Admin Magazine
 
  • News
  •  
  • Articles
  •  
  • Tech Tools
  •  
  • Subscribe
  •  
  • Archive
  •  
  • Whitepapers
  •  
  • Digisub
  •  
  • Write for Us!
  •  
  • Newsletter
  •  
  • Shop
  • DevOps
  • Cloud Computing
  • Virtualization
  • HPC
  • Linux
  • Windows
  • Security
  • Monitoring
  • Databases
  • all Topics...
Search
Login
ADMIN Magazine on Facebook
GooglePlus

Search

Refine your search
  • [x] Creation time: Last year
Sort order
  • Date
  • Score
Content type
  • Article (Print) (50)
  • Article (12)
  • News (2)
Keywords

1 2 3 4 5 6 7 Next »

100%
SC24 – Bursting at the Seams
07.01.2025
Home »  HPC  »  Articles  » 
We’ll recap some noticeable and not so noticeable points of interest that came up during the largest, most attended Supercomputing Conference yet. ... ; used with permission). Notice that whereas FP64 and FP64 Tensor dominate the overall floating-point precision on Perlmutter GPUs, FP32 usage is about 36% of the total. This report surprises me ... We’ll recap some noticeable and not so noticeable points of interest that came up during the largest, most attended Supercomputing Conference yet.
99%
Core Linux Commands for HPC
09.03.2025
Home »  Articles  » 
Many people want to get into HPC but aren’t sure how.  We consider  commands  that would be  a good starting point, especially if you want to build your own home system. ... ’t really seen any lists for HPC. However, the intersection of these articles gave me a starting point for my ideas about core Linux commands for HPC. Of course, the danger in publishing a list of Linux ... Many people want to get into HPC but aren’t sure how. W e consider c ommands  that would be  a good starting point, especially if you want to build your own home system.
75%
Supercomputing Conference 2024
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © djem, 123RF.com
image from PMBS24 presentation by Si Hammond; used with permission). Notice that whereas FP64 and FP64 Tensor dominate the overall floating-point precision on Perlmutter GPUs, FP32 usage is about 36 ... We'll recap some noticeable and not so noticeable points of interest that came up during the largest, most attended Supercomputing Conference yet.
62%
Reducing the Attack Surface in Windows
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Photo by Sander Sammy on Unsplash
the elements of the interface. The "attack surface" on which Microsoft documentation [1] focuses is the sum total of potential attack points on the computer systems of an IT network that unauthorized users could ... The sum total of all possible points of attack can be defined as the attack surface, and you need to take every opportunity to minimize it to the extent possible. Windows has built-in rules
37%
IP Fabric 7.0 Released
21.02.2025
Home »  News  » 
 
-view dashboards for tracking security operations or monitoring compliance. Visio export for creating detailed diagrams. Expanded security capabilities including Check Point, Palo Alto, and Stormshield support
36%
How vector databases work and when they're used
04.12.2024
Home »  Archive  »  2024  »  Issue 84: Non-R...  » 
Lead Image © neyro2008, 123rf.com
, the numerical values stand for the meaning of the statement in question. In the example, the vectors of the word groups "A blue striped cotton shirt" and "A nautical cotton shirt" would point to locations close
36%
SUSE Cloud Observability Announced
14.11.2024
Home »  News  » 
 
environments powered by OpenTelemetry, with more than 40 out-of-the-box dashboards providing a holistic view of the entire stack. Cost-effective entry point: Transparent, usage-based pricing with no hidden
35%
Zero trust planning and implementation
27.09.2024
Home »  Archive  »  2024  »  Issue 83: Storage  » 
Lead Image © magiceyes, 123RF.com
carrying out continuous verification at different points and on different levels: never trust, always verify. The fundamental cornerstones of zero trust are derived from: Continuous verification or
35%
ASM tools and strategies for threat management
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Lead Image © tarokichi, 123RF.com
spear, and murdered the purportedly invulnerable hero. He knew about the weak point in Siegfried's protective armor. Literary historians talk about Siegfried's death as an intrigue or honor killing
34%
Monitor applications end to end
26.01.2025
Home »  Archive  »  2025  »  Issue 85: Monit...  » 
Photo by Adam Winger on Unsplash
the performance and quality of an entire application from the user's point of view, or at the point of customer contact if you prefer. Digital experience monitoring (DEM) is sometimes used as a synonym

1 2 3 4 5 6 7 Next »

Service

  • Article Code
  • Contact
  • Legal Notice
  • Privacy Policy
  • Glossary
    • Backup Test
© 2025 Linux New Media USA, LLC – Legal Notice