21%
09.04.2019
, "; ")
global i = i + 2
end
# for loop using iterators
for n in 1:5
print(2^n, "--")
end
# implied nested loop
for i = 1:2, j = 1:2
println([i, j])
end
# loop over container
for i in ["first", "second
21%
10.06.2015
], an open source community project for a full-featured toolkit implementation of SSL and TLS, as well as general-purpose cryptography. It was the subject of the infamous Heartbleed [15] vulnerability
21%
04.08.2020
intrusion detection system up and running in less than 15 minutes. In this article, I walk you through enabling the tool, configuring notifications and security alerts, and showing you different ways
21%
06.10.2019
.path.isfile( "/opt/openvpn/ca/keys/" + username + ".crt"):
13 # print "Cert for " + username + " exists"
14 a=1
15 else:
16
17 # get user details
18 detailsurl
21%
05.12.2016
"
12 tapetype "EXAMPLE-TAPE"
13 define tapetype EXAMPLE-TAPE {
14 length 100 mbytes
15 filemark 4 kbytes
16 }
17 define dumptype simple-gnutar-tcp {
18 auth "bsdtcp"
19 program "GNUTAR
21%
13.02.2017
.g., with a centralized, alerting Syslog server).
Run through the Center For Internet Security (CIS) hardening document for your daemon [15].
Run Docker on a host by itself, and don't introduce further issues
21%
09.06.2018
access to files, the network, the graphical user interface (GUI), and various subsystems. Using predefined interfaces from the portal APIs [15], an application running in the sandbox can access resources
21%
16.08.2018
content type or a module like Juicebox [14], which was beta at the time of writing)
Comment Function
Yes
No (can be retrofit with extensions like JComments [15] or CComment Pro [16
21%
15.08.2016
Docker for two reasons, as articulated in an article by Nicole Hemsoth [15] and as alluded to by Gregory M. Kurtzer [16], the developer of Singularity:
HPC Security – no root escalation
"… 'simple
21%
26.01.2025
examples, as well as a nice section on generative examples [15] that go beyond the transformer examples.
Infos
Keras: https://kera.io/
MNIST: https