20%
11.10.2016
(every 5 seconds):
14 (periodically-expire 5)
15
16 ; Email address used to send notifications:
17 (def email (mailer {:from "riemann@example.com"}))
18
19 ; Index: Definition
20 (let [index (index)]
21
20%
16.08.2018
pdsh read the hosts from a file other than the WCOLL environment variable:
$ pdsh -w ^/tmp/hosts uptime
192.168.1.4: 15:51:39 up 8:35, 12 users, load average: 0.64, 0.38, 0.20
192.168.1.250: 15:47:53 up
20%
11.04.2016
Example
# iostat -xmt 1 /dev/sda
Linux 3.16.7-21-desktop (tweedleburg) 08/07/15 _x86_64_ (8 CPU)
08/07/15 17:25:13
avg-cpu: %user %nice %system %iowait %steal %idle
1
20%
05.08.2024
.yml playbook to remove the uprintfd entry from the /etc/inittab file on the AIX host (Listing 15). Note that the state: directive is set to absent, meaning the /etc/inittab entry should be removed if it exists
20%
27.09.2024
, but the SSD writes 1.5MB, the SSD has a WAF value of 1.5. A WAF of 1 with zero overhead would be ideal. Sequential write operations come closest because they store large contiguous blocks of data. The WAF
20%
03.08.2023
followed by the number of the configured DHCP option. For example, the block from Listing 2 sets DHCPv4 option code 15 (domain-name).
Listing 2
Dictionary Entry
{
"code": 15,
"data
20%
16.05.2013
result on host
15
16 // Free device memory
17 dA = gpuFree(dA);
18 dC = gpuFree(dC);
19 d1 = gpuFree(d1);
20 d2 = gpuFree(d2);
21 d3 = gpuFree(d3);
Scilab has a vibrant community, and the excellent
20%
31.10.2025
.4/hour (US$ 0.15/core per hour), Cluster GPU instance is US$ 2.1/hour, and the High I/O instance is US$ 3.1/hour.
Thus, using the small usage case (80 cores, 4GB of RAM per core, and basic storage of 500
20%
31.10.2025
for VirtualBox
14 - virtualpc plugin for VirtualPC
15
16 Available delivery plugins:
17 - s3 plugin for Amazon Simple Storage Service (Amazon S3)
18 - cloudfront plugin for Amazon Simple Storage
20%
30.11.2025
pressing Save
, whenever a client on the LAN tries to access the Internet, the user is automatically shown the login screen that you can see in Figure 15. The user needs to enter the credentials stored