Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb%3%A9n Llorente 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (200)
  • Article (77)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 Next »

15%
Network backups with Amanda
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Tommaso Lizzul, 123RF.com
as the user name. Amanda versions before 3.3.9 have a vulnerability that lets this user execute arbitrary code with root privileges. A (manual) upgrade to version 3.3.9 is only necessary if you don't trust
15%
Time-series-based monitoring with Prometheus
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Juthamas Oonhawat, 123RF.com
('request_processing_seconds', 'Time spent processing request') 07 08 # Decorate function with metric. 09 @REQUEST_TIME.time() 10 def process_request(t): 11 """A dummy function that takes some time.""" 12 time.sleep(t) 13 14
15%
Parallel Programming with OpenCL
04.11.2011
Home »  HPC  »  Articles  » 
only need to port the two inner loops (Listing 2, lines 7 and 9) because the threads process all the required x and y values in parallel. I use the built-in clamp() function (Listing 3, line 42
15%
Error-correcting code memory keeps single-bit errors at bay
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Igor Stevanovic, 123RF.com
of an uncorrectable error by factors of 9-400. Uncorrectable errors following a correctable error are still small at 0.1%-2.3% per year. + The incidence of correctable errors increases with age
15%
The AWS CDK for software-defined deployments
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © krisckam, 123RF.com
"dev": 2, 11 "qa": 3, 12 "prod": 3 13 } 14 } 15 } From the code in the subnetConfiguration block, you can see three types of subnets: Public, Private, and Isolated. As mentioned
15%
Parallel Shells: Run Commands on Multiple Nodes
02.07.2014
Home »  HPC  »  Articles  » 
 user           execute remote commands as user -t seconds        set connect timeout (default is 10 sec) -u seconds        set command timeout (no default) -f n              use fanout of n nodes -w
15%
Darshan I/O analysis for Deep Learning frameworks
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Michaela Murphy on Unsplash
) (None, 32, 32, 32) 9,248 max_pooling2d (MaxPooling2D) (None, 16, 16, 32) 0 conv2d_2 (Conv2D) (None, 16, 16, 64) 18,496 conv2d_3 (Conv2D
15%
Container and hardware e-virtualization under one roof
17.10.2011
Home »  CloudAge  »  Articles  » 
 
.6.24: 1.5-23 05 pve-kernel-2.6.24-11-pve: 2.6.24-23 06 qemu-server: 1.1-16 07 pve-firmware: 1.0-5 08 libpve-storage-perl: 1.0-13 09 vncterm: 0.9-2 10 vzctl: 3.0.23-1pve11 11 vzdump: 1.2-5 12 vzprocps: 2
15%
PowerShell Part 1: Retrieving System Information
18.03.2012
Home »  Articles  » 
 
Name ------- ------ ----- ----- ----- ------ -- ----------- 81 9 2392 3076 76 0.12 3996 AmIcoSinglun64 74 9 1464 2568 42 0.09 2172 armsvc 195 10 2380 2984 62
15%
Secure containers with a hypervisor DMZ
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © lightwise, 123RF.com
=kata-fc -itd --name=kata-fc busybox sh d78bde26f1d2c5dfc147cbb0489a54cf2e85094735f0f04cdf3ecba4826de8c9 $ pstree|grep -e container -e kata |-containerd-+-containerd-shim-+-firecracker---2*[{firecracker

« Previous 1 ... 17 18 19 20 21 22 23 24 25 26 27 28 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice