42%
30.01.2020
=test
test: (g=0): rw=randwrite, bs=(R) 4096B-4096B, (W) 4096B-4096B, (T) 4096B-4096B, ioengine=libaio, iodepth=32
fio-3.12
Starting 1 process
Jobs: 1 (f=1): [w(1)][100.0%][w=654MiB/s][w=167k IOPS][eta 00m:00s
42%
27.08.2014
record size, (2) sequential read testing with 1MB record size, and (3) random write and read (4KB). In running these tests, I wanted to see what block layer information ioprof revealed.
The system I
42%
22.05.2012
/group_gz | 212 kB 00:00
Package flex-2.5.35-8.el6.x86_64 already installed and latest version
Package gcc-4.4.6-3.el6.x86_64 already installed and latest version
Package autoconf-2.63-5.1.el6.noarch
42%
19.11.2019
, ioengine=libaio, iodepth=32
fio-3.1
Starting 1 process
Jobs: 1 (f=1): [w(1)][100.0%][r=0KiB/s,w=1401KiB/s][r=0,w=350 IOPS][eta 00m:00s]
test: (groupid=0, jobs=1): err= 0: pid=3104: Sat Oct 12 14:39:08 2019
write: IOPS=352
42%
15.02.2012
2
0
0
0
0
0
2
256KB < < 512KB
2
2
2
3
2
2
2
3
512KB < < 1MB
3
2
2
42%
26.01.2012
2
0
0
0
0
0
2
256KB < < 512KB
2
2
2
3
2
2
2
3
512KB < < 1MB
3
2
2
42%
05.08.2024
, as in Python [3] or Node [4].
Recent books have been published about writing shell commands in Rust [5], Python [6], Node.js [7], and even Go [8], and it is into this last language's interesting performance
42%
30.11.2025
01 $ ar -tv Adaptec_Inc_bootbank_scsi-aacraid_5.0.5.1.7.28700-1OEM.500.0.0.406165.vib
02 --------- 0/0 1356 Jan 1 01:00 1970 descriptor.xml
03 --------- 0/0 2122 Jan 1 01:00 1970 sig.pkcs7
04
42%
20.02.2012
://www.example.com
creates 30 concurrent users to hit the site. The stats you get back are useful:
Lifting the server siege... done.
Transactions: 422 hits
Availability: 100.00 %
Elapsed
42%
30.11.2025
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple