16%
16.05.2013
rates are unquestionably impressive. Thanks to the cache, at least five clients can read around 100MBps from the iSCSI targets, resulting in an aggregated read rate of 500MBps; without the accelerator
16%
28.06.2011
). The exact syntax and other examples of applications are discussed at [12]. Additionally, OpenVZ can create what it refers to as checkpoints (snapshots) of VEs: A checkpoint freezes the current state of the VE
16%
17.05.2017
, 5 ) / ( 8, 5 ) }
DATA {
(0,0): 0, 1, 2, 3, 4,
(1,0): 5, 6, 7, 8, 9,
(2,0): 10, 11, 12, 13, 14,
(3,0): 15, 16, 17, 18, 19,
(4,0): 20, 21, 22, 23, 24,
(5,0): 25, 26, 27, 28, 29,
(6
16%
06.10.2022
shows some function call examples.
Listing 1
Example Function Calls
# Rounding up
# 11
round(10.9)
# Generate an array of numbers
# [9, 8, 7, 6, 5, 4, 3, 2, 1]
numbers.range(9, 1
16%
09.01.2013
running Node.js
6) 64bit Amazon Linux running Node.js
...
Don't create an RDS instance this time, so type n
for that option; however, notice how easy launching a whole DB-backed application would
16%
05.12.2019
. Whereas video CDs usually have a capacity of around 700MB, video DVDs that follow the DVD-18 standard can store around 17GB. The significantly higher storage capacity not only makes it possible to offer
16%
09.01.2013
of virtual machines, and industrial customers include Telefonica and Akamai. The main developer from C12G Labs offers commercial support and is currently establishing an international network of partners [6
16%
05.12.2014
1Gbit Ethernet
Power Supplies
External, In: 100-240 V/50-60 Hz; Out: 12 V/5 A
External, In: 100-240 V/50-60 Hz; Out: 12 V/6 A
Internal
External, In: 100-240 V/50
16%
07.06.2019
_HOME=/ephemeral/jenkins
10
11 # for main web interface:
12 EXPOSE ${HTTP_PORT}
13
14 ENV JENKINS_HOME=${JENKINS_HOME}
15 ENV CASC_JENKINS_CONFIG=/jcasc_config
16
17 COPY jcasc_config/* ${CASC_JENKINS_CONFIG}/
18
19 RUN mkdir
16%
16.08.2018
1.2 depends on lazy page table entry (PTE) enforcement, the same mechanism on which the Meltdown flaw exploitation relies.
Spectre is not a single vulnerability; it's a class or family of flaws