17%
28.11.2023
image: monitoror/monitoror:${MTRRTAG:-latest}
05 ports:
06 - "38080:8080"
07 environment:
08 - "MO_CONFIG=/etc/config.json"
09 restart: unless-stopped
10
11 networks:
12 default
17%
30.11.2020
== 0:
08 data = { 'key1' : [10,10.1,10+11j],
09 'key2' : ('mpi4py' , 'python'),
10 'key3' : array([1, 2, 3]) }
11 else:
12 data = None
13 # end if
14
15 data = comm
17%
09.10.2017
rule phishing_pdf {
02
03 meta:
04 author = "James Stanger"
05 last_updated = "2017-09-12"
06 category = "phishing"
07 confidence = "high"
08 threat_type = "phishing exploit"
09 description
17%
02.06.2020
= sol.copy()
10
11 for j in range(0,ny-1):
12 sol[0,j] = 10.0
13 sol[nx-1,j] = 1.0
14 # end for
15
16 for i in range(0,nx-1):
17 sol[i,0] = 0.0
18 sol[i,ny-1] = 0.0
19 # end for
20
21 # Iterate
22
17%
17.06.2017
04 real :: var2
05 integer :: int1
06 end type other_struct
07
08 type my_struct ! Declaration of a Derived Type
09 integer :: i
10 real :: r
11 real*8 :: r8
12 real, dimension(100
17%
09.10.2017
_consumer_secret>"
06 config.access_token = ""
07 config.access_token_secret = ""
08 end
09
10 user = client.user("23Cent")
11 puts user.name
12
13 def collect
17%
12.09.2013
. There are some new lines: 5 and 12 to 22. Line 22 installs the sig function as a signal handler for SIGTERM. When the signal arrives, line 13 opens a new connection to the database and calls the pg
17%
22.12.2017
": "glusterfs-cluster"
06 },
07 "subsets": [
08 {
09 "addresses": [
10 {
11 "ip": "192,168,121,101"
12 }
13 ],
14 "ports
17%
16.10.2012
($ssh, '/sbin/ifconfig');
07 stream_set_blocking($stream, true);
08
09 $response = '';
10 while($buffer = fread($stream, 4096)) {
11 $response .= $buffer;
12 }
13
14 fclose($stream);
15 echo $response;
16
17
17%
07.06.2019
.0 as build
03 MAINTAINER Yves Schumann
04
05 COPY /demo-app
06
07 RUN mkdir /demo-app/build \
08 && cd /demo-app/build \
09 && cmake .. \
10 && cmake --build .
11
12 RUN echo "Build