Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: GGpoker德州官方网站dv9500.comGGpoker德州官方网站dv9500.comGGpoker德州官方网站dv9500.comGGpoker德州官方网站dv9500.comdex ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (54)
  • Article (34)
  • News (3)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 2 3 4 5 6 7 8 9 10 Next »

50%
Understanding the Status of Your Filesystem
18.06.2014
Home »  HPC  »  Articles  » 
/brushed/gismrc~                       5,153.420     #6    /home/laytonjb/.gkrellm2/themes/brushed/gkrellmrc                     4,986.920     #7    /home/laytonjb/.gkrellm2/themes/x17/host/bg_panel.png                 4,985.801     #8
50%
Darshan I/O analysis for Deep Learning frameworks
27.09.2021
Home »  Archive  »  2021  »  Issue 65: 7 Em...  » 
Photo by Michaela Murphy on Unsplash
, so I can get a feel for the postprocessing output. I grabbed an example from a previous article [4] (Listing 1). Although this example doesn't produce much I/O, I was curious to see whether Darshan
50%
Security analysis with Security Onion
04.04.2023
Home »  Archive  »  2023  »  Issue 74: The F...  » 
Photo by Mick Haupt on Unsplash
of malicious behavior that you apply to the metadata or content of the monitored communications. Suricata allows the use of Snort rules in part, but only if they were created for the older 2.x version. You can
50%
Zero Trust as a security strategy
03.02.2022
Home »  Archive  »  2022  »  Issue 67: syst...  » 
Photo by Jack Dong on Unsplash
't win a pot of gold with a connection hampered by a poor enhanced data GSM environment (EDGE) or because of a completely overloaded 4G network. Nevertheless, many companies are forcing their employees
50%
Darshan I/O Analysis for Deep Learning Frameworks
18.08.2021
Home »  HPC  »  Articles  » 
whether Darshan could profile the I/O the application does create. Listing 1: I/O Example Code program ex1     type rec         integer :: x, y, z         real :: value     end type rec     integer
50%
How graph databases work
04.08.2020
Home »  Archive  »  2020  »  Issue 58: Graph...  » 
Lead Image © iofoto, Fotolia.com
for the past 10 years. In parallel, a great variety of graph databases have emerged, including the originals like Neo4j [1], distributed databases like Titan [2], free databases like JanusGraph [3], proprietary
50%
Security first with the Hiawatha web server
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © Tatiana Popov, 123RF.com
0 127.0.0.1:12319 0.0.0.0:* LISTEN 766/shellinaboxd tcp 0 0 0.0.0.0:12320 0.0.0.0:* LISTEN 764/stunnel4 tcp 0 0 0
50%
Processor and Memory Metrics
12.02.2014
Home »  HPC  »  Articles  » 
.py  CPU ALL:  1.0  %  CPU0    4.1%  CPU1    2.0%  CPU2    0.0%  CPU3    0.0%  CPU4    0.0%  CPU5    0.0%  CPU6    0.0%  CPU7    2.0%  CPU ALL:    user:      0.7%  nice:    0.0%    system:    0.2%  idle
50%
Network monitoring with Icinga and Raspberry Pi
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © AndreaDanti, 123RF.com
You Need" box). The current version, the Raspberry Pi Model B+ [4] (Figure 1), continues a history of iterative improvements. What You Need Keep in mind that once you have a Rasp Pi B+, you
49%
Discovering indicators of compromise
05.02.2019
Home »  Archive  »  2019  »  Issue 49: Anato...  » 
Photo by Jakob Owens on Unsplash
and organizations on which they work. Two of the more popular models include: The Cyber Kill Chain copyrighted by Lockheed Martin [4]. The Mitre ATT&CK model [5]. Just as a good hiker uses different

« Previous 1 2 3 4 5 6 7 8 9 10 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice