Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (446)
  • Article (182)
  • News (6)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 ... 64 Next »

16%
Data Analysis with Panda
12.03.2014
Home »  HPC  »  Articles  » 
important data structure in NumPy is the N -dimensional array, ndarray . In a one-dimensional case, ndarrays are vectors. Unlike Python lists, the size of NumPy arrays is immutable; its elements
16%
Pandas: Data analysis with Python
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © yang chao, 123RF.com
that no longer exist in the new index. Instead of NaN, you use the fill_value argument to specify different default values. To fill empty rows with 0, use: s.reindex(['d', 'e', 'f'], fill_value=0
16%
Encrypting files
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Yoichi Shimizu, 123RF.com
Uncompressed File $ gunzip hpc_001.html.gz $ ls -s total 11280 11032 Flying_Beyond_the_Stall.pdf 28 hpc_001.html.gpg 196 hpc_001.html 24 hpc_001.html.gz.gpg $ head -n 5 hpc_001.html HPC
16%
Aligning filesystem partitions
20.03.2014
Home »  Archive  »  2014  »  Issue 19: Perim...  » 
Lead Image © Lucy Baldwin, 123RF.com
. Setting this jumper will adjust sector addressing "in hardware" off by one, mapping address n into physical sector n +1. You want to be extremely careful not to enable this unless it is actually called
16%
Managing Cluster Software Packages
12.02.2013
Home »  HPC  »  Articles  » 
in to another node (n0 in this case). On the first login, the modules are loaded on the remote node. On the second login, with NOMODULES set, no modules are available: $ module list Currently Loaded
16%
Managing cluster software packages
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
© victoroancea, 123RF.com
in Listing 2, in which two modules are loaded (fftw and mpich2) before logging in to another node (n0 in this case). On the first login, the modules are loaded on the remote node. On the second login
16%
GlusterFS Storage Pools
17.11.2016
Home »  HPC  »  Articles  » 
. Figure 1: Client systems access the desired GlusterFS volume via a single namespace. (Red Hat CC BY-SA 3.0 [1]) When you look under the hood of GlusterFS, it is striking that the filesystem
16%
Build storage pools with GlusterFS
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © jala, Fotolia.com
. Figure 1: Client systems access the desired GlusterFS volume via a single namespace. (Red Hat CC BY-SA 3.0 [1]) When you look under the hood of GlusterFS, it is striking that the filesystem
16%
System temperature as a dimension  of  performance
28.11.2022
Home »  Archive  »  2022  »  Issue 72: OpenS...  » 
Lead Image © Lucy Baldwin, 123RF.com
of alternative sources. Listing 1 sensors Output federico@ferenginar:~$ sensors k10temp-pci-00c3 Adapter: PCI adapter temp1: +42.5¡C (high = +70.0¡C) (crit = +100.0¡C
16%
Pre-authentication for Kerberos services
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by pina messina on Unsplash
. For practical use, you first need to call kinit with the -n option to give you an anonymous TGT: kinit -n klist Ticket cache: KCM:0 Default principal: WELLKNOWN/ANONYMOUS@WELLKNOWN:ANONYMOUS [...] You can now

« Previous 1 ... 29 30 31 32 33 34 35 36 37 38 39 40 41 42 ... 64 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice