12%
17.02.2015
://developer.nvidia.com/jetson-tk1
Odroid-XU3
Android 4.4, Linux
Samsung Exynos5422
Quad ARM Cortex-A15 @2.0GHz (32KB/32KB/2MB), Quad ARM Cortex-A7 @1.4GHz (32KB/32KB/512KB)
Mali-T628 MP6
12%
20.05.2014
.168.1.129 -p 3260
specifying that the target Windows computer with the Subject
USB stick is at 192.168.1.129 and listening on port 3260. The system connects to targets
iqn.2008-02.com.f-response.cr0wn-d00
12%
12.09.2013
=$dbh->prepare('select burncpu(?)');
12 $sth->execute((($ENV{QUERY_STRING}+0) || .5).'s');
13
14 while( my $row=$sth->fetchrow_arrayref ) {
15 print "@$row\n";
16 }
Workaround
The script is simple, but the attentive
12%
21.08.2014
} 'a'..'c';
12
13 $s .= $one;
14 $s .= $two;
15 $s .= $three;
16
17 my $temp;
18 for (my $i=0; $i<12288; $i++) {
19 $temp=substr($s,length($s)-1,1);
20 $s=$temp.$s;
21 $s = substr($s,0
12%
30.01.2020
sports a few additional capabilities, the most noteworthy being its ability to measure page faults and swapping activity by the tested binary:
$ /usr/bin/time gcc test.c -o test
0.03user 0.01system 0:00
12%
05.09.2011
STAT
03 0 open-nebula-wn 0 100 99 100 1068948 921356 on
04 1 open-nebula-wn2 0 100 12 100 1173072 1027776 on
OpenNebula Configuration File
You
12%
20.10.2013
: Z1F35P0G
LU WWN Device Id: 5 000c50 050b954c3
Firmware Version: CC27
User Capacity: 3,000,592,982,016 bytes [3.00 TB]
Sector Sizes: 512 bytes logical, 4096 bytes physical
Device is: In smartctl
12%
02.06.2020
= sol.copy()
10
11 for j in range(0,ny-1):
12 sol[0,j] = 10.0
13 sol[nx-1,j] = 1.0
14 # end for
15
16 for i in range(0,nx-1):
17 sol[i,0] = 0.0
18 sol[i,ny-1] = 0.0
19 # end for
20
21 # Iterate
22
12%
05.02.2019
), (2, 2017, 0.0), (3, 2017, 100.00);
12 SQL> INSERT INTO customer
13 VALUES (1, 2018, 400.0), (2, 2018, 0.0), (3, 2018, 0.0);
14
15 SQL> SELECT * FROM customer;
16 +---+------+---------+
17 | id| year
11%
29.09.2020
-amd64.tar.gz.sha256sum
[...snip]
e6be589df85076108c33e12e60cfb85dcd82c5d756a6f6ebc8de0ee505c9fd4c helm-v3.1.2-linux-amd64.tar.gz
$ sha256sum helm-v3.1.2-linux-amd64.tar.gz
e6be589df85076108c33e12e60cfb85