8%
25.03.2021
. If older devices are in use, NT LAN Manager (NTLM) authentication is also possible, if necessary, and in most cases, perfectly acceptable.
However, the situation is different for a highly privileged account
8%
18.07.2012
The Warewulf cluster is ready to run HPC applications. Now, it’s time to build a development environment.
... that come with the package. In this case, hwloc
itself is 1.0MB, but the sum of it and all of the dependencies is 11MB. Again, this might or might not seem like a large amount to you. It’s your decision ...
The Warewulf cluster is ready to run HPC applications. Now, it’s time to build a development environment.
8%
27.09.2024
for "shoddy security, insincerity" and "cascades of security failures" [2].
MAPI: The Curse of Exchange Protocols
Under the pressure of new European Union regulations such as the General Data Protection
8%
30.11.2025
. In the case of SSL certificates, they scanned the Internet and found 1.2 million SSL-enabled websites [3] [4]. Among the problems found were certificates for reserved addresses (e.g., 192.168.1.2, a reserved IP
8%
10.06.2015
an Infrastructure as a Service (IaaS) solution. In the case of Platform as a Service (PaaS) and Software as a Service (SaaS), you will not typically have access at the operating system level. In this case, you
8%
16.05.2013
://wiki.scilab.org/Documentation/ParallelComputingInScilab
parallel_run
http://help.scilab.org/docs/5.4.0/en_US/parallel_run.html
Parallel programing
http://my.opera.com/muksitsyahlan/blog/2011/01/05/parallel-programming-with-scilab-2
MPI
8%
20.06.2022
class: https://github.com/josephwright/beamer/
S5: https://meyerweb.com/eric/tools/s5/
DZSlides: http://paulrouget.com/dzslides/
Slidy: https://www.w3.org/Talks/Tools/Slidy2/#(1)
Slideous
8%
30.01.2020
_time)
print(" Time taken in seconds: {0} s").format(time_taken_in_micro)
If a section of code is called repeatedly, just sum the elapsed times for the section and sum the number of times that section
8%
04.12.2024
the dimensions completely wrong and go for 56 vCPUs and 1.5TB of vRAM (shown in the figure as the red monster VM2). On the other hand, you could do it the right way: 26 cores or 52 hypertreads per NUMA node. I
8%
03.04.2024
advertising messages, fraud attempts, spoofed sender addresses, and many other dirty tricks began to flourish.
Since then, associations such as the Internet Engineering Task Force (IETF), which defines ... If you don't want to hand over your mail to a corporation, you have to operate your own mail server. Securing it sensibly involves some effort.