14%
02.02.2021
.sin(periods * 2 * np.pi * t)
12 return max(value, 0.0)
13 else:
14 value = np.sin(periods * 2 * np.pi * t)
15 return max(value, 0.0)
16
17 # building the data vector
18 my_data = []
19 i = 0
20 while
14%
07.06.2019
:
Estimate Std. Error t value Pr(>|t|)
(Intercept) 517.340 18.270 28.316 < 2e-16 ***
wdayThursday -31.046 16.119 -1.926 0.0545 .
wdayFriday -116.981 16.122 -7.256 1.08e-12 ***
wday
14%
11.02.2016
. The guide cites a 1.5GHz CPU or better, 512MB of RAM, and 30GB of hard disk space as the minimum requirements. For a small installation for up to 10 users, you could even get away with 256MB if RAM, 20GB
14%
21.08.2012
just two nodes: test1, which is the master node, and n0001, which is the first compute node):
[laytonjb@test1 ~]$ pdsh -w test1,n0001 uptime
test1: 18:57:17 up 2:40, 5 users, load average: 0.00, 0.00
14%
09.10.2017
"SubnetMax": "10.99.0.0",
07 "Backend": {
08 "Type": "udp",
09 "Port": 7890
10 }
11 }
12 [...]
At first glance, this concept looks robust and simple
14%
28.11.2021
Compiler: Apple LLVM 12.0.5 (clang-1205.0.22.9) GCC 4.2.1 CLANG 12.0
Darwin : 20.4.0 : Darwin Kernel Version 20.4.0:
PageSize:16KB
Apple M1 8C8T
RAM size: 16384 MB, # CPU hardware threads: 8
RAM usage
14%
03.12.2015
.0.3.0/24 !10.0.3.0/24
root@ubuntu:~# ps -eaf | grep dnsmas
lxc-dns+ 1047 1 0 18:24 ? 00:00:00 dnsmasq -u lxc-dnsmasq --strict-order --bind-interfaces --pid-file=/run/lxc/dnsmasq.pid --conf
14%
17.03.2021
. It supported an integrated memory controller and a HyperTransport I/O bus. The processor started at a speed of 1.2GHz. Although test results are hard to come by, it is thought that its performance was a bit less
14%
28.11.2021
can use to test security vulnerabilities, enumerate networks, execute attacks, and evade detection" [1], has been written up in a number of books. Linux Magazine
reported more than 12 years ago [2
14%
14.03.2013
family, by the names of SHA-224, SHA-256, SHA-284, and SHA-512. But, again, some cryptographers saw issues looming; the methods that SHA-2 uses differ only slightly from those used by MD5 and SHA-1.
So