47%
10.10.2012
tmp DISPATCH_WINDOW # Keywords
test1 0 () () () () () ()
n0001 3 () () () () () ()
default
47%
30.11.2025
defective disks (Listing 3).
Listing 3
Reading a Partially Defective Disk
01 dd_rescue -A /dev/sdb sdb.img
02
03 dd_rescue: (info): ipos: 1667072.0k, opos: 1667072.0k, xferd: 1667072.0k
47%
30.11.2025
example, Mar 25, 2011, PrivateKeyEntry,
33 Certificate fingerprint (MD5): AC:D5:CB:5C:13:9D:EF:F2:85:6B:AB:89:49:F8:48:3A
Finally, to enable the web connector's HTTPS port, you need to add
47%
02.02.2021
// ---- previously --------
02 if ($user !== null) {
03 $a = $user->address;
04
05 if ($a !== null) {
06 $b = $user->getBirthday();
07
08 if ($b !== null) {
09 $bday = $b->asString();
10 }
11
47%
14.11.2013
and 256MB of RAM, so the suggested machine type, m1.small
is sufficient (Figure 9). You can keep the defaults for the other settings. Continue by pressing Next: Select security
47%
03.01.2013
data on the Device (GPU)
dA = gpuSetData(A);
dC = gpuSetData(C);
d1 = gpuMult(A,B);
d2 = gpuMult(dA,dC);
d3 = gpuMult(d1,d2);
result = gpuGetData(d3); // Get result on host
// Free device memory
dA
47%
23.08.2017
03736 bash
zap@03736c2a2088:/zap$ x11vnc --forever --usepw --create
Enter VNC password:
Verify password:
Write password to /home/zap//.vnc/passwd? [y]/n y
Password written to: /home
47%
16.05.2013
,1000);
06
07 // Set host data on the Device (GPU)
08 dA = gpuSetData(A);
09 dC = gpuSetData(C);
10
11 d1 = gpuMult(A,B);
12 d2 = gpuMult(dA,dC);
13 d3 = gpuMult(d1,d2);
14 result = gpuGetData(d3); // Get
47%
05.02.2019
but independently of one another (Figure 2).
Table 3
Gang Execution
Fortran
C
!$acc parallel do i=1,n ! do something enddo!$acc end parallel
pragma acc parallel{ for (int i=0; i
47%
14.03.2013
and password, are added to the database query. This approach works in theory, but imagine an attacker changing the query like this:
Password = ' OR 'a' = 'a'
The query to the database is now:
SELECT * FROM