Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1559)
  • News (435)
  • Article (314)
  • Blog post (8)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 188 189 190 191 192 193 194 195 196 197 198 199 200 201 ... 232 Next »

12%
Assigning Privileges with sudo and PolicyKit
22.01.2013
Home »  Articles  » 
 
Kit is the polkitd daemon. Because it only needs to respond to requests from system tools, it runs on a restricted account. Therefore no one can use it to hijack the system. polkitd provides its functions via the D
12%
Profiling Is the Key to Survival
19.12.2012
Home »  HPC  »  Articles  » 
); and DSPs (digital signal processors) have risen in popularity. These accelerators have the potential to provide much better performance in applications and algorithms that can take advantage of them compared
12%
The Meson Build System
16.07.2014
Home »  HPC  »  Articles  » 
. Meson does not support IDEs yet, but the build system provides an API that any developer can use to integrate Meson into their favorite IDE. A simple GUI is in its infancy (Figure 4). If you want
12%
Understanding Privilege Escalation
13.12.2011
Home »  Articles  » 
 
files and directories outside home directory might provide a means for escalating privileges. Metasploitable revealed 1070 such entries. Among these writable files and directories, two directories
12%
Win-Win with Cygwin
23.01.2012
Home »  Articles  » 
 
(Secure Shell). SSH is the secure equivalent of the old Telnet application; it provides an interactive shell session on the remote system from which you can work at the command line. Also, you can direct
12%
Modern Fortran – Part 2
15.12.2016
Home »  HPC  »  Articles  » 
, was becoming popular. It provided a way to utilize other processors in the same system or processors on other systems. Additionally, OpenMP was released, providing a threading model for applications
12%
Modern Fortran – Part 3
25.01.2017
Home »  HPC  »  Articles  » 
, gfortran provides coarray functionality from Fortran 2008 starting with version 5.1. It uses the coarray capability in OpenCoarrays. The compiler translates the coarray syntax into library calls
12%
Creating Virtual SSDs
21.01.2020
Home »  HPC  »  Articles  » 
 modprobe nvmet-tcp The NVMe target tree will need to be made available over the kernel user configuration filesystem to provide access to the entire NVMe target configuration environment. To begin, mount the kernel user
12%
Container Best Practices
22.01.2020
Home »  HPC  »  Articles  » 
Containers provide reproducible, portable applications. In a sense, they are an evolution of virtual machines (VMs), but without the entire operating system (OS). Therefore, containers are a bit
12%
Desktop Blades (of Glory)
06.05.2024
Home »  HPC  »  Articles  » 
: Compute Blade (used with permission of Jeff Geerling). Each blade can accommodate a CM4 or CM4 Lite Raspberry Pi and can hold an M.2 NVMe card up to type 22110. Power is provided by USB-C or Power

« Previous 1 ... 188 189 190 191 192 193 194 195 196 197 198 199 200 201 ... 232 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice