10%
14.03.2013
enable TLS 1.2 – given OpenSSL 1.0.1 and a recent 2.2 or 2.4 version of the Apache web server – using the SSLProtocol configuration option. Listing 1 provides a potential server configuration.
Listing
10%
09.12.2019
| 0| 0| 0| 0.00%| # Attribute half of the total potential energy to particle J.
162| 12724500| 76.7099| 6.02852e-06| 5.08%| potential = potential + 0.5 * np.sin(d2) * np.sin(d2)
163
10%
28.11.2022
sensors available on an older MacBook Pro. Not all values discovered are temperatures.
On Linux, my default choice for in-terminal monitoring TUI is glances [6], which I have examined previously
10%
06.08.2012
> Contacts
07/28/2012 02:38 PM
Desktop
07/27/2010 08:15 AM Diskeeper
07/11/2012 03:17 PM Documents
07/29/2012 03:51 PM Downloads
07
10%
30.05.2021
Linux will be a community-based 1:1 binary replacement for Red Hat Enterprise Linux and currently ships with Gnome 3.32, Linux kernel 4.18.0-240.22.1.el8, SQLite 3.26, virt-what 1.18, Samba 4.12.3, DNF 4
10%
01.08.2019
_path": "/var/log/osquery",
07 "disable_logging": "false",
08 "schedule_splay_percent": 10
09 },
10 "schedule": {
11 "osquery_profile": {
12 "query": "SELECT * FROM osquery_info;",
13
10%
02.07.2014
:
[laytonjb@home4 ~]$ pdsh -w 192.168.1.250 uname -r
192.168.1.250: 2.6.32-431.11.2.el6.x86_64
The -w
option means I am specifying the node(s) that will run the command. In this case, I specified the IP
10%
25.03.2020
.io/service-account.name: testserviceaccount
kubernetes.io/service-account.uid: b45a08c2-d385-412b-9505-6bdf87b64a7a
Type: kubernetes.io/service-account-token
Data
====
ca.crt: 1025 bytes
namespace: 7 bytes
token: ey
10%
19.10.2012
12-core AMD processors ranging in speed from 2.2 to 2.9GHz with 24 to 128GB of RAM per server and up to 1TB of scratch local storage per node.
Getting applications running POD HPC clouds can be quite
10%
28.07.2025
on the programming model and compiler in use, these optimizations are so well understood as to carry their own names.
Loopy
David Spuler's recent works [1][2] feature the taxonomy of loop manipulation strategies