not work with the virtual bridge interface that Docker uses. In the case of Kata Containers, 700 instances
88%
Managing Storage with LVM
07.11.2023
Home »  HPC  »  Articles  » 
PVs, /dev/sdb1  and /dev/sdd , are used to create a linear VG named vg0  with default extents of 4MiB: # vgcreate vg0 /dev/sdb1 /dev/sdd The first PV, /dev/sdb1 , has 125,000 extents (500,000Mi
88%
Look for Bottlenecks with Open|SpeedShop
21.12.2011
Home »  HPC  »  Articles  » 
.155000   1629.353117         512  PMPI_Init (libmonitor.so.0.0.0: pmpi.c,103) 729.541000        0.000001         0.907746     4667648  MPI_Waitall (libmpich.so.1.0: waitall.c,57) 21.905000      17
88%
Failure to Scale
03.07.2013
Home »  HPC  »  Articles  » 
). For one process, the wall clock time is assumed to be 1,000 seconds. This means that 200 seconds of the wall clock time is the serial portion of the application. Also, vary the number of processes from 1
88%
Finding Memory Bottlenecks with Stream
25.09.2013
Home »  HPC  »  Articles  » 
evaluations, Newton’s method for evaluation functions, and many DSP operations, this benchmark can be directly associated with application performance. The FMA operation has its own instruction set now
88%
John the Ripper
22.08.2011
Home »  Articles  » 
 
’s password and shadow files to a remote location. This procedure allows the hacker to crack the passwords at his leisure and in the safety of his own computer lab. Once the hacker collects a system’s password
88%
Google+ with Business
02.09.2011
Home »  Articles  » 
 
’Reilly, who is also a Twitter user, says that, despite having approximately 55,800 followers on Google+ compared with more than 1,489,000 Twitter followers, he notices more comments and feedback on his Google ... Google+ isn’t officially ready for corporate use, but users are already excited about what this new social networking platform means for the workplace. We look at how you can leverage Google’s ... Google+ with Business ... Google+ Means Business
88%
Server virtualization with Citrix XenServer
04.08.2011
Home »  CloudAge  »  Articles  » 
 
. Depending on the functional scope, the prices are between US$ 1,000 and US$ 5,000 including 12 months of free upgrades, news, and information. For newcomers to the world of server virtualization, Citrix
88%
Pymp – OpenMP-like Python Programming
15.04.2020
Home »  HPC  »  Articles  » 
. As for the shared memory, according to the Pymp website, “… the memory is not copied, but referenced. Only when a process writes into a part of the memory [does] it gets its own copy of the corresponding memory

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 24 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice