Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1026)
  • Article (300)
  • News (156)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 107 108 109 110 111 112 113 114 115 116 117 118 119 120 ... 149 Next »

9%
Secret Sauce
09.11.2017
Home »  Articles  » 
. There are a few differences, so a developer has to go in and tweak the remaining 1%.” The ROCm developers recently converted the CUDA-based Caffe machine learning library to HIP and found that 99.6% of the 55
9%
HPC Container Maker
13.06.2018
Home »  HPC  »  Articles  » 
 with: ../src/configure -v      --with-pkgversion='Ubuntu 5.4.0-6ubuntu1~16.04.9'      --with-bugurl=file:///usr/share/doc/gcc-5/README.Bugs      --enable-languages=c,ada,c++,java,go,d,fortran,objc,obj-c++      --prefix
9%
Porting CUDA to HIP
15.11.2019
Home »  HPC  »  Articles  » 
. The ROCm developers have also ported the LAMMPS molecular dynamics simulator and the HPGMG benchmark to HIP with similar success. Another porting project was the Caffe deep learning framework [5], where 99.6
9%
Darshan I/O Analysis for Deep Learning Frameworks
18.08.2021
Home »  HPC  »  Articles  » 
-job-summary.pl tool to create a PDF summary of the analysis. The very top of the PDF file (Figure 6) gives you some quick highlights of the analysis. The top line in the output says that one processor was used
9%
Security as Code
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © bluebay, 123RF.com
/CD) process, you can automate the monitoring of your systems, dependent on your scenario. Gauntlt's scripts come in the form of "attack files" [6]; each plain text file ends with the .attack extension. Listing
9%
PowerShell add-on security modules
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
| sed '1,6d;s/[";]//g;s/\\/,0/g' | tr -d '\n' | cut -c2- This command string correctly prepares the -Shellcode parameter value. When passed to -Shellcode without specifying a process ID, the Invoke
9%
Detecting phishing domains with dnstwist
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © tobkatrina, 123RF.com
in the Domain Name System and shows the IPv4 or IPv6 address to which they refer. Figure 1: A first call with just the domain of interest produces many
9%
Workflow-based data analysis with KNIME
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Andrea De Martin, 123RF.com
over the color for the bars (Figure 6). Figure 6: Histogram of the groups of readers as determined by cluster analysis. Visualizing Multiple
9%
Planning Performance Without Running Binaries
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
bottlenecks, not absolute speedup numbers for the whole codebase. Second, given more resources, you will usually process more data or do more work. Gustafson's law [6] provides an alternative formulation
9%
Updating Docker containers with Watchtower
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Alan on Unsplash
_SCHEDULE="0 0 */6 * * *" to the docker run command. As discussed earlier, if you use containers for which automatic updates are difficult or unreliable, you can also configure Watchtower simply to check

« Previous 1 ... 107 108 109 110 111 112 113 114 115 116 117 118 119 120 ... 149 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice