18%
30.01.2020
-06f4dce9c3ae2c504" # for eu-west-3 paris
07 InstanceType: t2.small
08 AvailabilityZone: !GetAtt FortiVPCFrontNet.AvailabilityZone
09 KeyName:
10 Ref: KeyName
11 Network
18%
04.08.2020
in the standard Python built-ins [2] and in the NumPy library [3].
Figure 1: IPython session comparing two implementations of a round routine.
Unless you
18%
05.02.2019
Kubernetes Service (AKS) [3], make it possible to provision immensely complex orchestration platforms and tools with point-and-click web interfaces or a simple command-line invocation. In this dimension, many
18%
03.08.2023
, author, publication_date, price) VALUES
('1984', 'George Orwell', '1949-06-08', 14.99);
SELECT * FROM books;
As long as a majority of the replicas (in this case, at least two out of three) are operational
18%
30.11.2020
== 0:
08 data = { 'key1' : [10,10.1,10+11j],
09 'key2' : ('mpi4py' , 'python'),
10 'key3' : array([1, 2, 3]) }
11 else:
12 data = None
13 # end if
14
15 data = comm
18%
28.11.2023
.
Listing 14
statpingng_stack.yml
01 version: '3.5'
02 services:
03
04 statping:
05 container_name: statpingng
06 image: adamboutcher/statping-ng:${SPNGTAG:-latest}
07 ports:
08
18%
14.03.2013
to 4.2GHz)
4MB L2 cache
384 Radeon cores
800MHz GPU clock speed
DDR3 1866MHz memory
100W
Putting both the CPU and the GPU on the same processor allows the GPU to have access to system
18%
28.11.2022
of the DIB sector, the DoD cannot scale its organic cybersecurity assessment capability to conduct on-site assessments of approximately 220,000 DoD contractors every three years. As a result, the Department
18%
22.08.2011
:lanman passfile.txt
Loaded 2 passwords with 2 different salts (FreeBSD MD5 [32/64])
guesses: 0 time: 1:04:04:08 (3) c/s: 10927 trying: gmugoky - gmugok2
guesses: 0 time: 1:09:25:10 (3) c/s: 10929 trying
18%
02.02.2021
interacts with the environment as an agent, much like a sentient being (Figure 3). The agent has to explore the environment and typically only learns after a certain number of actions whether