Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xcode Llorente 12 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (71)
  • Article (41)
  • Blog post (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 Next »

14%
Parallel Programming with OpenMP
21.11.2012
Home »  HPC  »  Articles  » 
(unew(i,j)-u(i,j)) ) 141 ENDDO 142 ENDDO 143 144 IF(MOD(iter,10)==0) WRITE(*,"('iter,diff:',i6,e12.4)") iter,diff 145 146 ! Update solution 147 DO j=2,m-1 148 DO i=2,m-1 149 u(i,j) = unew
14%
Digital asset management
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Claudia, Fotolia.com
. ResourceSpace supports more than 90 image and document types and approximately 120 audio and video formats. Ubuntu users can find information in the wiki about how to expand the system so that, with help
14%
Warewulf Cluster Manager – Administration and Monitoring
21.08.2012
Home »  HPC  »  Articles  » 
Size Used Avail Use% Mounted on none 1.5G 274M 1.2G 19% / tmpfs 1.5G 0 1.5G 0% /dev/shm 10.1.0.250:/var/chroots/sl6.2 53G 33G 18G
14%
Serverless computing with AWS Lambda
30.01.2020
Home »  Archive  »  2020  »  Issue 55: AWS L...  » 
Lead Image © joingate, 123RF.com
Lookup Output START RequestId: 4e90b424-95d9-4453-a2f4-8f5259f5f263 Version: $LATEST ('www.devsecops.cc', [], [' 138.68.149.181' ]) END RequestId: 4e90b424-95d9-4453-a2f4-8f5259f5f263 REPORT Request
14%
Detecting intruders with Suricata
10.06.2015
Home »  Archive  »  2015  »  Issue 27: Fault...  » 
Lead Image © Kurhan, 123RF.com
this type of long-term attacker, you need a different, more methodical approach. Dwell Time Most organizations are already at the 80% threshold in regard to security. Getting to 90% and above
14%
Documentation Tools for Admins
20.05.2014
Home »  Archive  »  2014  »  Issue 20: IPv6...  » 
Lead Image © Sorin Colac, 123RF.com
immediately on the phone or by email. Ideally, help desk staff should handle 80 to 90 percent of all requests themselves and pass on only the really tough cases to the specialists. The success rate depends
14%
Let the hardware do the heavy lifting
09.06.2018
Home »  Archive  »  2018  »  Issue 45: Autom...  » 
Photo by Victor Freitas on Unsplash
TLS delivered 70Gbps with greater than 90% CPU usage. The inline encryption and decryption on both ends of the session reduced overall packet latency and saved valuable CPU cycles, thereby increasing
14%
Automate your VMware configuration with Puppet
11.04.2016
Home »  Archive  »  2016  »  Issue 32: Measu...  » 
Lead Image © astragal, 123RF.com
a public key with hash 31452e1f896 f71542b6b9198188de1b5e59f5af62ffcefdc261df324636c90c7 but we're expecting a hash of XXX. If you are sure the remote system is authentic set
14%
Flexible backup for large-scale environments
05.08.2024
Home »  Archive  »  2024  »  Issue 82: Sover...  » 
Photo by Nils Bouillard on Unsplash
to three collections of hard drives (just a bunch of disks, JBODs). Each array comprises 90 SAS2 disks connected by several controllers, each with a capacity of 12TB. ZFS ensures the required filesystem
14%
pdsh Parallel Shell
08.07.2018
Home »  HPC  »  Articles  » 
read the hosts from a file other than the WCOLL environment variable: $ pdsh -w ^/tmp/hosts uptime 192.168.1.4:  15:51:39 up  8:35, 12 users,  load average: 0.64, 0.38, 0.20 192.168.1.250:  15:47:53 up

« Previous 1 ... 3 4 5 6 7 8 9 10 11 12 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice