18%
31.07.2013
Code Example
1 #include
2
3 /* Our structure */
4 struct rec
5 {
6 int x,y,z;
7 float value;
8 };
9
10 int main()
11 {
12 int counter;
13 struct rec my
18%
09.08.2015
quotes ('). The short shell script in Listing 3 shows how to handle variables by searching through the sample file and outputting the matching lines. Figure 22 shows the result.
Listing 3
search
18%
31.10.2025
, 50GB of memory, and a 1Gb NIC. However, the CPU must be a 64-bit system with a mandatory virtualization extension: either AMD-V or Intel VT.
In contrast to RHEV 2.2, RHEV 3 is no longer based on RHEL ... Version 3.1 of the oVirt management platform for virtual infrastructures has recently become available. On Fedora 17, the new release is easy to install and deploy. ... oVirt 3.1 ... Managing virtual infrastructures with oVirt 3.1
18%
16.07.2019
is spent compiling the function. Recall that the first pass through the code compiles it. Subsequent passes do not:
CPU times: user 72.3 ms, sys: 8 µs, total: 72.3 ms
Wall time: 72 ms
Notice that the run
18%
02.06.2020
6836191232 sde
8 48 6836191232 sdd
8 80 6836191232 sdf
Make sure to load the ZFS modules,
$ sudo modprobe zfs
and verify that they are loaded:
$ lsmod|grep zfs
zfs 3039232 3
18%
14.03.2013
well. Of the available clients, PJSUA [3] turns out to be the best choice. PJSUA is the PJSIP reference implementation, and it comprises a function library for SIP, RTP, STUN, and some other Vo
18%
07.10.2014
to its GPRS and 3G customers, this approach opened up our servers to many more IP addresses than in our old system, with its 10 or 20 authorized IP addresses at the company offices and at the homes
18%
12.09.2013
17 %description
18 Custom SELinux policy module.
19
20 %prep
21 if [ ! -d custom-selinux-policy ]; then
22 mkdir custom-selinux-policy
23 fi
24 cp -p %{SOURCE0} %{SOURCE1} %{SOURCE2} custom
18%
30.11.2025
gas prices. The company announced its VMware Ready Desktop Solutions program on June 22. Ready Desktop Solutions is a validation program for "desktop virtualization solution architectures" provided
18%
30.11.2025
the smoke and mirrors that some pieces of software employ to keep their workings secret, fail2ban is transparent in the work it does behind the scenes.
In simple terms, fail2ban [3] keeps a close eye on your