29%
30.11.2025
"------------------------------------------------------"
18 echo -n "Replace stored data line (y)? ";read we
19 if [ "$we" = "y" ];
20 then
21
22 # Delete line and write to
23 # temporary file
24
25 # Build sed instruction
26
29%
01.06.2024
_Comm_size(MPI_COMM_WORLD, &nodenum);
21 long recieved[nodenum];
22 long recvniter[nodenum];
23 srand(SEED+myid); //Give rand() a seed value. Needs to be different on each node
24
25 if(myid != 0
29%
12.09.2013
approx. US$ 600
approx. US$ 335
CPU
Via Eden X2/1GHz
Via Eden X2/1GHz
AMD G-T44R/1.2GHz
AMD G-T56N/1.6GHz
Marvell ARMADA PXA 510 v7.1
Chipset
29%
09.10.2023
12 7:12 0 40.8M 1 loop /snap/snapd/20092
sda 8:0 0 5.5T 0 disk
|---sda1 8:1 0 5.5T 0 part /home2
nvme1n1 259:0 0 953.9G 0 disk
|---nvme1n1p1 259:2 0 953.9
29%
15.12.2016
are over i
= 2,n
− 1 and j
= 2,n
−1. Here is how you can write the iteration over the domain using array notation:
a(2:n-1,2:n-1) = 0.25 * &
(a(1:n-2,2:n) + a(3:n,2:n) + a(2:n,1:n-2) + a(2:n,3:n
29%
16.10.2012
6), and start stream blocking (line 7), which executes the command and waits for the response. Now, write the output to a variable (lines 9-12), close the stream (line 14), and send the response
29%
05.09.2011
can see how the arp cache poisoning works:
$ sudo nemesis arp -v -r -d eth0 -S 192.168.1.2 \
-D 192.168.1.133 -h 00:22:6E:71:04:BB -m 00:0C:29:B2:78:9E \
-H 00:22:6E:71:04:BB -M 00:0C:29:B2:78:9E
29%
25.09.2013
5.25
Sandy Bridge EP (2012)
16 (8)
78
4.88
Sandy Bridge EP (2012)
12 (6)
78
6.5
Sandy Bridge EP (2012)
8 (4)
78
9
29%
18.02.2018
public_key = "${file("${var.ssh_pub_key}")}"
07 }
08 resource "digitalocean_droplet" "mywebapp" {
09 image = "docker-16-04"
10 name: guest
11 region = "fra1"
12 size = "512mb"
13 ssh
29%
30.11.2025
.168.209.200
07 192.168.209.200:3260,1 iqn.1986-03.com.sun:02:8f4cd1fa-b81d-c42b-c008-a70649501262
08 # iscsiadm -m node
09 # /etc/init.d/open-iscsi restart
10 # fdisk -l
11 Disk /dev/sdb: 2147 MB, 2147418112 bytes