18%
02.08.2021
%util
sda 10.91 6.97 768.20 584.64 4.87 18.20 30.85 72.31 13.16 20.40 0.26 70.44 83.89 1.97 3.52
nvme0n1 58.80 12.22 17720.47 48.71 230
18%
22.12.2017
impacted platforms at risk. Systems using ME Firmware versions 11.0/11.5/11.6/11.7/11.10/11.20, SPS Firmware version 4.0, and TXE version 3.0 are impacted."
The affected products include the sixth, seventh
18%
06.10.2019
account for the majority of IT security vulnerabilities today, and both can be easily avoided: buffer overflows with n functions (e.g., strncpy() instead of strcpy()) and SQL injections with prepared
18%
09.08.2015
resources = Resources(cpu = 0.1, ram = 20*MB, disk = 20*MB),
09 processes = [hello_world_process])
10
11 hello_world_job = Job(
12 cluster = 'test',
13 role = os.getenv('USER'),
14 task = hello
18%
20.02.2023
the file /usr/local/bin/gpu_devices.sh
(Listing 6).
Listing 6: /usr/local/bin/gpu_devices.sh
#!/bin/bash
/sbin/modprobe nvidia
if [ "$?" -eq 0 ]; then
# Count the number of NVIDIA controllers found.
NVDEVS=`lspci | grep -i NVIDIA`
N3
18%
01.08.2012
=====================================================================================================================================
Install 1 Package(s)
Total download size: 297 k
Installed size: 908 k
Is this ok [y/N]: y
Downloading Packages:
libstdc++-4.4.6-3.el6.i686.rpm
18%
05.12.2014
: chris@linux.tld
[->] Subject: Picture yourself, on a boat, on a river
[->] User-Agent: Heirloom mailx 12.5 6/20/10
[->] MIME-Version: 1.0
[->] Content-Type: multipart/mixed;
boundary="=_546791b1.cwvb6n4
18%
17.02.2015
back to the browser as a response to the HTTP request.
Web Server
Using the instructions in Listing 1, the developer first prepares the Apache web server on Ubuntu 12.04 for running the sample
18%
14.11.2013
with the IP addresses 192.168.100.11 and 192.168.100.12. In the boot menu, select Install CentOS 6 with Eucalyptus Node Controller
. You can decline the offer to check the installation medium by pressing Skip
18%
28.07.2025
on the programming model and compiler in use, these optimizations are so well understood as to carry their own names.
Loopy
David Spuler's recent works [1][2] feature the taxonomy of loop manipulation strategies