9%
05.08.2024
COPY --from=dockerize /usr/local/bin/dockerize /usr/local/bin/
COPY gcpemu_csptst.sh /usr/local/bin/run.sh
ENTRYPOINT ["run.sh"]
Finally, create the YAML file in Listing 12 and launch the local
9%
13.10.2020
be parallelized). For one process, the wall clock time is assumed to be 1,000 seconds, which means that 200 seconds of the wall clock time is the serial portion of the application. From Amdahl’s Law, the minimum
9%
30.11.2020
at their disposal.
Figure 2: Network hardware, such as these Mellanox switches, achieves at least 200Gbps per port – less than 25Gbps does not make sense
9%
02.02.2021
cannot be parallelized). For one process, the wall clock time is assumed to be 1,000 seconds, which means that 200 seconds of the wall clock time is the serial portion of the application. From Amdahl's Law
9%
07.10.2014
Research notes the cost of password breaches reached more than US$ 200 billion in annual losses.
According to the Verizon 2013 Data Breach Report, weak or stolen credentials account for 76 percent
9%
02.02.2021
(Listing 4).
Listing 4
JSON Output
$ teler -i apache.log -c teler.yml --json
/","status":"200","time_local":"07/Nov/2020:22:45:20 +0000"}
{"body_bytes_sent":"5695","category":"Bad Crawler
9%
30.01.2020
: /lib/modules/4.20.5-200.fc29.x86_64/kernel/net/netfilter/nf_tables.ko.xz
alias: nfnetlink-subsys-10
author: Patrick McHardy
license: GPL
depends
9%
08.04.2014
| elapsed: 0.0s remaining: 4.5s
[Parallel(n_jobs=2)]: Done 198 out of 1000 | elapsed: 1.2s remaining: 4.8s
[Parallel(n_jobs=2)]: Done 399 out of 1000 | elapsed: 2.3s remaining: 3.5s
9%
18.03.2013
is a classic bug in a web application: an SQL injection vulnerability. SQL injection, which has been known for around 12 years, is still one of the hacker’s most popular tools.
This article presents real
9%
05.12.2011
’s Supercomputing Conference (SC12) in Salt Lake City. We will be at the International Supercomputing Conference in Hamburg, Germany, at the RWTH Aachen booth.
Readers can get involved by petitioning their companies