Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6gbps Llorente" ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (934)
  • Article (274)
  • News (114)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 133 Next »

15%
Resolving problems with DNS, Active Directory, and Group Policy
17.04.2017
Home »  Archive  »  2017  »  Issue 38: .NET...  » 
Lead Image © Fernando Gregory, 123RF.com
settings of the computers. The fastest way to launch the network connection configuration tool is to use ncpa.cpl at the command line. Optimizing Reverse Zones and IPv6 Settings Working with a reverse zone
15%
CPU affinity in OpenMP and MPI applications
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Lead Image © podfoto, 123RF.com
for the CPUs: -----------text01 code $ cat /sys/devices/system/cpu/cpu0/topology/thread_siblings_list 0,32 If the first number in the output [6] is equal to the CPU number in the command, then it's a real core
15%
An open source object storage solution
22.05.2023
Home »  Archive  »  2023  »  Issue 75: Teamwork  » 
Photo by Pat Whelen on Unsplash
provider (IDP). In this case, you should create a new user, either in the console or with the mc utility. For example, to add user 8pu2T6NBB6 for the deployment mycluster1 defined earlier with the secret
15%
Processor and Memory Affinity Tools
14.09.2021
Home »  HPC  »  Articles  » 
 $(find /sys/devices/system/cpu -regex ".*cpu[0-9]+/topology/thread_siblings_list") | sort -n | uniq 0,32 1,33 2,34 3,35 4,36 5,37 6,38 7,39 8,40 9,41 10,42 11,43 12,44 13,45 14,46 15,47 16,48 17,49 18,50 19,51 20,52 21,53 22,54 23,55 24,56 25
15%
Managing Storage with LVM
07.11.2023
Home »  HPC  »  Articles  » 
, mount the new filesystem and check it with the df  command. The Ubuntu 22.04 example can illustrate this process (Listing 6). Listing 6: LV Block Device for Filesystem $ sudo mkdir /mnt/test $ sudo mkfs.ext4
15%
Automate CentOS and RHEL installation with PXE
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © Michael Kempf, Fotolia.com
--reserve-mb='auto' 40 %end 41 42 %anaconda 43 pwpolicy root --minlen=6 --minquality=1 --notstrict --nochanges --notempty 44 pwpolicy user --minlen=6 --minquality=1 --notstrict --nochanges --emptyok 45
15%
Darshan I/O analysis for Deep Learning frameworks
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Michaela Murphy on Unsplash
the darshan-job-summary.pl output PDF. Darshan with TensorFlow Darshan has had a number of successes with MPI applications. For this article, I tried it on a TensorFlow framework, with Keras [6] loading
15%
Integrating OCS information into monitoring with OpenNMS
21.08.2014
Home »  Archive  »  2014  »  Issue 22: OpenS...  » 
Lead Image © Kheng Ho Toh, 123RF.com
and production. To show how monitoring profiles can be implemented for a specific server, the example distinguishes between mail, web, and database servers. It assumes that the stable version 1.12.3 of OpenNMS [6
15%
Software-defined storage with LizardFS
17.06.2017
Home »  Archive  »  2017  »  Issue 39: Conta...  » 
Lead Image © larisa13, 123RF.com
. If you enter a support agreement with Skytechnology, you can use the proprietary uRaft daemon, which is independent of LizardFS and provides automatic failover according to the Raft consensus algorithm [6
15%
Manage logical volumes with GUI tools
09.10.2017
Home »  Archive  »  2017  »  Issue 41: Kuber...  » 
Lead Image © grafner, 123RF.com
more data security. You make your choice when creating an LVM volume group, but usually all the tools set up linear volumes without RAID functionality. Frequently used RAID levels (e.g., RAID 5, 6

« Previous 1 ... 60 61 62 63 64 65 66 67 68 69 70 71 72 73 ... 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice