STG303 Building Scalable Applications on Amazon S3 - AWS re: Invent 2012Amazon Web Services
Want to build an application that requires minimal up-front investment, and will seamlessly scale from hundreds to millions of users? Amazon S3 is a powerful building block that can enable you to focus your time on the value and functionality of your application, rather than the challenges of scaling it. In this session we'll cover techniques to best take advantage of the platform. We'll discuss structuring your key naming convention to maximize consistency of performance, as well as ways to optimize your upload and download throughput. We'll learn how to eliminate proxies between your application and Amazon S3, and use the platform for your logging needs. Finally, we'll cover simple techniques for efficiently managing the billions of objects your highly scaled application may accumulate.
STG303 Building Scalable Applications on Amazon S3 - AWS re: Invent 2012Amazon Web Services
Want to build an application that requires minimal up-front investment, and will seamlessly scale from hundreds to millions of users? Amazon S3 is a powerful building block that can enable you to focus your time on the value and functionality of your application, rather than the challenges of scaling it. In this session we'll cover techniques to best take advantage of the platform. We'll discuss structuring your key naming convention to maximize consistency of performance, as well as ways to optimize your upload and download throughput. We'll learn how to eliminate proxies between your application and Amazon S3, and use the platform for your logging needs. Finally, we'll cover simple techniques for efficiently managing the billions of objects your highly scaled application may accumulate.
JCON Online 2021, International Java Community Conference, 07.10.21, Moritz Kammerer (@Moritz Kammerer, Expert Software Engineer at QAware).
== Please download slides in case they are blurred! ===
In his talk we have had a look at how Microservices can be developed with Micronaut. In our slides you can find out if it kept its promise.
Java Day 2021, WeAreDevelopers, 2021-09-01, online: Moritz Kammerer (@Moritz Kammerer, Expert Software Engineer at QAware).
== Please download slides in case they are blurred! ===
In this talk, we took a look at how Microservices can be developed with Micronaut. Have a look if it has kept its promises.
This deck is about Microservices Architecture and why do we need it, architecture patterns which need to be followed during Microservices development, and about few tricky questions like API Versioning and
Decomposition Recipes
Scaling your Kafka streaming pipeline can be a pain - but it doesn’t have to ...HostedbyConfluent
"Kafka data pipeline maintenance can be painful.
It usually comes with complicated and lengthy recovery processes, scaling difficulties, traffic ‘moodiness’, and latency issues after downtimes and outages.
It doesn’t have to be that way!
We’ll examine one of our multi-petabyte scale Kafka pipelines, and go over some of the pitfalls we’ve encountered. We’ll offer solutions that alleviate those problems, and go over comparisons between the before and after . We’ll then explain why some common sense solutions do not work well and offer an improved, scalable and resilient way of processing your stream.
We’ll cover:
• Costs of processing in stream compared to in batch
• Scaling out for bursts and reprocessing
• Making the tradeoff between wait times and costs
• Recovering from outages
• And much more…"
This session will provide mod_perl users with various ways to
identify and solve performance problems with mod_perl 2.0
application code.
Covering a variety of tips and techniques including:
persistent DB connections, cached DBI statements, reducing memory usage by
deploying shared memory, module preloading techniques, avoiding
importing of variables and global variables in general, forking and
subprocess overhead, memory leakages detection and prevention,
tuning Apache configuration directives for best performance by
benchmarking the scripts, object method calls vs. functions, sending
compressed HTML, performance of print calls and buffer flushing.
An introduction to Figaro, the XML Database for the .NET Framework, and a solution overview of an ASP.NET MembershipProvider built with the XML database.
Clojure is a modern dynamically typed lisp. Dynamical typing is ofter associated with poor performance and runtime failures. In this talk, I'll present some of the lessons learned on building Clojure/Script systems that are both ridiculously fast and will fail fast on errors. Will compare the performance of mutable, persistent & zero-copy data structures and show how we can use interpreters and compilers to build beautiful and performant abstractions. A quick demo on how to build a simple non-blocking web server that runs idiomatic Clojure to serve millions of requests per sec.
Clojure is awesome, and it can be fast too.
Video: https://www.youtube.com/watch?v=3SSHjKT3ZmA
“Purikura” culturein Japan andour web application architectureKoichi Sakata
DevoxxUS Quickie Session on 2017/03/22
Our web application contains more than one billion files of young Japanese women's face image. The photos taken with Photo Booth and are sent to our application through the internet. We use Java, Spring Framework and Oracle RAC as well as MogileFS, is open source distributed filesystem for storing images, . We had not expected that our application had so many images when we started developing. I will explain our architecture, mainly forcused on use cases of MogileFS and troubles we've met. And I also will introduce Japanese "kawaii" culture. "kawaii" includes "lovable", "cute", or "adorable" and the quality of cuteness in the context of Japanese culture. Many Japanese young women take photos with Photo Booth to become more "kawaii".
(BDT318) How Netflix Handles Up To 8 Million Events Per SecondAmazon Web Services
In this session, Netflix provides an overview of Keystone, their new data pipeline. The session covers how Netflix migrated from Suro to Keystone, including the reasons behind the transition and the challenges of zero loss while processing over 400 billion events daily. The session covers in detail how they deploy, operate, and scale Kafka, Samza, Docker, and Apache Mesos in AWS to manage 8 million events & 17 GB per second during peak.
JCON Online 2021, International Java Community Conference, 07.10.21, Moritz Kammerer (@Moritz Kammerer, Expert Software Engineer at QAware).
== Please download slides in case they are blurred! ===
In his talk we have had a look at how Microservices can be developed with Micronaut. In our slides you can find out if it kept its promise.
Java Day 2021, WeAreDevelopers, 2021-09-01, online: Moritz Kammerer (@Moritz Kammerer, Expert Software Engineer at QAware).
== Please download slides in case they are blurred! ===
In this talk, we took a look at how Microservices can be developed with Micronaut. Have a look if it has kept its promises.
This deck is about Microservices Architecture and why do we need it, architecture patterns which need to be followed during Microservices development, and about few tricky questions like API Versioning and
Decomposition Recipes
Scaling your Kafka streaming pipeline can be a pain - but it doesn’t have to ...HostedbyConfluent
"Kafka data pipeline maintenance can be painful.
It usually comes with complicated and lengthy recovery processes, scaling difficulties, traffic ‘moodiness’, and latency issues after downtimes and outages.
It doesn’t have to be that way!
We’ll examine one of our multi-petabyte scale Kafka pipelines, and go over some of the pitfalls we’ve encountered. We’ll offer solutions that alleviate those problems, and go over comparisons between the before and after . We’ll then explain why some common sense solutions do not work well and offer an improved, scalable and resilient way of processing your stream.
We’ll cover:
• Costs of processing in stream compared to in batch
• Scaling out for bursts and reprocessing
• Making the tradeoff between wait times and costs
• Recovering from outages
• And much more…"
This session will provide mod_perl users with various ways to
identify and solve performance problems with mod_perl 2.0
application code.
Covering a variety of tips and techniques including:
persistent DB connections, cached DBI statements, reducing memory usage by
deploying shared memory, module preloading techniques, avoiding
importing of variables and global variables in general, forking and
subprocess overhead, memory leakages detection and prevention,
tuning Apache configuration directives for best performance by
benchmarking the scripts, object method calls vs. functions, sending
compressed HTML, performance of print calls and buffer flushing.
An introduction to Figaro, the XML Database for the .NET Framework, and a solution overview of an ASP.NET MembershipProvider built with the XML database.
Clojure is a modern dynamically typed lisp. Dynamical typing is ofter associated with poor performance and runtime failures. In this talk, I'll present some of the lessons learned on building Clojure/Script systems that are both ridiculously fast and will fail fast on errors. Will compare the performance of mutable, persistent & zero-copy data structures and show how we can use interpreters and compilers to build beautiful and performant abstractions. A quick demo on how to build a simple non-blocking web server that runs idiomatic Clojure to serve millions of requests per sec.
Clojure is awesome, and it can be fast too.
Video: https://www.youtube.com/watch?v=3SSHjKT3ZmA
“Purikura” culturein Japan andour web application architectureKoichi Sakata
DevoxxUS Quickie Session on 2017/03/22
Our web application contains more than one billion files of young Japanese women's face image. The photos taken with Photo Booth and are sent to our application through the internet. We use Java, Spring Framework and Oracle RAC as well as MogileFS, is open source distributed filesystem for storing images, . We had not expected that our application had so many images when we started developing. I will explain our architecture, mainly forcused on use cases of MogileFS and troubles we've met. And I also will introduce Japanese "kawaii" culture. "kawaii" includes "lovable", "cute", or "adorable" and the quality of cuteness in the context of Japanese culture. Many Japanese young women take photos with Photo Booth to become more "kawaii".
(BDT318) How Netflix Handles Up To 8 Million Events Per SecondAmazon Web Services
In this session, Netflix provides an overview of Keystone, their new data pipeline. The session covers how Netflix migrated from Suro to Keystone, including the reasons behind the transition and the challenges of zero loss while processing over 400 billion events daily. The session covers in detail how they deploy, operate, and scale Kafka, Samza, Docker, and Apache Mesos in AWS to manage 8 million events & 17 GB per second during peak.
Similar to The survival strategy of the cloud computing era 2011 1119 zem_distribution (20)
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf91mobiles
91mobiles recently conducted a Smart TV Buyer Insights Survey in which we asked over 3,000 respondents about the TV they own, aspects they look at on a new TV, and their TV buying preferences.
zkStudyClub - Reef: Fast Succinct Non-Interactive Zero-Knowledge Regex ProofsAlex Pruden
This paper presents Reef, a system for generating publicly verifiable succinct non-interactive zero-knowledge proofs that a committed document matches or does not match a regular expression. We describe applications such as proving the strength of passwords, the provenance of email despite redactions, the validity of oblivious DNS queries, and the existence of mutations in DNA. Reef supports the Perl Compatible Regular Expression syntax, including wildcards, alternation, ranges, capture groups, Kleene star, negations, and lookarounds. Reef introduces a new type of automata, Skipping Alternating Finite Automata (SAFA), that skips irrelevant parts of a document when producing proofs without undermining soundness, and instantiates SAFA with a lookup argument. Our experimental evaluation confirms that Reef can generate proofs for documents with 32M characters; the proofs are small and cheap to verify (under a second).
Paper: https://eprint.iacr.org/2023/1886
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
The Metaverse and AI: how can decision-makers harness the Metaverse for their...Jen Stirrup
The Metaverse is popularized in science fiction, and now it is becoming closer to being a part of our daily lives through the use of social media and shopping companies. How can businesses survive in a world where Artificial Intelligence is becoming the present as well as the future of technology, and how does the Metaverse fit into business strategy when futurist ideas are developing into reality at accelerated rates? How do we do this when our data isn't up to scratch? How can we move towards success with our data so we are set up for the Metaverse when it arrives?
How can you help your company evolve, adapt, and succeed using Artificial Intelligence and the Metaverse to stay ahead of the competition? What are the potential issues, complications, and benefits that these technologies could bring to us and our organizations? In this session, Jen Stirrup will explain how to start thinking about these technologies as an organisation.
Le nuove frontiere dell'AI nell'RPA con UiPath Autopilot™UiPathCommunity
In questo evento online gratuito, organizzato dalla Community Italiana di UiPath, potrai esplorare le nuove funzionalità di Autopilot, il tool che integra l'Intelligenza Artificiale nei processi di sviluppo e utilizzo delle Automazioni.
📕 Vedremo insieme alcuni esempi dell'utilizzo di Autopilot in diversi tool della Suite UiPath:
Autopilot per Studio Web
Autopilot per Studio
Autopilot per Apps
Clipboard AI
GenAI applicata alla Document Understanding
👨🏫👨💻 Speakers:
Stefano Negro, UiPath MVPx3, RPA Tech Lead @ BSP Consultant
Flavio Martinelli, UiPath MVP 2023, Technical Account Manager @UiPath
Andrei Tasca, RPA Solutions Team Lead @NTT Data
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
A tale of scale & speed: How the US Navy is enabling software delivery from l...sonjaschweigert1
Rapid and secure feature delivery is a goal across every application team and every branch of the DoD. The Navy’s DevSecOps platform, Party Barge, has achieved:
- Reduction in onboarding time from 5 weeks to 1 day
- Improved developer experience and productivity through actionable findings and reduction of false positives
- Maintenance of superior security standards and inherent policy enforcement with Authorization to Operate (ATO)
Development teams can ship efficiently and ensure applications are cyber ready for Navy Authorizing Officials (AOs). In this webinar, Sigma Defense and Anchore will give attendees a look behind the scenes and demo secure pipeline automation and security artifacts that speed up application ATO and time to production.
We will cover:
- How to remove silos in DevSecOps
- How to build efficient development pipeline roles and component templates
- How to deliver security artifacts that matter for ATO’s (SBOMs, vulnerability reports, and policy evidence)
- How to streamline operations with automated policy checks on container images
15. • May 1964
“ Barring unforeseen obstacles, an on-line interactive
computer service, provided commercially by an
information utility, may be as commonplace by 2000
AD as telephone service i today.”
l h i is d ”
The Computers of Tomorrow by Martin Greenberger
http://www.theatlantic.com/past/docs/unbound/flashbks/computer/greenbf.htm
75. Throughput 463 287
463.287 MB/sec 1 clients 1 procs max_latency=3.968
max latency=3 968 ms
Throughput 789.003 MB/sec 2 clients 2 procs max_latency=4.765 ms
Throughput 1304.08 MB/sec 4 clients 4 procs max_latency=5.390 ms
Throughput 1939 43
1939.43 MB/sec 8 clients 8 procs max_latency=4.479
max latency=4 479 ms
Throughput 2534.71 MB/sec 16 clients 16 procs max_latency=12.107 ms
Throughput 2541.42 MB/sec 32 clients 32 procs max_latency=10.461 ms
Throughput 1877.46 MB/sec 64 clients 64 procs max_latency 16.700
max latency=16.700 ms
Throughput 1716.98 MB/sec 128 clients 128 procs max_latency=278.057 ms
Throughput 1727.13 MB/sec 256 clients 256 procs max_latency=301.766 ms
g p
Throughput 1517.07 MB/sec 512 clients 512
/ p
procs max_latency=376.031 ms
y
Throughput 1252.7 MB/sec 1024 clients 1024 procs max_latency=907.610 ms
Throughput 722.169 MB/sec 2048 clients 2048 procs max_latency=14085.365 ms
Throughput 730.51 MB/sec 4096 clients 4096 procs max_latency=26752.568 ms
76. [3] open /fioa/tmp//clients/client4592 failed for handle 16385 (No such file or directory)
Throughput /fioa/tmp//clients/client6026 failed for handle 16385 (No such file latency=3 968 ms
[3] open /fioa/tmp//clients/client6026 failed for handle 16385 (No such file or directory)
[3] open 463 287 MB/sec
463.287 1 clients 1 procs max or directory)
max_latency=3.968
[3] open /fioa/tmp//clients/client6482 failed for handle 16385 (No such file or directory)
Throughput 789.003 MB/sec 2 clients 2 procs max_latency=4.765 ms
[3] open /fioa/tmp//clients/client5040 failed for handle 16385 (No such file or directory)
Throughput 1304.08 MB/sec 4 clients 4 procs max_latency=5.390 ms
[3] open /fioa/tmp//clients/client6965 failed for handle 16385 (No such file or directory)
Throughput /fi /t 43 li t / li t5044 f clients dl 16385 (N
[3] open /fioa/tmp//clients/client5044 failed for handle 16385 (No such file or directory) 479 ms
[3] 1939 // MB/sec
1939.43 8 il d f h 8 procs max latency=4
max_latency=4.479
h fil di t )
Throughput 2534.71 MB/sec 16 clients 16 procs max_latency=12.107 ms
[3] open /fioa/tmp//clients/client6055 failed for handle 16385 (No such file or directory)
Throughput 2541.42 MB/sec 32 clients 32 procs max_latency=10.461 ms
[3] open /fioa/tmp//clients/client4909 failed for handle 16385 (No such file or directory)
p p
Throughput 1877.46 MB/sec 64 clients ( max_latency y)
[3] open /fioa/tmp//clients/client6713 failed for handle 16385 (No such file or directory)
64 procs max latency=16.700 ms 16.700
[3] open /fioa/tmp//clients/client5014 failed for handle 16385 (No such file or directory)
Throughput 1716.98 MB/sec 128 clients 128 procs max_latency=278.057 ms
[3] open /fioa/tmp//clients/client4971 failed for handle 16385 (No such file or directory)
Throughput 1727.13 MB/sec 256 clients 256 procs max_latency=301.766 ms
[3] open /fioa/tmp//clients/client6221 failed for handle 16385 (No such file or directory)
Throughput /fioa/tmp//clients/client5207 failed for handle 16385 (No such file latency=376.031 ms
[3] open 1517.07 MB/sec
g p / 512 clients 512 procs max_ or directory)
p y
[3] open /fioa/tmp//clients/client5207 failed for handle 16385 (No such file or directory)
Throughput 1252.7 MB/sec 1024 clients 1024 procs max_latency=907.610 ms
[3] open /fioa/tmp//clients/client4139 failed for handle 16385 (No such file or directory)
Throughput 722.169 MB/sec 2048 clients 2048 procs max_latency=14085.365 ms
Throughput 730.51 MB/sec 4096 clients 4096 procs max_latency=26752.568 ms
# uptime
p
19:24:07 up 7 days, 5:46, 2 users, load average: 1543.52, 5862.79, 7304.55
77. [3] open /fioa/tmp//clients/client4592 failed for handle 16385 (No such file or directory)
Throughput /fioa/tmp//clients/client6026 failed for handle 16385 (No such file latency=3 968 ms
[3] open /fioa/tmp//clients/client6026 failed for handle 16385 (No such file or directory)
[3] open 463 287 MB/sec
463.287 1 clients 1 procs max or directory)
max_latency=3.968
[3] open /fioa/tmp//clients/client6482 failed for handle 16385 (No such file or directory)
Throughput 789.003 MB/sec 2 clients 2 procs max_latency=4.765 ms
[3] open /fioa/tmp//clients/client5040 failed for handle 16385 (No such file or directory)
Throughput 1304.08 MB/sec 4 clients 4 procs max_latency=5.390 ms
[3] open /fioa/tmp//clients/client6965 failed for handle 16385 (No such file or directory)
Throughput /fi /t 43 li t / li t5044 f clients dl 16385 (N
[3] open /fioa/tmp//clients/client5044 failed for handle 16385 (No such file or directory) 479 ms
[3] 1939 // MB/sec
1939.43 8 il d f h 8 procs max latency=4
max_latency=4.479
h fil di t )
Throughput 2534.71 MB/sec 16 clients 16 procs max_latency=12.107 ms
[3] open /fioa/tmp//clients/client6055 failed for handle 16385 (No such file or directory)
Throughput 2541.42 MB/sec 32 clients 32 procs max_latency=10.461 ms
[3] open /fioa/tmp//clients/client4909 failed for handle 16385 (No such file or directory)
p p
Throughput 1877.46 MB/sec 64 clients ( max_latency y)
[3] open /fioa/tmp//clients/client6713 failed for handle 16385 (No such file or directory)
64 procs max latency=16.700 ms 16.700
[3] open /fioa/tmp//clients/client5014 failed for handle 16385 (No such file or directory)
Throughput 1716.98 MB/sec 128 clients 128 procs max_latency=278.057 ms
[3] open /fioa/tmp//clients/client4971 failed for handle 16385 (No such file or directory)
Throughput 1727.13 MB/sec 256 clients 256 procs max_latency=301.766 ms
[3] open /fioa/tmp//clients/client6221 failed for handle 16385 (No such file or directory)
Throughput /fioa/tmp//clients/client5207 failed for handle 16385 (No such file latency=376.031 ms
[3] open 1517.07 MB/sec
g p / 512 clients 512 procs max_ or directory)
p y
[3] open /fioa/tmp//clients/client5207 failed for handle 16385 (No such file or directory)
Throughput 1252.7 MB/sec 1024 clients 1024 procs max_latency=907.610 ms
[3] open /fioa/tmp//clients/client4139 failed for handle 16385 (No such file or directory)
Throughput 722.169 MB/sec 2048 clients 2048 procs max_latency=14085.365 ms
Throughput 730.51 MB/sec 4096 clients 4096 procs max_latency=26752.568 ms
# uptime
p
19:24:07 up 7 days, 5:46, 2 users, load average: 1543.52, 5862.79, 7304.55