25%
05.12.2014
12288 Oct 22 00:00 2014-10-21
drwxr-xr-x. 2 root root 12288 Oct 23 00:00 2014-10-22
drwxr-xr-x. 2 root root 12288 Oct 24 00:00 2014-10-23
drwxr-xr-x. 2 root root 12288 Oct 25 00:00 2014-10-24
~~~~~
drwxr-xr-x
25%
21.01.2021
This first article of a series looks at the forces that have driven desktop supercomputing, beginning with the history of PC and supercomputing processors through the 1990s into the early 2000s.
... an application.
The 1990s were critical to both “classic” supercomputers and PC systems. Both had advanced very quickly, setting a trajectory into the early 2000s.
PC Processors in the Early 2000s
In early 2001 ...
This first article of a series looks at the forces that have driven desktop supercomputing, beginning with the history of PC and supercomputing processors through the 1990s into the early 2000s.
25%
24.02.2022
0 1 0 0 1 1073741824 67108864 4096.0 POSIX 0
Finished : Tue Jan 25 20:04:13 2022
For a virtual machine deployment on a 1GigE network, I get roughly 2.2GiBps reads, which again, if you think about it, is not bad at all
25%
07.04.2022
1073741824 67108864 4096.0 POSIX 0
Finished : Tue Jan 25 20:04:13 2022
For a virtual machine deployment on a 1GigE network, I get roughly 2.2GiBps reads, which again, if you think
25%
21.08.2014
't connect to $remote_host:$remote_port: $@ \n";
17
18
19 while() {
20 my @lavg = Sys::CpuLoad::load();
21 my $ts=time();
22 print $socket "system.loadavg_1min $lavg[0] $ts\n";
23 print $socket "system ... 22
25%
23.07.2012
.13.134.52):
Not shown: 994 filtered ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 4.3 (protocol 2.0)
25/tcp closed smtp
53/tcp open domain ISC BIND 9
25%
31.10.2025
.nmap.org (64.13.134.52):
Not shown: 994 filtered ports
PORT STATE SERVICE VERSION
22/tcp open ssh OpenSSH 4.3 (protocol 2.0)
25/tcp closed smtp
24%
23.03.2022
laytonjb laytonjb 19946519 Nov 20 2020 Lmod-8.4.15.tar.gz
31988342 drwxrwxr-x 2 laytonjb laytonjb 4096 Oct 27 14:22 mpibzip2-0.6
31988329 -rw-rw-r-- 1 laytonjb laytonjb 92160 Oct 27 14:18 mpibzip
24%
28.11.2021
://nmap.org ) at 2021-07-25 22:05 CEST
Nmap scan report for metasploitable (192.168.122.236)
Host is up (0.095s latency).
Not shown: 65506 closed ports
PORT STATE SERVICE
21/tcp open ftp
22/tcp open ssh
23
24%
30.11.2025
As of kernel 2.4.x
As of kernel 2.2.x
Asianux/Red Flag, CentOS, Debian, Novell OES, Red Hat, SUSE, Ubuntu
BSD
–
FreeBSD, NetBSD, OpenBSD
No
No
Free