Articles on Trending Technologies

Technical articles with clear explanations and examples

Major Activities of an Operating System with Regard to Secondary Storage Management

David Meador
David Meador
Updated on 17-Mar-2026 2K+ Views

Secondary storage devices are non-volatile devices where data is stored for long-term storage. Disks are the mainly used secondary storage devices, providing the bulk of secondary storage in modern operating systems. The main activity performed in secondary storage management is disk scheduling. This involves determining the order in which disk I/O requests are serviced to minimize seek time and optimize performance. There are many disk scheduling algorithms, with the most important being FCFS, SSTF, SCAN, and LOOK scheduling. Disk Scheduling Overview Disk Track (0 to 199) ...

Read More

How to run long time process on Udev event

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 2K+ Views

Udev is a device manager used by modern Linux systems to detect hardware changes and manage device nodes in the /dev directory. It provides a flexible way to run scripts or programs in response to device events, such as automounting drives, launching backup scripts, or running long-running processes. This article explains how to handle long-time processes triggered by Udev events. Understanding Udev Rules Udev rules are configuration files that specify how Udev should respond to device events. Each rule consists of match conditions that identify devices, actions to take when conditions are met, and optional attributes for fine-tuning ...

Read More

Find the Process That is Using a File in Linux

Kunal Verma
Kunal Verma
Updated on 17-Mar-2026 25K+ Views

When working with files in Linux, you may encounter situations where you cannot unmount a filesystem or access a file because it shows as "busy". This occurs when a process is actively using the file, keeping it open for reading or writing. To resolve this, you need to identify which process is using the file. This tutorial covers the essential commands to find processes that are using specific files in Linux systems. Note − Linux commands are case-sensitive. Commands to Find the Process Linux provides several commands to identify processes working with files. These commands gather ...

Read More

A Comprehensive Guide to Using Snap Packages on Ubuntu

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 546 Views

Snap packages are a modern containerized application packaging format for Ubuntu and other Linux distributions. They run in a sandboxed environment with isolated dependencies, providing enhanced security, easier installation, and automatic updates compared to traditional package management systems. What are Snap Packages? Snap packages are self-contained applications that bundle the software and all its dependencies into a single file. Created using the Snapcraft tool, they run in a secure sandbox with controlled access to system resources. This isolation ensures that snaps work consistently across different Ubuntu versions and Linux distributions without dependency conflicts. Installing Snapd Ubuntu ...

Read More

Apache Virtual Hosting IP Based and Name Based Virtual Hosts in RHEL/CentOS/Fedora

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 801 Views

Apache Virtual Hosting allows you to host multiple websites on a single server by creating separate virtual hosts. There are two main types: IP-based virtual hosting (each site gets a unique IP address) and name-based virtual hosting (sites share an IP address but are distinguished by domain name). This guide shows how to configure both types in RHEL/CentOS/Fedora. What is Virtual Hosting? Virtual hosting is a method of hosting multiple websites on a single server, saving resources and costs for businesses. When hosting multiple websites, each site needs its own unique identity and separation from other sites. ...

Read More

Lock Variable Mechanism

Diksha Patro
Diksha Patro
Updated on 17-Mar-2026 2K+ Views

A lock variable is a fundamental synchronization mechanism that controls access to shared resources in multi-threaded or multi-process environments. It acts as a simple data structure, typically implemented as a boolean or integer, that indicates whether a resource is currently in use or available for access. How Lock Variable Mechanism Works When a thread or process wants to access a shared resource, it first checks the lock variable's value. If the lock is free (unlocked), the thread can acquire it by setting the variable to busy (locked). This ensures mutual exclusion, allowing only one thread to access the ...

Read More

How to Fix the SSH Connection Refused Error?

Satish Kumar
Satish Kumar
Updated on 17-Mar-2026 2K+ Views

SSH (Secure Shell) is a cryptographic network protocol widely used for secure data communication, remote shell services, and command-line interface access to computers. SSH replaced the older and less-secure telnet protocol as the go-to method for remote shell access, providing strong encryption and authentication features for data confidentiality, integrity, and authenticity during communication over unsecured networks. SSH has become an essential tool for system administrators, developers, network engineers, and enthusiasts who need to securely manage or access computing resources remotely. However, establishing SSH connections can sometimes fail with various error messages, with "connection refused" being one of the most ...

Read More

Configuring FreeNAS to Setup ZFS Storage Disks and Creating NFS Shares On FreeNAS

Mrudgandha Kulkarni
Mrudgandha Kulkarni
Updated on 17-Mar-2026 891 Views

FreeNAS is a popular open-source network-attached storage (NAS) operating system based on FreeBSD. It provides a powerful and flexible platform for setting up a centralized storage system that can be accessed by multiple devices on a network. One of the key features of FreeNAS is its support for the ZFS file system, which offers advanced features such as data integrity, compression, and snapshots. In this article, we'll walk you through configuring FreeNAS to set up ZFS storage disks and create NFS shares. We'll cover everything from hardware requirements and installation to creating storage pools, setting up NFS shares, and ...

Read More

How to check the syntax of a Bash script without running it in Linux?

Mukul Latiyan
Mukul Latiyan
Updated on 17-Mar-2026 502 Views

There are always chances that we will make some type of error whenever we are programming. Compilers and interpreters are always there to help us in these cases, but in order to use them we must run the program or some sort of an IDE that constantly checks for these errors and reminds us every time, so that we can correct them. What if we don't want to write our code in a fancy IDE and also don't want to run the program either, in that case we are left with very few options if any. In case you ...

Read More

How did the Windows operating system evolve and compare Windows 10 and Ubuntu?

Bhanu Priya
Bhanu Priya
Updated on 17-Mar-2026 475 Views

Microsoft Windows has evolved significantly since its first release in 1985, transforming from a simple graphical interface to a comprehensive operating system. This evolution spans multiple decades and represents one of the most significant developments in personal computing history. Windows Evolution Timeline Windows Operating System Evolution Win 1.0 1985 Win 3.0 1990 ...

Read More
Showing 8321–8330 of 61,297 articles
« Prev 1 831 832 833 834 835 6130 Next »
Advertisements