17%
26.10.2012
that the frequently forwarded ports belong to services typically used by malware to infect new systems (Figure 6).
Figure 6: Registered attacks on various ports
17%
02.04.2013
any back-end software because it is provided by Vasco in the cloud (see also the “OAuth API” box).
Figure 6: The online demo token by Vasco lets users
17%
12.08.2013
.tool
The output is given in JSON format (Figure 5), so piping it to python -m json.tool
makes the output readable (Figure 6).
Figure 5: Performance data queried
17%
22.06.2014
Stack machines is much more convenient in the built-in Puppet Dashboard than setting up the services manually (Figure 6). If you want to extend your OpenStack installation later to add more computers, you can do
17%
13.12.2011
entities and run transforms to change those entities. The palette is available once you click the Manage
tab and see it listed under Windows
, which contains a default collection of entities (see Figure 6
17%
03.02.2012
be sure that the evidence is genuine and has not been injected by a malicious third-party? In this context, the term data provenance [6] becomes extremely meaningful: It covers the origins of the piece
17%
16.07.2019
a “wrapper function” for the library in Python (Listing 6).
Listing 6: Wrapper Function
import ctypes
_sum = ctypes.CDLL('libsum.so')
_sum.sum_function
17%
03.04.2019
) by each thread, you would probably put the parallel region around the outside loop (Table 6); otherwise, the work on each thread is less (fewer loops), and you aren't taking advantage of parallelism
17%
20.02.2023
the file /usr/local/bin/gpu_devices.sh
(Listing 6).
Listing 6: /usr/local/bin/gpu_devices.sh
#!/bin/bash
/sbin/modprobe nvidia
if [ "$?" -eq 0 ]; then
# Count the number of NVIDIA controllers found.
NVDEVS=`lspci | grep -i NVIDIA`
N3
17%
11.09.2023
compute nodes with 4-6 (or more) SSD drives that are combined by software RAID with anything from RAID 0 to RAID 5 or RAID 6. These nodes now have substantial performance in the tens of gigabytes per second