must meet very different demands when employed on a number crunching server compared to a file server, for example.
Supports the administrator with security-related choices and decisions.
An administrator's guide for problem detection, resolution and optimization.
For SUSE and Novell trademarks, see the Novell Trademark and Service Mark list
All other third party trademarks are the property of their respective owners.
A copy of the license version 1.2 is included in the section entitled .
Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or (at your option) version 1.3; with the Invariant Section being this copyright notice and license.Find how to inspect and optimize your system by means of monitoring tools and how to efficiently manage resources.Also contains an overview of common problems and solutions, and of additional help and documentation resources.Due to the simple fact that different workloads vary substantially in various aspects—most importantly I/O access patterns, memory access patterns, and process scheduling.A behavior that perfectly suits a certain workload might t reduce performance of a completely different workload (for example, I/O intensive databases usually have completely different requirements compared to CPU-intensive tasks, such as video encoding).Choose from various approaches, ranging from a local installation or a network installation server to a mass deployment using a remote-controlled, highly-customized, and automated installation technique.