18%
05.02.2019
but independently of one another (Figure 2).
Table 3
Gang Execution
Fortran
C
!$acc parallel do i=1,n ! do something enddo!$acc end parallel
pragma acc parallel{ for (int i=0; i
18%
19.11.2014
the CPU (-c
), load (-l
), and disk (sdc
) for 10 seconds at one-second increments.
Figure 3: Dstat output with focus on CPU, load, and disk stats while
18%
14.03.2013
a virtual hard disk (VHD).
Infos
Licensing FAQ: http://download.microsoft.com/download/4/D/B/4DB352D1-C610-466A-9AAF-EEF4F4CFFF27/WS2012_Licensing-Pricing_FAQ.pdf
The Author
18%
21.01.2021
This first article of a series looks at the forces that have driven desktop supercomputing, beginning with the history of PC and supercomputing processors through the 1990s into the early 2000s.
... a “front-end” system to provide things such as I/O functionality. Examples of front-end systems were the Cray C90 or Y-MP.
The T3D was something of a sea change for Cray. The first reason is that it moved ...
This first article of a series looks at the forces that have driven desktop supercomputing, beginning with the history of PC and supercomputing processors through the 1990s into the early 2000s.
18%
28.11.2021
it with the command:
wget https://raw.githubusercontent. com/Microsoft/OMS-Agent-for-Linux/master/installer/scripts/onboard_agent.sh && sh onboard_agent.sh -w 3a25ad6b-cf60-47a9-a61c-6ba32aa70779 -s WF8SXVgDaDQXmF8NZb
18%
28.11.2023
Ripgrep gives you by default, set the -C <n> option, where <n> denotes the number of lines before and after the location you want to view. To check a certain number of lines exclusively before the find
18%
12.05.2014
The revelation of wide-spread government snooping has sparked a renewed interest in data storage security via encryption. In this article, we review some options for encrypting files, directories ... ]$ cd ~/encrypted
[laytonjb@test1 encrypted]$ ls -l
total 8
lrwxrwxrwx 1 laytonjb laytonjb 24 Sep 4 15:12 acS5u3K9TJ,9FWTDUq0yWqx6 -> XuD50Mah2kp2vukDeo04cOv,
-rw-rw-r-- 1 laytonjb laytonjb 18 Sep 4 15:12 WvPjlWtCaq5g9hE1 ...
The revelation of wide-spread government snooping has sparked a renewed interest in data storage security via encryption. In this article, we review some options for encrypting files, directories
18%
03.02.2024
: Human-Readable df
$ df -h
Filesystem Size Used Avail Use% Mounted on
tmpfs 26G 2.5M 26G 1% /run
/dev/nvme0n1p2
18%
16.05.2013
Explanation
* OK IMAP4rev1 Service Ready
Server greets client
a001 login mrc secret
Client logs in
a001 OK LOGIN completed
Server acknowledges
18%
28.07.2025
--serial 05:0e:50:04:eb:b0:35:ad:e9:d7:6d:c1:0b:36:d6:0e:33:f1--signature-algorithm1.2.840.10045.4.3.2--issuer-o Let's Encrypt--pubkey-algorithm rsa--pubkey-size 256
This check would give you a pretty good