Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede%3 00 Llorente"52 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (252)
  • Article (110)
  • News (9)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 38 Next »

19%
Detecting intruders with Suricata
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kurhan, 123RF.com
Tunneling"; content:"|01 00|"; offset:2; w ithin:4; content:"cT"; offset:12; depth:3; content:"|00 10 00 01|"; within:255; class type:bad - unknown; sid:1000 2; The preceding rule inspects the DNS traffic
19%
CronRAT Malware Targets Linux Servers
29.11.2021
Home »  News  » 
 
and not that the date of the task is legitimate. The crontab date specification for ConRAT is 52 23 31 2 3, which would generate a run time error upon execution. However, that runtime will never happen, because the date
19%
ClusterHAT
10.07.2017
Home »  HPC  »  Articles  » 
, the Raspberry Pi 3 (RPi3), is about $35, and the introduction of the Raspberry Pi Zero (Pi Zero) in 2015, set the low-end price of $5. People have been building clusters from Raspberry Pi units, starting
19%
Run TensorFlow models on edge devices
02.06.2020
Home »  Archive  »  2020  »  Issue 57: Artif...  » 
Lead Image © leeavison, 123RF.com
this article. TensorFlow provides stable Python (for version 3.7) and C APIs. However, other programming languages supported without guaranteed API backward compatibility are C++, Go, Java, Java
19%
Warewulf 4 – Environment Modules
20.03.2023
Home »  HPC  »  Articles  » 
this module, the module files under compiler  are available, but only those associated with gnu/8.5/  (Figure 3).  Figure 2: Path to the gnu/8.5 module
19%
Parallel Programming with OpenMP
21.11.2012
Home »  HPC  »  Articles  » 
directions) 085 086 ALLOCATE ( unew(1:m,1:m), u(1:m,1:m) ) ! mem for unew, u 087 088 ! 089 ! Boundary Conditions 090 ! =================== 091 ! 092 pi = DACOS(0.0d0) 093 094 ! Top of unit square: (N) 095
19%
Working with the Lustre Filesystem
24.02.2022
Home »  HPC  »  Articles  » 
.255.255.255  broadcast 0.0.0.0         inet6 fe80::bfd3:1a4b:f76b:872a  prefixlen 64  scopeid 0x20         ether 42:01:0a:80:00:02  txqueuelen 1000  (Ethernet)         RX packets 11919  bytes 61663030 (58.8 Mi
19%
Lustre HPC distributed filesystem
07.04.2022
Home »  Archive  »  2022  »  Issue 68: Autom...  » 
Photo by Efe Kurnaz on Unsplash
,BROADCAST,RUNNING,MULTICAST> mtu 1460 inet 10.0.0.2 netmask 255.255.255.255 broadcast 0.0.0.0 inet6 fe80::bfd3:1a4b:f76b:872a prefixlen 64 scopeid 0x20 ether 42:01:0a:80:00:02 txqueuelen 1000
19%
Cloud protection with Windows Azure Backup
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Oleksiy-Mark, 123RF.com
in Windows Azure; you will find this on the Azure portal [3]. The familiar Windows backup interface is used for backing up and restoring. You can also control the process in Windows PowerShell; a separate
19%
Explore automation-as-code with Ansible
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © Kittipong Jirasukhanont, 123RF.com
Shift or – as shown here – an Ingress route for accessing the AWX service. This strategy also works with MicroK8s or K3s. You might have to adjust the Ingress definition if routers such as Traefik cannot cope

« Previous 1 ... 12 13 14 15 16 17 18 19 20 21 22 23 24 25 ... 38 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice