35%
09.09.2024
images
REPOSITORY TAG IMAGE ID CREATED SIZE
ubuntu-24.04-dev2 latest 8f311b6fbb1e 9 seconds ago 1.82GB
ubuntu-24.04-dev1 latest 2358ab17d70c 35 minutes ago 149MB
35%
20.02.2023
the file /usr/local/bin/gpu_devices.sh
(Listing 6).
Listing 6: /usr/local/bin/gpu_devices.sh
#!/bin/bash
/sbin/modprobe nvidia
if [ "$?" -eq 0 ]; then
# Count the number of NVIDIA controllers found.
NVDEVS=`lspci | grep -i NVIDIA`
N3
35%
10.07.2017
with the original Raspberry Pi Model A, ranging from two to more than 250 nodes. That early 32-bit system had a single core running at 700MHz with 256MB of memory. You can build a cluster of five RPi3 nodes with 20
35%
23.08.2017
accessibility and its feature set.
What first piqued my interest in ZAP was its intuitive interface. Although dissimilar, it reminded me a little of WebGoat's tutorial-based approach [3]. ZAP is unquestionably
35%
16.11.2017
scrolling terminal output.
For a quick example, the simple command
$ watch -n 1 uptime
tells watch
to run a command (uptime
) every second (-n 1
). It will continue to run this command forever unless you
35%
27.09.2024
Design Document with Views
{
"_id": "_design/queries",
"_rev": "6-856a5c52b1a9f33e136b7f044b14a8e6",
"language": "javascript",
"views": {
"by-timestamp": {
"map": "function (doc) {\n
35%
29.09.2020
version 3.0 onward, Helm had some relatively significant changes with the removal of Tiller because of security concerns [6], so be sure to choose version 3.0+.
Hoots Mon
The Helm Project itself provides
35%
09.01.2013
running Node.js
6) 64bit Amazon Linux running Node.js
...
Don't create an RDS instance this time, so type n
for that option; however, notice how easy launching a whole DB-backed application would
35%
14.11.2013
-persistent-net-generator.rules
openSUSE, Red Hat 6
* /etc/udev/rules.d/70-persistent-net.rules* No net generator rules since 12.3. Instead, the biosdevname package is used to identify the NICs
35%
28.11.2023
):
ssh-keygen -t ed25519 -a 100 -f
ubuntu-sre-id_ed25519 -q -N
2. Copy the SSH public key data on the target server to the authorized_keys file in the $HOME/.ssh directory. You can use the secure copy