12%
21.09.2012
with hardware vendors such as NVidia to include things such as GPU monitoring. Because some of the hardware features contain code protected by non-disclosure agreements, they can’t use an open development model
12%
06.05.2014
to the filesystem, which manages the resources and monitors the execution of the commands sent by a Hadoop-compatible application on the framework. These commands form jobs, and jobs are implemented as individual
12%
26.01.2012
storage is performing well enough? How do I manage my storage? How do I monitor my storage? Do I need a backup or do I really only need a copy of the data? How can I monitor the state of my storage? Do I
12%
20.04.2017
to understand what’s going on with your storage, even on your desktop or laptop.
Studies of Data Age
A few years ago, a study from the University of California, Santa Cruz, and NetApp examined CIFS storage
12%
19.12.2012
. Profiling goes beyond this to monitor the system while the application is running, which is really monitoring “events” that happen on the system. For example, you could measure the number of different cache
12%
21.12.2017
at the LRZ in the application support group and mainly deals with performance monitoring and energy optimization of high-performance computing applications. In this context, she programs system-wide tools
12%
05.11.2018
for starting, executing, and monitoring work (normally a parallel job) on the set of allocated nodes.”
“… it arbitrates contention for resources by managing a queue of pending work.”
These three points
12%
12.01.2012
. Even a quad-core desktop or laptop can present a formidable parallel programming challenge. In its long history, parallel programming tools and languages seem to be troubled by a lack of progress. Just
12%
25.02.2016
one class to the next) was used on a laptop with 8GB of memory using two cores (OMP_NUM_THREADS=2
).
Initial tests showed that the application finished in a bit less than 60 seconds. With an interval
12%
16.04.2015
on its laptops that allows the software to steal web traffic using man-in-the-middle attacks.
When you use an encrypted filesystem or SEDs, all
of the data is encrypted. However, if you forget