Are you over 18 and want to see adult content?
More Annotations
Welcome to Elegance Novelties | Elegance Novelties
Are you over 18 and want to see adult content?
Anniversary Ideas Home Page ~ Gifts for Wedding Anniversaries
Are you over 18 and want to see adult content?
DỊCH VỤ SEO - ĐÀO TẠO SEO - KHÓA HỌC SEO CỘNG HƯỞNG
Are you over 18 and want to see adult content?
Latest Carer News- Taiyari Aage Badhne Ki
Are you over 18 and want to see adult content?
Taming The Saxophone: a much better saxophone site
Are you over 18 and want to see adult content?
Love Radius, par Je Porte Mon Bébé – JPMBB - Love Radius, par JPMBB ®
Are you over 18 and want to see adult content?
Snowboarding & Snow Ski Gear Online. Book Ski Hire and Snowboard Rentals Now.
Are you over 18 and want to see adult content?
Favourite Annotations
A complete backup of https://ilovemole.com
Are you over 18 and want to see adult content?
A complete backup of https://comfortfinds.com
Are you over 18 and want to see adult content?
A complete backup of https://headsprout.com
Are you over 18 and want to see adult content?
A complete backup of https://bayoubaratariarvpark.com
Are you over 18 and want to see adult content?
A complete backup of https://chargifypay.com
Are you over 18 and want to see adult content?
A complete backup of https://wrestrus.ru
Are you over 18 and want to see adult content?
A complete backup of https://buzzfeed.com.br
Are you over 18 and want to see adult content?
A complete backup of https://chadkids.org
Are you over 18 and want to see adult content?
A complete backup of https://galvaunion.com
Are you over 18 and want to see adult content?
A complete backup of https://radiosunce.com
Are you over 18 and want to see adult content?
Text
function.
CUDDLETECH | SOLARIS CORE ANALYSIS, PART 1: MDB The cuddletech rule of crashes is: An unexpected crash is unacceptable; An unexplained crash is inexcusable. If you’re reading this you’ve probably lived through a panic before, but lets recap. The best explanation of a “crash” event and resulting dump can be found in the dumpadm (1M) man page: A crash dump is a disk copy of the CUDDLETECH | ZFS AND THIN PROVISIONING ZFS and Thin Provisioning. Posted on August 12, 2006. ZFS is an amazing and wonderful technology. I say technology because its more than just any one of its capabilities. Being able to dish out, from a single pool, both filesystems and traditional volumes (which I’ll call zvol’s) makes for an extremely power storage foundation onwhich to
CUDDLETECH | HADOOP ANALYSIS OF APACHE LOGS USING FLUME-NG Lastly, there are 3 triggers that will cause Flume to “roll” the HDFS output file: size, count, and interval. When Flume writes data, if any one of the triggers is true it will roll to use a new file. By default the count is 30 (seconds), size is 1024 (bytes), and count is 10. Think about that, if any of those is true the file is rolled. PRIVILEGES, ROLES AND PROFILES Other Permissioning Problems Up: Users and Permissions Previous: Adding New Users Contents Privileges, Roles and Profiles. At first the three can be confusing to differentiate.USERS AND PASSWORDS
Adding New Users Up: Users and Permissions Previous: Users and Permissions Contents Users and Passwords. A big part of the confusion over authentication is due to the fact that there are two diffrent forms of authentication! Authentication can be done using password authentication (also called internal authentication) or OS authentication (external authentication). THE CUDDLETECH GUIDE TO SNMP PROGRAMMING Chapter 1 Introduction to SNMP 1.1 General Overview Simple Network Management Protocol is a simple method of interacting with networked devices. The standard was defined by IETF RFC 1157 in May of CREATING AN INITIAL RRD The tool rrdtool is called with the argument create followed by the RRD filename of the database to be created. The next two arguments specify the time at which the database starts, measured in seconds since the Epoch, and the step time measured in seconds which is the interval between database updates. ENABLING ARCHIVELOG MODE Basic RMAN Backup Up: Using RMAN Previous: Using RMAN Contents Enabling ARCHIVELOG Mode. Most of the High Availability features of Oracle require you to enable CUDDLETECH | ZDB: EXAMINING ZFS AT POINT-BLANK RANGE Datasets (-d) Report stats on zdb’s I/O (-s), this is similar to the first interval of zpool iostat. Thus, zdb testpool is the same as zdb -Cuds testpool. Lets look at the output. The pool we’ll be using is actually a 256MB pre-allocated file with a single dataset as simple as it can come. root@quadra /$ zdb testpool version=12 name CUDDLETECH | BATTERY MONITORING ON THE ADAFRUIT HUZZAH32 Since the ESP32 has tons of ADC pins, we ‘sacrifice’ one for Lipoly battery monitoring. You can read half of the battery voltage off of A13. Don’t forget to double the voltage you read, since there is a divider. That A13 pin is actually pin 35, on Arduino we’d use an AnalogRead () but on MongooseOS we’ll use the ADC.read ()function.
CUDDLETECH | SOLARIS CORE ANALYSIS, PART 1: MDB The cuddletech rule of crashes is: An unexpected crash is unacceptable; An unexplained crash is inexcusable. If you’re reading this you’ve probably lived through a panic before, but lets recap. The best explanation of a “crash” event and resulting dump can be found in the dumpadm (1M) man page: A crash dump is a disk copy of the CUDDLETECH | ZFS AND THIN PROVISIONING ZFS and Thin Provisioning. Posted on August 12, 2006. ZFS is an amazing and wonderful technology. I say technology because its more than just any one of its capabilities. Being able to dish out, from a single pool, both filesystems and traditional volumes (which I’ll call zvol’s) makes for an extremely power storage foundation onwhich to
CUDDLETECH | HADOOP ANALYSIS OF APACHE LOGS USING FLUME-NG Lastly, there are 3 triggers that will cause Flume to “roll” the HDFS output file: size, count, and interval. When Flume writes data, if any one of the triggers is true it will roll to use a new file. By default the count is 30 (seconds), size is 1024 (bytes), and count is 10. Think about that, if any of those is true the file is rolled. PRIVILEGES, ROLES AND PROFILES Other Permissioning Problems Up: Users and Permissions Previous: Adding New Users Contents Privileges, Roles and Profiles. At first the three can be confusing to differentiate.USERS AND PASSWORDS
Adding New Users Up: Users and Permissions Previous: Users and Permissions Contents Users and Passwords. A big part of the confusion over authentication is due to the fact that there are two diffrent forms of authentication! Authentication can be done using password authentication (also called internal authentication) or OS authentication (external authentication). THE CUDDLETECH GUIDE TO SNMP PROGRAMMING Chapter 1 Introduction to SNMP 1.1 General Overview Simple Network Management Protocol is a simple method of interacting with networked devices. The standard was defined by IETF RFC 1157 in May of CREATING AN INITIAL RRD The tool rrdtool is called with the argument create followed by the RRD filename of the database to be created. The next two arguments specify the time at which the database starts, measured in seconds since the Epoch, and the step time measured in seconds which is the interval between database updates. ENABLING ARCHIVELOG MODE Basic RMAN Backup Up: Using RMAN Previous: Using RMAN Contents Enabling ARCHIVELOG Mode. Most of the High Availability features of Oracle require you to enable CUDDLETECH | SOLARIS CORE ANALYSIS, PART 1: MDB The cuddletech rule of crashes is: An unexpected crash is unacceptable; An unexplained crash is inexcusable. If you’re reading this you’ve probably lived through a panic before, but lets recap. The best explanation of a “crash” event and resulting dump can be found in the dumpadm (1M) man page: A crash dump is a disk copy of the CUDDLETECH | TEAM OF TEAMS & COMPLEXITY: AN APPROACH FOR The solution to “breaking down silos” is to create a shared responsibility and empower that via shared context, or what is better called “shared consciousness”. So long as one teams performance is independent of other teams, a sense of competition will overpower any sense of cooperation unless conditions happen to arise in which the CUDDLETECH | SOLARIS IPSEC: SHARED KEY TRANSPORT MODE The Blog of Ben Rockwood. In this entry we’ll build on our our IPsec Basics discussed last time and actually create an IPsec connection.. IPsec can be used for direct system-to-system access known as “transport mode” or to create a virtual pipeline into whicheverything is
CUDDLETECH | SOLARIS AUTOMATED FILE INTEGRITY CHECKING Quite simply, bartlog is a BASH wrapper around BART and logger which is run from cron on any schedule you like and reports any changes to syslog. Setup is simple, download bartlog and copy into /usr/sbin or whereever you prefer, then download bart.rules and copy into /etc. Now run bartlog from cron every hour or day or whatever you like. CREATING AN INITIAL RRD The tool rrdtool is called with the argument create followed by the RRD filename of the database to be created. The next two arguments specify the time at which the database starts, measured in seconds since the Epoch, and the step time measured in seconds which is the interval between database updates. CUDDLETECH | EXPLORE YOUR STORAGE WITH FILEBENCH The Blog of Ben Rockwood. FileBench is one of the most powerful and flexible benchmarking tools around. Your typical tool like Bonnie++ or IOzone tend to take some discrete operation and do it multiple times at differing block sizes (8K file in 1K blocks, 8K file in 2K blocks,etc).
CUDDLETECH | USING HASHICORP VAULT AS A PKI SSL/TLS CA Encrypting data is important, both in transit and at rest. By far the most popular method of in-transit encryption is SSL/TLS. That sad truth is, except for our public facing web sites, most administrators rarely use it unless they have to. CUDDLETECH | WHY SYSADMIN’S CAN’T CODE Step 3: Scripting isn’t programming. SysAdmin’s are tool masters they know as many of them as possible. This is why scripting is a natural thing for us, it allows us to plug different tools together. But this isn’t really programming, its plumbing. This becomes more apparent when you start programming in a non-shell language. THE RELATIONAL MODEL Play Along at Home Up: Introduction Previous: Introduction Contents The Relational Model. In this day and age its easy to take the "simplicity" of the modern relational database for granted. CUDDLETECH | SOLARIS EVANGELISTS: LUGRADIO SF THIS WEEKEND This is a call for all Solaris Evangelists in the SF Bay Area LUGradio SF is happening this weekend at the Metreon. Sun/OpenSolaris will have a booth there, put together by the amazing Jesse Silver. CUDDLETECH | ZDB: EXAMINING ZFS AT POINT-BLANK RANGE Datasets (-d) Report stats on zdb’s I/O (-s), this is similar to the first interval of zpool iostat. Thus, zdb testpool is the same as zdb -Cuds testpool. Lets look at the output. The pool we’ll be using is actually a 256MB pre-allocated file with a single dataset as simple as it can come. root@quadra /$ zdb testpool version=12 name CUDDLETECH | BATTERY MONITORING ON THE ADAFRUIT HUZZAH32 Since the ESP32 has tons of ADC pins, we ‘sacrifice’ one for Lipoly battery monitoring. You can read half of the battery voltage off of A13. Don’t forget to double the voltage you read, since there is a divider. That A13 pin is actually pin 35, on Arduino we’d use an AnalogRead () but on MongooseOS we’ll use the ADC.read ()function.
CUDDLETECH | SOLARIS CORE ANALYSIS, PART 1: MDB The cuddletech rule of crashes is: An unexpected crash is unacceptable; An unexplained crash is inexcusable. If you’re reading this you’ve probably lived through a panic before, but lets recap. The best explanation of a “crash” event and resulting dump can be found in the dumpadm (1M) man page: A crash dump is a disk copy of the CUDDLETECH | CONTAINERS, NOW AND THEN The Blog of Ben Rockwood. I’m excited to announce that Cuddletech is now 100% Docker Powered. This is particularly exciting for me because it comes after being hosted on containers for the previous 10 years ofits life.
CUDDLETECH | TEAM OF TEAMS & COMPLEXITY: AN APPROACH FOR The solution to “breaking down silos” is to create a shared responsibility and empower that via shared context, or what is better called “shared consciousness”. So long as one teams performance is independent of other teams, a sense of competition will overpower any sense of cooperation unless conditions happen to arise in which the CUDDLETECH | ZFS AND THIN PROVISIONING ZFS and Thin Provisioning. Posted on August 12, 2006. ZFS is an amazing and wonderful technology. I say technology because its more than just any one of its capabilities. Being able to dish out, from a single pool, both filesystems and traditional volumes (which I’ll call zvol’s) makes for an extremely power storage foundation onwhich to
CUDDLETECH | OPPORTUNITIES ABOUND AROUND THE INTERNET OF Intel Edison and Onion Omega2 are excellent fits for running Linux, while packing in WIFI and plenty of GPIO. Lots of options! When it comes to sending and processing data, there are also a variety of options. Sparkfun & Adafruit both have their own in-house solutions, ARTIK Cloud and AWS IoT are great. Where things fall down right now isin
CUDDLETECH | WHY SYSADMIN’S CAN’T CODE Step 3: Scripting isn’t programming. SysAdmin’s are tool masters they know as many of them as possible. This is why scripting is a natural thing for us, it allows us to plug different tools together. But this isn’t really programming, its plumbing. This becomes more apparent when you start programming in a non-shell language. THE CUDDLETECH GUIDE TO SNMP PROGRAMMING Chapter 1 Introduction to SNMP 1.1 General Overview Simple Network Management Protocol is a simple method of interacting with networked devices. The standard was defined by IETF RFC 1157 in May of ENABLING ARCHIVELOG MODE Basic RMAN Backup Up: Using RMAN Previous: Using RMAN Contents Enabling ARCHIVELOG Mode. Most of the High Availability features of Oracle require you to enable CUDDLETECH | ZDB: EXAMINING ZFS AT POINT-BLANK RANGE Datasets (-d) Report stats on zdb’s I/O (-s), this is similar to the first interval of zpool iostat. Thus, zdb testpool is the same as zdb -Cuds testpool. Lets look at the output. The pool we’ll be using is actually a 256MB pre-allocated file with a single dataset as simple as it can come. root@quadra /$ zdb testpool version=12 name CUDDLETECH | BATTERY MONITORING ON THE ADAFRUIT HUZZAH32 Since the ESP32 has tons of ADC pins, we ‘sacrifice’ one for Lipoly battery monitoring. You can read half of the battery voltage off of A13. Don’t forget to double the voltage you read, since there is a divider. That A13 pin is actually pin 35, on Arduino we’d use an AnalogRead () but on MongooseOS we’ll use the ADC.read ()function.
CUDDLETECH | SOLARIS CORE ANALYSIS, PART 1: MDB The cuddletech rule of crashes is: An unexpected crash is unacceptable; An unexplained crash is inexcusable. If you’re reading this you’ve probably lived through a panic before, but lets recap. The best explanation of a “crash” event and resulting dump can be found in the dumpadm (1M) man page: A crash dump is a disk copy of the CUDDLETECH | CONTAINERS, NOW AND THEN The Blog of Ben Rockwood. I’m excited to announce that Cuddletech is now 100% Docker Powered. This is particularly exciting for me because it comes after being hosted on containers for the previous 10 years ofits life.
CUDDLETECH | TEAM OF TEAMS & COMPLEXITY: AN APPROACH FOR The solution to “breaking down silos” is to create a shared responsibility and empower that via shared context, or what is better called “shared consciousness”. So long as one teams performance is independent of other teams, a sense of competition will overpower any sense of cooperation unless conditions happen to arise in which the CUDDLETECH | ZFS AND THIN PROVISIONING ZFS and Thin Provisioning. Posted on August 12, 2006. ZFS is an amazing and wonderful technology. I say technology because its more than just any one of its capabilities. Being able to dish out, from a single pool, both filesystems and traditional volumes (which I’ll call zvol’s) makes for an extremely power storage foundation onwhich to
CUDDLETECH | OPPORTUNITIES ABOUND AROUND THE INTERNET OF Intel Edison and Onion Omega2 are excellent fits for running Linux, while packing in WIFI and plenty of GPIO. Lots of options! When it comes to sending and processing data, there are also a variety of options. Sparkfun & Adafruit both have their own in-house solutions, ARTIK Cloud and AWS IoT are great. Where things fall down right now isin
CUDDLETECH | WHY SYSADMIN’S CAN’T CODE Step 3: Scripting isn’t programming. SysAdmin’s are tool masters they know as many of them as possible. This is why scripting is a natural thing for us, it allows us to plug different tools together. But this isn’t really programming, its plumbing. This becomes more apparent when you start programming in a non-shell language. THE CUDDLETECH GUIDE TO SNMP PROGRAMMING Chapter 1 Introduction to SNMP 1.1 General Overview Simple Network Management Protocol is a simple method of interacting with networked devices. The standard was defined by IETF RFC 1157 in May of ENABLING ARCHIVELOG MODE Basic RMAN Backup Up: Using RMAN Previous: Using RMAN Contents Enabling ARCHIVELOG Mode. Most of the High Availability features of Oracle require you to enable CUDDLETECH | SOLARIS CORE ANALYSIS, PART 1: MDB The cuddletech rule of crashes is: An unexpected crash is unacceptable; An unexplained crash is inexcusable. If you’re reading this you’ve probably lived through a panic before, but lets recap. The best explanation of a “crash” event and resulting dump can be found in the dumpadm (1M) man page: A crash dump is a disk copy of the CUDDLETECH | CONTAINERS, NOW AND THEN The Blog of Ben Rockwood. I’m excited to announce that Cuddletech is now 100% Docker Powered. This is particularly exciting for me because it comes after being hosted on containers for the previous 10 years ofits life.
CUDDLETECH | SOLARIS AUTOMATED FILE INTEGRITY CHECKING Quite simply, bartlog is a BASH wrapper around BART and logger which is run from cron on any schedule you like and reports any changes to syslog. Setup is simple, download bartlog and copy into /usr/sbin or whereever you prefer, then download bart.rules and copy into /etc. Now run bartlog from cron every hour or day or whatever you like. CUDDLETECH | OPPORTUNITIES ABOUND AROUND THE INTERNET OF Intel Edison and Onion Omega2 are excellent fits for running Linux, while packing in WIFI and plenty of GPIO. Lots of options! When it comes to sending and processing data, there are also a variety of options. Sparkfun & Adafruit both have their own in-house solutions, ARTIK Cloud and AWS IoT are great. Where things fall down right now isin
CUDDLETECH | HADOOP ANALYSIS OF APACHE LOGS USING FLUME-NG Lastly, there are 3 triggers that will cause Flume to “roll” the HDFS output file: size, count, and interval. When Flume writes data, if any one of the triggers is true it will roll to use a new file. By default the count is 30 (seconds), size is 1024 (bytes), and count is 10. Think about that, if any of those is true the file is rolled. CUDDLETECH | USING HASHICORP VAULT AS A PKI SSL/TLS CA Encrypting data is important, both in transit and at rest. By far the most popular method of in-transit encryption is SSL/TLS. That sad truth is, except for our public facing web sites, most administrators rarely use it unless they have to. CUDDLETECH | UNCOVERING THE ROOTS OF LEAN & DEVOPS In the purest sense of the word, I am a philosopher, a lover of wisdom. If I learn something about a concept, I’ve gained knowledge, but if I learn about a concepts origins I CREATING AN INITIAL RRD The tool rrdtool is called with the argument create followed by the RRD filename of the database to be created. The next two arguments specify the time at which the database starts, measured in seconds since the Epoch, and the step time measured in seconds which is the interval between database updates. CUDDLETECH | THREE ASPECTS OF DEVOPS: WHAT’S IN A WORD Cloud. DevOps. Both are in the fad category, but both are very popular and everyone is grasping at what they really are. There is a subtledifference however.
PRIVILEGES, ROLES AND PROFILES Other Permissioning Problems Up: Users and Permissions Previous: Adding New Users Contents Privileges, Roles and Profiles. At first the three can be confusing to differentiate. CUDDLETECHBLOGDOCSABOUTTHE CUDDLETECH SAS GUIDE TO ORACLETHE CUDDLETECH GUIDE TO SNMP PROGRAMMING It is not necessary to change. Survival is not mandatory.- W. Edwards Deming; A bad system will defeat a good person every time.- W. EdwardsDeming
CUDDLETECH | ZDB: EXAMINING ZFS AT POINT-BLANK RANGE Datasets (-d) Report stats on zdb’s I/O (-s), this is similar to the first interval of zpool iostat. Thus, zdb testpool is the same as zdb -Cuds testpool. Lets look at the output. The pool we’ll be using is actually a 256MB pre-allocated file with a single dataset as simple as it can come. root@quadra /$ zdb testpool version=12 name CUDDLETECH | BATTERY MONITORING ON THE ADAFRUIT HUZZAH32 Since the ESP32 has tons of ADC pins, we ‘sacrifice’ one for Lipoly battery monitoring. You can read half of the battery voltage off of A13. Don’t forget to double the voltage you read, since there is a divider. That A13 pin is actually pin 35, on Arduino we’d use an AnalogRead () but on MongooseOS we’ll use the ADC.read ()function.
CUDDLETECH | ZFS AND THIN PROVISIONING ZFS and Thin Provisioning. Posted on August 12, 2006. ZFS is an amazing and wonderful technology. I say technology because its more than just any one of its capabilities. Being able to dish out, from a single pool, both filesystems and traditional volumes (which I’ll call zvol’s) makes for an extremely power storage foundation onwhich to
USERS AND PASSWORDS
Adding New Users Up: Users and Permissions Previous: Users and Permissions Contents Users and Passwords. A big part of the confusion over authentication is due to the fact that there are two diffrent forms of authentication! Authentication can be done using password authentication (also called internal authentication) or OS authentication (external authentication). THE CUDDLETECH GUIDE TO SNMP PROGRAMMING Chapter 1 Introduction to SNMP 1.1 General Overview Simple Network Management Protocol is a simple method of interacting with networked devices. The standard was defined by IETF RFC 1157 in May ofA SIMPLE EXAMPLE
Closing Thoughts Up: The Net-SNMP C API Previous: Watching SNMP on the Contents A simple example. The following is a very simple example taken from the Net-SNMP site. CREATING AN INITIAL RRD The tool rrdtool is called with the argument create followed by the RRD filename of the database to be created. The next two arguments specify the time at which the database starts, measured in seconds since the Epoch, and the step time measured in seconds which is the interval between database updates. VERITAS VOLUME MANAGER AND VX OBJECTS VERITAS is a logical volume manager. The operative word here is "logical". So, in order to keep things in order we have some basic pieces which are used in different ways for building volumes. PRIVILEGES, ROLES AND PROFILES Other Permissioning Problems Up: Users and Permissions Previous: Adding New Users Contents Privileges, Roles and Profiles. At first the three can be confusing to differentiate. CUDDLETECHBLOGDOCSABOUTTHE CUDDLETECH SAS GUIDE TO ORACLETHE CUDDLETECH GUIDE TO SNMP PROGRAMMING It is not necessary to change. Survival is not mandatory.- W. Edwards Deming; A bad system will defeat a good person every time.- W. EdwardsDeming
CUDDLETECH | ZDB: EXAMINING ZFS AT POINT-BLANK RANGE Datasets (-d) Report stats on zdb’s I/O (-s), this is similar to the first interval of zpool iostat. Thus, zdb testpool is the same as zdb -Cuds testpool. Lets look at the output. The pool we’ll be using is actually a 256MB pre-allocated file with a single dataset as simple as it can come. root@quadra /$ zdb testpool version=12 name CUDDLETECH | BATTERY MONITORING ON THE ADAFRUIT HUZZAH32 Since the ESP32 has tons of ADC pins, we ‘sacrifice’ one for Lipoly battery monitoring. You can read half of the battery voltage off of A13. Don’t forget to double the voltage you read, since there is a divider. That A13 pin is actually pin 35, on Arduino we’d use an AnalogRead () but on MongooseOS we’ll use the ADC.read ()function.
CUDDLETECH | ZFS AND THIN PROVISIONING ZFS and Thin Provisioning. Posted on August 12, 2006. ZFS is an amazing and wonderful technology. I say technology because its more than just any one of its capabilities. Being able to dish out, from a single pool, both filesystems and traditional volumes (which I’ll call zvol’s) makes for an extremely power storage foundation onwhich to
USERS AND PASSWORDS
Adding New Users Up: Users and Permissions Previous: Users and Permissions Contents Users and Passwords. A big part of the confusion over authentication is due to the fact that there are two diffrent forms of authentication! Authentication can be done using password authentication (also called internal authentication) or OS authentication (external authentication). THE CUDDLETECH GUIDE TO SNMP PROGRAMMING Chapter 1 Introduction to SNMP 1.1 General Overview Simple Network Management Protocol is a simple method of interacting with networked devices. The standard was defined by IETF RFC 1157 in May ofA SIMPLE EXAMPLE
Closing Thoughts Up: The Net-SNMP C API Previous: Watching SNMP on the Contents A simple example. The following is a very simple example taken from the Net-SNMP site. CREATING AN INITIAL RRD The tool rrdtool is called with the argument create followed by the RRD filename of the database to be created. The next two arguments specify the time at which the database starts, measured in seconds since the Epoch, and the step time measured in seconds which is the interval between database updates. VERITAS VOLUME MANAGER AND VX OBJECTS VERITAS is a logical volume manager. The operative word here is "logical". So, in order to keep things in order we have some basic pieces which are used in different ways for building volumes. PRIVILEGES, ROLES AND PROFILES Other Permissioning Problems Up: Users and Permissions Previous: Adding New Users Contents Privileges, Roles and Profiles. At first the three can be confusing to differentiate.CUDDLETECH
It is not necessary to change. Survival is not mandatory.- W. Edwards Deming; A bad system will defeat a good person every time.- W. EdwardsDeming
CUDDLETECH | SOLARIS PASSWORD SECURITY md5 (crypt_sunmd5.so): One-way password hashing module for use with crypt (3C) that uses the MD5 message hash algorithm. This module is designed to make it difficult to crack passwords that use brute force attacks based on high speed MD5 implementations that use code inlining, unrolled loops, and table lookup. Password Limit: 255 chars. CUDDLETECH | SOLARIS AUTOMATED FILE INTEGRITY CHECKING Quite simply, bartlog is a BASH wrapper around BART and logger which is run from cron on any schedule you like and reports any changes to syslog. Setup is simple, download bartlog and copy into /usr/sbin or whereever you prefer, then download bart.rules and copy into /etc. Now run bartlog from cron every hour or day or whatever you like.A SIMPLE EXAMPLE
Closing Thoughts Up: The Net-SNMP C API Previous: Watching SNMP on the Contents A simple example. The following is a very simple example taken from the Net-SNMP site. CUDDLETECH | HADOOP ANALYSIS OF APACHE LOGS USING FLUME-NG Lastly, there are 3 triggers that will cause Flume to “roll” the HDFS output file: size, count, and interval. When Flume writes data, if any one of the triggers is true it will roll to use a new file. By default the count is 30 (seconds), size is 1024 (bytes), and count is 10. Think about that, if any of those is true the file is rolled. CUDDLETECH | EXPLORE YOUR STORAGE WITH FILEBENCH The Blog of Ben Rockwood. FileBench is one of the most powerful and flexible benchmarking tools around. Your typical tool like Bonnie++ or IOzone tend to take some discrete operation and do it multiple times at differing block sizes (8K file in 1K blocks, 8K file in 2K blocks,etc).
CUDDLETECH | SOLARIS AUDITING (BSM) IN THE REAL WORLD BSM Basics. As I said in my former post, enabling BSM is simple. There is a convenience wrapper in /etc/security which will turn on the auditd SMF service and add the following to /etc/system : set c2audit:audit_load = 1. You reboot and auditing is going. THE RELATIONAL MODEL Play Along at Home Up: Introduction Previous: Introduction Contents The Relational Model. In this day and age its easy to take the "simplicity" of the modern relational database for granted. CUDDLETECH | USING HASHICORP VAULT AS A PKI SSL/TLS CA Encrypting data is important, both in transit and at rest. By far the most popular method of in-transit encryption is SSL/TLS. That sad truth is, except for our public facing web sites, most administrators rarely use it unless they have to. ENABLING ARCHIVELOG MODE Basic RMAN Backup Up: Using RMAN Previous: Using RMAN Contents Enabling ARCHIVELOG Mode. Most of the High Availability features of Oracle require you to enable CUDDLETECHBLOGDOCSABOUTTHE CUDDLETECH SAS GUIDE TO ORACLETHE CUDDLETECH GUIDE TO SNMP PROGRAMMING It is not necessary to change. Survival is not mandatory.- W. Edwards Deming; A bad system will defeat a good person every time.- W. EdwardsDeming
CUDDLETECH | ZDB: EXAMINING ZFS AT POINT-BLANK RANGE Datasets (-d) Report stats on zdb’s I/O (-s), this is similar to the first interval of zpool iostat. Thus, zdb testpool is the same as zdb -Cuds testpool. Lets look at the output. The pool we’ll be using is actually a 256MB pre-allocated file with a single dataset as simple as it can come. root@quadra /$ zdb testpool version=12 name CUDDLETECH | BATTERY MONITORING ON THE ADAFRUIT HUZZAH32 Since the ESP32 has tons of ADC pins, we ‘sacrifice’ one for Lipoly battery monitoring. You can read half of the battery voltage off of A13. Don’t forget to double the voltage you read, since there is a divider. That A13 pin is actually pin 35, on Arduino we’d use an AnalogRead () but on MongooseOS we’ll use the ADC.read ()function.
CUDDLETECH | ZFS AND THIN PROVISIONING ZFS and Thin Provisioning. Posted on August 12, 2006. ZFS is an amazing and wonderful technology. I say technology because its more than just any one of its capabilities. Being able to dish out, from a single pool, both filesystems and traditional volumes (which I’ll call zvol’s) makes for an extremely power storage foundation onwhich to
USERS AND PASSWORDS
Adding New Users Up: Users and Permissions Previous: Users and Permissions Contents Users and Passwords. A big part of the confusion over authentication is due to the fact that there are two diffrent forms of authentication! Authentication can be done using password authentication (also called internal authentication) or OS authentication (external authentication). THE CUDDLETECH GUIDE TO SNMP PROGRAMMING Chapter 1 Introduction to SNMP 1.1 General Overview Simple Network Management Protocol is a simple method of interacting with networked devices. The standard was defined by IETF RFC 1157 in May ofA SIMPLE EXAMPLE
Closing Thoughts Up: The Net-SNMP C API Previous: Watching SNMP on the Contents A simple example. The following is a very simple example taken from the Net-SNMP site. CREATING AN INITIAL RRD The tool rrdtool is called with the argument create followed by the RRD filename of the database to be created. The next two arguments specify the time at which the database starts, measured in seconds since the Epoch, and the step time measured in seconds which is the interval between database updates. VERITAS VOLUME MANAGER AND VX OBJECTS VERITAS is a logical volume manager. The operative word here is "logical". So, in order to keep things in order we have some basic pieces which are used in different ways for building volumes. PRIVILEGES, ROLES AND PROFILES Other Permissioning Problems Up: Users and Permissions Previous: Adding New Users Contents Privileges, Roles and Profiles. At first the three can be confusing to differentiate. CUDDLETECHBLOGDOCSABOUTTHE CUDDLETECH SAS GUIDE TO ORACLETHE CUDDLETECH GUIDE TO SNMP PROGRAMMING It is not necessary to change. Survival is not mandatory.- W. Edwards Deming; A bad system will defeat a good person every time.- W. EdwardsDeming
CUDDLETECH | ZDB: EXAMINING ZFS AT POINT-BLANK RANGE Datasets (-d) Report stats on zdb’s I/O (-s), this is similar to the first interval of zpool iostat. Thus, zdb testpool is the same as zdb -Cuds testpool. Lets look at the output. The pool we’ll be using is actually a 256MB pre-allocated file with a single dataset as simple as it can come. root@quadra /$ zdb testpool version=12 name CUDDLETECH | BATTERY MONITORING ON THE ADAFRUIT HUZZAH32 Since the ESP32 has tons of ADC pins, we ‘sacrifice’ one for Lipoly battery monitoring. You can read half of the battery voltage off of A13. Don’t forget to double the voltage you read, since there is a divider. That A13 pin is actually pin 35, on Arduino we’d use an AnalogRead () but on MongooseOS we’ll use the ADC.read ()function.
CUDDLETECH | ZFS AND THIN PROVISIONING ZFS and Thin Provisioning. Posted on August 12, 2006. ZFS is an amazing and wonderful technology. I say technology because its more than just any one of its capabilities. Being able to dish out, from a single pool, both filesystems and traditional volumes (which I’ll call zvol’s) makes for an extremely power storage foundation onwhich to
USERS AND PASSWORDS
Adding New Users Up: Users and Permissions Previous: Users and Permissions Contents Users and Passwords. A big part of the confusion over authentication is due to the fact that there are two diffrent forms of authentication! Authentication can be done using password authentication (also called internal authentication) or OS authentication (external authentication). THE CUDDLETECH GUIDE TO SNMP PROGRAMMING Chapter 1 Introduction to SNMP 1.1 General Overview Simple Network Management Protocol is a simple method of interacting with networked devices. The standard was defined by IETF RFC 1157 in May ofA SIMPLE EXAMPLE
Closing Thoughts Up: The Net-SNMP C API Previous: Watching SNMP on the Contents A simple example. The following is a very simple example taken from the Net-SNMP site. CREATING AN INITIAL RRD The tool rrdtool is called with the argument create followed by the RRD filename of the database to be created. The next two arguments specify the time at which the database starts, measured in seconds since the Epoch, and the step time measured in seconds which is the interval between database updates. VERITAS VOLUME MANAGER AND VX OBJECTS VERITAS is a logical volume manager. The operative word here is "logical". So, in order to keep things in order we have some basic pieces which are used in different ways for building volumes. PRIVILEGES, ROLES AND PROFILES Other Permissioning Problems Up: Users and Permissions Previous: Adding New Users Contents Privileges, Roles and Profiles. At first the three can be confusing to differentiate.CUDDLETECH
It is not necessary to change. Survival is not mandatory.- W. Edwards Deming; A bad system will defeat a good person every time.- W. EdwardsDeming
CUDDLETECH | SOLARIS PASSWORD SECURITY md5 (crypt_sunmd5.so): One-way password hashing module for use with crypt (3C) that uses the MD5 message hash algorithm. This module is designed to make it difficult to crack passwords that use brute force attacks based on high speed MD5 implementations that use code inlining, unrolled loops, and table lookup. Password Limit: 255 chars. CUDDLETECH | SOLARIS AUTOMATED FILE INTEGRITY CHECKING Quite simply, bartlog is a BASH wrapper around BART and logger which is run from cron on any schedule you like and reports any changes to syslog. Setup is simple, download bartlog and copy into /usr/sbin or whereever you prefer, then download bart.rules and copy into /etc. Now run bartlog from cron every hour or day or whatever you like.A SIMPLE EXAMPLE
Closing Thoughts Up: The Net-SNMP C API Previous: Watching SNMP on the Contents A simple example. The following is a very simple example taken from the Net-SNMP site. CUDDLETECH | HADOOP ANALYSIS OF APACHE LOGS USING FLUME-NG Lastly, there are 3 triggers that will cause Flume to “roll” the HDFS output file: size, count, and interval. When Flume writes data, if any one of the triggers is true it will roll to use a new file. By default the count is 30 (seconds), size is 1024 (bytes), and count is 10. Think about that, if any of those is true the file is rolled. CUDDLETECH | EXPLORE YOUR STORAGE WITH FILEBENCH The Blog of Ben Rockwood. FileBench is one of the most powerful and flexible benchmarking tools around. Your typical tool like Bonnie++ or IOzone tend to take some discrete operation and do it multiple times at differing block sizes (8K file in 1K blocks, 8K file in 2K blocks,etc).
CUDDLETECH | SOLARIS AUDITING (BSM) IN THE REAL WORLD BSM Basics. As I said in my former post, enabling BSM is simple. There is a convenience wrapper in /etc/security which will turn on the auditd SMF service and add the following to /etc/system : set c2audit:audit_load = 1. You reboot and auditing is going. THE RELATIONAL MODEL Play Along at Home Up: Introduction Previous: Introduction Contents The Relational Model. In this day and age its easy to take the "simplicity" of the modern relational database for granted. CUDDLETECH | USING HASHICORP VAULT AS A PKI SSL/TLS CA Encrypting data is important, both in transit and at rest. By far the most popular method of in-transit encryption is SSL/TLS. That sad truth is, except for our public facing web sites, most administrators rarely use it unless they have to. ENABLING ARCHIVELOG MODE Basic RMAN Backup Up: Using RMAN Previous: Using RMAN Contents Enabling ARCHIVELOG Mode. Most of the High Availability features of Oracle require you to enable CUDDLETECHBLOGDOCSABOUTTHE CUDDLETECH SAS GUIDE TO ORACLETHE CUDDLETECH GUIDE TO SNMP PROGRAMMING It is not necessary to change. Survival is not mandatory.- W. Edwards Deming; A bad system will defeat a good person every time.- W. EdwardsDeming
CUDDLETECH | BATTERY MONITORING ON THE ADAFRUIT HUZZAH32ESP32 BATTERY LEVELESP32 BATTERY LIFEESP32 BATTERY MONITORESP32 BATTERY POWER Since the ESP32 has tons of ADC pins, we ‘sacrifice’ one for Lipoly battery monitoring. You can read half of the battery voltage off of A13. Don’t forget to double the voltage you read, since there is a divider. That A13 pin is actually pin 35, on Arduino we’d use an AnalogRead () but on MongooseOS we’ll use the ADC.read ()function.
CUDDLETECH | ZDB: EXAMINING ZFS AT POINT-BLANK RANGE Datasets (-d) Report stats on zdb’s I/O (-s), this is similar to the first interval of zpool iostat. Thus, zdb testpool is the same as zdb -Cuds testpool. Lets look at the output. The pool we’ll be using is actually a 256MB pre-allocated file with a single dataset as simple as it can come. root@quadra /$ zdb testpool version=12 name CUDDLETECH | UNDERSTANDING ZFS: PREFETCH The first thing to understand is that “ZFS Prefetch” may refer to file-level prefetch and/or the virtual device read-ahead cache; we’ll discuss both here. When reading data from spinning media, the bulk of the service time is spent positioning the disk head. Once the THE CUDDLETECH GUIDE TO SNMP PROGRAMMING Chapter 1 Introduction to SNMP 1.1 General Overview Simple Network Management Protocol is a simple method of interacting with networked devices. The standard was defined by IETF RFC 1157 in May of CUDDLETECH | ZFS AND THIN PROVISIONING ZFS and Thin Provisioning. Posted on August 12, 2006. ZFS is an amazing and wonderful technology. I say technology because its more than just any one of its capabilities. Being able to dish out, from a single pool, both filesystems and traditional volumes (which I’ll call zvol’s) makes for an extremely power storage foundation onwhich to
THE RELATIONAL MODEL Play Along at Home Up: Introduction Previous: Introduction Contents The Relational Model. In this day and age its easy to take the "simplicity" of the modern relational database for granted.USERS AND PASSWORDS
Adding New Users Up: Users and Permissions Previous: Users and Permissions Contents Users and Passwords. A big part of the confusion over authentication is due to the fact that there are two diffrent forms of authentication! Authentication can be done using password authentication (also called internal authentication) or OS authentication (external authentication). CREATING AN INITIAL RRD The tool rrdtool is called with the argument create followed by the RRD filename of the database to be created. The next two arguments specify the time at which the database starts, measured in seconds since the Epoch, and the step time measured in seconds which is the interval between database updates. ENABLING ARCHIVELOG MODE Basic RMAN Backup Up: Using RMAN Previous: Using RMAN Contents Enabling ARCHIVELOG Mode. Most of the High Availability features of Oracle require you to enable CUDDLETECHBLOGDOCSABOUTTHE CUDDLETECH SAS GUIDE TO ORACLETHE CUDDLETECH GUIDE TO SNMP PROGRAMMING It is not necessary to change. Survival is not mandatory.- W. Edwards Deming; A bad system will defeat a good person every time.- W. EdwardsDeming
CUDDLETECH | BATTERY MONITORING ON THE ADAFRUIT HUZZAH32ESP32 BATTERY LEVELESP32 BATTERY LIFEESP32 BATTERY MONITORESP32 BATTERY POWER Since the ESP32 has tons of ADC pins, we ‘sacrifice’ one for Lipoly battery monitoring. You can read half of the battery voltage off of A13. Don’t forget to double the voltage you read, since there is a divider. That A13 pin is actually pin 35, on Arduino we’d use an AnalogRead () but on MongooseOS we’ll use the ADC.read ()function.
CUDDLETECH | ZDB: EXAMINING ZFS AT POINT-BLANK RANGE Datasets (-d) Report stats on zdb’s I/O (-s), this is similar to the first interval of zpool iostat. Thus, zdb testpool is the same as zdb -Cuds testpool. Lets look at the output. The pool we’ll be using is actually a 256MB pre-allocated file with a single dataset as simple as it can come. root@quadra /$ zdb testpool version=12 name CUDDLETECH | UNDERSTANDING ZFS: PREFETCH The first thing to understand is that “ZFS Prefetch” may refer to file-level prefetch and/or the virtual device read-ahead cache; we’ll discuss both here. When reading data from spinning media, the bulk of the service time is spent positioning the disk head. Once the THE CUDDLETECH GUIDE TO SNMP PROGRAMMING Chapter 1 Introduction to SNMP 1.1 General Overview Simple Network Management Protocol is a simple method of interacting with networked devices. The standard was defined by IETF RFC 1157 in May of CUDDLETECH | ZFS AND THIN PROVISIONING ZFS and Thin Provisioning. Posted on August 12, 2006. ZFS is an amazing and wonderful technology. I say technology because its more than just any one of its capabilities. Being able to dish out, from a single pool, both filesystems and traditional volumes (which I’ll call zvol’s) makes for an extremely power storage foundation onwhich to
THE RELATIONAL MODEL Play Along at Home Up: Introduction Previous: Introduction Contents The Relational Model. In this day and age its easy to take the "simplicity" of the modern relational database for granted.USERS AND PASSWORDS
Adding New Users Up: Users and Permissions Previous: Users and Permissions Contents Users and Passwords. A big part of the confusion over authentication is due to the fact that there are two diffrent forms of authentication! Authentication can be done using password authentication (also called internal authentication) or OS authentication (external authentication). CREATING AN INITIAL RRD The tool rrdtool is called with the argument create followed by the RRD filename of the database to be created. The next two arguments specify the time at which the database starts, measured in seconds since the Epoch, and the step time measured in seconds which is the interval between database updates. ENABLING ARCHIVELOG MODE Basic RMAN Backup Up: Using RMAN Previous: Using RMAN Contents Enabling ARCHIVELOG Mode. Most of the High Availability features of Oracle require you to enableCUDDLETECH
It is not necessary to change. Survival is not mandatory.- W. Edwards Deming; A bad system will defeat a good person every time.- W. EdwardsDeming
CUDDLETECH | SOLARIS PASSWORD SECURITY md5 (crypt_sunmd5.so): One-way password hashing module for use with crypt (3C) that uses the MD5 message hash algorithm. This module is designed to make it difficult to crack passwords that use brute force attacks based on high speed MD5 implementations that use code inlining, unrolled loops, and table lookup. Password Limit: 255 chars. CUDDLETECH | TEAM OF TEAMS & COMPLEXITY: AN APPROACH FOR The solution to “breaking down silos” is to create a shared responsibility and empower that via shared context, or what is better called “shared consciousness”. So long as one teams performance is independent of other teams, a sense of competition will overpower any sense of cooperation unless conditions happen to arise in which the CUDDLETECH | EXPLORE YOUR STORAGE WITH FILEBENCH The Blog of Ben Rockwood. FileBench is one of the most powerful and flexible benchmarking tools around. Your typical tool like Bonnie++ or IOzone tend to take some discrete operation and do it multiple times at differing block sizes (8K file in 1K blocks, 8K file in 2K blocks,etc).
CUDDLETECH | SOLARIS AUTOMATED FILE INTEGRITY CHECKING Quite simply, bartlog is a BASH wrapper around BART and logger which is run from cron on any schedule you like and reports any changes to syslog. Setup is simple, download bartlog and copy into /usr/sbin or whereever you prefer, then download bart.rules and copy into /etc. Now run bartlog from cron every hour or day or whatever you like. PRIVILEGES, ROLES AND PROFILES Other Permissioning Problems Up: Users and Permissions Previous: Adding New Users Contents Privileges, Roles and Profiles. At first the three can be confusing to differentiate. CUDDLETECH | LOOKING TO THE FUTURE BY APPRECIATING THE PAST I’ve recently come to the end of an interesting and exciting journey of re-discovery which began on Thanksgiving 2016. While waiting for Thanksgiving dinner to be ready, there was time to kill and we were all just sitting around waiting. CUDDLETECH | THE AGILE MANIFESTO FOR IT SERVICE MANAGEMENT The Blog of Ben Rockwood. Since before the beginnings of the word “DevOps” many of us have tried to create an adaptation of the Agile Manifesto specific to Operations. CUDDLETECH | USING HASHICORP VAULT AS A PKI SSL/TLS CA Encrypting data is important, both in transit and at rest. By far the most popular method of in-transit encryption is SSL/TLS. That sad truth is, except for our public facing web sites, most administrators rarely use it unless they have to. CUDDLETECH | NEW ADVENTURES: LEAVING JOYENT New Adventures: Leaving Joyent. Posted on November 8, 2014. After more than 8 years, yesterday was my last day at Joyent. I was asked by David Young & Jason Hoffman to join Joyent in 2006. At the time the idea of “utility computing” was being talked about but “grid” was really the domain of academic super computers for large batch CUDDLETECHBLOGDOCSABOUTTHE CUDDLETECH SAS GUIDE TO ORACLETHE CUDDLETECH GUIDE TO SNMP PROGRAMMING It is not necessary to change. Survival is not mandatory.- W. Edwards Deming; A bad system will defeat a good person every time.- W. EdwardsDeming
CUDDLETECH | BATTERY MONITORING ON THE ADAFRUIT HUZZAH32ESP32 BATTERY LEVELESP32 BATTERY LIFEESP32 BATTERY MONITORESP32 BATTERY POWER Since the ESP32 has tons of ADC pins, we ‘sacrifice’ one for Lipoly battery monitoring. You can read half of the battery voltage off of A13. Don’t forget to double the voltage you read, since there is a divider. That A13 pin is actually pin 35, on Arduino we’d use an AnalogRead () but on MongooseOS we’ll use the ADC.read ()function.
CUDDLETECH | ZDB: EXAMINING ZFS AT POINT-BLANK RANGE Datasets (-d) Report stats on zdb’s I/O (-s), this is similar to the first interval of zpool iostat. Thus, zdb testpool is the same as zdb -Cuds testpool. Lets look at the output. The pool we’ll be using is actually a 256MB pre-allocated file with a single dataset as simple as it can come. root@quadra /$ zdb testpool version=12 name CUDDLETECH | UNDERSTANDING ZFS: PREFETCH The first thing to understand is that “ZFS Prefetch” may refer to file-level prefetch and/or the virtual device read-ahead cache; we’ll discuss both here. When reading data from spinning media, the bulk of the service time is spent positioning the disk head. Once the THE CUDDLETECH GUIDE TO SNMP PROGRAMMING Chapter 1 Introduction to SNMP 1.1 General Overview Simple Network Management Protocol is a simple method of interacting with networked devices. The standard was defined by IETF RFC 1157 in May of CUDDLETECH | ZFS AND THIN PROVISIONING ZFS and Thin Provisioning. Posted on August 12, 2006. ZFS is an amazing and wonderful technology. I say technology because its more than just any one of its capabilities. Being able to dish out, from a single pool, both filesystems and traditional volumes (which I’ll call zvol’s) makes for an extremely power storage foundation onwhich to
THE RELATIONAL MODEL Play Along at Home Up: Introduction Previous: Introduction Contents The Relational Model. In this day and age its easy to take the "simplicity" of the modern relational database for granted.USERS AND PASSWORDS
Adding New Users Up: Users and Permissions Previous: Users and Permissions Contents Users and Passwords. A big part of the confusion over authentication is due to the fact that there are two diffrent forms of authentication! Authentication can be done using password authentication (also called internal authentication) or OS authentication (external authentication). CREATING AN INITIAL RRD The tool rrdtool is called with the argument create followed by the RRD filename of the database to be created. The next two arguments specify the time at which the database starts, measured in seconds since the Epoch, and the step time measured in seconds which is the interval between database updates. ENABLING ARCHIVELOG MODE Basic RMAN Backup Up: Using RMAN Previous: Using RMAN Contents Enabling ARCHIVELOG Mode. Most of the High Availability features of Oracle require you to enable CUDDLETECHBLOGDOCSABOUTTHE CUDDLETECH SAS GUIDE TO ORACLETHE CUDDLETECH GUIDE TO SNMP PROGRAMMING It is not necessary to change. Survival is not mandatory.- W. Edwards Deming; A bad system will defeat a good person every time.- W. EdwardsDeming
CUDDLETECH | BATTERY MONITORING ON THE ADAFRUIT HUZZAH32ESP32 BATTERY LEVELESP32 BATTERY LIFEESP32 BATTERY MONITORESP32 BATTERY POWER Since the ESP32 has tons of ADC pins, we ‘sacrifice’ one for Lipoly battery monitoring. You can read half of the battery voltage off of A13. Don’t forget to double the voltage you read, since there is a divider. That A13 pin is actually pin 35, on Arduino we’d use an AnalogRead () but on MongooseOS we’ll use the ADC.read ()function.
CUDDLETECH | ZDB: EXAMINING ZFS AT POINT-BLANK RANGE Datasets (-d) Report stats on zdb’s I/O (-s), this is similar to the first interval of zpool iostat. Thus, zdb testpool is the same as zdb -Cuds testpool. Lets look at the output. The pool we’ll be using is actually a 256MB pre-allocated file with a single dataset as simple as it can come. root@quadra /$ zdb testpool version=12 name CUDDLETECH | UNDERSTANDING ZFS: PREFETCH The first thing to understand is that “ZFS Prefetch” may refer to file-level prefetch and/or the virtual device read-ahead cache; we’ll discuss both here. When reading data from spinning media, the bulk of the service time is spent positioning the disk head. Once the THE CUDDLETECH GUIDE TO SNMP PROGRAMMING Chapter 1 Introduction to SNMP 1.1 General Overview Simple Network Management Protocol is a simple method of interacting with networked devices. The standard was defined by IETF RFC 1157 in May of CUDDLETECH | ZFS AND THIN PROVISIONING ZFS and Thin Provisioning. Posted on August 12, 2006. ZFS is an amazing and wonderful technology. I say technology because its more than just any one of its capabilities. Being able to dish out, from a single pool, both filesystems and traditional volumes (which I’ll call zvol’s) makes for an extremely power storage foundation onwhich to
THE RELATIONAL MODEL Play Along at Home Up: Introduction Previous: Introduction Contents The Relational Model. In this day and age its easy to take the "simplicity" of the modern relational database for granted.USERS AND PASSWORDS
Adding New Users Up: Users and Permissions Previous: Users and Permissions Contents Users and Passwords. A big part of the confusion over authentication is due to the fact that there are two diffrent forms of authentication! Authentication can be done using password authentication (also called internal authentication) or OS authentication (external authentication). CREATING AN INITIAL RRD The tool rrdtool is called with the argument create followed by the RRD filename of the database to be created. The next two arguments specify the time at which the database starts, measured in seconds since the Epoch, and the step time measured in seconds which is the interval between database updates. ENABLING ARCHIVELOG MODE Basic RMAN Backup Up: Using RMAN Previous: Using RMAN Contents Enabling ARCHIVELOG Mode. Most of the High Availability features of Oracle require you to enableCUDDLETECH
It is not necessary to change. Survival is not mandatory.- W. Edwards Deming; A bad system will defeat a good person every time.- W. EdwardsDeming
CUDDLETECH | SOLARIS PASSWORD SECURITY md5 (crypt_sunmd5.so): One-way password hashing module for use with crypt (3C) that uses the MD5 message hash algorithm. This module is designed to make it difficult to crack passwords that use brute force attacks based on high speed MD5 implementations that use code inlining, unrolled loops, and table lookup. Password Limit: 255 chars. CUDDLETECH | TEAM OF TEAMS & COMPLEXITY: AN APPROACH FOR The solution to “breaking down silos” is to create a shared responsibility and empower that via shared context, or what is better called “shared consciousness”. So long as one teams performance is independent of other teams, a sense of competition will overpower any sense of cooperation unless conditions happen to arise in which the CUDDLETECH | EXPLORE YOUR STORAGE WITH FILEBENCH The Blog of Ben Rockwood. FileBench is one of the most powerful and flexible benchmarking tools around. Your typical tool like Bonnie++ or IOzone tend to take some discrete operation and do it multiple times at differing block sizes (8K file in 1K blocks, 8K file in 2K blocks,etc).
CUDDLETECH | SOLARIS AUTOMATED FILE INTEGRITY CHECKING Quite simply, bartlog is a BASH wrapper around BART and logger which is run from cron on any schedule you like and reports any changes to syslog. Setup is simple, download bartlog and copy into /usr/sbin or whereever you prefer, then download bart.rules and copy into /etc. Now run bartlog from cron every hour or day or whatever you like. PRIVILEGES, ROLES AND PROFILES Other Permissioning Problems Up: Users and Permissions Previous: Adding New Users Contents Privileges, Roles and Profiles. At first the three can be confusing to differentiate. CUDDLETECH | LOOKING TO THE FUTURE BY APPRECIATING THE PAST I’ve recently come to the end of an interesting and exciting journey of re-discovery which began on Thanksgiving 2016. While waiting for Thanksgiving dinner to be ready, there was time to kill and we were all just sitting around waiting. CUDDLETECH | THE AGILE MANIFESTO FOR IT SERVICE MANAGEMENT The Blog of Ben Rockwood. Since before the beginnings of the word “DevOps” many of us have tried to create an adaptation of the Agile Manifesto specific to Operations. CUDDLETECH | USING HASHICORP VAULT AS A PKI SSL/TLS CA Encrypting data is important, both in transit and at rest. By far the most popular method of in-transit encryption is SSL/TLS. That sad truth is, except for our public facing web sites, most administrators rarely use it unless they have to. CUDDLETECH | NEW ADVENTURES: LEAVING JOYENT New Adventures: Leaving Joyent. Posted on November 8, 2014. After more than 8 years, yesterday was my last day at Joyent. I was asked by David Young & Jason Hoffman to join Joyent in 2006. At the time the idea of “utility computing” was being talked about but “grid” was really the domain of academic super computers for large batchcuddletech
Menu
* Blog
* Docs
* The Cuddletech SAs Guide to Oracle * The Cuddletech Guide to SNMP Programming * Veritas Volume Manager Kickstart * Getting Started with RRDtool* About
*
LOOKING TO THE FUTURE BY APPRECIATING THE PAST*
CONTAINERS, NOW AND THEN*
s S
*
> It is not necessary to change. Survival is not mandatory.- W.> Edwards Deming
*
> A bad system will defeat a good person every time.- W. Edwards> Deming
*
> Technology is anything that wasn't around when you were born.- Alan> Kay
*
> Failure is only the opportunity to begin again more intelligently.-> Henry Ford
*
> Nothing is harder to topple than a fact that supports a deeply held > prejudice denied by its holder.- Russell L. Ackoff* 1
* 2
* 3
* 4
* 5
WHATS NEW?
* GPIO External Wakeup on ESP32 with MongooseOS and ESP-IDF * Battery Monitoring on the Adafruit Huzzah32 ESP32 with MongooseOS * Crazy Talk: Firmware & Unikernels Unite * Opportunities Abound Around the Internet of Things * Team of Teams & Complexity: An Approach for breaking down SilosLATEST TWEETS
cuddletech © Copyright 2016* i
* l
* r
Details
Copyright © 2024 ArchiveBay.com. All rights reserved. Terms of Use | Privacy Policy | DMCA | 2021 | Feedback | Advertising | RSS 2.0