Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (571)
  • Article (132)
  • News (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 71 Next »

19%
Optimizing utilization with the EDF scheduler
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © SV-Luma, 123RF.com
0; 105 } The block of code starting with line 17 defines the required system call numbers for three platforms (ARM, 32 bit, and 64 bit). The central data structure that follows, struct sched ... The superior "Earliest Deadline First" task scheduling method has been part of Linux since kernel 3.14.
19%
Using the ATA security features of modern hard disks and SSDs
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © braverabbit, 123RF.com
is now in the SEC5 security state (if it were turned off, this would be SEC3). In this state, you can do two things with the device: block it for all I/O or erase it completely. The lock is automatically ... Modern ATA hard drives and SSDs offer security options that help you control access and reliably destroy data if necessary.
19%
Monitoring HPC Systems
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Alexander Rivosh, 123RF.com
the data. This data is stored using RRDtool [13]. The third piece is called gweb and is the Ganglia web interface. This second-generation web interface offers custom graphs that you can create to match your ... Ganglia is probably the most popular monitoring framework and tool, in that HPC, Big Data, and even cloud systems are using it. In this article, we show you how to install and configure Ganglia
19%
Resource Management with Slurm
05.11.2018
Home »  HPC  »  Articles  » 
One way to share HPC systems among several users is to use a software tool called a resource manager. Slurm, probably the most common job scheduler in use today, is open source, scalable, and easy ...  SelectTypeParameters=CR_Core_Memory,CR_CORE_DEFAULT_DIST_BLOCK,\ CR_ONE_TASK_PER_CORE 40 FastSchedule=1 41 # 42 # LOGGING 43 SlurmctldDebug=3 44 SlurmctldLogFile=/var/log/slurmctld.log 45 SlurmdDebug=3 ... One way to share HPC systems among several users is to use a software tool called a resource manager. Slurm, probably the most common job scheduler in use today, is open source, scalable, and easy
19%
Advanced MySQL security tips (a complete guide)
30.05.2021
Home »  Archive  »  2021  »  Issue 63: Autom...  » 
Lead Image © alphaspirit, 123RF.com
The centralized key management solution offers electronic code book (ECB) and cipher block chaining (CBC) block encryption for tablespace keys and data encryption in the MySQL server. Encryption at rest ... Security safeguards protect data on MySQL servers.
19%
TKperf – Customized performance testing for SSDs and HDDs
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Orcea David, 123RF
-compressible test data. TKperf requires Fio 2.0.3 or higher. In older versions of Fio, some terse output information is missing; this is minimal output that can be easily processed by other programs [4 ... SSD manufacturers try to impress customers with performance data. If you want to know more, why not try your own performance measurements with a standardized test suite that the free TKperf tool
18%
Hybrid public/private cloud
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Photo by JJ Ying on Unsplash
for the inside network card is missing – AWS only sets this when creating the instance. Because the data is now known, the Playbook can define the IP address. Listing 7 Ansible Playbook Part 3 01 ... Extending your data center temporarily into the cloud during a customer rush might not be easy, but it can be done, thanks to Ansible's Playbooks and some AWS scripts.
18%
Red Hat PaaS hyperconverged storage
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Oleksandr Omelchenko, 123RF.com
system provided to the containers running on the host. Here is an example of incorporating a data volume in a Docker container: # docker run -d -P --name web -v /data:/www/webapp fedora/httpd python app ... More and more companies are outsourcing their applications to containers. We look at storage management and how storage of persistent data can be leveraged within containers.
18%
Encrypting files
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Yoichi Shimizu, 123RF.com
the compressed file hpc_001.html.gz. Listing 3 Decrypt a Compressed File gpg -o hpc_001.html.gz -d hpc_001.html.gz.gpg gpg: 3DES encrypted data gpg: encrypted with 1 passphrase gpg: WARNING ... Encrypting your data is becoming increasingly important, but you don't always have to use an encrypted filesystem. Sometimes just encrypting files is enough.
18%
A modern logging solution
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
host aggregator.example.com port 24224 Listing 3 Simple Aggregator Node @type forward port 24224 @type ... Fluent Bit can help you unify data collection and consumption to make sense of logging data.

« Previous 1 ... 7 8 9 10 11 12 13 14 15 16 17 18 19 20 ... 71 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice