Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (348)
  • Article (95)
  • News (5)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 45 Next »

13%
Warewulf 4 – Time and Resource Management
17.01.2023
Home »  HPC  »  Articles  » 
.5.13-2.el8                          appstream        29 k  numactl-libs               x86_64 2.0.12-13.el8                         baseos           35 k  ohpc-filesystem            noarch 2.6-2.3.ohpc.2
13%
Building a HPC cluster with Warewulf 4
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Andrew Ly on Unsplash
.5.13-2.el8 appstream 29 k numactl-libs x86_64 2.0.12-13.el8 baseos 35 k ohpc-filesystem noarch 2.6-2.3.ohpc.2
13%
Look for Bottlenecks with Open|SpeedShop
21.12.2011
Home »  HPC  »  Articles  » 
.245000        20.251752         512  PMPI_Finalize (libmonitor.so.0.0.0: pmpi.c,232) 11.017000        0.011000         0.766577        6144  MPI_Allreduce (libmpich.so.1.0: allreduce.c,59) 2.291000        0
13%
Single sign-on with Keycloak
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Kirsty Pargeter, 123RF.com
ID Connect or the somewhat older SAML (security assertion markup language). If you have the choice, the Keycloak developers recommend OpenID Connect, which is an extension of OAuth 2.0 and offers JSON web
13%
Tuning I/O Patterns in Python
18.12.2013
Home »  HPC  »  Articles  » 
__ == "__main__": 12 13 local_dict = {'x':0, 'y':0, 'z':0,'value':0.0}; 14 my_record = []; # define list 15 16 counter_limit = 2000; 17 18 f = open('test.bin', 'r+') 19 for counter in range(1,counter
13%
PowerShell Part 1: Retrieving System Information
18.03.2012
Home »  Articles  » 
 
:\Users\khess> $Host Name : ConsoleHost Version : 2.0 InstanceId : ccbc6963-c33e-4848-a8e5-aa1ccaf7d65c UI : System
13%
The AWS CDK for software-defined deployments
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © krisckam, 123RF.com
under the Mozilla Public License (MPL) v2.0 [7]. Visibility into the deployment state. It exposes its state to inspection (CloudFormation does not expose its state in any way, although it recently
13%
Web Cryptography API
26.11.2013
Home »  Articles  » 
(text) { 11 polycrypt.importKey("raw", hex2bin(encRawKey)).oncomplete = function(e) { 12 var key = e.target.result; 13 polycrypt.encrypt(encAlg, key, str2bin(text)).oncomplete = function(e) { 14 var
13%
Getting the most from your cores
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © ktsdesign, 123RF.com
straightforward. If a processor was operating at a fixed frequency of 2.0GHz, CPU utilization was the percentage of time the processor spent doing work. (Not doing work is idle time.) For 50% utilization
13%
What's left of TLS
18.07.2013
Home »  Archive  »  2013  »  Issue 15: What’...  » 
Maria Dryfhout, 123RF
in its infancy, the former monopolist browser released the SSL encryption protocol version 2.0 (SSLv2). Version 1 existed only internally in Netscape. Numerous security vulnerabilities were discovered

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 45 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice