17%
28.07.2025
of all evil" sums up this point of view neatly [3]. The reasons for such a statement are particularly apparent in the many mangling strategies one can choose to apply to loops (Table 1). These strategies
17%
06.11.2012
using the avail
option:
$ module avail
-------------------------- /opt/Modules/modulefiles -----------------------------
atlas/3.10.0/gnu4/i5-2400S modules
blacs/1.1/gnu4/mpich2
17%
09.10.2023
1 loop /snap/core20/1974
loop2 7:2 0 63.5M 1 loop /snap/core20/2015
loop3 7:3 0 73.9M 1 loop /snap/core22/864
loop4 7:4 0 237.2M 1 loop /snap/firefox/3026
loop5
17%
10.11.2011
Opteron 6000 Series platform
AMD Opteron™ 4200 Series Processor
The world's lowest power per core x86 processor3 just got more power efficient
17%
25.03.2021
and system owners, which makes it easy to provide protection against exploits. Brute force attacks on SSH servers, the lack of encryption in communications, and distributed denial of service (DDoS
17%
12.09.2013
-passphrase
Several parameters in this file define the repository layout [2] [3], as follows:
Origin: An optional field that describes the origin of the repository. You can select a free line of text.
Label
17%
01.03.2012
control system, which Fedora enables by default. But at the top of the administrator’s list has to be kernel 3.1, with its new KVM and Xen functionality, and Fedora 16’s above average collection
17%
17.10.2018
the examples presented here use the Spyder 3.2.8 Python development environment (Anaconda 5.2.0) on Mint 19.0 Xfce. Because the full code is too long for a printed article, it’s freely available on
17%
15.12.2016
are over i
= 2,n
− 1 and j
= 2,n
−1. Here is how you can write the iteration over the domain using array notation:
a(2:n-1,2:n-1) = 0.25 * &
(a(1:n-2,2:n) + a(3:n,2:n) + a(2:n,1:n-2) + a(2:n,3:n
17%
13.06.2016
information [2].
You can use Let's Encrypt for any website regardless of the web server. For my home-grown sites, I use one ESXI VMware server and deploy pre-installed virtual machines using TurnKey Linux [3