21%
18.07.2013
CeBIT's focus on the "Cloud" in 2011 prompted many cloud providers to launch new business models, and new cloud products in particular sprouted like mushrooms in 2012. This year, the use of cloud ... Red Hat massively expanded its cloud portfolio during 2012. This overview can help you evaluate Red Hat's products in the context of VMware and others.
16%
03.02.2014
the purchase Motorola's Mobile Device Division in 2011 and completed the purchase in 2012. At the time, experts speculated that the real prize was Motorola's 17,000 patents, which Google would need
16%
21.08.2012
6 ### 8/5/2012
7
8 ### Set the job name
9 #PBS -N mpi_pi_fortran90
10
11 ### Run in the queue named “batch”
12 #PBS -q batch
13
14 ### Specify the number of cpus for your job. This example
15%
06.08.2012
-07-28 19:06 .bash_history
-rw-r--r-- 1 khess khess 220 2012-05-25 22:11 .bash_logout
-rw-r--r-- 1 khess khess 2940 2012-05-25 22:11 .bashrc
To show files in date-sorted order, try the following commands
15%
12.09.2013
Companies that want to integrate their users' smartphones into their existing infrastructure can do so with various Microsoft products. One example is System Center Configuration Manager (SCCM) 2012
15%
20.02.2012
.51, 0, 0.36, 17.74, 0.00, 6.38, 90, 0
2012-01-09 21:10:00, 92, 4.42, 0, 0.35, 20.81, 0.00, 7.22, 100, 0
2012-01-09 21
15%
30.11.2020
since version 2007, which is the basic prerequisite for using the corresponding API. In addition, you need the Exchange Web Services Managed API 2.2 [1].
If you only use Exchange locally, the EWS API
15%
30.01.2024
Dell Precision Workstation T7910
Power
1,300W
CPU
2x Intel Xeon Gold E5-2699 V4, 22 cores, 2.4GHz, 55MB of cache, LGA 2011-3
GPU, NPU
n/a*
Memory
15%
15.04.2013
standard. In October of 2012, the winner was chosen: the Keccak algorithm, which was developed by a team of Belgian scientists. This is the second competition of this type: The symmetrical encryption
15%
14.03.2013
standard. In October of 2012, the winner was chosen: the Keccak [2] algorithm, which was developed by a team of Belgian scientists. This is the second competition of this type: The symmetrical encryption