Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1345)
  • Article (364)
  • News (273)
  • Blog post (9)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 27 28 29 30 31 32 33 34 35 36 37 38 39 40 ... 200 Next »

9%
A Brief History of Supercomputers
21.01.2021
Home »  HPC  »  Articles  » 
models, the SX-1 and SX-2, were launched in 1985. Both systems had up to 256MB of main memory. The SX-2 was reportedly the first supercomputer to exceed 1GFLOPS. It had four sets of high-performance vector
9%
Warewulf Cluster Manager – Development and Run Time
18.07.2012
Home »  HPC  »  Articles  » 
becomes an integral part of the approach. For clusters, I see two approaches for a development or run-time environment: (1) a brute force approach or (2) a smart approach. In this article, I present
9%
OpenACC – Data Management
07.02.2019
Home »  HPC  »  Articles  » 
create present Their names describe their obvious functions. The specific data clause combined with the acc data  directive constitutes the start of a data region (Table 2). In C, the beginning
9%
Detecting malware with Yara
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © Mohamad Razi Bin Husin, 123RF.com
. The syntax for using Yara is as follows: rule NameOfRule { strings: $test_string1= "James" $test_string2= {8C 9C B5 L0} Conditions: $test_string1 or $test_string2 } In the preceding code
9%
Goodbye virtual machines, hello microVMs
06.10.2022
Home »  Archive  »  2022  »  Issue 71: Kuber...  » 
Photo by Eric Froehling on Unsplash
In two previous articles [1][2], I introduced how to bring up lightweight container machines with Footloose and cloud virtual machine stacks on a laptop with Multipass. The Footloose approach didn
9%
Pandas: Data analysis with Python
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © yang chao, 123RF.com
NumPy (Numerical Python) [2] library in particular takes the wind out of the sails of this allegation. It loads its data efficiently into memory and integrates C code, which compiles at run time
9%
Assess USB performance while exploring storage caching
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
cards, and USB keys can be fundamentally different. Turtles All the Way Down Mass storage performance lags that of working memory in the Von Neumann architecture [2], with the need to persist data
9%
Build system images with Kiwi
02.08.2021
Home »  Archive  »  2021  »  Issue 64: Bare...  » 
Lead Image © chachar, 123RF.com
. Figure 1: Prompting for the root password in YaST2 firstboot. Using Kiwi Regardless of the type of system image to be created, you need a description of the system in XML format that contains all
9%
Mesos compute cluster for data centers
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Artisticco LLC, 123RF.com
, and their professor Ion Stoica from the University of California, Berkeley. In 2009, Mesos was officially presented to the public [2]; at the time, the project went by the working title of Nexus. To avoid confusion
9%
Filesystem Encryption
12.05.2014
Home »  Articles  » 
 
it is not strong encryption). Software, Hardware, or Both? Fundamentally, you really have two options for encrypting data: (1) hardware based and (2) software based. Although you could use both options

« Previous 1 ... 27 28 29 30 31 32 33 34 35 36 37 38 39 40 ... 200 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice