Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (261)
  • Article (99)
  • News (97)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ... 46 Next »

27%
Appendix – I/O Report from MPI Strace Analyzer
15.02.2012
Home »  HPC  »  Newsletter  »  2012-02-15 HPC...  » 
 
,594 430,311 438,525 430,299 420,694 425,487 393,216 1,379,816   Median bytes per call   533,627.598053 461,969.153374 254,478
27%
Appendix – I/O Report from MPI Strace Analyzer
26.01.2012
Home »  HPC  »  Newsletter  »  2012-02-01 HPC...  » 
 
,594 430,311 438,525 430,299 420,694 425,487 393,216 1,379,816   Median bytes per call   533,627.598053 461,969.153374 254,478
27%
HPC Monitoring: What Should You Monitor?
15.01.2014
Home »  HPC  »  Articles  » 
monitoring data, then you will be limited in how many metrics, how frequently, and how many nodes can push data to the collection node. A shared GigE (1,000Mbps) network used for application communications
27%
Supercharge Your Website with Amazon CloudFront
01.04.2014
Home »  Articles  » 
 
, network latency, and on and on. I could spend 1,000 pages discussing the problems that influence page load time and never address the bigger picture I endeavor to tackle in this article. Herein, I focus
27%
TinyDNS
02.03.2012
Home »  Articles  » 
 
, and because of its diminutive code base, exceptionally secure. How secure? You might well ask Well, how does a US$ 1,000 reward sound if you discover a security hole? You have to admit that such an offer
27%
Tricking Intruders with HoneypotMe
26.10.2012
Home »  Articles  » 
 
. (From AV-TEST Institute [1], which registered more than 55,000 malicious programs every day.) Although regular updates of signature databases used in virus scanners and intrusion detection systems
27%
Routing with Quagga
19.02.2013
Home »  Articles  » 
to the networks of all other autonomous systems. Thus, the routing tables are correspondingly large (some 400,000 entries in April 2012.) In contrast to OSPF, admins must configure the connection between two
27%
Parallel Shells: Run Commands on Multiple Nodes
02.07.2014
Home »  HPC  »  Articles  » 
to do on a single node can be done on a large number of nodes using a parallel shell tool. If you try to use a parallel shell on a 50,000-node cluster, however, the time skew could be large enough
27%
Useful NFS Options for Tuning and Management
15.06.2016
Home »  HPC  »  Articles  » 
important because it determines packet fragments on the network. If your chunk size is 8KB and the MTU is 1500 , it will take six Ethernet frames to transmit the 8KB. If you increase the MTU to 9000 (9,000
27%
Modern Fortran – Part 1
20.10.2016
Home »  HPC  »  Articles  » 
 PROGRAM PTR_TEST2 In this example, the pointer PTR2 points to a single real value, and the pointer PTRA points to a block of dynamic memory for 1,000 real values. After you’re done using the block of memory, you

« Previous 1 ... 30 31 32 33 34 35 36 37 38 39 40 41 42 43 ... 46 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice