Linux Journal Contents #45, January 1998
Parallel Computing Using Linux
by Manu Konchady
Various classes of problems lend themselves to parallel computing solutions. This article discusses the concepts and shows how Linux can be used to address the problem.
Parallel Processing using PVM
by Richard A. Sevenich
PVM is a software application that allows you to turn TCP/IP networked computers into a single virtual machine in order to run parallel programming.
I'm Not Going to Pay a Lot for This Supercomputer!
by Jim Hill, Michael Warren and Patrick Goda
Los Alamos National Laboratory and Caltech obtain gigaflops performance on parallel Linux machines running free software and built of commodity parts costing less than $55,000 each.
HPF: Programming Linux Clusters the Easy Way
by Mike Delves
Mr. Delves tells us all about high performance Fortran and how it is used to write code to run efficiently on parallel computers.
News & Articles
X-CD-Roast: CD Writer Software
by Thomas Niederreiter
Mr. Niederreiter tells us all about his graphical user interface for writing data to a CD-ROM.
Netatalk, Linux and the Macintosh
by Richard Parry
With Netatalk, you can drag and drop files from Linux to Mac and back, share system resources and more.
LJ Interviews Mike Apgar, Speakeasy Café
by Marjorie Richardson
The Quick Start Guide to the GIMP, Part 3
by Michael J. Hammel
This month we learn how to use the Image Window and layers in building our images with the GIMP, a Linux power tool for the graphics artist.
by Randy Bentson
Red Hat CDE
by Don Kuenz
Microway “Screamer 533”
by Bradley Willson
by Zach Beane
JDBC Developer's Resource
by Rob Wehrli
Unix for the Hyper-Impatient
by Daniel Lazenby
Internet Connections With the 56Kbps Modems
by Tony Williamitis
Higher speed Internet connections are on the horizon with U.S. Robotics' XS modem and Rockwell International's K56Plus.
At the Forge A Recipe for Making Cookies
by Reuven M. Lerner
Cookies are an excellent way of keeping track of users who visit a web site. Here's how to use them.
Letters to the Editor
From the Editor
The Beowulf Project
by Marjorie Richardson
Stop the Presses
LISA '97 Conference
by Phil Hughes
Linux Apprentice Need More Info?
by Bill W. Cunningham
Need More Info? Here's how to get the information you need using GNU's hypertext system called info.
Take Command Kill: The Command to End All Commands
by Dean Provins
Kill: The Command to End All Commands Need to get rid of a job that's gotten into a loop and refuses to end? Here's a command that will take care of the problem.
Linux Means Business Linux at Rancho Santiago College
by Steve Moritsugu
Linux at Rancho Santiago College Linux is being used to teach Computer Science classes at a community college in Santa Ana, California.
System Administration Securing Networked Applications with SESAME
by Paul Ashley and Bradley Broom
Securing Networked Applications with SESAME This article describes the SESAME Security Architecture and how it can be used to secure your networked applications.
Kernel Korner Playing with Binary Formats
by Alessandro Rubini
Playing with Binary Formats This article explains how kernel modules can add new binary formats to a system and show a pair of examples.
Extra: Geek Vocabulary
This article explains some of the common Geek terms.
Linux Gazette Remote Compilation Using ssh and make
by John R. Daily
Remote Compilation Using ssh and make Here's a quick lesson in setting up scripts to use the ssh and make commands for compiling on a remote machine.
Best of Technical Support
- Linux Journal October 2016
- The Tiny Internet Project, Part I
- SUSECON 2016: Where Technology Reigns Supreme
- Download "Linux Management with Red Hat Satellite: Measuring Business Impact and ROI"
- Free Today: September Issue of Linux Journal (Retail value: $5.99)
- Bitcoin on Amazon! Sort of...
- Android Browser Security--What You Haven't Been Told
- Epiq Solutions' Sidekiq M.2
- Securing the Programmer
Pick up any e-commerce web or mobile app today, and you’ll be holding a mashup of interconnected applications and services from a variety of different providers. For instance, when you connect to Amazon’s e-commerce app, cookies, tags and pixels that are monitored by solutions like Exact Target, BazaarVoice, Bing, Shopzilla, Liveramp and Google Tag Manager track every action you take. You’re presented with special offers and coupons based on your viewing and buying patterns. If you find something you want for your birthday, a third party manages your wish list, which you can share through multiple social- media outlets or email to a friend. When you select something to buy, you find yourself presented with similar items as kind suggestions. And when you finally check out, you’re offered the ability to pay with promo codes, gifts cards, PayPal or a variety of credit cards.Get the Guide