7%
30.01.2020
": "Allow",
06 "Action": "logs:CreateLogGroup",
07 "Resource": "arn:aws:logs:eu-west-1:XXXXXXX:*"
08 },
09 {
10 "Effect": "Allow",
11 "Action": [
12 "logs
7%
11.06.2014
application server.
On a system in a stable state, throughput initially is not affected by file operations, but after a certain value (e.g., 16,384MB), performance collapses. As Figure 1 shows
7%
05.02.2019
Version: "2.0.0"
02
03 globalEnvVars:
04 - key: "MYSQL_USER"
05 value: "dev"
06 - key: "MYSQL_PASSWORD"
07 value: "123456"
08
09 commandTests:
10
11 # Is the MySQL package installed?
12 - name: "MySQL package
7%
30.11.2025
the Buffer
01 [global]
02 ioengine=libaio
03 direct=1
04 filename=testfile
05 size=2g
06 bs=4m
07
08 refill_buffers=1
09
10 [write]
11 rw=write
12 write_bw_log
13
14 [read]
15 stonewall
16 rw=read
17 write
7%
30.11.2025
: 1331404720 TZ: -0500
09 # SubSys: bcdfijmnstYZCD Options: cz Interval: 10:60 NumCPUs: 4 NumBud: 3 Flags: ix
10 # Filters: NfsFilt: EnvFilt:
11 # HZ: 100 Arch: x86_64-linux-thread-multi PageSize: 4096
12 # Cpu
7%
15.08.2016
The echo server simply returns **every** value.
08 schemes:
09 - http
10 host: mazimi-prod.apigee.net
11 basePath: /echo
12 paths:
13 /test:
14 get:
15 responses:
16 200:
17
7%
30.11.2025
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple
7%
14.08.2017
('request_processing_seconds', 'Time spent processing request')
07
08 # Decorate function with metric.
09 @REQUEST_TIME.time()
10 def process_request(t):
11 """A dummy function that takes some time."""
12 time.sleep(t)
13
14
7%
20.05.2014
"dependencies": {
09 "express": "*",
10 "swig": "*",
11 "consolidate": "*"
12 },
13 "devDependencies": {
14 "grunt": "~0.4.1",
15 "grunt-contrib-copy": "*",
16 "grunt
7%
05.09.2011
STAT
03 0 open-nebula-wn 0 100 99 100 1068948 921356 on
04 1 open-nebula-wn2 0 100 12 100 1173072 1027776 on
OpenNebula Configuration File
You