Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcomm ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (323)
  • Article (123)
  • News (10)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 37 38 39 40 41 42 43 44 45 46 Next »

62%
Moving HPC to the Cloud
19.10.2012
Home »  HPC  »  Articles  » 
, which can take anywhere from 5 to 20 minutes (depending on how large you make your cluster), you can then install your application. Application installation works just like a regular local machine
62%
Environment Modules
23.02.2012
Home »  HPC  »  Articles  » 
/64/4.3.0 globalarrays/open64/openmpi/64/4.2 mvapich2/gcc/64/1.2 acml/open64-int64/64/4.3.0 hdf5/1.6.9 mvapich2/open64/64/1.2 blacs/openmpi/gcc/64/1.1patch03 hpl/2.0
62%
Parallel and Encrypted Compression
09.12.2021
Home »  HPC  »  Articles  » 
 falls between the switch and the number of threads.) Both the compression and decompression capabilities should be multithreaded. pzstd The parallel version of zstd  is pzstd . On my Ubuntu 20.04 system, pzstd  was
62%
Vulnerability assessment best practices for enterprises
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Photo by Fancycrave on Unsplash
). Figure 1: Articulated as a mathematical formula, Risk = Threat x Vulnerability x Cost of Asset. Clear Guidance VA activities must have acceptance from the highest levels of an organization
62%
Windows 10 Updates with WSUS
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © sensay, 123RF.com
to download just 64-bit patches (x64 Global ) or updates for 32-bit computers (x86 Global ). If you don't want to download the updates directly via Windows Update, but rather on the basis of an existing WSUS
62%
Kubernetes StatefulSet
05.02.2023
Home »  Archive  »  2023  »  Issue 73: Datab...  » 
Photo by Ashley Light on Unsplash
, the container needs to check for consistency on restarting. On the other hand, you could stop a container with database version x and start a container with version x +1. This container then checks the dataset
62%
Zuul 3, a modern solution for CI/CD
05.12.2019
Home »  Archive  »  2019  »  Issue 54: NVMe...  » 
Lead Image © lightwise, 123RF.com
# return data to MySQL (empty key here 'mysql:') 16 mysql: 17 failure: 18 gerrit: 19 Verified: -1 20 mysql: 21 require: 22 gerrit: 23 # prevents waste runs on %submit usage 24
62%
Keeping Docker containers safe
13.02.2017
Home »  Archive  »  2017  »  Issue 37: Distr...  » 
Lead Image © Irina Tischenko, 123RF.com
others. Use SELinux, if possible; otherwise, use AppArmor [16], grsecurity [17], or PaX [18] to lock down unexpected system resource access. Patch your systems more often than usual; even official
62%
Manage software apps publicly and privately
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © Akurhan, 123RF.com
{ "$schema" : "https://aka.ms/winget-packages.schema.2.0.json", "CreationDate" : "2024-03-05T03:41:14.411-00:00", "Sources" : [ { "Packages" : [ { "PackageIdentifier" : "Microsoft.VisualStudio.2022.Community
62%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
the wget command shown in Listing 3 with its output to download the revershell file. Now make the module executable and insert the module into the host: chmod +x revershell.ko insmod revershell

« Previous 1 ... 37 38 39 40 41 42 43 44 45 46 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice