14%
07.10.2014
_string;
08
09 static int prochello_show( struct seq_file *m, void *v )
10 {
11 int error = 0;
12
13 error = seq_printf( m, "%s\n", output_string);
14 return error;
15 }
16
17 static int prochello
14%
16.05.2013
,1000);
06
07 // Set host data on the Device (GPU)
08 dA = gpuSetData(A);
09 dC = gpuSetData(C);
10
11 d1 = gpuMult(A,B);
12 d2 = gpuMult(dA,dC);
13 d3 = gpuMult(d1,d2);
14 result = gpuGetData(d3); // Get
13%
13.12.2018
], and MongoDB 3.6 [3]. If not already present, installing Java (as root or using sudo) before Elasticsearch and MongoDB is recommended:
yum install java-1.8.0-openjdk-headless.x86_64
You should remain root
13%
05.03.2013
constructor: (a, b, @width) ->
09 super a,b
10
11 draw: ->
12 alert "Width:" " + @width
13 super
14
15 shape = new rectangle 1,2,3
16 shape.draw()
The @
in the constructor ensures that Coffee
13%
20.05.2014
)]: Done 1 out of 181 | elapsed: 0.0s remaining: 4.5s
[Parallel(n_jobs=2)]: Done 198 out of 1000 | elapsed: 1.2s remaining: 4.8s
[Parallel(n_jobs=2)]: Done 399 out of 1000 | elapsed: 2.3
13%
10.04.2015
import java.io.*;
04 import java.util.*;
05
06 public class Readline {
07
08 [...]
09
10 public static final void load(ReadlineLibrary lib) throws UnsatisfiedLinkError {
11 [...]
12 System
13%
09.08.2015
.translation embeddedmap;
09
10 create class Relation extends E;
11 create property Relation.from date;
12
13 create class Appear extends E;
14 create property Appear.chapter embeddedlist integer
15
16 insert into Person
13%
09.08.2015
.04.1988
26 March 1989
15 April 1990
31-March-1991
19 April 1992
11 April 1993
3 April 1994
16. April 1995
7 April 1996
30 March 1997
12 April 1998
Regular Expressions
Regular expressions are used
13%
25.03.2020
2fuTVWnj7LDsEh3NzrhjGYlhWmtvrXg3mlFelz/MZ
08 XrK6uAlp6206Hc669ylfhIcD9d7w0rc9Ms1DFCh5wzVRbnJJF51mW2nC
09 mh5C8E7xSw==
10 mozilla.org. 6074 IN DNSKEY 256 3 7
11 AwEAAcY1VDPt
13%
02.06.2020
is a key part of securing an estate. Common Vulnerabilities and Exploits (CVEs) [3] are the most popular way of listing, publishing, and categorizing security bugs. Within Prisma Cloud Compute, you can