13%
14.03.2013
details as well [3]. The files in the Linux /proc directory also have a pleasingly hackable penchant for being directly readable as plain text, as opposed to more binary-centric proc implementations
13%
14.03.2013
be eliminated.
Export the schema definitions as an ASCII file. The next step is to export the schema definitions without the length semantics as an ASCII file (Figure 3). This gives you the option of cleaning up
13%
17.06.2017
="localhost" description="Rundeck server node" tags="" hostname="localhost" osArch="amd64" osFamily="unix" osName="Linux" osVersion="3.13.0-83-generic" username="rundeck"/>
The name and hostname attributes, at least
13%
09.03.2025
will be controversial, revolve around networking (Table 3). The idea is to start understanding the basics of networking and a few commands on how to check on various aspects.
Table 3: Secondary Networking HPC Linux
13%
19.10.2012
3.4GHz quad core Sandy Bridge-based systems with 16GB of RAM/node (4GB/core), DDR 2:1 blocking InfiniBand, and 1TB of local disk. Additionally, they have dual-socket 2.6GHz eight-core Sandy Bridge
13%
10.09.2012
/etc/bashrc
, or (3) modifying $PATH
in your own account. For the purposes of demonstrating how to do this, I will modify my .bashrc
file with the following line:
export PATH
13%
08.07.2018
a range of hosts on the command line:
$ pdsh -w host[1-11] uname -r
$ pdsh -w host[1-4,8-11] uname -r
In the first case, pdsh
expands the host range to host1
, host2
, host3
, etc., through host11
13%
19.02.2020
cannot.
Almost everyone should be running a Linux distribution that can use this feature: Linux kernel greater than 3.8. Singularity recommends a kernel greater than 3.18.
If you don’t have root access
13%
05.12.2014
[<-] 334 VXNlcm5hbWU6
[->] Y2hyaXNiaW5uaWUzQGdtYWlsLmNvbQ==
[<-] 334 UGFzc3dvcmQ6
[<-] 235 2.7.0 Accepted
[->] MAIL FROM:
[<-] 250 2.1.0 OK t2fjm4427fd213ply.2523 - gsmtp
[->] RCPT TO
13%
10.04.2015
Number: 00282-30340-00000-AB9A5
Version: 6.3.9600
The information you read from the operating system can also be formatted and customized. For example, normally only the operating system's most