search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%25x20mm&123%2008 Llorente 12
?
Refine your search
Sort order
Date
Score
Content type
Article (Print)
(48)
Article
(17)
Keywords
Creation time
Last day
Last week
Last month
Last three months
Last year
« Previous
1
2
3
4
5
6
7
14%
Fundamentals of I/O benchmarking
11.04.2016
Home
»
Archive
»
2016
»
Issue 32: Measu...
»
Example # iostat -xmt 1 /dev/sda Linux 3.16.7-21-desktop (tweedleburg) 08/07/15 _
x
86_64_ (8 CPU) 08/07/15 17:
25
:13 avg-cpu: %user %nice %system %iowait %steal %idle 1
14%
Processor and Memory Metrics
12.02.2014
Home
»
HPC
»
Articles
»
B kwrapper4 128.0 KiB +
25
.5 KiB = 153.5 KiB acpid 152.0 KiB +
12
.0 KiB = 164.0 KiB mcelog 152.0 KiB + 43.0 KiB = 195.0 KiB abrtd 164.0 KiB + 36.5 KiB = 200.5 Ki
14%
SDS configuration and performance
13.02.2017
Home
»
Archive
»
2017
»
Issue 37: Distr...
»
File server 1 Intel Xeon
X
5667 with 3GHz and 16 cores 16GB Disk array T6100S with 10 Hitachi drives (7200rpm) configured as RAID 1 File server 2 Intel Core i3
14%
Secure remote access and web applications with two-factor authentication
16.05.2013
Home
»
Archive
»
2013
»
Issue 14: Samba 4
»
, one-time passwords, or both. Certificate-based two-factor authentication typically uses digital PKI certificates based on the
X
.509 standard. These are typically stored on a hardware certificate storage
14%
Server distributions for small businesses tested
11.02.2016
Home
»
Archive
»
2016
»
Issue 31: Tunin...
»
. Collax GmbH offers commercial subscription-based licenses from EUR400 per year for the Basic license up to EUR
2,000
per year for the Unlimited license. We installed version 5.8.2. The manufacturer cites
« Previous
1
2
3
4
5
6
7