23%
25.02.2013
r/s w/s rMB/s wMB/s avgrq-sz avgqu-sz await r_await w_await svctm %util
md1 0.00 0.00 0.04 0.05 0.00 0.00 8.17 0.00 0.00 0.00 0.00 0.00
23%
05.03.2014
-s 12:00:00 -e 13:00:00
Linux 3.5.0-43-generic (hercules) 02.12.2013 _x86_64_ (2 CPU)
12:05:01 CPU %user %nice %system %iowait %steal %idle
12
23%
20.03.2014
jcb@hercules:# sar -u -f /var/log/sysstat/sa02 -s 12:00:00 -e 13:00:00
Linux 3.5.0-43-generic (hercules) 02.12.2013 _x86_64_ (2 CPU)
12:05:01 CPU %user %nice %system
23%
11.02.2016
wkB/s avgrq-sz avgqu-sz await r_await w_await svctm %util
sda 2.00 8.00 2.00 9500.00 16.00 151948.00 31.99 1.07 0.11 4.00 0.11 0.09 88.40
If your read or write
23%
12.03.2013
rMB_dir/s wMB_dir/s rMB_svr/s wMB_svr/s ops/s rops/s wops/s
192.168.1.250:/home
1230649.19 1843536.81 0.00 0.00 1229407.77 1843781
23%
19.11.2019
Jobs: 1 (f=1): [w(1)][100.0%][w=654MiB/s][w=167k IOPS][eta 00m:00s]
test: (groupid=0, jobs=1): err= 0: pid=1225: Sat Oct 12 19:20:18 2019
write: IOPS=168k, BW=655MiB/s (687MB/s)(10.0GiB/15634msec); 0
23%
20.02.2012
time: 11.79 secs
Data transferred: 2.47 MB
Response time: 0.22 secs
Transaction rate: 35.79 trans/sec
Throughput: 0
23%
30.01.2020
=1): err= 0: pid=1634: Mon Oct 14 22:18:59 2019
write: IOPS=118k, BW=463MiB/s (485MB/s)(10.0GiB/22123msec); 0 zone resets
[ ... ]
Run status group 0 (all jobs):
WRITE: bw=463MiB/s (485MB/s), 463MiB/s
23%
08.06.2012
More than 20 years having passed since its introduction, and HTTP certainly shows some signs of age. Google’s new SPDY protocol solves some problems with HTTP without breaking existing websites.
...
Suddenly HTTP 2.0 is just around the corner; the first draft is due in May, and Google’s SPDY protocol could be a part of it. SPDY has the advantage of already being implemented on Google’s own servers ...
More than 20 years have passed since its introduction, and HTTP certainly shows some signs of age. Google’s new SPDY protocol solves some problems with HTTP without breaking existing websites.
23%
30.11.2025
$ john -wordlist:password.lst passfile.txt
02 Loaded 2 passwords with 2 different salts (FreeBSD MD5 [32/64])
03 admin (root)
04 t-bone (khess)
05 guesses: 2 time: 0:00:00:00 100% c/s