Language Selection

English French German Italian Portuguese Spanish

Speed up the Kernel

Filed under
Linux
HowTos

Kernel performance tweaks

The Linux kernel operates at the most fundamental (hardware) level, and it is responsible for providing the many software abstractions that modern Linux systems rely upon. Fundamentally, the job of the kernel is to provide all of these conveniences while keeping out of the way as much as possible. Time spent by the kernel is time that cannot be spent performing useful work within application code, even if that application is the latest version of Angry Birds. The kernel is also intended to run on a wide range of different hardware systems ‘out of the box’ – from the smallest embedded device, to the largest supercomputer. As such, the many algorithms it uses have been heavily optimised over the past two decades, but there are limits.

It’s a fact of life that a system used predominantly as a desktop, for example, has different needs from (say) a system used to process real-time stock trade transactions, or to serve webpages to millions of social media consumers. These different use cases have lead to various flexibility, especially in the scheduling algorithms used within the kernel to determine which task (user application process) should receive time (quantum) on the CPU(s), or which I/O blocks should be written out to disk next.

rest here




More in Tux Machines

Leftovers: Gaming

Security Leftovers

  • Linux Foundation launches badge program to boost open source security
    The Linux Foundation has released the first round of CII Best Practices badges as part of a program designed to improve the quality and security of open-source software. Announced on Tuesday, the non-profit said the Core Infrastructure Initiative (CII), a project which brings tech firms, developers and stakeholders together to create best practice specifications and improve the security of critical open-source projects, has now entered a new stage with the issue of CII badges to a select number of open-source software.
  • Free Badge Program Signals What Open Source Projects Meet Criteria for Security, Quality and Stability
  • How to Conduct Internal Penetration Testing
    The best way to establish how vulnerable your network is to a hacker attack is to subject it to a penetration test carried out by outside experts. (You must get a qualified third party to help with penetration testing, of course, and eSecurity Planet recently published an article on finding the right penetration testing company.)
  • SSH for Fun and Profit
    In May last year, a new attack on the Diffie Hellman algorithm was released, called Logjam. At the time, I was working on a security team, so it was our responsiblity to check that none of our servers would be affected. We ran through our TLS config and decided it was safe, but also needed to check that our SSH config was too. That confused me – where in SSH is Diffie Hellman? In fact, come to think of it, how does SSH work at all? As a fun side project, I decided to answer that question by writing a very basic SSH client of my own.

Open Data in Europe

  • Helsinki to enhance open democracy technologies through a hackathon
    The International Open Data Day brings together citizens and developers in major cities around the world to develop tools and applications based on Open Data. In 2016, Open Data Day took place on the 5-6 March.
  • Dutch government organisations not ready for open data requests
    Dutch government organisations are generally unable to process requests under the new 'Law for re-use of government information' in a timely and correct manner. According to inventories made by the Open State Foundation and Open Archives, government at all levels took months to decide on the requests, had problems providing the information in an open and machine-readable format, and failed to forward requests that should be handled by other organisations.
  • Hungarian Post charging high costs to frustrate right to public information
    The issue was brought before Péterfalvi Attila, President of the National Authority for Data Protection and Freedom of Information, by Tóth Bertalan, Deputy Faction Leader for the Hungarian Socialist Party (MSZP). Tóth argued that citizens are restricted in exercising their right of access to public information if an agency asks that much money for its data.

No Ubuntu Back Doors, Windows and Mac Migrations

Today in Linux news Microsoft's market share has dipped below 90% and Mac is disappearing from Linux conventions. Ubuntu founder Mark Shuttleworth said in an interview today that security and encryption are a commitment of Ubuntu's. Jesse Smith reviewed the latest version of Ubuntu and OMG!Ubuntu! shared some glimpses of Ubuntu in the wild. Bryan Lunduke listed 12 "Linux geeks" all users should follow on social media and Sandra Gittlen highlighted six colleges that "immerse students in Open Source." Read more