14%
26.03.2025
a large text file (war-and-peace.txt from Project Gutenberg [2]) saved in a local Amazon Simple Storage Service (S3)-compatible object storage (Figure 2). This type of object storage, being easy to deploy
14%
05.12.2019
solution. Docker starts and configures its images reproducibly according to configuration files. If these are also in the project's version control system, theoretically all developers should get their own
14%
02.02.2021
(Listing 2), which configures forwarding to the PHP-FPM server for all files ending in .php. Because the client.html file, which is delivered as a static page, is located in the same folder as the server ... The FIDO and FIDO2 standard supports passwordless authentication. We discuss the requirements for the use of FIDO2 and show a sample implementation for a web service. ... Secure Login with FIDO2 ... Secure authentication with FIDO2
14%
14.03.2013
this file, producing two sets of information: (1) timing information that consists of execution time spent in every function and the equivalent percentage of total run time, and (2) a call graph showing who
14%
09.10.2017
configured open source Nagios distribution made for easy deployment on affordable hardware. Nagios Enterprise Monitoring Server (NEMS) [1] is a pre-configured, customized, and ready-to-deploy Nagios Core [2
14%
20.06.2022
with the default LTS release version of Ubuntu (20.04 as of this writing) named mycloudvm
with two CPUs, 2GB of memory, 10GB of disk space, and a launch operation timeout of 10min.
The commands
multipass list
14%
17.06.2017
files, yanking (copying and pasting), and manipulating buffers. If such features interest you, then you might prefer NeoBundle over Pathogen or Vundle.
NeoBundle requires Vim 7.2.051 or higher
14%
12.09.2013
software components, you can then start preparing your future template for automatic deployment of virtual machines. You need to run the Sysprep tool for Windows. On a Windows 7 guest system, you open
14%
03.02.2022
and execute arbitrary code loaded from LDAP servers when message substitution is enabled.
This vulnerability (CVE-2021-44228)(https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228) was found in Log4j2
14%
01.08.2019
total
x = numpy.arange(10_000_000);
%time sum(x)
CPU times: user 1.63 s, sys: 0 ns, total: 1.63 s
Wall time: 1.63 s
Next, add Numba into the code (Listing 2) so the @jit decorator can be used. (Don