24%
22.09.2016
that fit the sockets for DDR4 SDRAM DIMMs. However, motherboards need a BIOS that supports the modules. JEDEC envisages two approaches: NVDIMM-N backs up the content of its DRAM in case of a power outage
24%
11.10.2016
modules that fit the sockets for DDR4 SDRAM DIMMs. However, motherboards need a BIOS that supports the modules. JEDEC envisages two approaches: NVDIMM-N backs up the content of its DRAM in case of a power
24%
11.02.2016
document, to an advanced Knowledge Base, to personal customer support.
Our lab team looked at version 7.1 on a 64-bit machine. The ISO image weighed in around 800MB. Users who still have legacy 32-bit
24%
17.02.2015
translates into a huge address that it is undoubtedly out of the process address space. The following line computes this address using the GNU Project debugger (gdb):
(gdb) printf "0x%x\n",(j-i)+&vacf
0xd
24%
09.08.2015
to form a page (e.g., 8KB). Several pages then form a block (~2MB).
At this level, the first peculiarity of flash memory already comes to light: Whereas new data can be written to unused pages, subsequent
24%
11.06.2014
# replace: olcRootDN
07 dn: olcDatabase={2}bdb,cn=config
08 changetype: modify
09 replace: olcRootPW
10 olcRootPW: {SSHA}f0pv70XFFox5UqKc6A4Uy39NcxkqcJbc
11 -
12 replace: olcAccess
13 olcAccess: {0}to attrs
24%
28.11.2023
):
ssh-keygen -t ed25519 -a 100 -f
ubuntu-sre-id_ed25519 -q -N
2. Copy the SSH public key data on the target server to the authorized_keys file in the $HOME/.ssh directory. You can use the secure copy
24%
14.03.2013
(Accelerated Processing Unit) [4].
This processor combines a CPU with a GPU on a single chip. For example, the recently announced AMD A10-5800K has the following specifications:
4 cores at 3.8GHz (turbo
24%
05.12.2016
, such as the process layout below the Docker daemon.
With regard to separation of concerns, Systemd [8] acts as a centralized resource management instance and has been discussed by the rkt project [9]. The system
24%
05.12.2016
as the user name.
Amanda versions before 3.3.9 have a vulnerability that lets this user execute arbitrary code with root privileges. A (manual) upgrade to version 3.3.9 is only necessary if you don't trust