Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %252522Rub%2222%2525A9n Llorente"523 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (116)
  • Article (54)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 18 Next »

49%
OpenACC – Parallelizing Loops
09.01.2019
Home »  HPC  »  Articles  » 
of the loop, n , is large enough, some processing hardware can greatly speed up the computation. What happens if z(i)  depends on a previous value, as in the following: do i = 2,n    z(i) = z(i-1)*2 enddo
49%
OpenStack installation with the Packstack installer
16.08.2018
Home »  Archive  »  2018  »  Issue 46: CMS S...  » 
Lead Image © Tom Wang, Fotolia.com
| nova | compute | | 266b6275884945d39dbc08cb3297eaa2 | ceilometer | metering | | 4f0ebe86b6284fb689387bbc3212f9f5 | cinder | volume | | 59392edd44984143bc47a89e111beb0a
49%
OpenACC – Porting Code
07.03.2019
Home »  HPC  »  Articles  » 
; you should collapse two or more loops. Table 4: Collapsing Loops Fortran C !$acc parallel loop collapse(2)    do i=1,n       ...       do j=1,m          ...       enddo
49%
Arp Cache Poisoning and Packet Sniffing
05.09.2011
Home »  Articles  » 
 
can see how the arp cache poisoning works: $ sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 \ -D 192.168.1.133 -h 00:22:6E:71:04:BB -m 00:0C:29:B2:78:9E \ -H 00:22:6E:71:04:BB -M 00:0C:29:B2:78:9E
49%
History and use of the mail utility
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Vlad Kochelaevskiy, fotolia.com
's background is an age-old, bubbling cauldron of confusion. Here's that example, shown in Figure 2. Figure 2: You can see the lengths to which modern operating
49%
Securing the container environment
01.06.2024
Home »  Archive  »  2024  »  Issue 81: Load...  » 
Lead Image © zeferli, 123RF.com
Running hunger-check 0 56218b2e56fa8 hunger-check-deployment-96b6764f9-7zsbk cbdd56829a054 0ff4eace8cd5b 2 months ago Running metadata
49%
Using loop directives to improve performance
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Lead Image © orson, 123RF.com
if z(i) depends on a previous value, as in the following: do i = 2,n z(i) = z(i-1)*2 enddo As written, you can't generally parallelize the loop because of data dependency [4]. This dependency
49%
Extended File Attributes
20.04.2022
Home »  HPC  »  Articles  » 
 quick brown fox then add some extended attributes to this file: $ setfattr -n user.comment -v "This is a comment" test.txt This command sets the extended file attribute to the name user.comment . The -v  option indicates
49%
Cloud-native storage with OpenEBS
25.03.2021
Home »  Archive  »  2021  »  Issue 62: Lean...  » 
.io/hostname: "node2" dataRaidGroups: - blockDevices: - blockDeviceName: "blockdevice-3f4e3fea1ee6b86ca85d2cde0f132007" - blockDeviceName: "blockdevice-db84a74a39c0a1902fced6663652118e
49%
A script for strict packet filter updates
05.12.2016
Home »  Archive  »  2016  »  Issue 36: Autom...  » 
Lead Image © french 03, photocase.com
} ${TABLENAME} -nL ${CHAINNAME} 2> /dev/null 1> /dev/null 048 RET=$? 049 return ${RET} 050 fi 051 } 052 053 function delete_rule 054 { 055 # Find correct rule parameters 056 RULE=`echo ${@} | awk

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 ... 18 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice