26%
10.11.2021
speeds several times faster than Deflate.
An implementation of lz4
for Linux has been part of the Linux kernel since 3.11 and has been used by SquashFS since kernel version 3.19-rc1.
The lz4
utility
26%
01.08.2019
/docker-registry
$ htpasswd -Bbn oliver T0Ps3crEt | sudo tee /etc/docker-registry/htpasswd
oliver:$2y$05$lAmkjHRcR0.TK52/rHR/Pe86AGZqpRleXenHVT/eabFe8He5UZiPu
$ docker run -p 5000:5000 --name registry -v /etc
26%
08.10.2015
containers (Figure 3) – that is, completely virtualized operating systems – and application containers (Figure 4) for virtualizing a particular application, including its run-time environment. However, LXC
26%
30.11.2025
protocol ip parent 1:0 prio 100 u32 match ip $DIR 5.4.3.2 flowid 1:14
06 tc filter add dev $DEV protocol ip parent 1:0 prio 100 u32 match ip $DIR 4.3.2.1 flowid 1:14
Step Away from the Bandwidth
I
26%
14.03.2013
[1]. To create a jail, complete the steps shown in Listing 3.
Listing 3
Creating a Jail
01 # mkdir -p /jail/www
02 # cd /usr/src
03 # make world DESTDIR=/jail/www
04 # cd etc
05 # make
26%
18.09.2017
in the Fortran programfor a longer run time:
nx = 8000
ny = 8000
i
t_max = 10000
tolerance = 0.00004D+00
The code was compiled using GCC 7.1 and run on a four-core AMD A6-6310 laptop (Lenovo
26%
25.03.2021
library mpiP
[3], is used in conjunction with one of these two MPI libraries to gather MPI profile stats.
When Remora is finished, it creates a directory of form remora_XXX in the directory in which
26%
22.12.2017
(Figure 2). Once the installation is complete, type bash to display the prompt (Figure 1, bottom). Like all applications under Windows, the bash shell shown in Figure 3 is launched from the Start menu
26%
04.12.2024
-a9c7-1c7ef74a9ba4
Blocks the use of copied or imitated system tools (preview)
No
c0033c00-d16d-4114-a5a0-dc9b3a7d2ceb
Blocks web shell creation for servers
26%
28.07.2025
of all evil" sums up this point of view neatly [3]. The reasons for such a statement are particularly apparent in the many mangling strategies one can choose to apply to loops (Table 1). These strategies