30%
27.09.2021
[2] (section 3.2). Next, I built the Darshan utilities (darshan-util) with the command:
./configure CC=gcc --prefix=[binary location]
Because I'm running these tests on an Ubuntu 20.04 system, I had
30%
07.10.2014
compiling (Listing 2).
Listing 2
Sheepdog Uses the FNV-1a Algorithm
01 #define FNV1A_64_INIT ((uint64_t) 0xcbf29ce484222325ULL)
02 #define FNV_64_PRIME ((uint64_t) 0x100000001b3ULL)
03
04
30%
05.12.2014
://www.github.com/hbons/SparkleShare
–
Current version (as of October 2014)
7.0.2 (Community)
1.0.25
1.1
5.20141013
2.2
5.2.3
3.1.7
1.4
7.0
Release date
August
30%
05.02.2023
Map
18 metadata:
19 name: mariadb
20 labels:
21 app: mariadb
22 data:
23 MYSQL_ROOT_PASSWORD: mysqlroot
24 MYSQL_DATABASE: db1
25 MYSQL_USER: mysqluser
26 MYSQL_PASSWORD: mysqlpwd
30%
05.12.2019
# return data to MySQL (empty key here 'mysql:')
16 mysql:
17 failure:
18 gerrit:
19 Verified: -1
20 mysql:
21 require:
22 gerrit:
23 # prevents waste runs on %submit usage
24 ... The Zuul 3 gating system is a free and flexible solution for continuous integration, delivery, and deployment. ... Zuul 3 ... Zuul 3, a modern solution for CI/CD
30%
30.01.2020
Zhao through his summer internship at IBM Research. The dm-cache module was integrated into the Linux kernel tree as of version 3.9. It is an all-purpose caching module and is written and designed to run
30%
25.03.2020
"TracingConfig": {
17 "Mode": "PassThrough"
18 },
19 "CodeSha256": "37n/rzJz4o2lyvh4s2aet2aBlY=adc",
20 "Description": "",
21 "CodeSize": 432,
22 "FunctionArn": "arn
30%
22.12.2017
Message FormApp FormMessage where
18 renderMessage _ _ = defaultFormMessage
19 - the "FormApp" web application only provides one route
20 mkYesod "FormApp" [parseRoutes|
21 /contact ContactR GET |]
22
30%
18.02.2018
. The required modifications are explained in the Huginn wiki [3].
The software is based on Ruby on Rails [4] and therefore requires an installed Ruby environment; in fact, it needs version 2.2 or 2.3
30%
10.06.2015
] on its laptops that allows the software to steal web traffic using man-in-the-middle attacks.
When you use an encrypted filesystem or SEDs [3], all of the data is encrypted. However, if you forget