This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Integrated Lights-Out (iLO) is a remote server management processor embedded on the system boards of HP ProLiant and Blade servers that allows controlling and monitoring of HP servers from a remote location. HP iLO management is a powerful tool that provides multiple ways to configure, update, monitor, and run servers remotely. | |
The embedded iLO management card has its own network connection and IP address to which server administrators can connect via Domain Name System (DNS)/Dynamic Host Configuration Protocol (DHCP) or through a separate dedicated management network. iLO provides a remote Web-based console, which can be used to administer the server remotely. The iLO port is an Ethernet port, which can be enabled through the ROM-Based Setup Utility (RBSU). |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Check if this is being repeated | |
They are NOT the same thing. They are used for different purposes! | |
While both types of semaphores have a full/empty state and use the same API, their usage is very different. | |
Mutual Exclusion Semaphores | |
Mutual Exclusion semaphores are used to protect shared resources (data structure, file, etc..). | |
A Mutex semaphore is "owned" by the task that takes it. If Task B attempts to semGive a mutex currently held by Task A, Task B's call will return an error and fail. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Group policy is periodically applied to the registry so if a group policy is set to a certain setting it will change the relevant registry setting to conform to it, so in that sense group policy takes precedence. | |
However, when the OS checks to see whether the user should be permitted to use the run command it will only check the registry, not group policy so in that sense registry takes precedence. | |
In practice it means that if you change the registry at any given moment then the registry setting will be honored, until the next group policy update takes place, at which point your registry change will be overwritten to align with group policy. In this regard you can think of group policy as being an automatic mechanism for changing registry settings to the desired value in organisations. | |
The frequency at which group policy is applied is also configurable but usually it gets applied when you log on to windows and then at scheduled intervals. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
500 | |
down vote | |
accepted | |
Segmentation fault is a specific kind of error caused by accessing memory that “does not belong to you.” It’s a helper mechanism that keeps you from corrupting the memory and introducing hard-to-debug memory bugs. Whenever you get a segfault you know you are doing something wrong with memory – accessing variable that has already been freed, writing to a read-only portion of the memory, etc. Segmentation fault is essentially the same in most languages that let you mess with the memory management, there is no principial difference between segfaults in C and C++. | |
There are many ways to get a segfault, at least in the lower-level languages such as C(++). A common way to get a segfault is to dereference a null pointer: | |
int *p = NULL; | |
*p = 1; |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
https://10gbps.io/blog/advantages-disadvantages-various-raid-levels/ | |
As a business owner, you have many features to consider when choosing the right system and infrastructure for your critical online applications. One of the features you have to consider when choosing the right server for your business is whether to enable RAID on your system, but more importantly, what type of RAID to choose to fit your technical needs. Below we will go through all the pros and cons of each RAID level and give suggestions on which type to choose for your set up. | |
RAID, short for redundant array of independent (originally inexpensive) disks is a disk subsystem that stores your data across multiple disks to either increase the performance or provide fault tolerance to your system (some levels provide both). | |
There are two ways of implementing the system. Software raid and hardware raid. | |
Hardware raid is directly managed by a dedicated hardware controller to which the disks are connected. The raid calculations are managed by |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Link: http://searchstorage.techtarget.com/definition/disk-striping | |
Disk striping is the process of dividing a body of data into blocks and spreading the data blocks across multiple storage devices, such as hard disks or solid-state drives (SSDs). A stripe consists of the data divided across the set of hard disks or SSDs, and a striped unit, or strip, that refers to the data slice on an individual drive. | |
disk striping | |
Posted by: Margaret Rouse | |
WhatIs.com | |
Contributor(s): Carol Sliwa |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Link: https://stackoverflow.com/questions/4233816/what-are-mysql-database-engines | |
MyISAM and InnoDB are the most commonly used engines. | |
MyISAM is slightly faster than InnoDB, and implements the FULLTEXT index which is quite useful for integrating search capabilities. MyISAM is not transacted and doesn't implement foreign key constraints, which is a major drawback. | |
But you can use the best of both and create tables with different storage engines. Some software (WordPress, I think) use Inno for most data, like relations between pages, versions etc. Records for the posts contain an ID that links to a record in a separate content table that uses MyISAM. That way, the content is stored in the table that has the best search capabilities, while most other data is stored in tables that enforce data integrity. | |
If I were you, I'd pick Inno, because it is the most reliable. Only use MyISAM for specific purposes if you need to. |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
https://www.slashroot.in/san-vs-nas-difference-between-storage-area-network-and-network-attached-storage | |
NAS is a device that has the sole purpose of storing your data. Unlike Server, it cannot do anything else. You cannot create AD on it. You cannot do virtualization on it. Nothing. You can only store files in the NAS which can be then accessed by the users on your network by FTP/Apple File Protocol/CFS/SMP etc. It is attached to your storage and stores the files for you. So, it is basically a file server. | |
NAS is just a box that attaches to your network and stores files. | |
SAN on the other hand is a Storage Area Network. You can have a cluster of storage devices together that will store your data. The advantage with SAN is that if you have a good replication or RAID strategy implemented, you won't lose your data unlike NAS, which is just a box of storage attached to your network. | |
The SAN gives you a feeling of local drive if connected with Fibre channel or iSCSI channel. You can install any software or sa |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
When you’re initially setting up a router, one of the things you might skip over is the DHCP Lease Time setting. It’s typically measured in minutes, but how long should it be set for? What are the advantages or disadvantages of longer or shorter lease times? | |
In the average home router, your lease time is set for about 24 hours (1440 minutes). Some people set 8 hour leases, some prefer up to a week! The DHCP lease is how long a device reserves an IP address on your network. The DHCP reservation is the key. The device can leave the network, but the reservation can still be in place, depending on how long you set the lease time. | |
It’s a little confusing, so let’s use a few real world examples. Imagine you’re the IT Guy for a dentist’s office. Let’s say you have 2 routers – one for Internal use, and one being used as a public hotspot. On the internal router, things aren’t going to change too often. Even if you are pretty lenient and you let employees use their cell phones on the internal wi-fi (we can get in to |