14%
13.06.2016
/run/systemd/resolve/resolv.conf /etc/resolv.conf
mkdir /etc/systemd/network
Listings 2 and 3 show the two configuration files for the regular Ethernet card (Listing 2) and bridge device (Listing 3
14%
14.09.2021
$(find /sys/devices/system/cpu -regex ".*cpu[0-9]+/topology/thread_siblings_list") | sort -n | uniq
0,32
1,33
2,34
3,35
4,36
5,37
6,38
7,39
8,40
9,41
10,42
11,43
12,44
13,45
14,46
15,47
16,48
17,49
18,50
19,51
20,52
21,53
22,54
23,55
24,56
25
14%
26.01.2025
the binary media data as text. Among the myriad ways to do this, the standard in browsers is Base64 encoding [22], provided in Julia by the IBase64
package.
Listing 4 shows the server program from Listing 3
14%
01.08.2019
exists, renaming the old one with ID sha256: f09fe80eb0e75e97b04b9dfb065ac3fda37a8fac0161f42fca1e6fe4d0977c80 to empty string
Loaded image: nginx:latest
With the docker images command, you can see
14%
18.06.2014
]: 13502 ( 3.48%) ( 87.59% cumulative)
[ 64- 128 KB]: 12083 ( 3.11%) ( 90.70% cumulative)
[ 128- 256 KB]: 8623 ( 2.22%) ( 92.93% cumulative)
[ 256- 512 KB]: 13437 ( 3
14%
05.12.2019
will stop supporting version 2 and developers must begin the migration to Python 3 as soon as possible. However, there's a catch. If you get Python from the Ubuntu repositories (for either 16.04 or 18
14%
07.06.2019
= 50ms;
07 .interval = 3s;
08 .window = 10;
09 .threshold = 8;
10 }
11 }
12
13 set beresp.grace = 12h;
Changes on the Fly
The reverse proxy not only delivers web pages
14%
05.02.2019
Kubernetes Service (AKS) [3], make it possible to provision immensely complex orchestration platforms and tools with point-and-click web interfaces or a simple command-line invocation. In this dimension, many
14%
22.08.2011
have been created over the last few years, including Amazon Elastic Compute Cloud (EC2), Amazon Simple Storage Service (S3), and JiffyBox. In the US, they are joined by providers such as Go
14%
10.09.2012
@test1 ~]$ su
Password:
[root@test1 laytonjb]# more /opt/logs/module
Aug 22 09:41:20 test1 laytonjb: This is a test
Notice that a user cannot look at the log or modify it, but root can.
No it’s time