14%
16.07.2019
+=x[i]
return total
x = numpy.arange(10_000_000);
%time sum(x)
CPU times: user 1.63 s, sys: 0 ns, total: 1.63 s
Wall time: 1.63 s
Next, add Numba into the code (Listing 2) so the @jit
decorator can be used
14%
06.10.2022
([hostPort:]containerPort)
ubuntu1804 1 weaveworks/ignite-ubuntu:18.04 weaveworks/ignite-kernel:5.13.3 2 2G 20G 22,38080,52812,58080
centos8 1 weaveworks/ignite-centos:8 weaveworks/ignite-kernel:5.13.3 2 2G
14%
18.12.2013
(Figure 3P) then 2,000 to see whether the trend of increasing buffer-limit writes continues.
Figure 3P: Strace excerpt with Python one-by-one code; 500
14%
18.06.2014
]: 13502 ( 3.48%) ( 87.59% cumulative)
[ 64- 128 KB]: 12083 ( 3.11%) ( 90.70% cumulative)
[ 128- 256 KB]: 8623 ( 2.22%) ( 92.93% cumulative)
[ 256- 512 KB]: 13437 ( 3
14%
25.03.2021
=libaio, iodepth=32
fio-3.12
Starting 1 process
Jobs: 1 (f=1): [w(1)][100.0%][w=1420KiB/s][w=355 IOPS][eta 00m:00s]
test: (groupid=0, jobs=1): err= 0: pid=3377: Sat Jan 9 15:31:04 2021
write: IOPS=352, BW=1410Ki
14%
30.01.2024
Dell Precision Workstation T7910
Power
1,300W
CPU
2x Intel Xeon Gold E5-2699 V4, 22 cores, 2.4GHz, 55MB of cache, LGA 2011-3
GPU, NPU
n/a*
Memory
14%
20.10.2013
: Z1F35P0G
LU WWN Device Id: 5 000c50 050b954c3
Firmware Version: CC27
User Capacity: 3,000,592,982,016 bytes [3.00 TB]
Sector Sizes: 512 bytes logical, 4096 bytes physical
Device is: In smartctl
14%
20.06.2022
Huge DDoS Attack over HTTPS is Discovered and Stopped
The security company Cloudflare has announced that it detected and mitigated a 15.3 million request-per-second (rps) denial of service attack
14%
20.02.2012
.51, 0, 0.36, 17.74, 0.00, 6.38, 90, 0
2012-01-09 21:10:00, 92, 4.42, 0, 0.35, 20.81, 0.00, 7.22, 100, 0
2012-01-09 21
14%
26.03.2025
a full HTTP request directly to the server, Slowloris begins a request and then continuously, but very slowly, adds headers without ever completing the request; (3) the server fields all of the header data