16%
15.12.2017
08 action :install
09 end
10 service "apache2" do
11 action [ :enable, :start ]
12 end
13
14 directory node['main']['doc_root'] do
15 owner 'www1-data'
16 group 'www1-data'
17 mode '0744'
18 action
16%
21.01.2021
).
That supercomputer was expensive. A predecessor to the Y-MP, the X-MP, sold to a nuclear research center in West Germany for $11.4 million in 1981, or $32.6 million in 2020 dollars (see The Supermen
by Charles J
16%
02.10.2017
than 8MB of files are installed, youcan start creating a snap with an init
command (Figure 6), which pulls in a template.
Figure 6: Some helpful output
16%
23.08.2017
of the stack in the Application Layer (OSI model Layer 7) [6]. Although many fantastic network security tools exist that will probe every nook and cranny of a network stack, ZAP specializes in the application
16%
06.10.2022
this problem. File I/O can therefore be a highly relevant factor for program optimization. The libiotrace [4] library uses LD_PRELOAD to gather data about POSIX [5] and MPI [6] file I/O functions. Although other
16%
05.12.2019
player can also cope with protected Blu-ray discs, thanks to the keys, and you can use the menu in many cases.
HandBrake
For many years, the continuously updated HandBrake [6] has been regarded
16%
20.05.2014
available in both free and commercial versions. According to the manufacturer, more than 4,000 customers deploy Endian Firewall Enterprise, and more than 1.2 million users have downloaded the community
16%
16.05.2013
to be invoked. [Bug 9651]
6. Windows clients complain that they cannot disable offline caching on the profile share [Bug 7810]. (This is a non-critical message and does not affect operation.)
Issues 2 and 3
16%
16.05.2013
authentication on the basis of text messages.
Zyxel [6], the Taiwanese network equipment manufacturer, has a two-factor authentication solution in its portfolio. It provides VPN access to the company's own Zy
16%
22.08.2011
The important parts are in line 4 of the listing, which initializes the Deltacloud client with the URL and credentials provided on the command line, and lines 6 and 19, which retrieve a list of all instances