SlideShare a Scribd company logo
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Linux Essenciais and System Administration
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Key Knowledge Areas
Run jobs in the foreground and background.
Signal a program to continue running after logout.
Monitor active processes.
Select and sort processes for display.
Send signals to processes.
Unix Commands
Create, monitor and kill processes
Terms and Utilities
& bg
fg jobs
kill nohup
ps top
free uptime
killall
2
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Create, monitor and kill processes
Process wraps up everything needed to know about a running piece of software.
Meta information includes the machine code for the software, and things like what
user/group pair is running the process, when it was started, what command line was, etc.
Pertinent parts of a process:
PID; PPID; UID/GID; Command; Start Time; CPU Time; CWD; State; TTY; Environment; Priority; Nice; Level
Processes structure
3
PID
Process ID
•Linux uses this number to uniquely identify every process on the computer
•Number from 1-32768 ( default - can change the maximum )
•Assigns new PIDs incrementally by 1, 2 or 4
•Loops back to 1 after hitting the maximum
PPID
Parent Process ID
•PID of the process that started this one
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Create, monitor and kill processes
UID/GID
The User and Group running the process
•Very important! Defines access and permissions to file system and operating system.
•Inherited from Parent process unless: SetUID/SetGID bits on executable
•Completes the Circle of Security
Processes structure
4
command
The command (and arguments) for the process
•Identifies the executable running, as well as the arguments passed at invocation
start & cpu time
Start Time tracks when the process was started
•CPU Time tracks time the process actually spends running on the CPU
CWD
Current Working Directory
•Inherited from parent process
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Create, monitor and kill processes
state
State of the process:
•Runnable; Stopped; Blocked – Interruptible; Blocked - Non-interruptible; Zombie
Processes structure
5
TTY
•Connected terminal
•Mostly informational
•Inherited from parent process
environment
•Every process has it’s own Environment
•Inherited from parent process
priority
•Priority is a read-only value showing current priority assigned by the scheduler
•Ranges from 0-99, with higher values representing higher priorities.
•The scheduler constantly adjusts priorities to balance efficiency, performance and responsiveness
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Create, monitor and kill processes
nice
nice level represents the influence on the calculations the kernel uses when assigning priorities.
•Originally designed and named to allow users to be “nice” to other users of the system by assigning a
higher nice value to an intensive process, which in turn lowers it’s priority.
•Ranges from -20 to 19. Default nice level is 0.
•Only root can assign negative nice values.
See slides: Modify process execution priorities v2.ppt
Processes structure
6
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Create, monitor and kill processes
Job control - Ability to selectively suspend execution of processes and continue their execution later.
A job is a process or a pipeline of processes that were started by the shell.
Job control
7
job which receives keyboard input is called the foreground job.
•When a foreground process is running, it receives keyboard input and signals.
•Processes started are run in foreground by default and continue until they exit.
To run a process in background – input command followed by special character &
•Processes running in the background may still send output to the terminal.
•They do not receive keyboard input unless they are brought to the foreground.
When bash starts a background job, it prints a line with:
- job number and - process ID of last process in pipeline
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Create, monitor and kill processes
command jobs displays current list of jobs either running or stopped.
jobs
8
foo:~ $ dd if=/dev/zero of=/dev/null bs=1 &
[1] 1181
foo:~ $ cat /dev/urandom | grep hello &
[2] 1183
foo:~ $ jobs
[1]- Running dd if=/dev/zero of=/dev/null bs=1 &
[2]+ Running cat /dev/urandom | grep hello &
Ex:
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Create, monitor and kill processes
Control jobs
9
key sequences entered to foreground processes:
Key Signal Meaning Usage
Ctrl+C SIGINT Interrupt Interrupt the program running in the foreground
Ctrl+Z SIGSTOP Suspend Suspend the program running in the foreground
cmds entered to control background processes.
Command Meaning Usage
fg foreground Run the background job in the foreground. If it has suspended, restart it.
bg background Restart a suspended job.
fg makes most recently executed job a foreground job.
You can specify a specific job number. (Ex. fg 2 will make job 2 run in the foreground)
bg makes most recently executed job continue to run in background.
You can make a specific job run in the background by specifying a job number (Ex. bg 2)
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Create, monitor and kill processes
Control jobs
10
kill command
kill job based on job number (instead of PID) using percentage sign to specify the job number
foo:~ $ jobs
[1]- Running dd if=/dev/zero of=/dev/null bs=1 &
[2]+ Running cat /dev/urandom | grep hello &
foo:~ $ kill %1
foo:~ $
[1]- Terminated dd if=/dev/zero of=/dev/null bs=1
foo:~ $ jobs
[2]+ Running cat /dev/urandom | grep hello &
foo:~ $ kill %2
foo:~ $
[2]+ Terminated cat /dev/urandom | grep hello
Ex:
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Create, monitor and kill processes
Monitoring processes
11
ps – process status
options supported by ps are somewhat complex.
GNU version supports: Unix98 options (letters); BSD options (dash); GNU options (two dashes).
To ... Unix98 BSD
- Show all processes ps -ax ps -A ps -e
- Show full info ps -u (user format) ps -f (full listing)
- Show full info for all processes ps -aux ps -ef ps -Af
foo:~ $ ps -f
UID PID PPID C STIME TTY TIME CMD
georgem 987 612 0 20:32 pts/2 00:00:00 /bin/bash
georgem 3398 987 0 21:11 pts/2 00:00:00 ps -f
foo:~ $ ps u
USER PID %CPU %MEM VSZ RSS TTY STAT START TIME COMMAND
georgem 987 0.0 1.7 4676 2040 pts/2 S 20:32 0:00 /bin/bash
georgem 3399 0.0 0.5 2524 696 pts/2 R 21:11 0:00 ps u
Ex:
ps -w – display in wide format
ps -f – display in forest of processes, similar to output of pstree - Generate hierarchical view of
processes.
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Create, monitor and kill processes
Processes states
12
5 basic process states:
1. Runnable Process is running, or is set to run.
•Linux is a multi-tasking it’s hard to see exactly when processes are running (switched so quickly),
•state is runnable, indicating that the scheduler will provide CPU time when it’s available.
2. Stopped Process will not get CPU time
•Nothing happens to the process - it’s still in memory, poised, ready to go.
•But when it’s put in the stopped state, scheduler will not put it on the CPU.
•Files/network connections remain open, but network connections may drop after a time (timeout).
3. Blocked/Sleeping – interrutible Process is waiting for some event
•Event can be an alarm from a sleep system call, or a signal or other external event.
•Interruptible means that other processes/events can break the sleep.
4. Blocked/Sleeping - non-interrutible Sleep state generally caused by IO operations
accessing a drive, communicating with network, etc.
•Non-interruptible means that other processes/events can not break this sleep.
•This process is unable to respond to signals.
5. Zombie/Defunct Exited process whose parent did not wait() on child
•Does not consume resources beyond a PID and meta information storage ( < 1k generally )
•Generally caused by2 situations:
- Bug in software
- Overly taxed machine
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Create, monitor and kill processes
Monitoring processes
13
top – displays processes that use up the most CPU or memory.
Ex:
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Create, monitor and kill processes
Disconnected processes
14
commands nohup and setsid
- used to run processes disconnected from terminal that started them.
nohup sets the signal mask for the process it starts to ignore the SIGHUP signal.
SIGHUP signal is sent to each process when the shell exits. - happens when you exit a session on console, or via network connection.
•nohup writes the output to a file - nohup.out
•nohup is generally used - When you know that the process you are going to run should continue to
run after your session ends.
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Create, monitor and kill processes
Signals
15
Processes in Linux do not communicate with each other directly, but send each other signals
via kernel.
most common signal sent is SIGTERM,
means Terminate, unless you know what to do
signal(7) man page.
Ex:
http://linux.about.com/od/commands/l/blcmdl7_signal.htm
First form of Interprocess Communication ( IPC )
A signal is a message sent to a process to indicate
events or other conditions.
The signal itself is the message – there around
three dozen defined signals...
CoreLinuxforRedHatandFedoralearningunderGNUFreeDocumentationLicense-Copyleft(c)AcácioOliveira2012
Everyoneispermittedtocopyanddistributeverbatimcopiesofthislicensedocument,changingisallowed
Fim de sessão
16

More Related Content

What's hot (20)

PDF
The origin: Init (compact version)
Tzung-Bi Shih
 
PDF
Kernel Recipes 2017: Using Linux perf at Netflix
Brendan Gregg
 
PPT
101 1.3 runlevels , shutdown, and reboot
Acácio Oliveira
 
PPT
101 1.3 runlevels, shutdown, and reboot v2
Acácio Oliveira
 
PDF
Kernel Recipes 2019 - BPF at Facebook
Anne Nicolas
 
PPT
1.3 runlevels, shutdown, and reboot v3
Acácio Oliveira
 
PDF
Systems@Scale 2021 BPF Performance Getting Started
Brendan Gregg
 
PDF
UM2019 Extended BPF: A New Type of Software
Brendan Gregg
 
ODP
Linux kernel tracing superpowers in the cloud
Andrea Righi
 
PDF
Kernel Recipes 2019 - Kernel documentation: past, present, and future
Anne Nicolas
 
PDF
TIP1 - Overview of C/C++ Debugging/Tracing/Profiling Tools
Xiaozhe Wang
 
PDF
BPF Internals (eBPF)
Brendan Gregg
 
PDF
Kernel Recipes 2019 - Hunting and fixing bugs all over the Linux kernel
Anne Nicolas
 
PDF
Kernel Recipes 2019 - Formal modeling made easy
Anne Nicolas
 
PDF
Container Performance Analysis
Brendan Gregg
 
PDF
Kernel Recipes 2019 - ftrace: Where modifying a running kernel all started
Anne Nicolas
 
PDF
eBPF Trace from Kernel to Userspace
SUSE Labs Taipei
 
PDF
Kernel Recipes 2017 - Understanding the Linux kernel via ftrace - Steven Rostedt
Anne Nicolas
 
PDF
BPF: Tracing and more
Brendan Gregg
 
PDF
Linux Performance Profiling and Monitoring
Georg Schönberger
 
The origin: Init (compact version)
Tzung-Bi Shih
 
Kernel Recipes 2017: Using Linux perf at Netflix
Brendan Gregg
 
101 1.3 runlevels , shutdown, and reboot
Acácio Oliveira
 
101 1.3 runlevels, shutdown, and reboot v2
Acácio Oliveira
 
Kernel Recipes 2019 - BPF at Facebook
Anne Nicolas
 
1.3 runlevels, shutdown, and reboot v3
Acácio Oliveira
 
Systems@Scale 2021 BPF Performance Getting Started
Brendan Gregg
 
UM2019 Extended BPF: A New Type of Software
Brendan Gregg
 
Linux kernel tracing superpowers in the cloud
Andrea Righi
 
Kernel Recipes 2019 - Kernel documentation: past, present, and future
Anne Nicolas
 
TIP1 - Overview of C/C++ Debugging/Tracing/Profiling Tools
Xiaozhe Wang
 
BPF Internals (eBPF)
Brendan Gregg
 
Kernel Recipes 2019 - Hunting and fixing bugs all over the Linux kernel
Anne Nicolas
 
Kernel Recipes 2019 - Formal modeling made easy
Anne Nicolas
 
Container Performance Analysis
Brendan Gregg
 
Kernel Recipes 2019 - ftrace: Where modifying a running kernel all started
Anne Nicolas
 
eBPF Trace from Kernel to Userspace
SUSE Labs Taipei
 
Kernel Recipes 2017 - Understanding the Linux kernel via ftrace - Steven Rostedt
Anne Nicolas
 
BPF: Tracing and more
Brendan Gregg
 
Linux Performance Profiling and Monitoring
Georg Schönberger
 

Similar to 101 3.5 create, monitor and kill processes v2 (20)

PPT
3.1.c apend scripting, crond, atd
Acácio Oliveira
 
PPT
101 apend. scripting, crond, atd
Acácio Oliveira
 
PPT
101 apend. troubleshooting tools v2
Acácio Oliveira
 
PPTX
Practical Operation Automation with StackStorm
Shu Sugimoto
 
PPT
4.9 apend troubleshooting tools v2
Acácio Oliveira
 
PPT
3.6 modify process execution priorities v2
Acácio Oliveira
 
PDF
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
Zoltan Balazs
 
PDF
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
Shakacon
 
PDF
Linux Server Deep Dives (DrupalCon Amsterdam)
Amin Astaneh
 
PDF
D200011_2024_Dec13 (2).pdf aaaaaaaaaaaaa
TeaKashahu1
 
PPT
101 3.6 modify process execution priorities v2
Acácio Oliveira
 
PDF
Time Series Database and Tick Stack
Gianluca Arbezzano
 
ODP
Nagios Conference 2014 - Spenser Reinhardt - Detecting Security Breaches With...
Nagios
 
PPTX
Process management in linux
Mazenetsolution
 
PDF
HKG18-TR14 - Postmortem Debugging with Coresight
Linaro
 
PPTX
HPC Examples
Wendi Sapp
 
PPT
Apend. kernel
Acácio Oliveira
 
PDF
Android Boot Time Optimization
Kan-Ru Chen
 
PPT
101 apend. kernel
Acácio Oliveira
 
PDF
Setup & Operate Tungsten Replicator
Continuent
 
3.1.c apend scripting, crond, atd
Acácio Oliveira
 
101 apend. scripting, crond, atd
Acácio Oliveira
 
101 apend. troubleshooting tools v2
Acácio Oliveira
 
Practical Operation Automation with StackStorm
Shu Sugimoto
 
4.9 apend troubleshooting tools v2
Acácio Oliveira
 
3.6 modify process execution priorities v2
Acácio Oliveira
 
DEFCON 22: Bypass firewalls, application white lists, secure remote desktops ...
Zoltan Balazs
 
Hacking Highly Secured Enterprise Environments by Zoltan Balazs
Shakacon
 
Linux Server Deep Dives (DrupalCon Amsterdam)
Amin Astaneh
 
D200011_2024_Dec13 (2).pdf aaaaaaaaaaaaa
TeaKashahu1
 
101 3.6 modify process execution priorities v2
Acácio Oliveira
 
Time Series Database and Tick Stack
Gianluca Arbezzano
 
Nagios Conference 2014 - Spenser Reinhardt - Detecting Security Breaches With...
Nagios
 
Process management in linux
Mazenetsolution
 
HKG18-TR14 - Postmortem Debugging with Coresight
Linaro
 
HPC Examples
Wendi Sapp
 
Apend. kernel
Acácio Oliveira
 
Android Boot Time Optimization
Kan-Ru Chen
 
101 apend. kernel
Acácio Oliveira
 
Setup & Operate Tungsten Replicator
Continuent
 
Ad

More from Acácio Oliveira (20)

PPTX
Security+ Lesson 01 Topic 24 - Vulnerability Scanning vs Pen Testing.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 25 - Application Security Controls and Techniques.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 21 - Types of Application Attacks.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 19 - Summary of Social Engineering Attacks.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 23 - Overview of Security Assessment Tools.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 20 - Summary of Wireless Attacks.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 22 - Security Enhancement Techniques.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 15 - Risk Management Best Practices.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 13 - Physical Security and Environmental Controls.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 14 - Disaster Recovery Concepts.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 06 - Wireless Security Considerations.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 04 - Secure Network Design Elements and Components....
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 02 - Secure Network Administration Concepts.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 01 - Intro to Network Devices.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 08 - Integrating Data and Systems with Third Partie...
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 07 - Risk Related Concepts.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 05 - Common Network Protocols.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 11 - Incident Response Concepts.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 12 - Security Related Awareness and Training.pptx
Acácio Oliveira
 
PPTX
Security+ Lesson 01 Topic 17 - Types of Malware.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 24 - Vulnerability Scanning vs Pen Testing.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 25 - Application Security Controls and Techniques.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 21 - Types of Application Attacks.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 19 - Summary of Social Engineering Attacks.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 23 - Overview of Security Assessment Tools.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 20 - Summary of Wireless Attacks.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 22 - Security Enhancement Techniques.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 15 - Risk Management Best Practices.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 13 - Physical Security and Environmental Controls.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 14 - Disaster Recovery Concepts.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 06 - Wireless Security Considerations.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 04 - Secure Network Design Elements and Components....
Acácio Oliveira
 
Security+ Lesson 01 Topic 02 - Secure Network Administration Concepts.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 01 - Intro to Network Devices.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 08 - Integrating Data and Systems with Third Partie...
Acácio Oliveira
 
Security+ Lesson 01 Topic 07 - Risk Related Concepts.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 05 - Common Network Protocols.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 11 - Incident Response Concepts.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 12 - Security Related Awareness and Training.pptx
Acácio Oliveira
 
Security+ Lesson 01 Topic 17 - Types of Malware.pptx
Acácio Oliveira
 
Ad

Recently uploaded (20)

PDF
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PDF
Market Insight : ETH Dominance Returns
CIFDAQ
 
PPTX
Simple and concise overview about Quantum computing..pptx
mughal641
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PDF
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
PDF
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
PDF
TrustArc Webinar - Navigating Data Privacy in LATAM: Laws, Trends, and Compli...
TrustArc
 
PPTX
Agile Chennai 18-19 July 2025 | Workshop - Enhancing Agile Collaboration with...
AgileNetwork
 
PPTX
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
PDF
Researching The Best Chat SDK Providers in 2025
Ray Fields
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PPTX
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Google I/O Extended 2025 Baku - all ppts
HusseinMalikMammadli
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Structs to JSON: How Go Powers REST APIs
Emily Achieng
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
Market Insight : ETH Dominance Returns
CIFDAQ
 
Simple and concise overview about Quantum computing..pptx
mughal641
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Data_Analytics_vs_Data_Science_vs_BI_by_CA_Suvidha_Chaplot.pdf
CA Suvidha Chaplot
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Make GenAI investments go further with the Dell AI Factory
Principled Technologies
 
How Open Source Changed My Career by abdelrahman ismail
a0m0rajab1
 
TrustArc Webinar - Navigating Data Privacy in LATAM: Laws, Trends, and Compli...
TrustArc
 
Agile Chennai 18-19 July 2025 | Workshop - Enhancing Agile Collaboration with...
AgileNetwork
 
AI in Daily Life: How Artificial Intelligence Helps Us Every Day
vanshrpatil7
 
Researching The Best Chat SDK Providers in 2025
Ray Fields
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
IT Runs Better with ThousandEyes AI-driven Assurance
ThousandEyes
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 

101 3.5 create, monitor and kill processes v2