search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
%200mb%C3%A9n Llorente"52
?
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(47)
Keywords
1
2
3
4
5
Next »
100%
Automating Migration to openEuler
30.11.2025
Home
»
Archive
»
2025
»
Issue 90 VoIP N...
»
Rubén
Llorente
... Sulad, a lightweight container runtime daemon;
A
-Tune, an AI-powered performance tuning tool for servers; and the x2openEuler migration tool. In this article, I explain how to use x2openEuler to migrate a small fleet
66%
Monitor your nodes with collectl
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
25-E SSD [
9
] courtesy of Intel is mounted as /dev/sdd ext4 filesystem with the default options Open MPI [10] v1.5.4 NAS Parallel Benchmarks
3.3
.1-MPI [11] Iozone [12] Daemon ...
9
66%
Checking password complexity with John the Ripper
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
/s virtual 50 51 Benchmarking: Raw SHA-1 [raw-sha1]... DONE
52
Raw: 3749K
c
/s real, 3753K
c
/s virtual 53 54 Benchmarking: IPB2 MD5 [Invision Power Board 2.x salted MD5]... DONE 55 Many salts: 2933K
c
62%
Workshop: Container virtualization with LXC on Ubuntu 10.04
30.11.2025
Home
»
Archive
»
2011
»
Issue 6: Perfor...
»
lxc.cgroup.devices.allow =
c
1:
9
rwm 25 lxc.cgroup.devices.allow =
c
1:8 rwm 26 lxc.cgroup.devices.allow =
c
136:* rwm 27 lxc.cgroup.devices.allow =
c
5:2
rwm 28 # rtc 29 lxc.cgroup.devices.allow =
c
57%
Win-win with Cygwin
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
'll receive the following response: The authenticity of host '192.168.1.250' can't be established. RSA key fingerprint is 87:17:
c
3
:92:44:ba: 1
a
:df:d7:
9
c
:44:b2:5b:73:
52
:09. Are you sure you want to continue
57%
Julia: A new language for technical computing
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
)* Julia Python MATLAB Octave R JavaScript v
3
f670da0 v2.7.1 vR2011
a
v
3
.4 v2.14.2 v8
3
.6.6.11 fib 1.97 31
57%
Debugging the Linux kernel with the Qemu emulator
30.11.2025
Home
»
Archive
»
2012
»
Issue 07: Xen v...
»
:add-symbol-file module.ko text_address -s .data data_address -s .bss bss_address
9
. Debug: Set breakpoints and so on. In Toolchain , enable the Build gdb for the Host option; in Kernel | Kernel version , type
3
56%
Managing virtual machines
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
filesystem, if so desired [5]: $ guestfish -
N
fs:ext
3
When you call Guestfish with the new image, $ guestfish -
a
you are taken to a shell where you first need to enter run to toggle the system ...
9
54%
The next generation of Internet connectivity
30.11.2025
Home
»
Archive
»
2011
»
Issue 3: Are yo...
»
_seq=
3
ttl=
52
time=103 ms Personally, I prefer using tunnels over Teredo and 6to4 for several reasons – the simplest is that it works with a public IP or behind a NAT box (well, usually). Tunnels ...
3
53%
Network backup with Burp, Obnam, and Backshift
30.11.2025
Home
»
Archive
»
2012
»
Issue 10: Traff...
»
existing backups, enter: burp -
a
l -b a Of course, more complex queries are also possible. For example, burp -
a
l -b
3
-r
lists all of the files in backup
3
that match the "regular
1
2
3
4
5
Next »