Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (570)
  • Article (171)
  • News (20)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 42 43 44 45 46 47 48 49 50 51 52 53 54 55 ... 77 Next »

18%
Keras: Getting Started with AI
03.12.2024
Home »  HPC  »  Articles  » 
Flow, Microsoft Cognitive Toolkit (commonly referred to as CNTK), Theano, and PlaidML. By version 2.4, Keras only supported TensorFlow. In version 3.0 and subsequent versions, Keras once again supported multiple
18%
New features in PHP 8
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Maxim Borovkov, 123RF.com
On if $lever is set to Up or Down. If none of the comparison values before => are correct, the default value applies. Listing 1 match $flasher = match ($lever) { 0 => "Warning_Flasher", 'Up
17%
The AWS CDK for software-defined deployments
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © krisckam, 123RF.com
under the Mozilla Public License (MPL) v2.0 [7]. Visibility into the deployment state. It exposes its state to inspection (CloudFormation does not expose its state in any way, although it recently
17%
Hunt down vulnerabilities with the Metasploit pen-testing tool
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bluebay, 123rf.com
can use to test security vulnerabilities, enumerate networks, execute attacks, and evade detection" [1], has been written up in a number of books. Linux Magazine reported more than 12 years ago [2
17%
Secure Your Server with TCP Wrappers
02.10.2012
Home »  Articles  » 
 
, for example, 12.34.56.78 will be allowed to connect to ALL services and not just SSH. As well as these flexible options, you can also declare old school subnets directly: sshd: 1.2.3.4/255.255.255.0 As well
17%
Rocky Reaches for a Role in HPC
12.09.2022
Home »  HPC  »  Articles  » 
. One reason for the importance of CentOS to the HPC market was cost. The largest HPC systems on the TOP500 list are created with huge budgets where the operating system is less of a factor in the overall
17%
News for Admins
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
 
-based Linux distributions are affected by the vulnerability except for SUSE Linux Enterprise 15, openSUSE Leap 15.0, and Fedora 28 and 29. These distributions compile their userspace code with GCC's -fstack
17%
Matlab-like tools for high-performance computing
16.05.2013
Home »  Archive  »  2013  »  Issue 14: Samba 4  » 
://wiki.scilab.org/Documentation/ParallelComputingInScilab parallel_run http://help.scilab.org/docs/5.4.0/en_US/parallel_run.html Parallel programing http://my.opera.com/muksitsyahlan/blog/2011/01/05/parallel-programming-with-scilab-2 MPI
17%
OpenACC – Parallelizing Loops
09.01.2019
Home »  HPC  »  Articles  » 
of the loop, n , is large enough, some processing hardware can greatly speed up the computation. What happens if z(i)  depends on a previous value, as in the following: do i = 2,n    z(i) = z(i-1)*2 enddo
17%
Using loop directives to improve performance
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © orson, 123RF.com
if z(i) depends on a previous value, as in the following: do i = 2,n z(i) = z(i-1)*2 enddo As written, you can't generally parallelize the loop because of data dependency [4]. This dependency

« Previous 1 ... 42 43 44 45 46 47 48 49 50 51 52 53 54 55 ... 77 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice