search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%220mb 12 00s Llorente 13
?
Refine your search
[x]
Creation time
: Last year
Sort order
Date
Score
Content type
Article (Print)
(54)
Keywords
« Previous
1
2
3
4
5
6
Next »
13%
I/O benchmarks with Fio
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
/0K /
s
] [4137 /0 iops] [eta
00
m:06
s
] In the example, the first job is performing a sequential read, marked as r in square brackets, while Fio hasn't initialized the second job, marked as P
13%
Using the Expect scripting environment
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
$spin 08 @$molecule.xyz 09 10 END 11
12
done
13
done The Gaussian 09 (g09) computational chemistry simulation package uses a small input that tells it what type of predictions are desired and which
13%
Dispatches from the world of IT
31.10.2025
Home
»
Archive
»
2012
»
Issue 11: Cloud...
»
services will account for 16 percent of IT revenue in the following technology categories: applications, system infrastructure software, platform as a service (Paa
S
), servers, and basic storage. Additionally
13%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
08 default: 09 $(MAKE) -C $(KDIR) M=$(PWD) modules 10 endif 11
12
clean:
13
rm -rf *.ko *.o *.mod.c *.mod.o modules.order 14 rm -rf Module.symvers .*.cmd .tmp
13%
OpenVPN with e-tokens in large-scale environments
30.11.2025
Home
»
Archive
»
2011
»
Issue 5: Pen Te...
»
(in days) 05 export CA_EXPIRE=3650 06 07 # Certificate validity (in days) 08 export KEY_EXPIRE=3650 09 10 # Predefined certificate values 11 export KEY_COUNTRY="DE"
12
export KEY_PROVINCE="BY"
13
export
12%
Building a custom Cyberdeck
07.10.2025
Home
»
Archive
»
2025
»
Issue 89: Autom...
»
a mouse. Fortunately, I have explored terminal user interface (TUI) tools often in this column. Tools like btop [
12
], glances [
13
], speedometer [14], nethogs [15], and even plain old top [16] are ready
12%
Configuring the JBoss application server
30.11.2025
Home
»
Archive
»
2011
»
Issue 4: Secure...
»
-method>POST 10 11
12
JBossAdmin
13
14 Next, you just need the user account data
12%
Server virtualization with Citrix XenServer
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
.Xensource.xenapi.Connection; 07 import com.Xensource.xenapi.Host; 08 import com.Xensource.xenapi.Session; 09 import com.Xensource.xenapi.Task; 10 11 import de.pm.xenserver.utils.Server;
12
13
public class TestAPI { 14 15
12%
Shell scripts: Equal rights for Unix derivatives and Linux
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
="" 04 PING="ping -c1 -w 3" 05 PING2="" 06 07 case $OS in 08 HP-UX*) 09 PING=ping 10 PING2="-n 1" 11 RSH="remsh"
12
RSH2="-l user"
13
;; 14 Sun
12%
High availability clustering on a budget with KVM
30.11.2025
Home
»
Archive
»
2010
»
Issue 0: Active...
»
06 I_T nexus information: 07 LUN information: 08 LUN: 0 09 Type: controller 10 SCSI ID: deadbeaf1:0 11 SCSI SN: beaf10
12
Size: 0
13
« Previous
1
2
3
4
5
6
Next »