search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Digisub
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
laptop providing
?
Refine your search
[x]
Creation time
: Last month
Sort order
Date
Score
Content type
Article (Print)
(39)
Keywords
1
2
3
4
Next »
100%
Getting started with I/O profiling
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
Jeff
Layton
... attempts have been made over the years to understand I/O patterns. One method I employ is to use strace [8] (system trace) to
profile
the I/O pattern of an application. Because virtually all I/O from ... Getting started with I/O
profiling
...
Profiles
in Storage
26%
Monitor your nodes with collectl
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
Jeff
Layton
9%
Efficient central management of Windows libraries
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
noticing, you can use a group policy. Document libraries use the user account's
profile
path and the public
profile
on a client by default, which means documents are not saved on the server when users save
9%
Adapting VMware vSphere for state-of-the-art hardware
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
). The starting point for a custom image is the installation image
profile
of a VMware offline bundle, which is available from VMware as a Zip file or ISO image
9%
Client management and configuration
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
restrictions in configuration and deployment. Desktop Authority http://1 offers several options for automating computer and user
profile
provisioning on top of group policy management (Figure 1). Additionally
9%
Mandatory access control with Tomoyo Linux
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
, and q quits the Policy Editor without a prompt. Figure 3: Additional domains are created automatically by Tomoyo.
Profiled
Tomoyo Linux needs
9%
Igel thin clients
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
configure clients and roll out firmware and also offers remote management and diagnostic options for support. The settings for the individual thin clients are established with the use of a
profile
.
Profiles
9%
Security compliance with OpenSCAP
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
definitions for the system and a prebuilt
profile
by called "F14-Default," which references a subset of all available OVAL definitions in order to validate the system. The command for doing this is as follows
8%
News
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
be changed. You can download the entire brief from http://www.verisigninc.com/DNIB. Silver Tail Announces
Profile
Analyzer Silver Tail Systems has announced
Profile
Analyzer, which, according to the company
8%
Using AppLocker to block applications on networks
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
access via the iPhone configuration program [5]. Administrators can use the configuration program to create various
profiles
with settings. The
profiles
take the form of XML files that define the i
1
2
3
4
Next »