42%
05.02.2019
| revenue |
18 +---+------+---------+
19 | 1 | 2016 | 100.00 |
20 | 2 | 2016 | 0.00 |
21 | 3 | 2016 | 999.99 |
22 | 1 | 2017 | 500.00 |
23 | 2 | 2017 | 0.00 |
24 | 3 | 2017 | 100.00 |
25 | 1 | 2018 ... What lacked maturity in MariaDB 10.2 has now been sorted out in version 10.3. We look at the benefits you can reap now. ... MariaDB 10.3 ... New features in MariaDB 10.3
42%
20.02.2012
.51, 0, 0.36, 17.74, 0.00, 6.38, 90, 0
2012-01-09 21:10:00, 92, 4.42, 0, 0.35, 20.81, 0.00, 7.22, 100, 0
2012-01-09 21
42%
18.07.2013
buffered disk reads: 616 MB in
3.00 seconds = 205.03 MB/sec
$ hdparm -T /dev/sda
/dev/sda:
Timing cached reads: 6292 MB in
2.00 seconds = 3153.09 MB/sec
If this were a spinning disk, you would also
42%
20.10.2013
,000,592,982,016 bytes [3.00 TB]
Sector Sizes: 512 bytes logical, 4096 bytes physical
Device is: In smartctl database [for details use: -P show]
ATA Version is: 8
ATA Standard is: ACS-2 (unknown minor revision code: 0x001
42%
30.11.2025
initial tests are quite reasonable: 1GB memory, a virtual CPU, about 20GB of disk space, and a bridged network adapter with an Internet connection will do for now. Sun xVM VirtualBox is a good choice
42%
11.06.2014
image, and then Volatility [3] and Mandiant Redline [4] for further investigation. In this paper, I dive more deeply into Redline and Volatility.
To begin, I review a raw memory dump of a known malware
42%
06.10.2022
find ready-made policy bundles online for many use cases, and they are likely to contain a useful, predefined set of rules. A freely accessible Playground [2] and a free Styra Academy [3] can help you
42%
30.11.2025
at the prompt or double-click the Cygwin icon, and type startwwin
at the bash prompt. Two significant things happen when you invoke the startxwin
command: An xterm and an X server (Cygwin/X Server:0.0) launch
42%
20.10.2016
writing code. Columns 1 to 5 could be used for statement labels such as the following:
...
SUM = 0.0
D0 100 I=1,10
SUM = SUM + REAL(I)
100 CONTINUE
...
Y = X1 + X2 + X3
42%
05.12.2014
of the pgrep tricks, the following example offers a nice way of retrieving detailed information regarding the ssh command:
# ps -p $(pgrep -d, -x sshd)
PID TTY TIME CMD
1905 ? 00:00:00 sshd