search:
News
Articles
Tech Tools
Subscribe
Archive
Whitepapers
Write for Us!
Newsletter
Shop
DevOps
Cloud Computing
Virtualization
HPC
Linux
Windows
Security
Monitoring
Databases
all Topics...
Search
Login
Search
Spell check suggestion:
laptop providing
?
Refine your search
[x]
Creation time
: Last three months
Sort order
Date
Score
Content type
Article (Print)
(39)
Keywords
1
2
3
4
Next »
100%
Getting started with I/O profiling
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
Jeff
Layton
... attempts have been made over the years to understand I/O patterns. One method I employ is to use strace [8] (system trace) to
profile
the I/O pattern of an application. Because virtually all I/O from ... Getting started with I/O
profiling
...
Profiles
in Storage
26%
Monitor your nodes with collectl
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
Jeff
Layton
9%
Efficient central management of Windows libraries
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
noticing, you can use a group policy. Document libraries use the user account's
profile
path and the public
profile
on a client by default, which means documents are not saved on the server when users save
9%
Adapting VMware vSphere for state-of-the-art hardware
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
). The starting point for a custom image is the installation image
profile
of a VMware offline bundle, which is available from VMware as a Zip file or ISO image
9%
Client management and configuration
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
restrictions in configuration and deployment. Desktop Authority http://1 offers several options for automating computer and user
profile
provisioning on top of group policy management (Figure 1). Additionally
9%
Mandatory access control with Tomoyo Linux
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
, and q quits the Policy Editor without a prompt. Figure 3: Additional domains are created automatically by Tomoyo.
Profiled
Tomoyo Linux needs
9%
Igel thin clients
30.11.2025
Home
»
Archive
»
2010
»
Issue 2: Backup...
»
configure clients and roll out firmware and also offers remote management and diagnostic options for support. The settings for the individual thin clients are established with the use of a
profile
.
Profiles
9%
Security compliance with OpenSCAP
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
definitions for the system and a prebuilt
profile
by called "F14-Default," which references a subset of all available OVAL definitions in order to validate the system. The command for doing this is as follows
8%
News
30.11.2025
Home
»
Archive
»
2012
»
Issue 08: FreeNAS
»
be changed. You can download the entire brief from http://www.verisigninc.com/DNIB. Silver Tail Announces
Profile
Analyzer Silver Tail Systems has announced
Profile
Analyzer, which, according to the company
8%
Using AppLocker to block applications on networks
30.11.2025
Home
»
Archive
»
2012
»
Issue 09: Windo...
»
access via the iPhone configuration program [5]. Administrators can use the configuration program to create various
profiles
with settings. The
profiles
take the form of XML files that define the i
1
2
3
4
Next »