15%
21.08.2012
Listing 4: Installing ganglia-metad into the Master Node
[root@test1 RPMS]# yum install ganglia-gmetad-3.4.0-1.el6.i686.rpm
Loaded plugins: fastestmirror, refresh-packagekit, security
Loading
15%
27.11.2011
needs direct access to the hardware and thus typically runs with root privileges. The exceptions are Mac OS X and Solaris, where the user only needs access privileges for the network interface card device
15%
20.10.2016
such as square root, cosine, or sine.
Fortran 90 also introduced derived data types (custom data types). Before Fortran 90, you could not create your own data type; however, creating a derived data type
15%
20.04.2017
you install it into /usr/local
as root. The other option is to build the code and install the tool in your user account; for example:
./configure --prefix=/home/laytonjb/bin/agedu
Then you just
15%
25.01.2017
between 1 and n
, the number of images. Notice it starts with a 1 and not a zero, which is perhaps influenced by the Fortran roots.
In the application code, you define a coarray with a trailing
15%
18.10.2017
. In this case, the template is *.dat.2
, which means find
will locate any file that ends in .dat.2
(note the use of the * wildcard). If I truly get desperate to find a file, I'll go to the root directory
15%
13.06.2022
as root, be careful. For example, to run the EP benchmark use:
time mpirun -np 6 -h ./hostfile ep.B.x
The output could be written to a random file in /tmp
and parsed for the runtime.
The benchmark time
15%
13.07.2022
following commands on the system – in my previous example, this would be laytonjb-desktop
:
$ sudo chmod u+s $(which screen)
$ sudo chmod 755 /var/run/screen
Note that these commands need to be run by root
15%
20.02.2023
the total size, use the command du -sh
on the root directory (/). Recall that /home
and /opt
are NFS exported to the compute node so the output of the command includes the space for those directories
15%
17.02.2015
Docker detractors believe the root of the problem is Docker's overlay design, because they think its modifications are too wild, but the security also leaves something to be desired.
A Docker container