Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1278)
  • Article (303)
  • News (160)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 128 129 130 131 132 133 134 135 136 137 138 139 140 141 ... 175 Next »

9%
Magellan Report on Cloud Computing
15.02.2012
Home »  HPC  »  Articles  » 
-source virtualized cloud software stacks for production science use. Finding 5. Clouds expose a different risk model requiring different security practices and policies. Finding 6. MapReduce shows promise
9%
Secret Sauce
09.11.2017
Home »  Articles  » 
. There are a few differences, so a developer has to go in and tweak the remaining 1%.” The ROCm developers recently converted the CUDA-based Caffe machine learning library to HIP and found that 99.6% of the 55
9%
HPC Container Maker
13.06.2018
Home »  HPC  »  Articles  » 
 with: ../src/configure -v      --with-pkgversion='Ubuntu 5.4.0-6ubuntu1~16.04.9'      --with-bugurl=file:///usr/share/doc/gcc-5/README.Bugs      --enable-languages=c,ada,c++,java,go,d,fortran,objc,obj-c++      --prefix
9%
Porting CUDA to HIP
15.11.2019
Home »  HPC  »  Articles  » 
. The ROCm developers have also ported the LAMMPS molecular dynamics simulator and the HPGMG benchmark to HIP with similar success. Another porting project was the Caffe deep learning framework [5], where 99.6
9%
Darshan I/O Analysis for Deep Learning Frameworks
18.08.2021
Home »  HPC  »  Articles  » 
-job-summary.pl tool to create a PDF summary of the analysis. The very top of the PDF file (Figure 6) gives you some quick highlights of the analysis. The top line in the output says that one processor was used
9%
Security as Code
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © bluebay, 123RF.com
/CD) process, you can automate the monitoring of your systems, dependent on your scenario. Gauntlt's scripts come in the form of "attack files" [6]; each plain text file ends with the .attack extension. Listing
9%
PowerShell add-on security modules
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
| sed '1,6d;s/[";]//g;s/\\/,0/g' | tr -d '\n' | cut -c2- This command string correctly prepares the -Shellcode parameter value. When passed to -Shellcode without specifying a process ID, the Invoke
9%
Detecting phishing domains with dnstwist
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © tobkatrina, 123RF.com
in the Domain Name System and shows the IPv4 or IPv6 address to which they refer. Figure 1: A first call with just the domain of interest produces many
9%
Workflow-based data analysis with KNIME
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Andrea De Martin, 123RF.com
over the color for the bars (Figure 6). Figure 6: Histogram of the groups of readers as determined by cluster analysis. Visualizing Multiple
9%
Planning Performance Without Running Binaries
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
bottlenecks, not absolute speedup numbers for the whole codebase. Second, given more resources, you will usually process more data or do more work. Gustafson's law [6] provides an alternative formulation

« Previous 1 ... 128 129 130 131 132 133 134 135 136 137 138 139 140 141 ... 175 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice