Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Spell check suggestion: %xsede%3 00s Llorente 48 ?

Refine your search
Sort order
  • Date
  • Score
Content type
  • Article (Print) (122)
  • Article (43)
  • Blog post (1)
  • News (1)
Keywords
Creation time
  • Last day
  • Last week
  • Last month
  • Last three months
  • Last year

1 2 3 4 5 6 7 ... 17 Next »

100%
Resource Management with Slurm
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Vladislav Kochelaevs, fotolia.com
CoresPerSocket=10 ThreadsPerCore=1 RealMemory=30000 State=UNKNOWN PartitionName=compute Nodes=ALL Default=YES MaxTime=48:00:00 DefaultTime=04:00:00 MaxNodes=2 State=UP DefMemPerCPU=3000 Notice that you ... 48
99%
Assess USB performance while exploring storage caching
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Lucy Baldwin, 123RF.com
disk reads: 1306 MB in 3.00 seconds = 434.77 MB/sec federico@cybertron:~$ sudo hdparm -W /dev/sdb /dev/sdb: write-caching = 1 (on) federico@cybertron:~$ sudo hdparm -W 0 /dev/sdb /dev/sdb: write ... 48
98%
Symbolic mathematics with Python's SymPy library
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Buchachon Petthanya, 123RF.com
and simplifying expressions; functions for symbolically solving equations and ordinary and partial differential equations; two- and three-dimensional (2D and 3D) plotting; and much more (e.g., see the Sym ... 48
98%
Kubernetes Auto Analyzer
05.10.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
HQifQ.gyjpaChSSdpq2WQqsFB81noKQShT19XkoO7620t70w8GVSRt3BhY2UiOiJkZWZhdWx0Iiwia3ViZXJuZXRlcy5[snip ...]   $ kubectl describe po kube-apiserver-minikube -n kube-system $ kubeautoanalyzer -s https://192.168.39.207:8443 -t ... 48
98%
Exploring SQL Server on Linux
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © yewkeo, 123RF.com
. At the time of writing, some core-based engine feature limitations remain, and only the SQL Server integration service is supported on Linux, as shown in Figure 3. Other BI modules are currently out of scope ... 48
98%
Installing and operating the Graylog SIEM solution
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Leo Blanchette, 123RF.com
], and MongoDB 3.6 [3]. If not already present, installing Java (as root or using sudo) before Elasticsearch and MongoDB is recommended: yum install java-1.8.0-openjdk-headless.x86_64 You should remain root ... 48
98%
Workflow-based data analysis with KNIME
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image © Andrea De Martin, 123RF.com
Gateway Initiative (OSGI) technology. The latest version (version 3.7) is available at the project website [1], where you will also find other introductory materials, including blogs, videos, and sample ... 48
98%
Improved defense through pen testing
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
Lead Image Photo by Simeon Jacobson on Unsplash
of the more popular models are the Cyber Kill Chain© (copyright Lockheed Martin) [2] and the MITRE ATT&CKTM model [3]. Rather than say that all models have their strengths and weaknesses, I would argue ... 48
98%
D-Wave's Murray Thom discusses the present and future of quantum computing.
13.12.2018
Home »  Archive  »  2018  »  Issue 48: Secur...  » 
the early 1980s, and mathematicians and physicists have written many papers and given many lectures exploring the possibilities of quantum computing algorithms. In theory, a quantum computer should be able ... 48
61%
Discover the power of RouterBOARDS
25.09.2023
Home »  Archive  »  2023  »  Issue 77: Secur...  » 
Lead Image © andreysuslov, 123RF.com
Rubén Llorente ... is easy enough (superuser privileges are required): arp -s 192.168.90.55 00:0c:29:c1:91:b1 The last field of the command is the MAC address, which is the unique identifier of the network device to which

1 2 3 4 5 6 7 ... 17 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice