29%
12.02.2014
B hald-addon-input
...
22.9 MiB + 4.0 MiB = 26.9 MiB plasma-desktop
26.0 MiB + 5.7 MiB = 31.7 MiB konsole (3)
28.3 MiB + 4.4 MiB = 32.7 MiB kwin
41.0 MiB + 2.0 MiB = 43.0 MiB Xorg
146
29%
11.02.2016
19
20 mysql> CREATE TABLE `data_random` (
21 `id` CHAR(32) NOT NULL,
22 `data` VARCHAR(64) DEFAULT NULL,
23 `ts` TIMESTAMP NOT NULL DEFAULT CURRENT_TIMESTAMP ON UPDATE CURRENT_TIMESTAMP,
24
29%
05.02.2019
FOR NOT FOUND
18 RETURN count_students;
19
20 LOOP
21 FETCH GROUP NEXT ROW;
22 IF x THEN
23 SET count_students = count_students + 1;
24 END IF;
25 END LOOP;
26 END;
27 //
28
29 SQL> DELIMITER ;
30
31 SQL> SELECT
29%
09.01.2013
using sshfs [20], which are treated as a local filesystems.
Caching: You can configure a cache for S3QL to improve apparent performance, perhaps taking advantage of a local SSD for data caching.
S
29%
01.04.2014
care of hosts rather than specific applications, the Cloudify developers leverage the power of Chef as a central management tool. Since Cloudify 2.2, it has been possible to use Chef to deploy
29%
02.10.2012
port 22) to port 2222, for example, to stop port scans filling up your logs. Without TCP Wrappers enabled, scans might run dictionary attacks on your server where password combinations are guessed by one
29%
21.01.2013
NIC. However, the CPU must be a 64-bit system with a mandatory virtualization extension: either AMD-V or Intel VT.
In contrast to RHEV 2.2, RHEV 3 is no longer based on RHEL 5, but on RHEL 6, which
29%
10.12.2012
, just in case the device is left behind or lost. The recipient will have a nice $20 gift, but at least the identity and purpose of the drive will remain hidden.
Managing Portability
If you use the x86
29%
20.09.2011
't speak until spoken to.)
The port scanner sends out a SYN request on a particular port number (22). The target responds with an ACK. The scanner notes the ACK and sends a RST to disconnect from
29%
04.08.2011
virtualized guest systems use the advanced features of modern x86 CPUs (Intel's VT-x or AMD-V). Paravirtualization works without these processor capabilities but does involve modifying the guest system itself