Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (782)
  • Article (248)
  • News (27)
  • Blog post (2)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 106 Next »

27%
Exploring the Xeon Phi
05.11.2013
Home »  Articles  » 
were largely identical to the cores of the Pentium-S processors and communicated with each other via a high-speed network connection and four DDR-3 memory channels. Intel manufactured a few hundred SCCs ... Intel’s powerful new Xeon Phi co-processor
27%
Moving Your Data – It’s Not Always Pleasant
08.05.2013
Home »  HPC  »  Articles  » 
no xattr information. 8. bbFTP Although bbFTP sounds like it’s related to BBCP, it’s really not. BBCP was developed at SLAC, and bbFTP was developed at IN2P3. It is something like FTP, but it uses its own ... Moving Your Data – It’s Not Always Pleasant
27%
Predicting Drive Doom
20.10.2013
Home »  HPC  »  Articles  » 
Modern drives use S.M.A.R.T. (self-monitoring, analysis, and reporting technology) to gather information and run self-tests. Smartmontools is a Linux tool for interacting with the S ... of the drives (more on that later). Smartmontools is compatible with all S.M.A.R.T. features and supports ATA/ATAPI/SATA-3 to -8 disks and SCSI disks and tape devices. It also supports the major Linux RAID cards ... Modern drives use S.M.A.R.T. (self-monitoring, analysis, and reporting technology) to gather information and run self-tests. Smartmontools is a Linux tool for interacting with the S ... S.M.A.R.T., Smartmontools, and Drive Monitoring
27%
The practical benefits of network namespaces
15.08.2016
Home »  Archive  »  2016  »  Issue 34: Softw...  » 
Lead Image © Morganimation, fotolia.com
1500 qdisc noop state DOWN mode DEFAULT group default qlen 1000 link/ether 52:54:00:02:e3:f1 brd ff:ff:ff:ff:ff:ff $ ip link 1: lo: mtu 65536 qdisc noqueue state UNKNOWN mode
26%
Monitoring NFS Storage with nfsiostat
12.03.2013
Home »  HPC  »  Articles  » 
is shown in Listing 1. Listing 1: Sample nfsiostat Output Linux 2.6.18-308.16.1.el5.centos.plus (home8) 02/10/2013 _i686_ (1 CPU) 02/10/2013 03:38:48 PM Filesystem: rMB_nor/s wMB_nor/s
26%
Modern Fortran – Part 1
20.10.2016
Home »  HPC  »  Articles  » 
Fortran comprises a huge body of software in high-performance computing. We look at Fortran’s evolution into a modern HPC language. ... writing code. Columns 1 to 5 could be used for statement labels such as the following: ...       SUM = 0.0       D0 100 I=1,10          SUM = SUM + REAL(I)  100  CONTINUE ...       Y = X1 + X2 + X3 ... Fortran comprises a huge body of software in high-performance computing. We look at Fortran’s evolution into a modern HPC language.
26%
open64
01.08.2012
Home »  HPC  »  Articles  »  Warewulf Cluste...  »  Warewulf 3 Code  » 
 
| 4.3 MB 00:02 (2/2): nss-softokn-freebl-3.12.9-11.el6.i686.rpm | 115 kB 00:00 ... Warewulf 3 open64 code
26%
Appendix – I/O Report from MPI Strace Analyzer
15.02.2012
Home »  HPC  »  Newsletter  »  2012-02-15 HPC...  » 
 
2 0 0 0 0 0 2 256KB < < 512KB 2 2 2 3 2 2 2 3 512KB < < 1MB 3 2 2
26%
Appendix – I/O Report from MPI Strace Analyzer
26.01.2012
Home »  HPC  »  Newsletter  »  2012-02-01 HPC...  » 
 
2 0 0 0 0 0 2 256KB < < 512KB 2 2 2 3 2 2 2 3 512KB < < 1MB 3 2 2
26%
Uncovering SQL Injections
18.03.2013
Home »  Articles  » 
 
Hardly a day goes by without reports of hackers breaking into government, military, or enterprise servers. If you analyze the details of the hacker’s approach, you will see that, in 90 percent ... is a classic bug in a web application: an SQL injection vulnerability. SQL injection, which has been known for around 12 years, is still one of the hacker’s most popular tools. This article presents real ... Hardly a day goes by without reports of hackers breaking into government, military, or enterprise servers. If you analyze the details of the hacker’s approach, you will see that, in 90 percent

« Previous 1 2 3 4 5 6 7 8 9 10 11 12 13 14 ... 106 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice