18%
17.08.2011
_costs = {
't1.micro' => 0.02,
'm1.small' => 0.095,
'c1.medium' => 0.19,
'm2.2xlarge' => 1.14,
'm2.4xlarge' => 2.28
}
Then I list the regions. This could have been dynamic, but I don’t want
18%
23.03.2022
laytonjb laytonjb 19946519 Nov 20 2020 Lmod-8.4.15.tar.gz
31988342 drwxrwxr-x 2 laytonjb laytonjb 4096 Oct 27 14:22 mpibzip2-0.6
31988329 -rw-rw-r-- 1 laytonjb laytonjb 92160 Oct 27 14:18 mpibzip
18%
28.11.2021
Compiler: Apple LLVM 12.0.5 (clang-1205.0.22.9) GCC 4.2.1 CLANG 12.0
Darwin : 20.4.0 : Darwin Kernel Version 20.4.0:
PageSize:16KB
Apple M1 8C8T
RAM size: 16384 MB, # CPU hardware threads: 8
RAM usage
18%
18.07.2013
: XXXXXXXXXXXXXXXXXX
6 Firmware Revision: 2CV102HD
7 Transport: Serial, ATA8-AST, SATA 1.0a, SATA II Extensions, SATA Rev 2.5, SATA Rev 2.6
8 Standards:
9 Used: ATA/ATAPI-7 T13 1532
18%
04.05.2021
:1 binary replacement for Red Hat Enterprise Linux and currently ships with GNOME 3.32, kernel 4.18.0-240.22.1.el8, SQLite 3.26, virt-what 1.18, samba 4.12.3, dnf 4.2, rpm 4.14, glibc 2.28, libgcc 8
18%
20.09.2021
barriers between operating systems.”
Black Lotus has identified a series of samples that were uploaded every two to three weeks, dating back to May 3, 2021, through August 22, 2021. The attacks were
18%
14.09.2021
$(find /sys/devices/system/cpu -regex ".*cpu[0-9]+/topology/thread_siblings_list") | sort -n | uniq
0,32
1,33
2,34
3,35
4,36
5,37
6,38
7,39
8,40
9,41
10,42
11,43
12,44
13,45
14,46
15,47
16,48
17,49
18,50
19,51
20,52
21,53
22,54
23,55
24,56
25
18%
03.02.2022
CPUs.
Listing 5
numactl
$ numactl --hardware
available: 1 nodes (0)
node 0 cpus: 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38
18%
15.08.2016
1.1.1.1/10 scope global veth1 valid_lft forever preferred_lft forever
$ ss -etn
State Recv-Q Send-Q Local Address:Port Peer Address:Port
ESTAB 0 0 1.1.1.1:22 1
18%
30.01.2020
a filter chain, assign it to the previously created firewall table, and specify where in the network stack it should be placed:
nft create chain inet firewall incoming { type filter hook input priority 0