26%
09.10.2023
identifier: 0x8c344631
Device Boot Start End Sectors Size Id Type
/dev/nvme1n1p1 2048 2000408575 2000406528 953.9G 83 Linux
Disk /dev/nvme0n1: 476.94 GiB, 512110190592 bytes
26%
17.06.2017
of the array), has to be specified. The following are simple examples of a declaration
INTEGER, TARGET :: a(3), b(6), c(9)INTEGER, DIMENSION(:),POINTER :: pt2
and multidimensional arrays:
INTEGER, POINTER
26%
05.12.2019
).
Figure 1: Flattening a 2D array in C or C++.
Listing 3
inspect.c
#include
**
int a[4][5] = { // array of 4 arrays of 5 ints each, a 4x5 matrix
{ 1, 2, 3
26%
11.05.2021
, 32, 64, 128, 256, 512, 1024, 2048, 4096, 8192]
A = single( rand(N,N) );
B = single( rand(N,N) );
start = clock();
C = A*B;
elapsedTime = etime(clock(), start);
gFlops = 2*N*N*N / (elapsedTime * 1e+9);
disp(sprintf("N = %4d
25%
29.10.2013
Created Auto Scaling group
policy named:
arn:aws:autoscaling:eu-west-1:894012917938:scalingPolicy:
927c9769-d96e-46ba-b08f-099650ae7a3d:autoScalingGroupName/awseb-
e-mnpsy5bpzk
25%
20.10.2016
), has to be specified. Here is a simple example of the declaration:
INTEGER, TARGET :: a(3), b(6), c(9)
INTEGER, DIMENSION(:), POINTER :: pt2
Another quick example of multidimension arrays
25%
25.03.2021
.io/hostname: "node2"
dataRaidGroups:
- blockDevices:
- blockDeviceName: "blockdevice-3f4e3fea1ee6b86ca85d2cde0f132007"
- blockDeviceName: "blockdevice-db84a74a39c0a1902fced6663652118e
25%
25.09.2023
guest
82a84,88
>
> tee /etc/.htpasswd <<'EOF'
> guest:$apr1$gz4n7s6o$P.O/V1k9rZuV9nN/5lh3l0
> admin:$apr1$esczj7wu$ffu/6j8vETMAMJaVTKn7a1
> EOF
Monit is configured to load service
25%
27.07.2020
Numerous Ubuntu installations have been subject to two particular vulnerabilities (CVE-2019-20908 and CVE-2020-15780) that could allow an attacker to bypass Secure Boot restrictions and execute
25%
05.04.2021
of speculative execution attacks such as Spectre. In conjunction with Meltdown, Spector can be used, via side-channel attacks, to exploit flaws in most modern Intel and AMD CPUs to leak data from memory.
CVE-2020