15%
18.10.2017
(with around 55,000 lines of code) from CUDA to HIP: 99.6 percent of the code went unmodified or was automatically converted, and the remaining 0.4 percent took less than a week of developer time to tie
15%
07.01.2024
7:3 0 349.7M 1 loop /snap/gnome-3-38-2004/143
loop4 7:4 0 485.5M 1 loop /snap/gnome-42-2204/120
loop5 7:5 0 497M 1 loop /snap/gnome-42-2204/141
loop6 7:6 0 81.3M 1 loop
15%
05.12.2014
Model
TS-251
DS-214
N5550
ReadyNAS RN31400
Manufacturer
QNAP Inc.
Synology
Thecus
Netgear
Operating System
QTS 4.1.1 (Linux 3.12.6
15%
17.02.2015
168
(gdb) p j
$3 = 144
(gdb) c
Breakpoint 2, Calc_vacf () at MD.o.c:671
671 vacf[j-i]=0;
(gdb) p &j
$6 = (int *) 0xffffc168
(gdb) p j
$7 = 144
On the other hand, when dealing with the ELF
15%
17.02.2015
for their baby – or actually two: First, the new project goes by the name of Project Dark Mail. Levison collected many donations and much goodwill on Kickstarter [6] under this name. Recently the project
15%
17.02.2015
#include
009 #include
010 #include
011 #include
012
013 #define gettid() syscall(__NR_gettid)
014
015 #define SCHED_DEADLINE 6
016
017 /* XXX use
15%
29.09.2020
.js v7.6 and upward, so if you have trouble running the tool, try upgrading npm, installing from source, if required.
Quietly Does It
For security reasons, I won't just blindly pull a Docker
15%
29.09.2020
and – at the end – the leaf of the tree. A rather short OID could be .1.3.6.1.2.1.31. There is an analogy to IP addresses here: Because it's difficult to remember an IP address as a series of numbers, the Domain
15%
11.06.2014
uses for such cases. Moments later, I received email telling me that malware was discovered by Palo Alto WildFire analysis [6].
WildFire identifies unknown malware, zero-day exploits, and advanced
15%
14.08.2017
practices [5]?
Have you taken into account and checked the alignment of disk volumes [6] [7]? Are the volumes formatted with a 64KB file allocation unit?
Does the distribution of the database files (on