12%
07.10.2014
way. To my mind, the "Customizing PortSentry" article [1] complements the topic of this article very nicely and might help you build a super-simple but highly effective security solution if you
12%
08.04.2014
| elapsed: 0.0s remaining: 4.5s
[Parallel(n_jobs=2)]: Done 198 out of 1000 | elapsed: 1.2s remaining: 4.8s
[Parallel(n_jobs=2)]: Done 399 out of 1000 | elapsed: 2.3s remaining: 3.5s
12%
27.09.2024
query large amounts of data on distributed systems. CouchDB has been an Apache project since 2008. Version 1.0 in 2010 has evolved into version 3.3 today.
"Couch" was originally an acronym for "cluster
11%
21.04.2016
been used to provision and manage some of the biggest supercomputers in the world. At present I am working on the architecture for the next major version of Warewulf (v4).
I am also part of a new open
11%
28.11.2022
Containers, Kubernetes, Rancher, OpenShift, Docker, Podman – if you have not yet worked in depth with containers and Kubernetes (aka K8s), you might sometimes get the impression that you have
10%
19.09.2019
add_ufunc(x, y):
return x + y
The decorator line defines the data types (i.e., int64
here) and the target for the decorator cuda
. A simple test for the add_ufunc
Numba function is:
a = np.array([1, 2, 3, 4])
b
10%
16.08.2018
harm to a critical asset.
With the main components of risk in mind, a picture of risk can be formulated as the intersection of all three components (Figure 1
10%
09.04.2019
tables, you just query an ephemeral table, keeping in mind its name pattern. For example,
SELECT seq FROM seq_1_to_10_step_2;
returns all numbers from 1 to 10, incremented by 2 (pair numbers). Slightly