Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1595)
  • Article (348)
  • News (206)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 205 206 207 208 209 210 211 212 213 214 215 216 Next »

18%
The Cloud’s Role in HPC
05.04.2013
Home »  HPC  »  Articles  » 
, assume the building block is a four-socket AMD node with 16 cores per socket (64 physical cores). Also assume that you oversubscribe the physical cores 3:1, producing 192 VMs per physical server
18%
Compiler Directives for Parallel Processing
12.08.2015
Home »  HPC  »  Articles  » 
of cache from L1, to L2, to L3 (and even L4) before going to main memory. Current CPUs also have several cores per processor. Although CPU improvements have brought wonderful gains in performance, the desire
18%
Interview with Gregory Kurtzer, Developer of Singularity
21.04.2016
Home »  HPC  »  Articles  » 
a repository of containers to which people can upload their work for others to download pre-made SAPPs; (3) to get Singularity included in the various distributions. To achieve all three goals, I need help
18%
Small Tools for Managing HPC
18.10.2017
Home »  HPC  »  Articles  » 
    bi    bo   in   cs us sy id wa st  1  0      0 5279852   2256 668972    0    0  1724    25  965 1042 17  9 71  2  0  1  0      0 5269008   2256 669004    0    0     0     0 2667 1679 28  3 69  0  0  1  0      0 5260976   2256 669004
18%
Why Good Applications Don’t Scale
13.10.2020
Home »  HPC  »  Articles  » 
and increasing the wall clock time. Notice that the peak speedup is only about a = 3.0 and happens at around 16 processors. This speedup is less than that predicted by Amdahl’s Law (a = 5). Note that you can
18%
What is an IOPS Really?
24.02.2022
Home »  HPC  »  Articles  » 
, an “accepted” payload has been created for measuring IOPS. This size is 4KB. The kilobyte is defined as 1,000 bytes and is grounded in base 10 (10^3). Over time, kilobyte has been incorrectly used to mean
18%
Protecting documents with Azure Information Protection
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Aleksey Mnogosmyslov, 123RF.com
and documents on mobile devices. Finally, you need the previously mentioned AIP client. The setup after downloading [3] is largely unspectacular. Besides the setup executable, an MSI package, which is suitable
18%
Secure authentication with FIDO2
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © lassedesignen, 123RF.com
Authentication (WebAuthn) and the Client to Authenticator Protocol (CTAP) components [3], all the major browsers have gradually introduced support for the Web Authentication JavaScript API and the use of security
18%
Preparing for cyberattacks
02.08.2022
Home »  Archive  »  2022  »  Issue 70: Defen...  » 
Lead Image © Natalia Lukiyanova, 123RF.com
, as illustrated by the Colonial Pipeline case in the US [3]. Attackers apparently found valid account credentials for an employee on the Darknet, accessed the company's computer systems over a virtual private
18%
Security analysis with Security Onion
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Mick Haupt on Unsplash
, in the Hunt interface, and in Kibana. You might already be familiar with CyberChef [3], which is also installed. This tool, widely referred to as the Swiss Army Knife of cybersecurity, lets you drag and drop

« Previous 1 ... 205 206 207 208 209 210 211 212 213 214 215 216 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice