Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: 谷歌seo霸屏【电报e1000】google收录外推.how.0x00 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (202)
  • Article (72)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 28 Next »

79%
Redfish standard as a replacement for IPMI Chassis Management
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © isselee, 123RF.com
with Python 01 import requests 02 import json 03 system = requests.get("http://172.17.0.2/redfish/v1/Systems/1").json() 04 print( system['SerialNumber'] ) 05 serial = requests.get("http://172.17.0.2/redfish ... Redfish has been slated to replace the Intelligent Platform Management Interface (IPMI) for hardware management over the network. We explain how the Redfish standard works and how it is used
79%
OpenSMTPD makes mail server configuration easy
08.10.2015
Home »  Archive  »  2015  »  Issue 29: Rescu...  » 
Lead Image © alphaspirit, 123RF.com
:/etc/smtpd_remote.db 04 listen on 192.0.2.15 inet4 port 25 hostname post.example.org tls pki post 05 listen on 192.0.2.15 inet4 port 587 hostname mail.example.org tls-require pki mail auth tag remote 06 listen
79%
Get Started with Parallel CPython
07.11.2011
Home »  HPC  »  Articles  » 
04 from multiprocessing import Process 05  06 def count(number, label): 07     for i in xrange(number): 08         print ' ' + str(i) + ' ' + label 09         sleep((number ‑ 15)/10.0) 10  11
79%
Booting Windows from a compressed image
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © ximagination, 123RF.com
on the basis of a preinstalled Windows 8.1 computer. In this article, I will describe how to perform the necessary preparations for using WIMBoot on a Windows 8.1 system, how to install the technology, and your
79%
Saving Storage Space with Reduced Precision
19.06.2023
Home »  HPC  »  Articles  » 
a = 100.0*np.random.random((N,N)) a.astype(np.float64) print("a[5,5] = ",a[5,5]," type = ",a[5,5].dtype) np.save('double', a) b = np.copy(a) b = b.astype(np.float32) print("b[5,5] = ",b[5,5]," type = ",b[5
79%
OpenACC – Porting Code
07.03.2019
Home »  HPC  »  Articles  » 
OpenACC directives can improve performance if you know how to find where parallel code will make the greatest difference. ... relative to the data values. For example, if the difference between two numbers is 100.0, but you are working with values of 10^8, then the difference (0.001%) might not be important. It’s really up ... OpenACC directives can improve performance if you know how to find where parallel code will make the greatest difference.
79%
CRI-O and Kubernetes Security
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © Corina Rosu, 123rf.com
Listing 8 config.json File Content 01 { 02 "ociVersion": "1.0.0", 03 "process": { 04 "user": { 05 "uid": 0, 06 "gid": 0 07 }, 08 "args": [ 09 "/usr
79%
Prepare, analyze, and visualize data with R
07.06.2019
Home »  Archive  »  2019  »  Issue 51: Self-...  » 
Lead Image © Buchachon Petthanya, 123RF.com
to see which arguments belong to which function. Listing 5 Pipe Operator > x <- c(TRUE, FALSE, TRUE, TRUE, FALSE, FALSE, TRUE, NA) > > # base > paste0(round(mean(x, na.rm = TRUE), 2
79%
Building an HPC Cluster
16.06.2015
Home »  HPC  »  Articles  » 
the traffic is pretty easy by giving each network interface (NIC) in the node an IP address with a different address range. For example, eth0 might be on a 10.0.1.x network, and eth1 on 10.0.2.x network
79%
Static code analysis finds avoidable errors
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © Andrey KOTKO, 123RF.com
illustrates the differences. Listing 1 Two Ways to Indent Code 01 if (x == y) then 02 { 03 do something; 04 } 05 06 while ( x < y) { 07 x = x+1; 08 } The indentation depth

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 28 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice