Search this site
Embedded Files
Dawid Trojanowski
  • Dawid
  • DevOps
  • DevOps old Cloud LB HA ProxMox LCMC ManagerIQ Xen K8e OpenStack VM LXD
  • ERP SaaS, ECM, WorkFlow, issue, BI, ESB/wso2, Accounting, HRM, SCM, MRP,
  • Developer 20y. coder software: windows, door, roller shutter, EDI, CNC.
  • I recommend. What's worth seeing.
Dawid Trojanowski
I recommend. What's worth seeing.

http://www.singularity.com/charts/page62.html

18 billion transistors in 398mm2. That means that Qualcomm can fit 48 cores

http://browser.geekbench.com/v4/cpu/search?dir=desc&q=dl580&sort=multicore_score

how many machines the top500 uses VMware or Windows

https://www.hpc.co.jp/product/cpu_intel_xeon-scalable-processors/

Memristor and Memristive Systems Symposium
http://tracker.ceph.com/projects/ceph/wiki/Tuning_for_All_Flash_Deployments

https://en.wikipedia.org/wiki/IOPS

https://www.youtube.com/watch?v=i_r3z1jYHAc&t=383s

Supercomputing Testbed based on Raspberry Pi

Linux Cluster Management Console HA, http://lcmc.sf.net

Juju Maas OpenStack

https://github.com/openstack/kolla-ansible

GNS3:  Docker, OvS, SDN OpenFlow mikrotik Cisco, Juniper, openWRT
kali linux metasploit trzeba znać by się zabezpieczyć Reset administrator password of Windows 10 without any software 
https://www.youtube.com/watch?v=z5FTS_08q8k
Easy Kubernetes deployment with Juju As A Service by Canonical
https://www.youtube.com/watch?v=z5FTS_08q8k

LCMC mySQL HA LB

LVS keepalive HAproxy nginx

Teoria Administracji serwerami VPS
Metasploit Minute
pluskwy wszędzie SS7 Metody pozostania w ukryciu w sieci i w terenie
Jak upolować Hakera
Bezpieczne urządzenie mobilne – czy to możliwe?
szarp.org | oscada.org | ws.linuxscada.infohttp://linuxscada.info/table.htm
Google Sites
Report abuse
Google Sites
Report abuse