14%
30.01.2020
| 12724500| 46.7333| 3.6727e-06| 3.09%| d = 0.0
155| 50898000| 195.426| 3.83956e-06| 12.94%| for k in range(0, d_num):
156| 38173500| 165.494| 4.33531e
14%
05.12.2016
back to sleep.
Listing 2
nginx_repl.yaml
01 apiVersion: v1
02 kind: ReplicationController
03 metadata:
04 name: nginx
05 spec:
06 replicas: 3
07 selector:
08 app: nginx
09
14%
14.08.2017
such as containers. In native cloud environments, Prometheus [3], with its time series database approach, has therefore blossomed into an indispensable tool. The software is related to the Kubernetes [4] container
14%
18.07.2013
=> installed
04 }
05 file { "/etc/update-motd.d/10-mymotd":
06 ensure => "present",
07 source => "puppet:///modules/mypuppets/misc/10-mymotd",
08 owner => 'root',
09 group => 'root',
10
14%
29.09.2020
at the blog [3] reveals that new versions of Cockpit are released approximately every two weeks.
In an article from 2015 [4], ADMIN
looked into the topic of managing Linux servers with Cockpit; since then
14%
04.04.2023
(NIST) National Vulnerability [2] or the Aqua Vulnerability [3] database.
Figure 1: An image scan with Trivy generates a long list of vulnerabilities
14%
14.03.2013
details as well [3]. The files in the Linux /proc directory also have a pleasingly hackable penchant for being directly readable as plain text, as opposed to more binary-centric proc implementations
14%
30.01.2020
of email addresses:
^[a-zA-Z0-9.!#$%&'*+/=?^_`{|}~-]+@[a-zA-Z0-9-]+(\.[a-zA-Z0-9-]+)*$
When you see a string like this for the first time, the semantics are not immediately apparent, but regular
14%
03.02.2022
,32
1,33
2,34
3,35
4,36
5,37
6,38
7,39
8,40
9,41
10,42
11,43
12,44
13,45
14,46
15,47
16,48
17,49
18,50
19,51
20,52
21,53
22,54
23,55
24,56
25,57
26,58
27,59
28,60
29,61
30,62
31,63
The lstopo tool
14%
12.05.2020
.04"
],
"RepoDigests": [
"nvidia/cuda@sha256:3cb86d1437161ef6998c4a681f2ca4150368946cc8e09c5e5178e3598110539f"
],
"Parent": "",
"Comment": "",
"Created": "2019-11-27T20