Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (292)
  • Article (97)
  • News (7)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 40 Next »

28%
Discovering ROCm
18.10.2017
Home »  HPC  »  Articles  » 
(with around 55,000 lines of code) from CUDA to HIP: 99.6 percent of the code went unmodified or was automatically converted, and the remaining 0.4 percent took less than a week of developer time to tie
28%
Malware Analysis
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © raptorcaptor, 123RF.com
uses for such cases. Moments later, I received email telling me that malware was discovered by Palo Alto WildFire analysis [6]. WildFire identifies unknown malware, zero-day exploits, and advanced
28%
Performance troubleshooting on Microsoft SQL Server
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Anna, Fotolia.com
practices [5]? Have you taken into account and checked the alignment of disk volumes [6] [7]? Are the volumes formatted with a 64KB file allocation unit? Does the distribution of the database files (on
28%
Embarrassingly parallel computation
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Lucy Baldwin, 123RF.com
Laboratory hosts a number of excellent parallel programming tutorials at its Leadership Computing Facility, including one demonstrating the Monte Carlo method in both serial and parallel implementations [6]. I
28%
Improved visibility on the network
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © Sergii_Figurnyi, 123RF.com
that this version does not yet support IPv6 addressing and is therefore only suitable for collecting IPv4 traffic data. Finally, after the release of version 9 of NetFlow as an open standard [2], a template
28%
CephX Encryption
27.03.2013
Home »  HPC  »  Articles  » 
would migrate from the “old” block device to the new RBD image. The new pool needs an RBD image of the desired size. The command qemu-img create -f rbd rbd:libvirt/ubuntu-amd64-alice 100G creates
28%
Exploring the HPC Toolbox
04.11.2011
Home »  HPC  »  Articles  » 
testing on a test cluster, because the production systems are 100% identical. Partimage [2] is an easy-to-use imaging tool that backs up and restores different types of partitions. SystemImager [3] is far
28%
Take your pick from a variety of AWS databases
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Claudia Paulussen, Fotolia.com
type (e.g., General Purpose (SSD) or Provisioned IOPS (SSD) [i.e., input/output operations per second]) and storage size. The storage can extend up to 6TB (for Aurora, 64TB) and does not affect
28%
pdsh Parallel Shell
08.07.2018
Home »  HPC  »  Articles  » 
using the IP address of the other node. $ pdsh -w 192.168.1.250 uname -r 192.168.1.250: 2.6.32-431.11.2.el6.x86_64 The -w option means that the IP address of the target’s node(s) is specified
28%
Detecting security threats with Apache Spot
14.03.2018
Home »  Archive  »  2018  »  Issue 44: Cloud...  » 
Photo by Geran de Klerk on Unsplash
and evaluation. The Spot team not only promises service availability of almost 100 percent without data loss, but also faster and more scalable functionality. Data collection is handled by special collector

« Previous 1 ... 19 20 21 22 23 24 25 26 27 28 29 30 31 32 ... 40 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice