68%
12.03.2014
]})
An optional index
list determines the indices, as for a Series.
In: DataFrame({'a': [1, 2], 'b': [3, 4]}, columns=['a', 'c'], index=['top', 'bottom'])
Out:
a c
top 1 NaN
bottom 2 NaN
68%
30.11.2025
, appearing in alphabetical order but allowing intervening letters, you can use the search expression:
"a.*e.*i.*o.*u"
This would match lines 1, 2, and 3. If you want lines containing all five vowels in order
68%
30.11.2025
lxc.cgroup.devices.allow = c 1:9 rwm
25 lxc.cgroup.devices.allow = c 1:8 rwm
26 lxc.cgroup.devices.allow = c 136:* rwm
27 lxc.cgroup.devices.allow = c 5:2 rwm
28 # rtc
29 lxc.cgroup.devices.allow = c
68%
19.06.2023
object
O
Python object
A simple example from nkmk creates a float64
data type (64-bit floating-point number):
import numpy as np
a = np.array([1, 2, 3], dtype=np.float64
68%
10.06.2015
to the first sed I know that here is only a SINGLE space
45 display_list="$(sed ':a;N;$!ba;s/\n / /g'<<<"$xrandr_current" | sed \
-n -e 's/^\([a-zA-Z0-9_-]\+\) connected.* \([0-9]\+\)mm.* \([0-9]\+\)mm
68%
28.07.2025
[i] + b[i];
}
When the number of cycles is known at compile time, a loop can be fully unrolled:
c[0] = a[0] + b[0];
c[1] = a[1] + b[1];
c[2] = a[2] + b[2];
c[3] = a[3] + b[3];
However, it remains
68%
28.11.2011
are the same as decimal 18. This command searches for packets with this type of data in byte 13:
# tcpdump -n -r dumpfile.lpc -c 10 'tcp[13] == 18' and host 172.16.183.2
Figure 5 is an example of what
68%
17.02.2015
e syscall=2
success=yes exit=3 a0=7fff67b1e9fc a1=0 a2=1fffffffffff0000 a3=3109e85ad0
items=1 ppid=7144 pid=11992 auid=1000 uid=1000 gid=1000 euid=1000 suid=1000
fsuid=1000 egid=1000 sgid=1000
68%
06.10.2019
-server-full
commands handle the request and sign procedure automatically, without requiring any intervention on the part of the admin.
The scripts CharitÈ uses are based on Easy-RSA 2.2.2-2, which comes with the Debian
68%
30.11.2025
:
Figure 4: Header bytes 12-15.
# tcpdump -n -r dumpfile.lpc -c 10 'tcp[13] == 18' and host 172.16.183.2
Figure 5 is an example what this command returns. When capturing data with tcpdump, you can