22%
10.04.2015
Qualys SSL-Test A+
Qualys SSL-Test A
Syss GmbH
Audits [2]
TLS 1.2
Yes
Yes
Yes
Yes
HTTPS/HSTS
Yes
Yes
Yes
Yes
22%
16.05.2013
,1000);
06
07 // Set host data on the Device (GPU)
08 dA = gpuSetData(A);
09 dC = gpuSetData(C);
10
11 d1 = gpuMult(A,B);
12 d2 = gpuMult(dA,dC);
13 d3 = gpuMult(d1,d2);
14 result = gpuGetData(d3); // Get
22%
25.03.2020
"RevisionId": "aa63-b5c0-4ec2-a5e99",
11 "MemorySize": 128,
12 "Version": "$LATEST",
13 "Role": "arn:aws:iam::XXXXX:role/bashFunctionRole",
14 "Timeout": 3,
15 "Runtime": "provided",
16
22%
14.03.2013
is a classic bug in a web application: an SQL injection vulnerability. SQL injection, which has been known for around 12 years, is still one of the hacker's most popular tools.
This article presents real
22%
19.02.2013
OSPF
01 !
02 hostname linuxrouter
03 password 8 7kdoaul4.iSTg
04 enable password 8 ZDF339a.20a3E
05 log file /var/log/quagga/zebra.log
06 service password-encryption
07 !
08 interface eth0
09 multicast
22%
17.12.2014
to see what might be causing the load.
Figure 8: Disk stats and top processes.
One last option I want to cover is n
, for network stats. Figure 9
22%
07.03.2019
acc parallel loop
{
for (j=0; j < m; j++) {
...
}
}
...
}
}
Table 3: Single-Directive Nested Loop
Fortran
C
!$acc parallel loop
do i=1,n
...
do
22%
05.02.2019
if z(i) depends on a previous value, as in the following:
do i = 2,n
z(i) = z(i-1)*2
enddo
As written, you can't generally parallelize the loop because of data dependency [4]. This dependency
22%
11.02.2016
+----------------------------------+---------+---------------------+
40 | 47e0142a3638fdc24fe40d4e4fbce3f1 | Row 1 | 2015-09-13 15:24:12 |
41 | b833c1e4c5bfc47d0dbe31c2e3f30837 | Row 3 | 2015-09-13 15:24:14 |
42 | c7d46523a316de4e1496c65c3cbdf358 | Row 2 | 2015
22%
18.03.2013
is a classic bug in a web application: an SQL injection vulnerability. SQL injection, which has been known for around 12 years, is still one of the hacker’s most popular tools.
This article presents real