Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %220mb%3%A9n Llorente 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (243)
  • Article (77)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 20 21 22 23 24 25 26 27 28 29 30 31 32 Next »

15%
Gathering Data on Environment Modules
10.09.2012
Home »  HPC  »  Articles  » 
to logfiles, and it’s pretty simple to use: [laytonjb@test1 ~]$ logger "This is a test" ... [root@test1 ~]# tail -n 2 /var/log/messages Aug 22 15:54:47 test1 avahi-daemon[1398]: Invalid query packet. Aug 22 17
15%
Network backups with Amanda
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © Tommaso Lizzul, 123RF.com
as the user name. Amanda versions before 3.3.9 have a vulnerability that lets this user execute arbitrary code with root privileges. A (manual) upgrade to version 3.3.9 is only necessary if you don't trust
15%
Checking password complexity with John the Ripper
30.11.2025
Home »  Archive  »  2011  »  Issue 6: Perfor...  » 
for checking a password hash file against a password dictionary is very high. A hacker can recover dictionary-based passwords in minutes, whereas a brute force attack can take days. Brute force is a single-character-at-a
15%
Time-series-based monitoring with Prometheus
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
Lead Image © Juthamas Oonhawat, 123RF.com
('request_processing_seconds', 'Time spent processing request') 07 08 # Decorate function with metric. 09 @REQUEST_TIME.time() 10 def process_request(t): 11 """A dummy function that takes some time.""" 12 time.sleep(t) 13 14
15%
Warding off the rise of VoIP spam
30.11.2025
Home »  Archive  »  2010  »  Issue 0: Active...  » 
Izaokas Sapiro, 123RF.com
,GotoIf($["${wl}" = "1"]?found:notfound) 05 exten => _.,n(notfound),agi,captcha.sh 06 exten => _.,n,Playback(to-call-num-press) 07 exten => _.,n,SayDigits(${captcha}) 08 exten => _.,n,Read(usercaptcha||3|1|) 09 exten
15%
Parallel Programming with OpenCL
04.11.2011
Home »  HPC  »  Articles  » 
only need to port the two inner loops (Listing 2, lines 7 and 9) because the threads process all the required x and y values in parallel. I use the built-in clamp() function (Listing 3, line 42
15%
Error-correcting code memory keeps single-bit errors at bay
14.11.2013
Home »  Archive  »  2013  »  Issue 17: Cloud...  » 
Lead Image © Igor Stevanovic, 123RF.com
of an uncorrectable error by factors of 9-400. Uncorrectable errors following a correctable error are still small at 0.1%-2.3% per year. + The incidence of correctable errors increases with age
15%
The AWS CDK for software-defined deployments
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © krisckam, 123RF.com
"dev": 2, 11 "qa": 3, 12 "prod": 3 13 } 14 } 15 } From the code in the subnetConfiguration block, you can see three types of subnets: Public, Private, and Isolated. As mentioned
15%
Parallel Shells: Run Commands on Multiple Nodes
02.07.2014
Home »  HPC  »  Articles  » 
 user           execute remote commands as user -t seconds        set connect timeout (default is 10 sec) -u seconds        set command timeout (no default) -f n              use fanout of n nodes -w
15%
Darshan I/O analysis for Deep Learning frameworks
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Michaela Murphy on Unsplash
) (None, 32, 32, 32) 9,248 max_pooling2d (MaxPooling2D) (None, 16, 16, 32) 0 conv2d_2 (Conv2D) (None, 16, 16, 64) 18,496 conv2d_3 (Conv2D

« Previous 1 ... 20 21 22 23 24 25 26 27 28 29 30 31 32 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice