12%
17.06.2017
directory at /usr/share/vim/addons, and a installation target at $HOME/.vim for private use or /var/lib/vim/addons for all system users. These directories can be changed using the options -r, -s, or -t
12%
11.10.2016
) first defines an addition and then lists the additions. For an introduction to Clojure programming and its basic concepts, you can check out a previous article [6] and find educational materials online [7
12%
09.06.2018
might tell RTCPeerConnection which STUN/TURN service(s) to connect to during the signaling process (Figure 12). Although the default transport for STUN requests is UDP, as with SIP, the request URL allows
12%
12.09.2022
Amdahl’s Law explains why the serial portion of applications don’t scale in performance as computing resources are added for the same problem size. The serial portions of an application can come
12%
09.04.2019
replacement for top written in Node.js with scrolling charts at the top (CPU usage) and the bottom left (memory usage).
A good YouTube video [6] presents vtop.
iptraf
Provides network
12%
26.03.2025
also acts as a USB-to-UART/SPI/I2C adapter and supports Bluetooth spamming. This low-energy denial-of-service (DoS) attack can be used to crash iPhones and iPads in particular. Devices with iOS 17
12%
09.01.2013
integrate existing data sources that are accessible via SMB/CIFS or Novell Core Protocol (NCP), for example, on Windows 2003/2008, Novell Open Enterprise 11 (OES), and NetWare 6.5.8 servers with at least one
12%
17.06.2017
SQL [6], MariaDB [7], and PostgreSQL [8].
Entry-Level Relational
Searching the web for the keyword "database" shows various techniques, implementations, approaches, and software variants. In this article
12%
02.06.2020
and storage capacity. In contrast, comparatively little has happened in the core algorithms of AI. Deep learning and convolutional neural networks are still based on ideas from the 1980s and 1990s. The success
12%
13.06.2016
on the admissible certificates for certain domains, for example, the key used (public key) or the issuing CA(s). This information pins the original certificate to the domain, so to speak, which makes spoofing third