11%
07.10.2014
/test
[zk: localhost:2181(CONNECTED) 11] get /test
HelloWorld!
cZxid = 0xa1f54
ctime = Sun Jul 20 15:22:57 CEST 2014
mZxid = 0xa1f54
mtime = Sun Jul 20 15:22:57 CEST 2014
pZxid = 0xa1f54
cversion = 0
11%
30.05.2021
Puppet is the Methuselah among solutions for configuration management, matured for a proud 15 years and currently at version 7. In contrast to Ansible, Puppet takes a declarative approach (i.e
11%
19.09.2019
add_ufunc(x, y):
return x + y
The decorator line defines the data types (i.e., int64
here) and the target for the decorator cuda
. A simple test for the add_ufunc
Numba function is:
a = np.array([1, 2, 3, 4])
b
11%
20.06.2022
as such on Windows Server (e.g., servers with IP addresses 1.1.1.1 (Cloudflare) and 8.8.8.8 (Google)). In Windows Server 2022 and Windows 11 PowerShell, you can use the Get-DNSClientDohServerAddress cmdlet to view ... The release of Windows Server 2022 adds some new security features to its server operating system that might not be earth-shattering; however, you will find Secured-core, DNS over HTTPs, TLS 1
11%
13.06.2016
together; it is the product's technical foundation. Red Hat OpenShift, on the other hand, is the complete PaaS platform, of which Origin is the important component. In OpenShift, Origin acts as the control
11%
07.06.2019
# DHCP Server Configuration file.
# see /usr/share/doc/dhcp*/dhcpd.conf.example
# see dhcpd.conf(5) man page
#
subnet 10.14.2.0 netmask 255.255.255.0 {
option routers 10.14.2.1
11%
02.08.2022
does not make an IoT application; the hardware (Figure 2) also plays an important role.
Figure 2: Every IoT device (e.g., the smart lights by Philips
11%
25.09.2023
should see the pods running (Listing 14).
Listing 14
Viewing the Running Pods
NAME READY STATUS RESTARTS AGE
nginx-794866d4f-9p5q4 1/1 Running 0 13
11%
28.11.2023
-go in the default namespace. The service specification states that the helloworld-go image from docker.io (i.e., from Docker Hub) runs the service. The TARGET environment variable containing Go Sample v1 is also set
11%
02.08.2022
to IT security, the other phases (e.g., as described in NIST CSF and MITRE D3FEND) need to be in place. In addition to this indispensable protection, the ability to recover quickly also plays a central role