28%
04.04.2023
timedatectl
$ ssh n0001
[laytonjb@n0001 ~]$ timedatectl
Local time: Sat 2022-12-17 11:31:26 EST
Universal time: Sat 2022-12-17 16:31:26 UTC
RTC time: Sat 2022-12
28%
25.09.2023
is: Active. Continue.
Port: 80: op 1.1. www.microsoft.com [23.207.41.178] Time: 33 ms.
Port: 80: op 1.2. www.microsoft.com [23.207.41.178] Time: 66 ms.
[...]
ZING: 23.207.41.178 / www.microsoft.com / a
28%
17.02.2015
lists the sample data as a table.
Listing 4
Installing R on Ubuntu 12.04
sudo apt-key adv --keyserver keyserver.ubuntu.com --recv-keys E084DAB9
sudo add-apt-repository ppa
28%
15.12.2016
are over i
= 2,n
− 1 and j
= 2,n
−1. Here is how you can write the iteration over the domain using array notation:
a(2:n-1,2:n-1) = 0.25 * &
(a(1:n-2,2:n) + a(3:n,2:n) + a(2:n,1:n-2) + a(2:n,3:n
28%
11.09.2018
.
Figure 6: Good old ``get pods'' but with width: ``kubectl get pod nginx-dep-54b9c79874-b9dzh -o wide'' showing an internal pod IP Address in the 172.17.0.0 range.
Use the -n
option to specify
28%
07.03.2019
Loops
Fortran
C
!$acc parallel loop
do i=1,n
A(i) = B(i) + C(i)
enddo
!$acc parallel loop
do j=1,m
B(i) = B(i) * D(i)
enddo
#pragma
28%
05.12.2014
(HostCt, ServerOwner, Date) %>%
106 arrange(desc(HostCt))
107 head12 <- head(top12, 25)
108
109 mergedTop25 <- rbind(head1,head2,head3,head4,head5,
head6,head7,head8,head9,head10,head11,head12)
110
111
28%
05.09.2011
can see how the arp cache poisoning works:
$ sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 \
-D 192.168.1.133 -h 00:22:6E:71:04:BB -m 00:0C:29:B2:78:9E \
-H 00:22:6E:71:04:BB -M 00:0C:29:B2:78:9E
27%
28.11.2023
://google.com"}},
10c7
< "label": "localhost PING/PORT/HTTP Tests",
---
> "label": "opensearch PING/PORT/HTTP Tests",
12,30c9,28
< {
< "type": "PING",
< "params": {
< "hostname": "129
27%
30.11.2025
"------------------------------------------------------"
18 echo -n "Replace stored data line (y)? ";read we
19 if [ "$we" = "y" ];
20 then
21
22 # Delete line and write to
23 # temporary file
24
25 # Build sed instruction
26