Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede%3 00s Llorente"22 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (1062)
  • Article (333)
  • News (113)
  • Blog post (5)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 71 72 73 74 75 76 77 78 79 80 81 82 83 84 ... 152 Next »

16%
Container Best Practices
22.01.2020
Home »  HPC  »  Articles  » 
_get(ospackages=['gcc', 'g++', 'gfortran'])   Stage0 += openmpi(cuda=False, infiniband=False,                   prefix='/usr/local/openmpi', version='3.1.0') The last line in the recipe adds the OpenMP MPI library to the specfile. In this case, it’s
16%
Programming with OpenMP
07.11.2011
Home »  HPC  »  Articles  » 
   #pragma omp parallel for reduction(+: pi) 10   for (i = 0; i < STEPCOUNTER; i++) { 11     /* pi/4 = 1/1 ‑ 1/3 + 1/5 ‑ 1/7 + ... 12        To avoid the need to continually change 13        the sign (s=1
16%
Secure containers with a hypervisor DMZ
02.02.2021
Home »  Archive  »  2021  »  Issue 61: Secur...  » 
Lead Image © lightwise, 123RF.com
. One well-known example comes from the field of networks, when securing a website with an application and database. A buffer zone, known as the demilitarized zone (DMZ) [3], has long been established
16%
Program GUIs in Go with Fyne
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Photo by Santoshi Guruju on Unsplash
.12. The command go get fyne.io/fyne/v2 downloads and sets up Fyne v2. To get a first impression of the different Fyne widgets, you can take a look at a demo app [3] and its available controls. To download
16%
Arm yourself against cloud attacks
06.10.2019
Home »  Archive  »  2019  »  Issue 53: Secur...  » 
Lead Image © sandra zuerlein, Fotolia.com
to be writable, which translates to decrypted. By the way, if you store backups of your environment in an object store, be it Amazon S3 or a private store (e.g., Ceph), you will want to use the encryption
16%
Bundle your custom apps in a Debian package
30.11.2025
Home »  Archive  »  2010  »  Issue 1: System...  » 
© Cathy Yeulet, 123RF.com
-changed.sh The first script should download an HTML file or a PHP file from either S3 or your existing repository and place it in the document root: cd /var/www/ wget -O tmp.tgz http://mybucket.s3.amazonaws
16%
OPA and Gatekeeper enforce policy defaults in Kubernetes
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Mac Gaither on Unsplash
: name: k8srequiredlabels spec: crd: spec: names: kind: K8sRequiredLabels validation: # Schema for the `parameters` field openAPIV3Schema: properties
16%
Forensic Tools
04.02.2014
Home »  Articles  » 
 
break, an office clerk uses his colleague’s computer, without the consent of his neighbor, to order several books under this neighbor’s Amazon account and at his neighbor’s expense. To conceal his actions
16%
Distributed Linear Algebra with Mahout
11.05.2022
Home »  HPC  »  Articles  » 
 Samsara online. Listing 1: Samsara Syntax Examples val G = B %*% B.t - C - C.t + (xi dot xi) * (s_q cross s_q) // Dense vectors: val denseVec1: Vector = (1.0, 1.1, 1.2) val denseVec2 = dvec(1, 0, 1, 1, 1, 2)   // Sparse
16%
Proactive Monitoring
11.10.2016
Home »  Archive  »  2016  »  Issue 35: Persi...  » 
Lead Image © Tom Wang, 123RF.com
values for the CPU, hard disks, and load follow: riemann-health -h -e -u 0.2 -r 0.5 -d 0.2 -s 0.3 -o l & Figure 1: The -help parameter

« Previous 1 ... 71 72 73 74 75 76 77 78 79 80 81 82 83 84 ... 152 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2026 Linux New Media USA, LLC – Legal Notice