21%
24.06.2013
hours)
900 ; retry (15 minutes)
604800 ; expire (1 week)
3600 ; minimum (1 hour)
)
NS ns1.example.com
NS ns2.example
21%
30.04.2013
several suspicious entries: The log entry in Listing 1, for example, shows the attacker attempting to send email-containing shell commands to the exim4
service.
Listing 1: Log Entry
2011-02-06 15:08:13 H
21%
22.08.2011
.keys.sort.each do |s|
14 printf "%20s %d\n", s, summary[s]
15 end
16 puts "Polling for changes (Ctrl-C to end)"
17 loop do
18 sleep 2
19 client.instances.each do |inst|
20 if state[inst.id] != inst.state
21
21%
05.09.2011
/vmImages/ubuntu_server.img", #location of source image
12 TARGET = "sda1", # mount as partition ]
13 DISK = [
14 TYPE = "swap", #swap drive
15 SIZE = 1024, # size of swap drive
16 TARGET = "sdb
21%
04.11.2011
14.921s
13 user 0m15.955s
14 sys 0m24.478s
The parallel
command shown in line 9 does the same thing but will execute four bzip2 processes at once. Although I have four CPU cores, I only get
21%
03.02.2012
15, 2009
[6] L. Rongxing, L. Xiaodong, L. Xiaohui, and S. Sherman, “Secure Provenance: The Essential of Bread and Butter of Data Forensics in Cloud Computing,” Proceedings of the 5th ACM Symposium
21%
12.03.2015
time: 5.245 seconds
iter 1
iter 5
iter 10
iter 15
iter 20
Benchmark completed
VERIFICATION SUCCESSFUL
L2 Norm is 0.5706732285739E-06
Error is 0.1345119360807E-12
MG
21%
14.01.2016
3700 IOPS: 15,900
Optane IOPS: 70,300 (4.42x)
P3700 latency: 58µ
Optane latency: 9µ (6.44x)
Test 2
P3700 IOPS: 13,400
Optane IOPS: 95,600 (7.13x)
P3700
21%
21.04.2016
for the Government and UC system has various advantages; for example, I am able to take part in relevant open source projects. I currently lead the open source Warewulf cluster management toolkit, which is almost 15
21%
17.11.2016
Volume ID: 4f8d25a9-bbee-4e8c-a922-15a7f5a7673d
Status: Started
Number of Bricks: 1 x 2 = 2
Transport-type: tcp
Bricks:
Brick1: gluster1:/storage/brick1/gv0
Brick2: gluster2:/storage/brick1/gv0
Options