8%
23.03.2016
7
):
$ ls -s /sys/devices/system/edac/mc/mc0
total 0
0 ce_count 0 csrow1 0 csrow4 0 csrow7 0 reset_counters 0 size_mb
0 ce_noinfo_count 0 csrow2 0 csrow5 0 device 0 sdram
8%
15.04.2020
around the GIL is to run computationally intensive code outside of Python with tools such as Cython and ctypes. You can even use F2PY with compiled C functions.
All of the previously mentioned tools
8%
10.06.2015
display, it only offers 16:10 resolutions via the data display channel (DDC) interface [2]. In addition to its native 16:9 resolution, the laptop display also supports a number of lower resolutions
8%
04.10.2018
that can be users or groups, as well as, theoretically, other object types. The functional principle is described in Microsoft Docs [2]. Dynamic objects have a lifetime (entryTTL) measured in seconds. After
8%
30.11.2020
extension on the desktop [2], and DAVx5 [3] and Etar [4] on the Android device. I did not test the Nextcloud alternative ownCloud [5], but calendar sharing may also work with ownCloud due to its similarity
8%
11.06.2014
, rerouting work to maintain high availability when a system goes down. Pacemaker has come a long way since the release of its predecessor, Heartbeat 2 – an unfriendly and unstable tool that was only manageable
8%
07.10.2014
see the lines shown in Listing 2 indicating that the reload was a success and completed without errors.
Listing 2
/var/log/auth.log
Aug 19 18:10:43 localhost sshd[3328]: Received SIGHUP
8%
14.08.2017
's postgresql.conf file, set the synchronous_standby_names option; for example,
synchronous_standby_names = node1, node2, node3
and add the following to the primary_conninfo section of the recovery.conf file
8%
02.08.2022
of options for patch orchestration in the Guest OS updates section (e.g., Automatic by OS (Windows Automatic Updates)
). However, this only works for selected operating systems (i.e., Windows Server 2008 R2 SP
8%
22.05.2023
is that companies need to invest more in their email security; in particular, protection against phishing attacks need significant improvement. This is where phishing penetration testing comes in: Gophish [2