14%
17.01.2023
modified mine to keep it really simple:
server 2.rocky.pool.ntp.org
driftfile /var/lib/chrony/drift
makestep 1.0 3
rtcsync
allow 10.0.0.0/8
local stratum 10
keyfile /etc/chrony.keys
leapsectz
14%
21.08.2014
the situation without investing in expensive mobile device management software.
In this article, we show how you can use tools from the Android SDK [3] to retrieve information about the state of the device. You
14%
14.08.2017
to compress data files. Listing 1 shows a quick example illustrating the change in file size.
Listing 1
Gzip Example
$ ls -lsah FS_scan.csv
3.2M -rw-r--r-- 1 laytonjb laytonjb 3.2M 2014-06-09 20
14%
10.06.2015
need a recent Apache installation, including MySQL Database Server 5.x, PHP 5.3 or higher, and the MySQLi extension. It is also possible to implement it on the Microsoft Internet Information Server (IIS
14%
13.06.2016
information [2].
You can use Let's Encrypt for any website regardless of the web server. For my home-grown sites, I use one ESXI VMware server and deploy pre-installed virtual machines using TurnKey Linux [3
14%
30.01.2020
without profiling).
Listing 3
pprofile Output
Command line: md_002.py
Total duration: 1662.48s
File: md_002.py
File duration: 1661.74s (99.96%)
Line #| Hits| Time| Time per hit
14%
06.10.2019
Stax Insights [3]. The former enables flexible scalability in Cassandra clusters and consumption-based billing supported by the stability and performance enhancements of DataStax Enterprise, which monitors
14%
09.12.2019
in execution time by about a factor of 10 (i.e., it ran 10 times slower than without profiling).
Listing 3: pprofile
Output
Command line: md_002.py
Total duration: 1662.48s
File: md_002.py
File duration: 1661
14%
13.12.2022
/11/05 08:56:13 info unpack layer: sha256:1a930d163dcafa193dc2c3c005d9c220ae1c07a48cad5f7feed0066ada0b998f
2022/11/05 08:56:15 info unpack layer: sha256:d3ca234f568b088b991388a0e9e8b61b05ac8627522f10fe16df2b81d51c0748
14%
14.03.2013
-to-router tunnel connects an IPv6/IPv4 node on an IPv4-only network with an IPv6/IPv4 router (Figure 3). To do this, the host uses a tunnel interface and appropriate routing entries (e.g., in the form of the default