28%
27.02.2012
(pseudocode):
method Reduce(target,counts[c1,c2,...])
sum <- 0
for all c in counts[c1,c2,...] do
sum <- sum + c
end
emit(target,sum)
end
If you take a look at the schematic, you quickly see
28%
04.06.2014
– in this example:
virsh secret-set-value 2a5b08e4-3dca-4ff9-9a1d-40389758d081 AQA5jhZRwGPhBBAAa3t78yY/0+1QB5Z/9iFK2Q==
Listing 4: ceph-secret.xml
01
02 2a5b08e4-3dca
28%
15.10.2013
for vSphere. Companies can also securely extend Layer 2/Layer 3 networks existing in their own data center to vCloud Hybrid Services via VPN. For this, you need the same management tools and network
28%
25.11.2012
to experiment can simply copy the tool to a computer of their choice and convert the image there. The
vmss2core -N6 .vmss
command generates the kernel dump (Listing 3). During testing, this conversion
28%
24.06.2013
.conf
) by editing /etc/powerdns/recursor.conf
. For brevity’s sake, I only include the configuration variables I have changed herein.
allow-from=192.168.1.0/24
#The 'allow-from' address specifies the network address
28%
16.04.2013
unicast address. The home agent means that the MN is accessible everywhere via its home address (Figure 2).
Figure 2: Mobile IPv6 terminology.
The MN
28%
30.04.2013
into a ZIP archive:
zip Ubuntu12041.zip /boot/System.map-3.2.0-29-generic module.dwarf
This kernel profile should then be moved to the volatility/plugins/overlays/linux/
directory. The analysis feature
28%
22.08.2011
.keys.sort.each do |s|
14 printf "%20s %d\n", s, summary[s]
15 end
16 puts "Polling for changes (Ctrl-C to end)"
17 loop do
18 sleep 2
19 client.instances.each do |inst|
20 if state[inst.id] != inst.state
21
28%
12.03.2015
time: 5.245 seconds
iter 1
iter 5
iter 10
iter 15
iter 20
Benchmark completed
VERIFICATION SUCCESSFUL
L2 Norm is 0.5706732285739E-06
Error is 0.1345119360807E-12
MG
28%
10.10.2022
.logp
gpu-manager-switch.log
boot.log
kern.log
dmesg
syslog
dpkg.log
Xorg.0.log
dpkg.log
These logs typically have a more or less