Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: bring calling -(liทe@248fvcen)-สูตรหวยออนไลน์.wco ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (879)
  • Article (252)
  • News (183)
  • Blog post (4)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

« Previous 1 ... 86 87 88 89 90 91 92 93 94 95 96 97 98 99 ... 132 Next »

15%
Collecting application logfiles with Kubernetes
28.11.2021
Home »  Archive  »  2021  »  Issue 66: Inci...  » 
Lead Image © bowie15, 123RF.com
. The goal is to start only one service with the container. Of course, you do not want a container to collect log information on the temporary local filesystem. Many start scripts therefore simply call
15%
HPC Cloud Storage
20.11.2013
Home »  HPC  »  Articles  » 
’t be changed in any way whatsoever. Range of Back Ends: S3QL has a range of back ends (what I call targets, but which S3QL calls storage back ends), such as Google storage, Amazon S3, Amazon Reduced
15%
Gathering Data on Environment Modules
10.09.2012
Home »  HPC  »  Articles  » 
log, /var/log/messages , where user actions create a log entry but the user cannot access the logfile. The answer to this conundrum is called logger . Logger allows users to add comments or entries
15%
HPC Data Analytics
08.08.2014
Home »  HPC  »  Articles  » 
. To get there, the computations are typically done in what is called a ``pipeline'' (also called a workflow). The phrase is commonly used in biological sequence analysis referring to a series of sequential
15%
I/O Profiling at the Block Level
27.08.2014
Home »  HPC  »  Articles  » 
wrote about I/O tracing by looking at I/O patterns the application sends to the system (system calls) with strace. These patterns can reveal a great deal about what the application is doing. However, data
15%
Safe Files
16.04.2015
Home »  HPC  »  Articles  » 
with GPG. By default it uses the symmetric encryption algorithm, called CAST5 that is a 128-bit symmetric-key block cipher. Other encryption algorithms available are listed below along with the public key
15%
OpenMP – Loops and Data Control
08.05.2019
Home »  HPC  »  Articles  » 
your serial code to OpenMP. In this article, I’m going to go a little deeper into those two directives and talking more about teams and loops, including some options (called “clauses”) for the
15%
Prolog and Epilog Scripts
07.07.2021
Home »  HPC  »  Articles  » 
Virtually all HPC systems use a resource manager, also called a job scheduler. This tool runs applications on behalf of the user when the free resources match what the user requests. Of the numerous
15%
Coming to grips with grep
05.12.2014
Home »  Archive  »  2014  »  Issue 24: Visua...  » 
Lead Image © Andrey Lavrushov, 123RF.com
the matches of a pattern: # g/chrisbinnie/p From these humble beginnings, a standalone utility called grep surfaced, toward which you could pipe any data. Thanks to grep's pervasive acceptance, the sys admin
15%
Lean on Logwatch
17.02.2015
Home »  Archive  »  2015  »  Issue 25: Safe...  » 
Lead Image © MuharremZengin, 123RF.com
in this section will almost certainly warrant further investigation. Figure 2: The header of a typical logwatch report. The file that cron calls, which

« Previous 1 ... 86 87 88 89 90 91 92 93 94 95 96 97 98 99 ... 132 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice