52%
09.04.2019
in mv
ubuntu@aws:~/slow-mv$ strace -t mv 3GB.copy 3GB
19:00:09 execve("/bin/mv", ["mv", "3GB.copy", "3GB"], 0x7ffd0e7dddf8 /* 21 vars */) = 0
19:00:09 brk(NULL) = 0x55cd7d1ce000
51%
09.12.2019
, it already has several functions. To better illustrate profiling the code, I converted it to simple serial code and called it md_00
1
.py
(Listing 5). Then, I profiled the code with cProfile:
$ python3 -m c
49%
11.02.2016
B/s wkB/s avgrq-sz avgqu-sz await r_await w_await svctm %util
sda 2.00 8.00 2.00 9500.00 16.00 151948.00 31.99 1.07 0.11 4.00 0.11 0.09 88.40
If your read or write
48%
22.06.2012
3600
0-01:00:00
5
6400
0-01:46:40
6
10000
0-02:46:40
7
14400
0-04:00:00
8
19600
0-05:26:40
9
25600
48%
18.06.2014
.29
14.2
14–28
8,768
2.26
16.49
28–56
25,377
6.54
23.03
56–112
8,101
2.09
25.12
112–168
47,729
12
47%
21.11.2012
) :: start_time, end_time
018 INTEGER :: m, iter = 0
019 INTEGER i, j
020 REAL( kind = 8 ) seconds, seconds2, elapsed_time
021 PUBLIC
022
023 CONTAINS
024 SUBROUTINE wtime(wtime2)
025
026
46%
11.10.2016
.0 and 1.3 (the variants mainly supported by providers), NETCONF [7], and the Open vSwitch Database (OVSDB) management protocol [8] for device configuration.
As Figure 1 shows, ONOS is constructed from
45%
05.12.2014
/bro/bin/bro-cut -d
2014-10-30T03:00:29-0500 192.168.1.2 67 udp DHCP
2014-10-30T03:12:12-0500 192.168.1.2 80 tcp HTTP
2014-10-30T03:14:29-0500 192.168.1.2 53 tcp HTTP
According to Listing 8
44%
21.08.2012
.6 M
Is this ok [y/N]: y
Downloading Packages:
(1/5): apr-1.3.9-3.el6_1.2.i686.rpm | 128 kB 00:00
(2/5): expat-2.0.1-11.el6_2.i686.rpm
43%
05.09.2011
can see how the arp cache poisoning works:
$ sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 \
-D 192.168.1.133 -h 00:22:6E:71:04:BB -m 00:0C:29:B2:78:9E \
-H 00:22:6E:71:04:BB -M 00:0C:29:B2:78:9E