17%
30.11.2025
/share/zoneinfo -type f | \
07 grep -v 'posix|right|Etc|SystemV | \
08 grep -i $city`
09 echo -n "Time in $1: "; TZ=`echo $z` date
The first section of this code ensures that the script's argument
17%
05.11.2013
processor managed only 0.9GFLOPS per watt with a total capacity of 85GFLOPS.
Unfortunately, the Polaris was extremely difficult to program and was never available as a commercial product – only five people
17%
22.12.2017
(Figure 2). Once the installation is complete, type bash to display the prompt (Figure 1, bottom). Like all applications under Windows, the bash shell shown in Figure 3 is launched from the Start menu
17%
10.06.2015
. The current version is Mesos 0.21.
Two years after the first release, the developers presented a far more advanced variant [3] at a 2011 Usenix conference. Twitter engineers had already been running Mesos
17%
05.12.2016
Access (OWA), in the user's mailbox features
(Figure 3). For an overview of the status of MAPI over HTTP for the users in your organization, try this PowerShell query:
> Get-CASMailbox | ft Name, Mapi
17%
11.04.2016
and target computer. A component specially developed for Linux needs to be provisioned on the Windows system to meet the same conditions. As you might expect, this component is a PowerShell module [3
17%
14.11.2013
it as an "experiment in organic software visualization" [3]. Similarly to Gource, code_swarm animates project changes in a version control system. Files appear as dots; their colors again indicate the file type (Figure
17%
30.11.2025
on plugins to handle STONITH commands (Figure 3); this is a separate module for the cards just referred to or the generic IPMI plugin. STONITH is then configured via Cluster CIB, (i.e., the Cluster Information
17%
27.09.2021
Request timeout for icmp_seq 0
Request timeout for icmp_seq 1
Request timeout for icmp_seq 2
64 bytes from 52.90.56.122: icmp_seq=3 ttl=48
time=40.492 ms
[ output truncated ]
Welcome to Ubuntu 20.04.1 LTS
17%
05.12.2019
such as SSH, FTP, IMAP, POP3, Sendmail, and others are susceptible to brute force and dictionary attacks, because username/password combinations are inherently weak protections.
Fail2ban allows you to set up