Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede%3 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1592)
  • Article (347)
  • News (206)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 153 154 155 156 157 158 159 160 161 162 163 164 165 166 ... 215 Next »

18%
Core Linux Commands for HPC
09.03.2025
Home »  Articles  » 
will be controversial, revolve around networking (Table 3). The idea is to start understanding the basics of networking and a few commands on how to check on various aspects. Table 3: Secondary Networking HPC Linux
18%
Live migration of virtual machines on Hyper-V
31.10.2025
Home »  Archive  »  2012  »  Issue 12: NAS S...  » 
© Anna Omelchenko, 123RF.com
, such as an external hard drive, or directly across the network. You can also set up a schedule (Figure 3). Figure 3: Scheduling the replication
18%
Tools for troubleshooting the network
31.10.2025
Home »  Archive  »  2012  »  Issue 11: Cloud...  » 
© Photographer, 123RF.com
(Figure 3). In subsequent test runs, you can compare the results with a previously saved map; devices added or removed are listed in each category. Figure 3
18%
Improve the physical security of your business
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
© ginasanders, 123RF.com
. Often, pressing the handle doesn't just activate the latch, but it also draws back the bolt on the locked door. In this case, an attacker needs a door handle catch (Figure 3). A piece of wire, bent
18%
Dispatches from the world of IT
30.11.2025
Home »  Archive  »  2011  »  Issue 5: Pen Te...  » 
of approximately $3M per MW of IT. In addition, IT systems that can tolerate higher temperatures can reduce the risk of IT failures during facility cooling outages." Red Hat and SAP Red Hat announced
18%
Convenient graphical remote control
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Thor Jorgen Udvang, 123RF.com
set of important remote control functions. On the bottom right is the connection monitor, which you can also hide and which tells you who is accessing the computer across the wire (Figure 3
18%
Server validation with Goss
07.10.2025
Home »  Archive  »  2025  »  Issue 89: Autom...  » 
Lead Image © Ewa Walicka, fotolia.com
passes an IPv4 address to the API website and expects the correct geographical assignment: http: geoip-api: status: 200 url: http://geoip.example.net/1.2.3.4 body: - Australia
18%
Moving HPC to the Cloud
19.10.2012
Home »  HPC  »  Articles  » 
3.4GHz quad core Sandy Bridge-based systems with 16GB of RAM/node (4GB/core), DDR 2:1 blocking InfiniBand, and 1TB of local disk. Additionally, they have dual-socket 2.6GHz eight-core Sandy Bridge
18%
Gathering Data on Environment Modules
10.09.2012
Home »  HPC  »  Articles  » 
/etc/bashrc , or (3) modifying $PATH in your own account. For the purposes of demonstrating how to do this, I will modify my .bashrc file with the following line: export PATH
18%
pdsh Parallel Shell
08.07.2018
Home »  HPC  »  Articles  » 
a range of hosts on the command line: $ pdsh -w host[1-11] uname -r $ pdsh -w host[1-4,8-11] uname -r In the first case, pdsh expands the host range to host1 , host2 , host3 , etc., through host11

« Previous 1 ... 153 154 155 156 157 158 159 160 161 162 163 164 165 166 ... 215 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice