18%
11.10.2016
modules that fit the sockets for DDR4 SDRAM DIMMs. However, motherboards need a BIOS that supports the modules. JEDEC envisages two approaches: NVDIMM-N backs up the content of its DRAM in case of a power
18%
09.08.2015
to form a page (e.g., 8KB). Several pages then form a block (~2MB).
At this level, the first peculiarity of flash memory already comes to light: Whereas new data can be written to unused pages, subsequent
18%
23.08.2017
03736 bash
zap@03736c2a2088:/zap$ x11vnc --forever --usepw --create
Enter VNC password:
Verify password:
Write password to /home/zap//.vnc/passwd? [y]/n y
Password written to: /home
18%
05.11.2018
One way to share HPC systems among several users is to use a software tool called a resource manager. Slurm, probably the most common job scheduler in use today, is open source, scalable, and easy ... . The first configuration file is slurm.conf
(Listing 1).
Listing 1: slurm.conf
01 #
02 # Example slurm.conf file. Please run configurator.html
03 # (in doc/html) to build a configuration file customized
04 ...
One way to share HPC systems among several users is to use a software tool called a resource manager. Slurm, probably the most common job scheduler in use today, is open source, scalable, and easy
18%
14.11.2013
of an uncorrectable error by factors of 9-400.
Uncorrectable errors following a correctable error are still small at 0.1%-2.3% per year.
+ The incidence of correctable errors increases with age
18%
17.02.2015
/smtp[14944]: \
Verified TLS connection established to dane.sys4.de[194.126.158.134]:25: \
TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)
The admin should set the smtp
18%
13.12.2018
.
Listing 2
sinfo
$ sinfo -s
PARTITION AVAIL TIMELIMIT NODES(A/I/O/T) NODELIST
p100 up infinite 4/9/3/16 node[212-213,215-218,220-229]
sbatch
To submit a batch serial
18%
01.08.2019
OS virtual machine (VM). Photon OS [6] is a specialized small Linux built for Docker, Kubernetes, and security.
A Photon VM is about 150MB on disk: Photon runs on VMware, as well as Amazon and Azure
18%
28.11.2021
can use to test security vulnerabilities, enumerate networks, execute attacks, and evade detection" [1], has been written up in a number of books. Linux Magazine
reported more than 12 years ago [2
18%
11.04.2016
toolkit for joomla
UrlToolkit {
ToolkitID = joomla
Match base64_encode[^(]*\([^)]*\) DenyAccess
Match (<|%3C)([^s]*s)+cript.*(>|%3E) DenyAccess
Match GLOBALS(=|\[|\%[0-9A-Z]{0,2}) Deny