8%
21.08.2014
08 passive_checks_enabled 1
09 notifications_enabled 1
10 check_freshness 1
11 freshness_threshold 93600
12 check_period 24x7
13
8%
30.11.2025
_NOT_RUNNING
08 fi
09
10 pid=`cat $ASTRUNDIR/asterisk.pid`
11 ocf_run kill -s 0 $pid
12 rc=$?
13
14 if [ $rc -eq 0 ]; then
15 if ocf_is_true "$OCF_RESKEY_realtime"; then
16
7%
07.06.2019
the old cache for a maximum of 12 hours.
Listing 3
Heart Rate Monitor
01 backend default {
02 .host = '127.0.0.1';
03 .port = '8080';
04 .probe = {
05 .url = "/";
06 .timeout
7%
11.10.2016
.then(
08 function() {console.log(
"second callback function"); },
09 function(e) {console.log(e.message);}
10 );
11
12 deferred.resolve();
If Listing 1 has registered
7%
07.11.2011
core : ' + str(icore)
07
08 if '__main__' == __name__:
09
10 osrvr = Server()
11 ncpus = osrvr.get_ncpus()
12
13 djobs = {}
14 for i in xrange(0, ncpus):
15 djobs[i] = osrvr
7%
30.11.2025
(number, label):
07 for i in xrange(number):
08 print ' ' + str(i) + ' ' + label
09 sleep((number - 15)/10.0)
10
11 if '__main__' == __name__:
12
13 p1 = Process(target = count, args = (20
7%
06.10.2019
* argv [])
06 /*@requires maxRead(argv) >= 1 @*/
07 /*@-modfilesys@*/
08 {
09 /*@-initallelements@*/
10 char buffer [BUFSIZE] = {'\0'};
11 /*@+initallelements@*/
12 if ( ( argc
7%
18.07.2013
in TLSv1.0 was error-prone, but the problems long remained theoretical.
TLSv1.1, which was designed to iron out the worst weaknesses of CBC, followed in 2006. Two years later, TLSv1.2 was released
7%
14.11.2013
use strict;
04 use Exporter;
05 use vars qw($VERSION @ISA @EXPORT @EXPORT_OK %EXPORT_TAGS);
06
07 $VERSION = 1.0;
08 @ISA = qw(Exporter);
09 @EXPORT = ();
10 @EXPORT_OK = qw
7%
30.11.2025
dh_group modp1024;
09 }
10 generate_policy off;
11 }
12
13 sainfo address 192.168.2.0/24 any address 172.16.0.0/16 any {
14 pfs_group modp1024;
15 encryption_algorithm aes256;
16