05-16-2017
Any garbage computer plus a PCI ethernet card beats a pi with a USB, with bonuses of being cheaper, faster, easier to use, able to boot a normal Linux livecd, able to run a distribution anyone has actually heard of, able to use media besides sd cards, and able to support normal hardware.
That you can do anything with a pi doesn't mean you should...
Last edited by Corona688; 05-16-2017 at 03:46 PM..
9 More Discussions You Might Find Interesting
1. UNIX for Dummies Questions & Answers
there are commands to monitor the memory, paging, io... how about network traffic. i mean commands to see whether the network traffic (LAN) is congested? the closest i got is netstat
thanks (6 Replies)
Discussion started by: yls177
6 Replies
2. Cybersecurity
Hi,
Can someone give me the clue on how to capture network traffic at gateway.
Thanx (2 Replies)
Discussion started by: kayode
2 Replies
3. Programming
I am developing a Network Appliation to monitor computers in a network.
Specs are
App monitors the current web page viewed in each system
App also can shutdown the computer in the network
App can show all process run by each computer in the network
I am now confused how to start my... (2 Replies)
Discussion started by: valaparambil88
2 Replies
4. Infrastructure Monitoring
Hi all,
Got a strange one here, well not so much strange, different :-)
I need to work out if a server is particulary chatty, whether its talking / communicating heavily to a particular server, as Im planning to physically move the server to a different server, over a link. Hence the... (6 Replies)
Discussion started by: sbk1972
6 Replies
5. HP-UX
I Colleagues,
Somebody can say me how to monitoring traffic in the network. also I am interested in monitoring memory. if somebody to know a guide with command advanced in unix welcome for me.
Thank you for adcanced. (0 Replies)
Discussion started by: systemoper
0 Replies
6. Red Hat
How to monitor network device traffic using MRTG?
How can I add network devices in MRTG configuration to monitor? (2 Replies)
Discussion started by: manalisharmabe
2 Replies
7. UNIX Desktop Questions & Answers
Hello,
I am working in office, where, more than 60 clients machines (only 16 machines are on windows) are there and one server Centos Server, I have configured clients with server, so that internet will be used form only one IP. Only 1 ip is assigned, but now a days, my client machines are... (2 Replies)
Discussion started by: RedRocks!!
2 Replies
8. Infrastructure Monitoring
If I would like to know what connection , data , traffic in a network port ( eth0 ) , what can I do ?
ps. because I always found the network is very slow , so I would like what the network port is doing .
Thanks
Login ID ust3 is currently in read-only mode for multiple infractions. Creating... (0 Replies)
Discussion started by: ust03
0 Replies
9. UNIX for Advanced & Expert Users
Hi All
I am resilience testing an application that is spread across multiple servers.
One thing I will need to do soon is throttle the network traffic for specific interfaces within the test cluster. Specifically, maybe make a connection take twice or three times as long to respond....
I... (3 Replies)
Discussion started by: bbq
3 Replies
FISH(6) BSD Games Manual FISH(6)
NAME
fish -- play ``Go Fish''
SYNOPSIS
fish [-p]
DESCRIPTION
fish is the game ``Go Fish'', a traditional children's card game.
The computer deals the player and itself seven cards, and places the rest of the deck face-down (figuratively). The object of the game is to
collect ``books'', or all of the members of a single rank. For example, collecting four 2's would give the player a ``book of 2's''.
The options are as follows:
-p Professional mode.
The computer makes a random decision as to who gets to start the game, and then the computer and player take turns asking each other for
cards of a specified rank. If the asked player has any cards of the requested rank, they give them up to the asking player. A player must
have at least one of the cards of the rank they request in their hand. When a player asks for a rank of which the other player has no cards,
the asker is told to ``Go Fish!''. Then, the asker draws a card from the non-dealt cards. If they draw the card they asked for, they con-
tinue their turn, asking for more ranks from the other player. Otherwise, the other player gets a turn.
When a player completes a book, either by getting cards from the other player or drawing from the deck, they set those cards aside and the
rank is no longer in play.
The game ends when either player no longer has any cards in their hand. The player with the most books wins.
fish provides instructions as to what input it accepts.
BUGS
The computer cheats only rarely.
BSD
May 31, 1993 BSD