Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (494)
  • Article (146)
  • News (13)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 27 28 29 30 31 32 33 34 35 36 37 38 39 40 ... 66 Next »

16%
Warewulf 4 – Environment Modules
20.03.2023
Home »  HPC  »  Articles  » 
in to the first compute node (Listing 5). Listing 5: Checking Lmod on the Compute Node [laytonjb@warewulf ~]$ ssh n0001 Last login: Sun Feb 12 09:10:32 2023 from 10.0.0.1 [laytonjb@n0001 ~]$ module
16%
Tuning I/O Patterns in C
31.07.2013
Home »  HPC  »  Articles  » 
Code Example 1 #include 2 3 /* Our structure */ 4 struct rec 5 { 6 int x,y,z; 7 float value; 8 }; 9 10 int main() 11 { 12 int counter; 13 struct rec my
16%
Compiler Directives for Parallel Processing
12.08.2015
Home »  HPC  »  Articles  » 
ACC compilers became quickly available. Version 2.0 was finalized on June 2013, although a preview was posted on November 12, 2012. It added some new capabilities and expanded functionality that had been learned
16%
ZFS on Linux helps if the ZFS FUSE service refuses to work
07.10.2014
Home »  Archive  »  2014  »  Issue 23: 10 Ti...  » 
Lead Image © Luis Louro, 123RF.com
at least outputs some information. What you need is access to the filesystem, which could reside in 06:zfs0; however, to determine the name of the pool, you need a zpool import (Listing 2). The name
16%
Checking your endpoints with Stethoscope
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © Ewa Walicka, fotolia.com
root. 10 node-builder_1 | To override this, specify the homepage in your package.json. 11 node-builder_1 | For example, add this to build it for GitHub Pages: 12 node-builder_1 | 13 node-builder_1
16%
News for Admins
14.08.2017
Home »  Archive  »  2017  »  Issue 40: Lean...  » 
 
to encrypt data that is transmitted across a network between a client application and an instance of SQL Server. SQL Server on Linux supports TLS protocols 1.2, 1.1, and 1.0. Machine Learning Services
16%
Single sign-on with Keycloak
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Kirsty Pargeter, 123RF.com
ID Connect or the somewhat older SAML (security assertion markup language). If you have the choice, the Keycloak developers recommend OpenID Connect, which is an extension of OAuth 2.0 and offers JSON web
16%
Setting up SELinux policies
12.09.2013
Home »  Archive  »  2013  »  Issue 16: Docker  » 
Lead Image © Agustin Paz, 123RF.com
: 1.0 05 Release: 1%{?dist} 06 License: GPL v2 or later 07 Source0: local.te 08 Source1: local.fc 09 Source2: local.if 10 Group: Development/Tools 11 Summary
16%
Tuning I/O Patterns in Fortran 90
04.12.2013
Home »  HPC  »  Articles  » 
3 type rec 4 integer :: x, y, z 5 real :: value 6 end type rec 7 8 integer :: counter 9 integer :: counter_limit 10 integer :: ierr 11 12 type (rec) :: my
16%
Malware Analysis
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © raptorcaptor, 123RF.com
at the bottom of the window, ranges from 0 (less risky) to 100 (more risky). Because these two processes started after the malware installed, they are likely bad. When I compared the Start Time of svchost

« Previous 1 ... 27 28 29 30 31 32 33 34 35 36 37 38 39 40 ... 66 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice