Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %200mb%C3%A9n Llorente%2022 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (149)
  • Article (76)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Next »

49%
Measuring the performance health of system nodes
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Peter Hermes Furian, 123RF.com
. The primary changes made to the benchmarks of the latest version 3.4.2 of the NPB are: added class F to the existing S, W, A, B, C, D, E added dynamic memory allocation added MPI and Open
49%
NVDIMM Persistent Memory
22.09.2016
Home »  HPC  »  Articles  » 
-0x0000000c7fffffff] usable Speed Test If you own NVDIMMs and want to check out the speed advantage, all you need is a short test with the Unix dd tool. In Listing 3, root copies 4GB from the null
49%
Aggregating information with Huginn
18.02.2018
Home »  Archive  »  2018  »  Issue 43: Real...  » 
Lead Image © it Ilka Burckhardt, Fotolia.com
.e., in this example). If the MySQL version you are using is version 5.5.3 or newer, then replace utf8 with utf8mb4: DATABASE_ENCODING=utf8mb4 The results should look like Figure 1. At the bottom
49%
A script for strict packet filter updates
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © french 03, photocase.com
'^$' | sort -n | uniq -c | awk '$1 >= '${BLOCK_PREFIX_THRESHOLD}' {print $2" "$3}'` 174 175 # echo "${PREFIXES}" 176 for P in $( echo "${PREFIXES}" | awk '{print $2}' ); do 177 DEL_IPS=`echo "${QUERY
49%
Performance Health Check
13.06.2022
Home »  HPC  »  Articles  » 
Many HPC systems check the state of a node b efore  running a n  application, but not very many check that the performance of the node is acceptable before running the job. ... made to the benchmarks of the latest version 3.4.2 of the NPB are: added class F to the existing S, W, A, B, C, D, E added dynamic memory allocation added MPI and OpenMP programming models ... Many HPC systems check the state of a node b efore  running a n  application, but not very many check that the performance of the node is acceptable before running the job.
49%
DevSecOps with DefectDojo
03.04.2024
Home »  Archive  »  2024  »  Issue 80: Threa...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
64ae120c27e504088d8c2ce29a0fa7f85c The example code in Listing 2 uses Python to demonstrate how to use the API to retrieve user information. To begin, import the Python Requests API and define the URL
49%
How to configure and use jailed processes in FreeBSD
14.03.2013
Home »  Archive  »  2013  »  Issue 13: IPv6...  » 
© Corina Rosu, 123RF.com
command: # sockstat | grep "\*:[0-9]" The description for rc.conf(5) lists the services that need to be bound to a fixed IP address via parameters. One example is the inetd service: inetd_flags="-wW -a
48%
Retrieving Windows performance data in PowerShell
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © andresr, fotolia.com
Number: 00282-30340-00000-AB9A5 Version: 6.3.9600 The information you read from the operating system can also be formatted and customized. For example, normally only the operating system's most
48%
Zero-Ops Kubernetes with MicroK8s
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Among the number of burgeoning Kubernetes distributions available today is the excellent production-ready K3s [1], which squeezes into a tiny footprint and is suitable for Internet of Things (Io ... A zero-ops installation of Kubernetes with MicroK8s operates on almost no compute capacity and roughly 700MB of RAM.
48%
Security data analytics and visualization with R
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Rancz Andrei, 123RF.com
of this attack, including a description, walk-through, and exploit is available at Exploit-DB [11]. Over the years, I've made use of a Perl script that reduces very long W3C Apache log entries down to just

« Previous 1 ... 10 11 12 13 14 15 16 17 18 19 20 21 22 23 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice