I. Capacity (能力): 1. Lack of scalability (無法迅速有效地處理大量的件事) 2. Busy but little throughput (很忙但沒進度) 3. Crash under heavy load (同時做三件事就掛了) 4. ON-OFF throughput pattern (間歇性施功) 5. Brainless and muscleless (不會思考又沒行動力) 6. Blurred receiver and transmitter (聽不到也講不清重點) 7. Weak in analysis, organization, or ...
by navy319510 - 网络技术文档中心 - 2007-05-21 08:41:34 阅读(599) 回复(0)
Is that true? We got two ways for Oracle 9i TNS listener configuration: The first one comes with Oracle8.1.7 and works with 9.0.1. You don't have to declare the databases the listener must listen. The second one is to use the "old fashion" way to declare the databases the listener must listen (add SID_LIST for each database) It seems the first one is slow when I connect to the database. Am I...
Unix,C的创建者的忏悔 在前不久举行的一次关于计算机产业的发布会上,Ken Thompson,Dennis Ritchie 和Brian Kernighan承认了由他们创建的Unix操作系统和C语言是来源于20年前的一个精心炮制的愚人节游戏! Thompson是在不久以前在UnixWorld软件开发论坛上说的这番话: “在1969年,AT&T刚刚完成一个和GE还有Honeywell公司合作的项目--Multics,那时候我和Brian 也刚刚接触一个由瑞士ETH实验室的Nicklaus教授创建的PASCAL...
Apr 01 11:18:01.401 dns_rdata_fromtext: xxx.com:6: near eol: unexpected end of input Apr 01 11:18:01.402 zone xxx.com/IN: loading master file xxx.com: unexpected end of input? Why?who can help me,please?
hi, I found that the DJBDNS always take the space of the file /var/log/auth.log, it fill in a lot of something like these.... While i config DJBDNS wrong, i give a lot of these message... Feb 28 18:56:51 dragon last message repeated 20 times Feb 28 19:06:51 dragon last message repeated 20 times Feb 28 19:16:51 dragon last message repeated 20 times Feb 28 19:26:51 dragon last message repeated 20...
将 /var/log/httpd-access.log 清空. # cd /var/log/ # true >; httpd-access.log 本文来自ChinaUnix博客,如果查看原文请点:http://blog.chinaunix.net/u/28922/showart_336145.html
假如我们不去打仗/那么敌人杀死了我们/还要用刺刀指着我们的骨头说/看哪,这是奴隶! 惊人大秘密: 1、我们是洛阳解放军150医院和8410生物研究所的成员,告诉大家一个非常不好的消息,根据我们近3年的研究,发现日本利用基因技术以知名化妆品和食品为主要的媒体来改变我们中国人的基因!? 中国人普遍文化程度不高,买东西以价格的高低来判断东西好坏,于是不但一直被日本人当作活生生的试验品,还让日本人赚#...
the following statement is true or false: true or false: When you use extended IP access lists to restrict vty access, the matching logic is a best match of the list rather than a first match in the list. can anybody help me to explain it, i extract it from ccna guide book, i dont really understand the meaning, thanx!