Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %6gbps Llorente" ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (934)
  • Article (274)
  • News (114)
  • Blog post (3)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 83 84 85 86 87 88 89 90 91 92 93 94 95 96 ... 133 Next »

15%
Two-Factor Authentication
02.04.2013
Home »  Articles  » 
 
any back-end software because it is provided by Vasco in the cloud (see also the “OAuth API” box). Figure 6: The online demo token by Vasco lets users
15%
Ceph Maintenance
12.08.2013
Home »  HPC  »  Articles  » 
.tool The output is given in JSON format (Figure 5), so piping it to python -m json.tool makes the output readable (Figure 6). Figure 5: Performance data queried
15%
Kickstack: OpenStack with Puppet
22.06.2014
Home »  Articles  » 
Stack machines is much more convenient in the built-in Puppet Dashboard than setting up the services manually (Figure 6). If you want to extend your OpenStack installation later to add more computers, you can do
15%
Win-Win with Cygwin
23.01.2012
Home »  Articles  » 
 
which your package exists, you can search for it with the Search field (upper left corner of the Select Packages window) (Figure 6). Figure 6: Searching
15%
Intruder Tools
13.12.2011
Home »  Articles  » 
 
entities and run transforms to change those entities. The palette is available once you click the Manage tab and see it listed under Windows , which contains a default collection of entities (see Figure 6
15%
Cloud Forensics
03.02.2012
Home »  Articles  » 
 
be sure that the evidence is genuine and has not been injected by a malicious third-party? In this context, the term data provenance [6] becomes extremely meaningful: It covers the origins of the piece
15%
High-Performance Python 1
16.07.2019
Home »  HPC  »  Articles  » 
a “wrapper function” for the library in Python (Listing 6). Listing 6: Wrapper Function import ctypes   _sum = ctypes.CDLL('libsum.so') _sum.sum_function
15%
OpenMP – Parallelizing Loops
03.04.2019
Home »  HPC  »  Articles  » 
) by each thread, you would probably put the parallel region around the outside loop (Table 6); otherwise, the work on each thread is less (fewer loops), and you aren't taking advantage of parallelism
15%
Warewulf 4 – GPUs
20.02.2023
Home »  HPC  »  Articles  » 
 the file /usr/local/bin/gpu_devices.sh  (Listing 6). Listing 6: /usr/local/bin/gpu_devices.sh #!/bin/bash   /sbin/modprobe nvidia   if [ "$?" -eq 0 ]; then   # Count the number of NVIDIA controllers found.   NVDEVS=`lspci | grep -i NVIDIA`   N3
15%
Where Does Job Output Go?
11.09.2023
Home »  HPC  »  Articles  » 
compute nodes with 4-6 (or more) SSD drives that are combined by software RAID with anything from RAID 0 to RAID 5 or RAID 6. These nodes now have substantial performance in the tens of gigabytes per second

« Previous 1 ... 83 84 85 86 87 88 89 90 91 92 93 94 95 96 ... 133 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice