Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (174)
  • Article (77)
  • News (49)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 Next »

32%
Getting Started with HPC Clusters
05.06.2013
Home »  HPC  »  Articles  » 
to build one yourself, or (3) build your own cluster using parts from various sources. However, with the rise of virtualization, you now have more system options than ever, particularly if your budget
32%
Parallel Programming with OpenCL
04.11.2011
Home »  HPC  »  Articles  » 
of Top 500 supercomputing sites. It is possible to invoke the GPU directly to assist with generic application processing, but the data has to be parallelizable. In today’s machines, quad- and hexacore
32%
Darshan I/O Analysis for Deep Learning Frameworks
18.08.2021
Home »  HPC  »  Articles  » 
, the command I used for Darshan to gather I/O statistics on the application was: env LD_PRELOAD=/home/laytonjb/bin/darshan-3.3.1/lib/libdarshan.so ./ex1 I copied the Darshan file from the log location
32%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © AndreaDanti, 123RF.com
web interface, a REST API, and support for a wider array of databases. Because Icinga was forked from Nagios code, it maintains compatibility with Nagios plugins [3]. Some of Icinga's key features are
32%
Open source multipoint VPN with VyOS
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Photo by Damon Lam on Unsplash
version of Vyatta, most notably VyOS [3]. The fork was successful, because VyOS includes all the DMVPN components: dynamic routing with high availability on top. EdgeOS Another player in the Vyatta market
32%
SMART storage device monitoring
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
Lead Image © Sk Design, Fotolia.com
and Pennsylvania State University examined SSD failures in data centers [3]. Over nearly three years they examined about 500,000 SSDs from five very large data centers and several edge data centers. The drives were
32%
Implement your own MIBs with Python
29.09.2020
Home »  Archive  »  2020  »  Issue 59: Custo...  » 
and – at the end – the leaf of the tree. A rather short OID could be .1.3.6.1.2.1.31. There is an analogy to IP addresses here: Because it's difficult to remember an IP address as a series of numbers, the Domain
32%
Darshan I/O analysis for Deep Learning frameworks
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Michaela Murphy on Unsplash
[2] (section 3.2). Next, I built the Darshan utilities (darshan-util) with the command: ./configure CC=gcc --prefix=[binary location] Because I'm running these tests on an Ubuntu 20.04 system, I had
32%
Nine home clouds compared
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © inertia@intuitivmedia.net
.21 –   EUR5.95 EUR1.00 (with French VAT) EUR2.78 (half price as of year two) – $2.92 License(s) AGPL, commercial GPL, LGPL, AGPL Commercial GPLv3
32%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
to identify an essential principle of the security analyst: As an attack occurs, certain things are left behind. This concept was first articulated by Edmond Locard [3] almost 100 years ago, well before

« Previous 1 ... 22 23 24 25 26 27 28 29 30 31 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice