Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (475)
  • Article (139)
  • News (41)
  • Blog post (6)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 26 27 28 29 30 31 32 33 34 35 36 37 38 39 ... 67 Next »

43%
Living with Many and Multiple Cores
04.12.2012
Home »  HPC  »  Articles  » 
jobs (i.e., the parallel job is spread across many nodes). Actual results can vary because sparsely packed jobs usually share the multicore nodes with other user jobs that might or might not have
43%
Fedora 18 for Admins
11.06.2013
Home »  Articles  » 
 
. In the KVM variation, VirtSandbox starts the kernel together with initramfs in a VM, which in turn calls up the actual application after the boot. According to Red Hat, access to the CPU in VirtSandbox goes
43%
The Road to End-of-Scale
19.06.2013
Home »  HPC  »  Articles  » 
. The SOL tells you that you can expect to fit 850PFLOPS (using 85,000KW of power) into your core radius before experiencing reduced latency, so you are close to, and might actually be able to hit, 1EFLOPS
43%
Advanced Security in Windows Firewall
02.04.2013
Home »  Articles  » 
 
on the scenario and environment, it is possible that you, as the administrator, only very rarely actually need to add rules manually. Creating a New Rule To add an inbound rule, select the New Rule item
43%
Finding Memory Bottlenecks with Stream
25.09.2013
Home »  HPC  »  Articles  » 
by 12.5 percent (4.0 to 3.5GBps). However, if you stayed with four cores per processor, the memory bandwidth per core actually went up to 5.25GBps/core. I know of some computer-aided engineering (CAE
43%
Hardware-assisted Virtualization
29.08.2011
Home »  Articles  » 
, but paravirtualization adds additional complexity by requiring modifications to the guest system -- either within the actual source code or on-the-fly at the binary level. Hardware virtualization reduces the involvement
43%
Google+ with Business
02.09.2011
Home »  Articles  » 
 
articles on Google+. “Of course, I do that with other social networking services as well,” he says. “What makes Google+ better than the others is that I get real feedback from people who actually take
43%
Arp Cache Poisoning and Packet Sniffing
05.09.2011
Home »  Articles  » 
 
in position to intercept communications between the two computers. Computer A believes it is communicating with Computer B, but because of the poisoned arp table, the communication actually goes to the attacker
43%
BackTrack Linux: The Ultimate Hacker's Arsenal
20.09.2011
Home »  Articles  » 
 
an actual ncrack scan looks like after a successful password crack. The user account, bob , uses a very weak password: cheese. It took ncrack two minutes thirty seconds to crack this password. This means
43%
Can Your Server Be Toppled with a Single Command?
01.10.2011
Home »  Articles  » 
 
was experimenting with the limit and limit-burst values, I was surprised at how little traffic was actually let through. Be warned that the limit values are strict and may be too punitive for your Apache

« Previous 1 ... 26 27 28 29 30 31 32 33 34 35 36 37 38 39 ... 67 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice