Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (35)
  • Article (25)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 Next »

15%
Machine learning and security
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Vlad Kochelaevskiy, 123RF.com
of their toolkits. For example, you can install and use Splunk Enterprise and its Machine Learning Toolkit (Figure 6) with a trial license for up to 60 days and index up to 500MB of data per day. The software
15%
Exploring the most famous performance tool
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Lucy Baldwin, 123RF.com
). Figure 3: The top command as featured in Mac OS. In the Mac world, the summary area is called global state [6], and memory regions are adjusted to match the Mach kernel's modeling of these resources
15%
HPC Software Road Gets a Bit Smoother
10.09.2013
Home »  HPC  »  Articles  » 
23,289.81 24,823.29 6% SP 19,751.24 12,061.77 39.00% a BT, block tri-diagonal; CG, conjugate gradient; EP, embarrassingly parallel; FT, 3D fast Fourier
15%
Ansible collections simplify AIX automation
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Lead Image © alexutemov, 123RF.com
/.ansible/collections:/usr/share/ansible/collections executable location = /usr/bin/ansible python version = 3.11.2 (main, Feb 17 2023, 09:48:02) [GCC 8.5.0 20210514 (Red Hat 8.5.0-18)] (/usr/bin/python3.11) jinja version = 3.1.2 libyaml = False
15%
Understanding Layer 2 switch port security
22.12.2017
Home »  Archive  »  2017  »  Issue 42: Secur...  » 
Lead Image © Taffi, Fotolia.com
.0.0.0.18576: S 1905213613:1905213613(0) win 512 91:33:3b:3:a0:f5 d6:11:53:f:5e:c8 0.0.0.0.8066 > 0.0.0.0.49105: S 428779274:428779274(0) win 512 c4:27:40:74:3d:11 b9:a5:d3:1d:e:bf 0.0.0.0.8772 > 0.0.0.0.42343: S 1206065071
15%
mpi4py – high-performance distributed Python
30.11.2020
Home »  Archive  »  2020  »  Issue 60: Secur...  » 
Lead Image © liu liming, 123RF.com
processes is shown in Listing 6. Notice that processes 3 and 4 didn't contribute or do anything. Listing 5 Point-to-Point 01 import numpy 02 from mpi4py import MPI 03 04 05 comm = MPI
14%
Building a HPC cluster with Warewulf 4
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Andrew Ly on Unsplash
: ohpc-slurm-server x86_64 2.6-7.1.ohpc.2.6 OpenHPC-updates 7.0 k Installing dependencies: mariadb-connector-c x86_64 3.1.11-2.el8_3 appstream
14%
Warewulf 4 – Time and Resource Management
17.01.2023
Home »  HPC  »  Articles  » 
:  ohpc-slurm-server              x86_64     2.6-7.1.ohpc.2.6          OpenHPC-updates     7.0 k Installing dependencies:  mariadb-connector-c            x86_64     3.1.11-2.el8_3            appstream
14%
Warewulf 4 – GPUs
20.02.2023
Home »  HPC  »  Articles  » 
 the file /usr/local/bin/gpu_devices.sh  (Listing 6). Listing 6: /usr/local/bin/gpu_devices.sh #!/bin/bash   /sbin/modprobe nvidia   if [ "$?" -eq 0 ]; then   # Count the number of NVIDIA controllers found.   NVDEVS=`lspci | grep -i NVIDIA`   N3
14%
First steps in IT automation by Rex
11.06.2014
Home »  Archive  »  2014  »  Issue 21: Manag...  » 
Lead Image © Konstantin Chagin , 123RF.com
on the Rex host and then copy the public key over to the client (Listing 3). After that, a test login on the client without password should work. Listing 3 Key-Based Authentication 01 root

« Previous 1 2 3 4 5 6 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice