Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (31)
  • Article (19)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 Next »

14%
HPC Software Road Gets a Bit Smoother
10.09.2013
Home »  HPC  »  Articles  » 
23,289.81 24,823.29 6% SP 19,751.24 12,061.77 39.00% a BT, block tri-diagonal; CG, conjugate gradient; EP, embarrassingly parallel; FT, 3D fast Fourier
14%
First steps in IT automation by Rex
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Konstantin Chagin , 123RF.com
_system_release = '12.04' 17 $eth0_mac = '08:00:27:c4:a1:d8' 18 $VirtInfo = { 19 virtualization_role => 'guest' 20 virtualization_type => 'virtualbox' 21 } 22 $memory_shared = '0' 23 $Network = { 24 networkdevices
14%
Machine learning and security
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
of their toolkits. For example, you can install and use Splunk Enterprise and its Machine Learning Toolkit (Figure 6) with a trial license for up to 60 days and index up to 500MB of data per day. The software
14%
Security first with the Hiawatha web server
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Tatiana Popov, 123RF.com
network adapters, one for administration and one for the web server. I gave the system 1GB memory, but it has not yet used more than 200MB. Then, boot the image. You have several choices: Add
14%
Understanding Layer 2 switch port security
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Taffi, Fotolia.com
a switch from attack. Layer 2 Switch Operation A switch provides Data Link Layer (or Layer 2) connectivity on an Ethernet network. Devices transmit data frames based on a unique 48-bit MAC address (Figure
14%
Warewulf 4 – GPUs
20.02.2023
Home »  HPC  »  Articles  » 
rocky-8 /bin/bash [rocky-8] Warewulf> dnf update ... [rocky-8] Warewulf> dnf clean all Failed to set locale, defaulting to C.UTF-8 48 files removed [rocky-8] Warewulf> exit ... The dnf update  command
14%
mpi4py – high-performance distributed Python
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © liu liming, 123RF.com
): 11 12 s = 0.0 13 s += h * f(a) 14 for i in range(1, n): 15 s += 2.0 * h * f(a + i*h) 16 # end for 17 s += h * f(b) 18 return (s/2.) 19 # end def 20 21 22 # Main section 23 comm = MPI
14%
Predicting Drive Doom
20.10.2013
Home »  HPC  »  Articles  » 
. The output for the Samsung SSD is: [root@home4 ~]# smartctl -i /dev/sdb smartctl 5.43 2012-06-30 r3573 [x86_64-linux-2.6.32-358.18.1.el6.x86_64] (local build) Copyright (C) 2002-12 by Bruce Allen, http
14%
S.M.A.R.T., smartmontools, and drive monitoring
09.01.2013
Home »  Archive  »  2013  »  Issue 18: New W...  » 
Lead Image © _fla, 123RF.com
. Listing 1 Samsung SSD Inquiry [root@home4 ~]# smartctl -i /dev/sdb smartctl 5.43 2012-06-30 r3573 [x86_64-linux-2.6.32-358.18.1.el6.x86_64] (local build) Copyright (C) 2002-12 by Bruce Allen, http
14%
Measuring the performance of code
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Lucy Baldwin, 123RF.com
-enabled as the first statement of the setup parameter with gc.enable(). Heisenberg's Law Heisenberg's law of profiling [6] holds that measuring a computing system alters it. How am I altering the system

« Previous 1 2 3 4 5 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice