Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (444)
  • Article (180)
  • News (6)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 25 26 27 28 29 30 31 32 33 34 35 36 37 38 ... 64 Next »

24%
Using loop directives to improve performance
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © orson, 123RF.com
but independently of one another (Figure 2). Table 3 Gang Execution Fortran C !$acc parallel do i=1,n ! do something enddo!$acc end parallel pragma acc parallel{ for (int i=0; i
24%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
container, create a directory and mount the root filesystem (run lsblk to verify the host filesystem; in this case, nvme0n1p1): mkdir /mnt/host_root mount /dev/nvme0n1p1 /mnt/host_root Now if you change
24%
Multicore Processing in Python
22.08.2017
Home »  HPC  »  Articles  » 
/NUM_THREADS   ITHREAD = OMP_GET_THREAD_NUM()   IF ( ITHREAD == 0 ) THEN PRINT *, "num_threads = ", NUM_THREADS PRINT *, "n = ", N ENDIF   ! ---------------------------------- ! Find my own starting index
24%
Sort Out the Top from the Bottom
25.05.2012
Home »  Articles  » 
 
it to become a Best Effort program with the top priority available to it: # ionice -c 2 -n 0 apache2 Back to iotop There’s also some useful interactive commands with iotop.You can move the cursor arrows
24%
Intruder Detection with tcpdump
28.11.2011
Home »  Articles  » 
 
or write network traffic information to a file. A basic capture uses the syntax tcpdump -n -i -s where -n means tcpdump should not resolve IP addresses to domain names or port
24%
Failure to Scale
03.07.2013
Home »  HPC  »  Articles  » 
speedup, n is the number of processors, and p is the parallel fraction, or the fraction of the application that is parallelizable (0 to 1). In an absolutely perfect world, the parallelizable fraction
24%
Service discovery, monitoring, load balancing, and more with Consul
04.10.2018
Home »  Archive  »  2018  »  Issue 47: Findi...  » 
Lead Image © Ringizzz, 123RF.com
[ec2-user@ip-172-31-20-189 ~]$ consul members Node Address Status Type Build Protocol DC Segment ip-172-31-16-22 172.31.16.22:8301 alive server 1.2.0 2
24%
Automated builds using CentOS 7 and Kickstart
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © Icetray, fotolia.com
ip addr show which lists the interfaces recognized by the system. In my case, the Ethernet interface was identified as enp0s3. Next, you can edit the network configuration file for the interface with
24%
Build your own cloud with antMan
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Jorge Coromina on Unsplash
. If the edgeLinux partitioner does not give you a suggestion for partitioning the system disk, proceed as follows: Create a 1024MB partition for /boot and a 20GB partition for /. Leave the remaining space
24%
Favorite benchmarking tools
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © Lucy Baldwin, 123RF.com
its execution in the real world (real), as well as how much CPU time was allocated in user and kernel (sys) modes: $ time sleep 1 real 0m1.004s user 0m0.002s sys 0m0.001s What not everyone knows

« Previous 1 ... 25 26 27 28 29 30 31 32 33 34 35 36 37 38 ... 64 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice