Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (269)
  • Article (96)
  • Blog post (1)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 37 Next »

28%
Resource Management with Slurm
05.11.2018
Home »  HPC  »  Articles  » 
One way to share HPC systems among several users is to use a software tool called a resource manager. Slurm, probably the most common job scheduler in use today, is open source, scalable, and easy ...    infinite         4/9/3/16  node[212-213,215-218,220-229] This example lists the status, time limit, node information, and node list of the p100 partition. sbatch To submit a batch serial job to Slurm, use the ... One way to share HPC systems among several users is to use a software tool called a resource manager. Slurm, probably the most common job scheduler in use today, is open source, scalable, and easy
28%
Coming to grips with grep
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Andrey Lavrushov, 123RF.com
/home/chris/.cache/software-center/piston-helper/software-center.ubuntu.\ com,api,2.0,applications,en,ubuntu,precise,\ amd64,,bbc2274d6e4a957eb7ea81cf902df9e0: "description": "La revista
28%
Posteo, Mailbox.org, Tutanota, and ProtonMail compared
10.04.2015
Home »  Archive  »  2015  »  Issue 26: OpenS...  » 
Lead Image © Kirill Bodrov, 123RF.com
.org Tutanota ProtonMail Mailbox from EUR1 Yes/2GB Yes/2GB Free/1GB Free/500MB Storage space expansion Yes Yes Yes Currently
28%
Correctly integrating containers
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Beboy, Fotolia.com
as input. This procedure is described in detail at the CNI GitHub repository [9]. Calico Project Calico [3] considers the ratio of nodes to containers. The idea is to transfer the concepts and relations
28%
Persistent Memory
14.01.2016
Home »  HPC  »  Articles  » 
the registers and main memory, Level 1 (L1), Level 2 (L2), and even L3 and L4 caches have been added. Typically the L1 cache is part of the processor (each core) and can store more data than the registers
28%
How persistent memory will change computing
03.12.2015
Home »  Archive  »  2015  »  Issue 30: OpenD...  » 
Lead Image © rangizzz, 123RF.com
the registers and main memory, Level 1 (L1), Level 2 (L2), and even L3 and L4 caches have been added. Typically the L1 cache is part of the processor (each core) and can store more data than the registers
28%
Understanding the Status of Your Filesystem
18.06.2014
Home »  HPC  »  Articles  » 
]:  13502  (  3.48%)  ( 87.59% cumulative)    [     64-    128 KB]:  12083  (  3.11%)  ( 90.70% cumulative)    [    128-    256 KB]:   8623  (  2.22%)  ( 92.93% cumulative)    [    256-    512 KB]:  13437  (  3
28%
What's your status (page)?
28.11.2023
Home »  Archive  »  2023  »  Issue 78: Domai...  » 
Lead Image © Tatiana Venkova, 123RF.com
for statpingng_stack.yml 6c6 < image: adamboutcher/statping-ng:${SPNGTAG:-latest} --- > image: mystatpingng:${SPNGTAG:-latest} 8a9,36 > volumes: > - ./config:/app > environment
28%
Data Analysis with R and Python
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © mopic, 123RF.com
/json;charset=utf-8\n\r\n\r%s" %json.dumps(obj) Lines 9 through 18 iterate against all entries of a database cursor, which the call to the find() method in line 9, generates from the queried data collection
28%
Network backups with Amanda
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Tommaso Lizzul, 123RF.com
as the user name. Amanda versions before 3.3.9 have a vulnerability that lets this user execute arbitrary code with root privileges. A (manual) upgrade to version 3.3.9 is only necessary if you don't trust

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 37 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice