17%
16.08.2018
: The top command on a Linux system.
15:28:23 up 1 day, 20:10, 3 users, load average: 0.10, 0.14, 0.13
The second line of the display lists the aggregate state of the system's processes – 205 in all
17%
28.11.2023
-existing-mysql -e MYSQL_ROOT_PASSWORD=my-secret-pw -d mysql:8.0
In this example, the environment variable MYSQL_ROOT_PASSWORD is set to your desired root password. The -d flag runs the container in detached mode
17%
27.08.2014
files in ext3/ext4 filesystems
Zipf theta - Estimate of Zipfian distribution theta
Ioprof is written in Perl and is fairly easy to run, but it has to be run as root (or with root privileges
17%
17.02.2015
an official File Checksum Integrity Verifier (FCIV) utility [9] from Microsoft, and dozens of open source tools are available. For Windows, I recommend the open source application WinHasher [10]. Next, write
17%
04.04.2023
should see the antsle configuration interface.
If you use Windows, this process stopped working properly in Windows 10, so you have two options: Either enter ip as root on the server and connect
17%
18.10.2017
, not the “shared” objects.
For example, the following simple Hello World program, called test1
, uses the PGI compilers (16.10). (Because all good HPC developers should be writing in Fortran, that’s what I use
17%
06.10.2019
are the root causes of breakdown-prone software. As early as 1972, scientists described the first, albeit theoretical, buffer overflow attack [1], and SQL injections [2] have been around since 1998. Both still
17%
27.09.2021
frameworks. In this article, Darshan, a widely accepted I/O characterization tool rooted in the HPC and MPI world, was used to examine the I/O pattern of TensorFlow running a simple model on the CIFAR-10
17%
07.10.2014
Sheepdog Server in Action
# ps -ef|egrep '([c]orosyn|[s]heep)'
root 491 1 0 13:04 ? 00:00:30 corosync
root 581 1 0 1:13 PM ? 00:00:03 sheep -p 7000 /var
17%
27.09.2024
specialized for particular kinds of work. London-based Security Roots is the developer of the open source Dradis [1] software for IT security teams. The framework creates standardized reports specifically