15%
07.11.2011
print str(id) + ' Total waste of CPU cycles!'
08
09 if '__main__' == __name__:
10
11 for i in xrange(20):
12 Process(target = waste, args = (i,)).start()
The counting.py
program delays
15%
06.10.2019
* argv [])
06 /*@requires maxRead(argv) >= 1 @*/
07 /*@-modfilesys@*/
08 {
09 /*@-initallelements@*/
10 char buffer [BUFSIZE] = {'\0'};
11 /*@+initallelements@*/
12 if ( ( argc
15%
09.01.2013
metadata tables...
08 Dumping metadata...
09 ..objects..
10 ..blocks..
11 ..inodes..
12 ..inode_blocks..
13 ..symlink_targets..
14 ..names..
15 ..contents..
16 ..ext_attributes..
17 Compressing and uploading
15%
07.06.2019
= 50ms;
07 .interval = 3s;
08 .window = 10;
09 .threshold = 8;
10 }
11 }
12
13 set beresp.grace = 12h;
Changes on the Fly
The reverse proxy not only delivers web pages
15%
05.09.2011
= kvmVM #specify the name
02 CPU = 1 # How many CPUs required?
03 MEMORY = 512 # RAM in MB
04 OS = [
05 KERNAL = "/boot/vmlinuz-2.6.32-24-generic", # Kernel to use
06
15%
17.02.2015
}
07 define service{
08 use generic-service
09 host_name w2k12srv
10 service_description Uptime
11 check_command check_nt!UPTIME
12 }
13 define service
15%
05.12.2016
Version: v1
02 kind: Pod
03 metadata:
04 name: nginx
05 spec:
06 containers:
07 - name: nginx
08 image: nginx
09 ports:
10 - containerPort: 80
A replication controller [12], however
15%
30.11.2020
== 0:
08 data = { 'key1' : [10,10.1,10+11j],
09 'key2' : ('mpi4py' , 'python'),
10 'key3' : array([1, 2, 3]) }
11 else:
12 data = None
13 # end if
14
15 data = comm
15%
17.02.2015
5420 Octa
Quad ARM Cortex-A15 (32KB instruction/32KB data/2MB L2) @1.8GHz, Quad-core ARM Cortex-A7 (32KB/32KB/512KB) @1.3GHz
Mali T-628 MP6
3GB LPDDR3e RAM (14.9GBps memory
15%
09.10.2017
rule phishing_pdf {
02
03 meta:
04 author = "James Stanger"
05 last_updated = "2017-09-12"
06 category = "phishing"
07 confidence = "high"
08 threat_type = "phishing exploit"
09 description