29%
02.02.2021
// ---- previously --------
02 if ($user !== null) {
03 $a = $user->address;
04
05 if ($a !== null) {
06 $b = $user->getBirthday();
07
08 if ($b !== null) {
09 $bday = $b->asString();
10 }
11
29%
03.01.2013
data on the Device (GPU)
dA = gpuSetData(A);
dC = gpuSetData(C);
d1 = gpuMult(A,B);
d2 = gpuMult(dA,dC);
d3 = gpuMult(d1,d2);
result = gpuGetData(d3); // Get result on host
// Free device memory
dA
29%
23.08.2017
03736 bash
zap@03736c2a2088:/zap$ x11vnc --forever --usepw --create
Enter VNC password:
Verify password:
Write password to /home/zap//.vnc/passwd? [y]/n y
Password written to: /home
29%
16.05.2013
,1000);
06
07 // Set host data on the Device (GPU)
08 dA = gpuSetData(A);
09 dC = gpuSetData(C);
10
11 d1 = gpuMult(A,B);
12 d2 = gpuMult(dA,dC);
13 d3 = gpuMult(d1,d2);
14 result = gpuGetData(d3); // Get
29%
05.02.2019
but independently of one another (Figure 2).
Table 3
Gang Execution
Fortran
C
!$acc parallel do i=1,n ! do something enddo!$acc end parallel
pragma acc parallel{ for (int i=0; i
29%
14.03.2013
and password, are added to the database query. This approach works in theory, but imagine an attacker changing the query like this:
Password = ' OR 'a' = 'a'
The query to the database is now:
SELECT * FROM
29%
07.04.2022
starwars.py
#!/usr/bin/env python3
**
import yaml
from yaml.loader import SafeLoader
**
with open('starwars.yaml') as f: sw = yaml.load(f, Loader=SafeLoader) print(yaml.dump(sw, indent=4, default
29%
02.03.2012
.8.8.8:300
@mydomainname.com::mydomainname.com:20:300
+mx3.mydomainname.com:9.9.9.9:300
@mydomainname.com::mx3.mydomainname.com:30:300
Although you have other ways to configure IP addresses, this way should illustrate how
29%
03.04.2024
.0.
The default meaning of UTF8 is different under MySQL 5.7 and MySQL 8.0. On MySQL 5.7, utf8 is interpreted as utf8mb3
, whereas under MySQL 8.0 it is utf8mb4
. Although utf8 and utf8mb3 are largely compatible
29%
05.12.2016
the filter rule
152 eval FOUND_IPS=\`${RULE}\`
153 IPS="${IPS}
154 ${FOUND_IPS}"
155 done
156
157 # Filter by IP address, incidence count, and use of the IP threshold
158 IPS=`echo "${IPS}" | grep -E '([0-9]{1,3}\.){3}[0-9]{1,3