Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (319)
  • Article (71)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 40 Next »

65%
Preload Trick
11.05.2021
Home »  HPC  »  Articles  » 
.50GHz Processor base frequency 2.5GHz Max turbo frequency 4.5GHz Cache 8MB Four cores (eight with hyper-threading) 45W TDP 8GB DDR4-2933 memory Maximum of two memory channels
65%
Darshan I/O analysis for Deep Learning frameworks
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Michaela Murphy on Unsplash
[2] (section 3.2). Next, I built the Darshan utilities (darshan-util) with the command: ./configure CC=gcc --prefix=[binary location] Because I'm running these tests on an Ubuntu 20.04 system, I had ... Characterizing and understanding I/O patterns in the TensorFlow machine learning framework with Darshan. ... Darshan I/O analysis for Deep Learning frameworks
65%
Creating load for fun and profit
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Lead Image © Lucy Baldwin, 123RF.com
I have discussed load-generating tools on these pages from the very beginning [1] out of simple practical necessity. Setting aside the benchmarks themselves, the facility generating a load
65%
Profiling Python Code
09.12.2019
Home »  HPC  »  Articles  » 
, it already has several functions. To better illustrate profiling the code, I converted it to simple serial code and called it md_00 1 .py (Listing 5). Then, I profiled the code with cProfile: $ python3 -m c
64%
Exploring OpenShift – Red Hat's next-generation PaaS tool
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
(C) Markus Feilner, CC-BY-SA 4.0
. Be aware that the M4 repositories on the OpenShift.org website contain OpenShift v2, and the M5 repositories lead to OpenShift v3. Version 3 offers several promising new features, but it is still in beta
64%
Secrets and certificate management
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © phive2015, 123rf.com
the Download button, a ZIP file starts downloading. In the following command, you can see the version I'm using as I decompress the file: $ unzip vault_1.3.2_linux_amd64.zip The next thing to do is move
64%
Top Top-Like Tools
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
summary of the status of the system. Let me explain with an example. Figure 1 is a screen shot of my desktop when I was running Python code test3.py (a long-running processor- and memory-intensive piece ... Admins solve problems ranging from slow servers to failing applications. The first tool I reach for when I need to check on a server with shell access is Top.
64%
Professional virtualization with RHV4
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Steve Cukrov, 123RF.com
| Register System . Installing RHV-M You also need a Manager (RHEV-M) that is based on RHEL, either physically or as a virtual machine (VM). To install RHV (i.e., to "soup up" a standard RHEL machine
64%
A script for strict packet filter updates
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © french 03, photocase.com
TS=$(date +%s) 071 ${IPTABLES} -I $@ -m comment --comment "Created: $TS" 072 fi 073 } 074 075 function add_rule 076 { 077 # echo "add: $@" 078 delete_rule $@ 079 080 if [ "${UNBLOCK
64%
Malware Analysis
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © raptorcaptor, 123RF.com
image, and then Volatility [3] and Mandiant Redline [4] for further investigation. In this paper, I dive more deeply into Redline and Volatility. To begin, I review a raw memory dump of a known malware

« Previous 1 ... 5 6 7 8 9 10 11 12 13 14 15 16 17 18 ... 40 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice