≡ Menu


Linux File System Limitations For High Performance Computing

Linux file systems have a number of limitations that make them a poor choice for large and high-performance computing environments. This article explains some of the pros and cons of Linux and old UNIX file systems:

I am frequently asked by potential customers with high I/O requirements if they can use Linux instead of AIX or Solaris.

No one ever asks me about high-performance I/O -- high IOPS (define) or high streaming I/O -- on Windows or NTFS because it isn't possible. Windows and the NTFS file system, which hasn't changed much since it was released almost 10 years ago, can't scale given its current structure. The NTFS file system layout, allocation methodology and structure do not allow it to efficiently support multi-terabyte file systems, much less file systems in the petabyte range, and that's no surprise since it's not Microsoft's target market.

=> Linux File Systems: You Get What You Pay For

What do you think?

Identify and Verify Gnome Users Based on How They Type

This tutorial explains GDM (GNOME Display Manager) modification to support user verification through keystroke-dynamics processing. Modified GDM allows only you to login. If you go ahead and tell your password to a friend. They still won't be able to log in using GDM without knowing the precise method of typing required when entering your user name.

You can create and store a one-way encrypted hash of your keystroke patterns when entering your user name. Add code to GDM to read current keystroke patterns and permit a user to log in when the characteristics are a match.

Many commercial products today provide two-factor authentication on Linux systems. These technologies generally require the purchase of additional hardware and create a closed implementation unsuitable for many environments. The code and processes presented here allow you to implement a low-cost authentication-input system based on the characteristics of how a user types his password into the GDM. Moving beyond examples and into implementation, the modifications to GDM presented here allow you to enhance the security of your computer.

=> Identify and verify users based on how they type