Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (149)
  • Article (70)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 ... 22 Next »

32%
Tips and Tricks for Containers
12.05.2020
Home »  HPC  »  Articles  » 
68e152db7e5bb36b1cca638",                 "sha256:37b9a4b2218692d028f9f26aa9cb85bf1f56d9abe612ba31304643bdb448484f",                 "sha256:b16af11cbf2977eb52ba4d6cee5b713721cc19812b8c90ea1f22e7e
32%
Monitoring NFS Storage with nfsiostat
12.03.2013
Home »  HPC  »  Articles  » 
is shown in Listing 1. Listing 1: Sample nfsiostat Output Linux 2.6.18-308.16.1.el5.centos.plus (home8) 02/10/2013 _i686_ (1 CPU) 02/10/2013 03:38:48 PM Filesystem: rMB_nor/s wMB
32%
Go testing frameworks
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © Lucy Baldwin, 123RF.com
are just that, benchmarks. Listing 6 introduces the testing framework, the loop variable N allowing for repeated testing and the ResetTimer() annotation a useful reminder to exclude test setup overheads
32%
Process, Network, and Disk Metrics
26.02.2014
Home »  HPC  »  Articles  » 
:    import re                 # Needed for regex except ImportError:    print "Cannot import re module - this is needed for this application.";    print "Exiting..."    sys.exit();       def bytes2human(n
32%
Arp Cache Poisoning and Packet Sniffing
05.09.2011
Home »  Articles  » 
 
can see how the arp cache poisoning works: $ sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 \ -D 192.168.1.133 -h 00:22:6E:71:04:BB -m 00:0C:29:B2:78:9E \ -H 00:22:6E:71:04:BB -M 00:0C:29:B2:78:9E
32%
Shell practice: Introduction to the sed stream editor
09.08.2015
Home »  Archive  »  2015  »  Issue 28: SSD RAID  » 
Lead Image © Dmitriy Sladkov, 123RF.com
' – Multiple patterns: Do not output lines containing an 'R' somewhere and an 'M' somewhere else '/[R]./,/[M]./!' sed -n '/[R]./,/[M]./!'p textdata.txt 6 All lines containing some
32%
Warewulf Cluster Manager – Master and Compute Nodes
22.05.2012
Home »  HPC  »  Articles  » 
psmisc.x86_64 0:22.6-15.el6_0.1 rdate.x86_64 0:1.4-16.el6 rpcbind.x86_64 0:0.2.0-8.el6 sed.x86_64 0:4.2.1-7.el6 setup
32%
Appendix – I/O Report from MPI Strace Analyzer
15.02.2012
Home »  HPC  »  Newsletter  »  2012-02-15 HPC...  » 
 
call count for the MB range intervals. Figure 6 plots the write IO function call count for the GB range intervals. Figure 7 plots the write IO function call count for the TB range intervals
32%
Appendix – I/O Report from MPI Strace Analyzer
26.01.2012
Home »  HPC  »  Newsletter  »  2012-02-01 HPC...  » 
 
call count for the MB range intervals. Figure 6 plots the write IO function call count for the GB range intervals. Figure 7 plots the write IO function call count for the TB range intervals
31%
Data Compression as a CPU Benchmark
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © Lucy Baldwin, 123RF.com
Compiler: Apple LLVM 12.0.5 (clang-1205.0.22.9) GCC 4.2.1 CLANG 12.0 Darwin : 20.4.0 : Darwin Kernel Version 20.4.0: PageSize:16KB Apple M1 8C8T RAM size: 16384 MB, # CPU hardware threads: 8 RAM usage

« Previous 1 2 3 4 5 6 7 8 9 10 ... 22 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice