10%
    
    
    05.08.2024
        
    
    	
        
COPY --from=dockerize /usr/local/bin/dockerize /usr/local/bin/
COPY gcpemu_csptst.sh /usr/local/bin/run.sh
ENTRYPOINT ["run.sh"]
Finally, create the YAML file in Listing 12 and launch the local
    
 
		    
				        
    10%
    
    
    05.03.2014
        
    
    	
         no longer than five hours. Registering for the test can take some time; applications for the test must be vetted manually. The Linux Magazine
 editorial team was granted access about 12 hours after applying
    
 
		    
				        
    10%
    
    
    08.04.2014
        
    
    	
         | elapsed:    0.0s remaining:    4.5s
[Parallel(n_jobs=2)]: Done  198 out of 1000 | elapsed:    1.2s remaining:    4.8s
[Parallel(n_jobs=2)]: Done  399 out of 1000 | elapsed:    2.3s remaining:    3.5s
    
 
		    
				    
    10%
    
    
    18.03.2013
        
    
    	 
         is a classic bug in a web application: an SQL injection vulnerability. SQL injection, which has been known for around 12 years, is still one of the hacker’s most popular tools.
This article presents real
    
 
		    
				        
    10%
    
    
    05.12.2011
        
    
    	
        ’s Supercomputing Conference (SC12) in Salt Lake City. We will be at the International Supercomputing Conference in Hamburg, Germany, at the RWTH Aachen booth.
Readers can get involved by petitioning their companies
    
 
		    
				    
    10%
    
    
    10.07.2012
        
    
    	 
                  firstname=v
12       elseif k=='lastname' then
13          lastname=v
14       end
15    end
16 
17    r:puts(string.format("Hello %s %s!", firstname, lastname))
18 
19    r:puts("