9%
02.06.2020
= sol.copy()
10
11 for j in range(0,ny-1):
12 sol[0,j] = 10.0
13 sol[nx-1,j] = 1.0
14 # end for
15
16 for i in range(0,nx-1):
17 sol[i,0] = 0.0
18 sol[i,ny-1] = 0.0
19 # end for
20
21 # Iterate
22
9%
09.01.2013
=/var/log/one/accounting.log
04
05 case "$1" in
06 "on"|"off")
07 mode=$1
08 shift
09 ;;
10 *)
11 echo "$0 error: wrong mode." >&2
12 exit 1
13 ;;
14 esac
15
16 if [ "$1
9%
15.08.2016
,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc pfifo_fast state UP group default qlen 1000
09 inet 192.168.1.123/24 scope global eth1
10 valid_lft forever preferred_lft forever
11
12 $ ip netns exec ns1 ip route add default
9%
10.04.2015
]
09 }
The next step is to define what action to trigger. The syntax is:
watchman -- trigger /opt/repos 'repos-sync' \
-- /usr/local/sbin/sync.sh /opt/repos
Where 'repos
9%
30.11.2025
]='-d'
09 debug1: Bind to port 2202 on ::.
10 Server listening on :: port 2202.
11 debug1: Bind to port 2202 on 0.0.0.0.
12 Server listening on 0.0.0.0 port 2202.
Now the fun part begins
9%
11.10.2016
.then(
08 function() {console.log(
"second callback function"); },
09 function(e) {console.log(e.message);}
10 );
11
12 deferred.resolve();
If Listing 1 has registered
9%
30.11.2025
fi
05
06 #####
07 LD_LIBRARY_PATH=$LD_LIBRARY_PATH:/usr/lib/vmware/lib/fc13lib64
08 export LD_LIBRARY_PATH
09 #####
10
11 eval exec "$DEBUG_CMD" "$binary" "$@"
12 $
Of course, you'll need the new
9%
09.10.2017
rule phishing_pdf {
02
03 meta:
04 author = "James Stanger"
05 last_updated = "2017-09-12"
06 category = "phishing"
07 confidence = "high"
08 threat_type = "phishing exploit"
09 description
9%
25.03.2021
[1] sdc1[0]
244065408 blocks super 1.2 [2/2] [UU]
[=>...................] resync = 6.4% (15812032/244065408) finish=19.1min speed=198449K/sec
bitmap: 2/2 pages [8KB], 65536KB chunk
9%
21.03.2017
# ===================
09 #
10 if __name__ == '__main__':
11
12 f = h5py.File("mytestfile.hdf5", "w")
13
14 dset = f.create_dataset("mydataset", (100,), dtype='i')
15
16 dset[...] = np.arange(100)
17