16%
30.11.2025
]
13 rw=randread
14 runtime=60
15
16 [sequentialread]
17 stonewall
18 rw=read
19 runtime=60
20
21 [randomwrite]
22 stonewall
23 rw=randwrite
24 runtime=60
25
26 [sequentialread]
27 stonewall
28 rw
16%
22.05.2012
:
Scientific Linux 6.2
2.6.32-220.4.1.el6.x86_64 kernel
GigaByte MAA78GM-US2H motherboard
AMD Phenom II X4 920 CPU (four cores)
8GB of memory (DDR2-800)
The OS and boot drive are on an IBM DTLA
16%
21.08.2012
, 0.02
n0001: 18:58:49 up 1:13, 0 users, load average: 0.00, 0.00, 0.00
With a simple Bash, Perl, or Python script and pdsh, you can query almost anything. Just be warned that you need to play
16%
19.11.2019
Jobs: 1 (f=1): [w(1)][100.0%][w=654MiB/s][w=167k IOPS][eta 00m:00s]
test: (groupid=0, jobs=1): err= 0: pid=1225: Sat Oct 12 19:20:18 2019
write: IOPS=168k, BW=655MiB/s (687MB/s)(10.0GiB/15634msec); 0
16%
30.01.2020
=1): err= 0: pid=1634: Mon Oct 14 22:18:59 2019
write: IOPS=118k, BW=463MiB/s (485MB/s)(10.0GiB/22123msec); 0 zone resets
[ ... ]
Run status group 0 (all jobs):
WRITE: bw=463MiB/s (485MB/s), 463Mi
16%
18.07.2013
buffered disk reads: 616 MB in
3.00 seconds = 205.03 MB/sec
$ hdparm -T /dev/sda
/dev/sda:
Timing cached reads: 6292 MB in
2.00 seconds = 3153.09 MB/sec
If this were a spinning disk, you would also
16%
15.02.2012
of Figure 10. Figure 11 plots the Write IO function count for the KB range intervals. Figure 12 plots the Write IO function count for the MB range intervals. Figure 13 plots the Write IO function count
16%
26.01.2012
of Figure 10. Figure 11 plots the Write IO function count for the KB range intervals. Figure 12 plots the Write IO function count for the MB range intervals. Figure 13 plots the Write IO function count
16%
30.11.2025
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple
15%
16.10.2012
to the screen (STDOUT; line 15).
Listing 1: SSH Script
01 #!/usr/bin/php
02
03
04 $ssh = ssh2_connect('192.168.1.85', 22);
05 ssh2_auth_password($ssh, 'khess', 'password');
06 $stream = ssh2_exec