20%
05.12.2016
'^$' | sort -n | uniq -c | awk '$1 >= '${BLOCK_PREFIX_THRESHOLD}' {print $2" "$3}'`
174
175 # echo "${PREFIXES}"
176 for P in $( echo "${PREFIXES}" | awk '{print $2}' ); do
177 DEL_IPS=`echo "${QUERY
20%
02.02.2021
it was successful and will receive a reward.
Figure 3: The reinforcement learning approach: An agent (A) interacts with the environment (U), performing actions
20%
25.09.2013
a(i) = b(i) + c(i)
24
1
TRIAD
a(i) = b(i) + q*c(i)
24
2
The Copy
benchmark measures the transfer rate in the absence of arithmetic. This should
20%
22.08.2011
:lanman passfile.txt
Loaded 2 passwords with 2 different salts (FreeBSD MD5 [32/64])
guesses: 0 time: 1:04:04:08 (3) c/s: 10927 trying: gmugoky - gmugok2
guesses: 0 time: 1:09:25:10 (3) c/s: 10929 trying
20%
11.10.2016
network operating system in cooperation with Accton Technology Corporation, Arista, Broadcom, Intel, and VMware. The series of Altoline switches [3] by HP Enterprise (HPE), as the group is now called, were
20%
18.02.2018
.site_container}",
17 ]
18 connection {
19 type = "ssh"
20 user = "root"
21 private_key = "${file("${var.ssh_priv_key}")}"
22 }
23 }
24 }
25 output "IP" {
26 value
20%
17.02.2015
/json;charset=utf-8\n\r\n\r%s" %json.dumps(obj)
Lines 9 through 18 iterate against all entries of a database cursor, which the call to the find() method in line 9, generates from the queried data collection ... 25
20%
03.04.2024
64ae120c27e504088d8c2ce29a0fa7f85c
The example code in Listing 2 uses Python to demonstrate how to use the API to retrieve user information. To begin, import the Python Requests API and define the URL
20%
16.08.2018
| swift | object-store |
| aef9ec430ac2403f88477afed1880697 | aodh | alarming |
| b0d402a9ed0c4c54ae9d949e32e8527f | neutron | network |
| b3d1ed21ca384878b5821074c4e0fafe
20%
14.03.2013
paper [2] entitled "Processes as Files." Cross-pollinated through the later Bell Labs Plan 9 implementation, Linux's version is original in exposing not just process information, but a wealth of system