9%
19.09.2019
= np.array([10, 20, 30, 40])
print('a+b:\n', add_ufunc(a, b))
The answer should be:
a+b:
[11 22 33 44]
In the previous example, you had to put everything that was to run on the GPU into a single Numba
9%
09.09.2024
.0.1 20240412 (experimental) [master r14-9935-g67e1433a94f] (Ubuntu 14-20240412-0ubuntu1)
Everything looks good: mpirun
is there and mpicc
points to gcc-14.0.1 (the host system is Ubuntu 22.04, for which gcc-14 does
9%
05.10.2018
info ruby # Needs to be v2.2+
$ curl -sSL https://rvm.io/mpapis.asc | gpg --import - # From here see https://tecadmin.net/install-ruby-latest-stable-centos
$ curl -L get.rvm.io | bash -s stable
$ source
9%
13.12.2018
# and network has converged
traceroute -In 10.4.1.25
1 10.3.1.22 # backup VPN
# router site 3
2 172.16.1.7 # backup VPN
# router site 4
3 10.4.1.25
LAN Failure
9%
04.08.2020
grants permissions to enable GuardDuty.
If some instances expose ports like 22 or 3389 to the world (0.0.0.0/0), you should soon see some findings of malicious IPs trying to get into your systems
9%
03.08.2023
: "routers",
"value": "192.168.2.254"
}],
"reservations": [{
"hw-address": "00:11:22:33:44:55",
"ip-address": "192.168.2.60",
hostname: "host-2-60"
}, {
"hw-address": "00
9%
30.11.2025
capture or display filters. The capture filter would look like this:
port 22
Then start capturing, initiate an SSH login at the console, and in the Analyze
menu, select Follow TCP Stream
. The result
9%
30.11.2025
to popular ports, such as 80 (HTTP) or 22 (SSH), and pings. If Portbunny does not register a response to a port request, but the trigger packet reaches the target, it tags the port as filtered. Using Portbunny
9%
30.11.2025
16 into offset hole 22, your new furniture might never live up to your expectations. Additionally, integrating the furniture into an existing room could be a challenge. Forgetting that the new surround