26%
05.08.2024
= [size][size]int {{0},{0},}
08
09 for i := 0; i < size; i++ {
10 for j := 0; j < size; j++ {
11 array[i][j]++
12 }
13 }
14
15
26%
11.04.2016
/s wMB/s avgrq-sz ...
sdb 0.00 28.00 1.00 259.00 0.00 119.29 939.69 ...
Parallelism
Multiple computers can access enterprise storage, and multiple threads can access
25%
10.09.2012
to logfiles, and it’s pretty simple to use:
[laytonjb@test1 ~]$ logger "This is a test"
...
[root@test1 ~]# tail -n 2 /var/log/messages
Aug 22 15:54:47 test1 avahi-daemon[1398]: Invalid query packet.
Aug 22 17:00
25%
30.11.2025
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple
25%
15.02.2012
rewinddir
0
0
0
0
0
0
0
0
fsync
21
21
21
21
21
22
26
31
lseekm
3
25%
26.01.2012
rewinddir
0
0
0
0
0
0
0
0
fsync
21
21
21
21
21
22
26
31
lseekm
3
25%
18.07.2013
downloaded the approximately 3MB ZIP file, create a folder before you unpack, because the archive does not contain one. If you simply unzip, all the files and directories end up in the current directory
25%
16.10.2012
to the screen (STDOUT; line 15).
Listing 1: SSH Script
01 #!/usr/bin/php
02
03
04 $ssh = ssh2_connect('192.168.1.85', 22);
05 ssh2_auth_password($ssh, 'khess', 'password');
06 $stream = ssh2_exec
25%
30.11.2025
Commands = -f /var/log/collectl -r00:00,7 -m -F60 -s+YZCD --iosize
These options allow me to monitor CPU, disk, and network in brief mode and slab, processes, and disk in detailed mode. I also added the ability
25%
05.11.2018
Default=none
22 SlurmctldPidFile=/var/run/slurmctld.pid
23 SlurmdPidFile=/var/run/slurmd.pid
24 ProctrackType=proctrack/cgroup
25 PluginDir=/usr/lib/slurm
26 ReturnToService=1
27 TaskPlugin=task/cgroup
28 # TIMERS