16%
19.11.2019
Jobs: 1 (f=1): [w(1)][100.0%][w=654MiB/s][w=167k IOPS][eta 00m:00s]
test: (groupid=0, jobs=1): err= 0: pid=1225: Sat Oct 12 19:20:18 2019
write: IOPS=168k, BW=655MiB/s (687MB/s)(10.0GiB/15634msec); 0
16%
12.02.2014
B xsettings-kde
...
12.3 MiB + 2.2 MiB = 14.6 MiB gedit
22.9 MiB + 4.0 MiB = 26.9 MiB plasma-desktop
26.4 MiB + 5.7 MiB = 32.1 MiB konsole (3)
28.3 MiB + 4.4 MiB = 32.7 MiB kwin
147
16%
21.08.2012
.3.3-14.el6_3.x86_64.rpm | 2.2 MB 00:01
(3/4): php-common-5.3.3-14.el6_3.x86_64.rpm | 522 kB 00:00
(4/4): php-gd-5.3.3-14.el6_3.x86_64.rpm
16%
22.06.2012
1-12:00:00
20
144400
1-16:06:40
21
160000
1-20:26:40
22
176400
2-01:00:00
23
193600
2-05:46:40
24
16%
04.08.2020
-slim[build]: info=image id=sha256:231d40e811cd970168fb0c4770f2161aa30b9ba6fe8e68527504df69643aa145 size.bytes=126323486 size.human=126 MB
docker-slim[build]: info=image.stack index=0 name='nginx:latest' id='sha256
15%
11.05.2021
sizes (Listing 1). The second script (Listing 2) is the same as Listing 1, but uses double precision.
Listing 1: Single-Precision Square Matrix Multiply
# Example SGEMM
for N = [2, 4, 8, 16, 32, 64, 128, 256
15%
21.08.2012
6 ### 8/5/2012
7
8 ### Set the job name
9 #PBS -N mpi_pi_fortran90
10
11 ### Run in the queue named “batch”
12 #PBS -q batch
13
14 ### Specify the number of cpus for your job. This example
15%
30.11.2025
:sda]RKBytes [DSK:sda]Writes
21 [DSK:sda]WMerge [DSK:sda]WKBytes [DSK:sda]Request [DSK:sda]QueLen \[DSK:sda]Wait [DSK:sda]SvcTim [DSK:sda]Util
22 20120310 13:39:10 sdb 0 0 0 2 4 24 12 0 12 2 0 sda 0 0 0 0 0 0 0 0 0 0
15%
30.11.2025
from compromised systems is John the Ripper (John). John is a free tool from Openwall [1]. System administrators should use John to perform internal password audits. It's a small (<1MB) and simple
15%
25.03.2020
---------------- -------------------- ---------------------------------------- --------- -------------------------- ---------------- --------
/dev/nvme0n1 152e778212a62015 Linux 1 21.00 TB / 21.00 TB 4 KiB + 0 B 5.4.12-0
You are now able to read and write from and to /dev