31%
07.11.2011
#pragma omp parallel for shared (sum) private (i)
12 for ( i=0; i < 1000000; i++) {
13 #pragma omp critical (sum_total)
14 sum = sum + a[i];
15 }
16 printf("sum=%lf\n",sum);
17
31%
10.11.2021
. As the level of compression increases, the amount of time to perform the compression increases and the amount of memory used increases. Compress level -6
is the default and is a reasonable trade-off between
31%
04.11.2011
on enterprise-grade rack hardware, there is no reason one cannot follow along at home with a few beige boxes and an 10Mb hub, as long as the servers are capable of booting from the network with PXE [6]. PXE
31%
17.01.2023
is working, boot the compute node and run timedatectl
:
$ ssh n0001
[laytonjb@n0001 ~]$ timedatectl
Local time: Sat 2022-12-17 11:31:26 EST
Universal time: Sat 2022-12
31%
04.04.2023
timedatectl
$ ssh n0001
[laytonjb@n0001 ~]$ timedatectl
Local time: Sat 2022-12-17 11:31:26 EST
Universal time: Sat 2022-12-17 16:31:26 UTC
RTC time: Sat 2022-12
31%
12.05.2021
.
Listing 6: iostat
Output
$ iostat -x -d 2 -c
Linux 5.4.12-050412-generic (dev-machine) 03/14/2021 _x86_64_ (4 CPU)
avg-cpu: %user %nice %system %iowait %steal %idle
0.79 0
31%
02.08.2021
%util
sda 10.91 6.97 768.20 584.64 4.87 18.20 30.85 72.31 13.16 20.40 0.26 70.44 83.89 1.97 3.52
nvme0n1 58.80 12.22 17720.47 48.71 230
31%
22.12.2017
impacted platforms at risk. Systems using ME Firmware versions 11.0/11.5/11.6/11.7/11.10/11.20, SPS Firmware version 4.0, and TXE version 3.0 are impacted."
The affected products include the sixth, seventh
31%
09.08.2015
resources = Resources(cpu = 0.1, ram = 20*MB, disk = 20*MB),
09 processes = [hello_world_process])
10
11 hello_world_job = Job(
12 cluster = 'test',
13 role = os.getenv('USER'),
14 task = hello
31%
06.10.2019
account for the majority of IT security vulnerabilities today, and both can be easily avoided: buffer overflows with n functions (e.g., strncpy() instead of strcpy()) and SQL injections with prepared