29%
15.12.2016
are over i
= 2,n
− 1 and j
= 2,n
−1. Here is how you can write the iteration over the domain using array notation:
a(2:n-1,2:n-1) = 0.25 * &
(a(1:n-2,2:n) + a(3:n,2:n) + a(2:n,1:n-2) + a(2:n,3:n
29%
11.09.2018
.
Figure 6: Good old ``get pods'' but with width: ``kubectl get pod nginx-dep-54b9c79874-b9dzh -o wide'' showing an internal pod IP Address in the 172.17.0.0 range.
Use the -n
option to specify
28%
07.03.2019
Loops
Fortran
C
!$acc parallel loop
do i=1,n
A(i) = B(i) + C(i)
enddo
!$acc parallel loop
do j=1,m
B(i) = B(i) * D(i)
enddo
#pragma
28%
05.12.2014
(HostCt, ServerOwner, Date) %>%
106 arrange(desc(HostCt))
107 head12 <- head(top12, 25)
108
109 mergedTop25 <- rbind(head1,head2,head3,head4,head5,
head6,head7,head8,head9,head10,head11,head12)
110
111
28%
05.09.2011
can see how the arp cache poisoning works:
$ sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 \
-D 192.168.1.133 -h 00:22:6E:71:04:BB -m 00:0C:29:B2:78:9E \
-H 00:22:6E:71:04:BB -M 00:0C:29:B2:78:9E
28%
28.11.2023
://google.com"}},
10c7
< "label": "localhost PING/PORT/HTTP Tests",
---
> "label": "opensearch PING/PORT/HTTP Tests",
12,30c9,28
< {
< "type": "PING",
< "params": {
< "hostname": "129
28%
20.06.2012
:root
bin:x:1:root,bin,daemon
daemon:x:2:root,bin,daemon
sys:x:3:root,bin,adm
adm:x:4:root,adm,daemon
tty:x:5:
disk:x:6:root
lp:x:7:daemon,lp
mem:x:8:
kmem:x:9:
wheel:x:10:root
mail:x:12:mail
uucp:x:14
28%
22.05.2012
.x86_64 0:1.9-22.el6_2.1
libacl.x86_64 0:2.2.49-6.el6 libattr.x86_64 0:2.4.44-7.el6 libblkid.x86_64 0:2.17.2-12.4.el6
libcap.x86_64 0
28%
21.08.2012
Xrender.i686 0:0.9.5-1.el6 will be installed
---> Package libselinux.i686 0:2.0.94-5.2.el6 will be installed
---> Package libthai.i686 0:0.1.12-3.el6 will be installed
---> Package pixman.i686 0:0.18.4-1.el6
28%
04.11.2011
-INPUT -p tcp -m tcp --dport 631 -j ACCEPT
-A RH-Firewall-1-INPUT -m state --state ESTABLISHED,RELATED -j ACCEPT
### begin ssh
#-A RH-Firewall-1-INPUT -m state --state NEW -m tcp -p tcp --dport 22 -j