35%
17.07.2023
"import torch; print(torch.cuda.is_available())"
python3 -c "import cupy as cp; x_gpu = cp.array([1, 2, 3]); print(x_gpu.device)"
Summary and Moral of the Story
I’ve used Python for quite a bit of my coding since 2008, and it worked well for me. As I
35%
16.08.2018
that it defines the service (e.g., MariaDB) as an ENTRYPOINT or as a CMD in the Dockerfile has a problem. If you were to kill -9 in this kind of container, the entire container would disappear immediately. From
35%
13.12.2018
Server instance on a Linux system.
Cross-Platform SQL Server
How Microsoft managed to make SQL Server a cross-platform product is a very interesting story. The story started in 2008, with the launch
35%
07.10.2014
Eric A. Young to start work on SSLeay (Figure 3). Because there was no cryptography-restricting legislation in Australia, the tool suite was available worldwide
35%
07.10.2014
(IIS) and Exchange are prominent representatives in this category.
Up to Windows Server 2003 R2, IIS saved its logs by default in the C:\WINDOWS\system32\LogFiles\W3SVC1 directory; newer systems store
35%
04.04.2023
and hardware, network virtualization primarily means the separation of data and control paths. Several higher levels are implemented in the network, from which the underlying switches and routers (Layers 2 and 3
35%
04.04.2023
on their infrastructures. Back in 2008, the open source Security Onion [1] project was launched with the aim of bundling open and free software to analyze threats, establish security monitoring in the sense of an intrusion
35%
22.05.2023
.vmware.vsphere.security.doc/GUID-CE292D3F-D4AC-4607-B262-DE19CE6E9F6B.html
Configuring a key provider: https://docs.vmware.com/en/VMware-vSphere/7.0/com.vmware.vsphere.security.doc/GUID-3D39CBA6-E5B2-43E2-A596-B9A69B094558.html
35%
11.02.2016
DestinationSizeChange 41943106 (40.0 MB)
Another view of the file statistics lists which file effected the change:
# gunzip -c /mnt/backup/rdiff-backup-data/file_statistics.\
2015-03-15T10\:44\:06+01\:00.data.gz | awk '$2
35%
11.02.2016
, these days, the System Security Services Daemon (SSSD) [2] is used most of the time in such scenarios. This approach, together with the software [3], is the simplest way to integrate Linux clients directly