<?xml version="1.0" encoding="utf-8" ?><rss version="2.0"><channel><title>Bing: NC Peer Support Note Examples</title><link>http://www.bing.com:80/search?q=NC+Peer+Support+Note+Examples</link><description>Search results</description><image><url>http://www.bing.com:80/s/a/rsslogo.gif</url><title>NC Peer Support Note Examples</title><link>http://www.bing.com:80/search?q=NC+Peer+Support+Note+Examples</link></image><copyright>Copyright © 2026 Microsoft. All rights reserved. These XML results may not be used, reproduced or transmitted in any manner or for any purpose other than rendering Bing results within an RSS aggregator for your personal, non-commercial use. Any other use of these results requires express written permission from Microsoft Corporation. By accessing this web page or using these results in any manner whatsoever, you agree to be bound by the foregoing restrictions.</copyright><item><title>open a port permanently on linux using nc (netcat) [duplicate]</title><link>https://stackoverflow.com/questions/76323691/open-a-port-permanently-on-linux-using-nc-netcat</link><description>nc is the wrong tool for this job (to a greater or lesser degree based on which version you have; the more appropriate ones have the option to fork a subprocess for each new incoming connection). Use a proper built-to-purpose superserver -- xinetd was the up-and-coming standard 25 years ago; today I'd suggest tcpsvd.</description><pubDate>Thu, 09 Apr 2026 10:16:00 GMT</pubDate></item><item><title>unix - Why node nc (netcat) give error "inverse host lookup failed ...</title><link>https://stackoverflow.com/questions/48779583/why-node-nc-netcat-give-error-inverse-host-lookup-failed-unknown-host</link><description>"Inverse host lookup failed" simply means that nc wanted to print which host name 10.0.0.10 corresponds to, but couldn't. UNKNOWN is simply what it then prints as the host name. This is distinct from "I looked it up, but it doesn't seem to correspond to anything" which is what happens outside the container. To be perfectly explicit, connecting to the host succeeded, but looking up its name ...</description><pubDate>Wed, 08 Apr 2026 08:59:00 GMT</pubDate></item><item><title>What is the difference between ssh proxycommand -W, nc, exec nc</title><link>https://stackoverflow.com/questions/22635613/what-is-the-difference-between-ssh-proxycommand-w-nc-exec-nc</link><description>The old nc version doesn't allow using different usernames for the bastion and target server. Also, I recently learned that ssh 7.3 and newer introduced a ProxyJump parameter which is a more user-friendly option to the ones you mentioned.</description><pubDate>Thu, 09 Apr 2026 22:41:00 GMT</pubDate></item><item><title>Export to netcdf / .nc file from a pandas DataFrame</title><link>https://stackoverflow.com/questions/79399697/export-to-netcdf-nc-file-from-a-pandas-dataframe</link><description>I want to multiple data extract from cmip6 model data and save as netcdf file by using the following scripts: import pandas as pd import xarray as xr from netCDF4 import Dataset nc_file = (r&amp;qu...</description><pubDate>Thu, 09 Apr 2026 18:38:00 GMT</pubDate></item><item><title>Broadcasting a message using nc (netcat) - Stack Overflow</title><link>https://stackoverflow.com/questions/13294893/broadcasting-a-message-using-nc-netcat</link><description>I'm trying to send a broadcast message using netcat. I have firewalls open and sending a regular message like this works for me: host: nc -l 192.168.1.121 12101 client: echo "hello" | nc 192....</description><pubDate>Mon, 06 Apr 2026 08:40:00 GMT</pubDate></item><item><title>Read .nc (netcdf) files using python - Stack Overflow</title><link>https://stackoverflow.com/questions/36360469/read-nc-netcdf-files-using-python</link><description>I am trying to learn how to read netcdf files using Python in the most easiest/fastest way. I heard that it can be done with 3 lines of code but I really don't know how. I am running the MITgcm num...</description><pubDate>Thu, 09 Apr 2026 15:17:00 GMT</pubDate></item><item><title>How to display nc return value in Linux shell script?</title><link>https://stackoverflow.com/questions/42377276/how-to-display-nc-return-value-in-linux-shell-script</link><description>I am using nc command in my Linux box like below to check if a port is listening; This displays success message: nc -z 192.168.0.2 9000 This displays 0: echo $? I have combined it in a shell scr...</description><pubDate>Thu, 09 Apr 2026 18:02:00 GMT</pubDate></item><item><title>Test if remote TCP port is open from a shell script</title><link>https://stackoverflow.com/questions/4922943/test-if-remote-tcp-port-is-open-from-a-shell-script</link><description>I'm looking for a quick and simple method for properly testing if a given TCP port is open on a remote server, from inside a Shell script. I've managed to do it with the telnet command, and it works</description><pubDate>Thu, 09 Apr 2026 18:45:00 GMT</pubDate></item><item><title>Combining .nc files and extracting selected variables</title><link>https://stackoverflow.com/questions/74783678/combining-nc-files-and-extracting-selected-variables</link><description>However, if my nc-files contain lots of variables, i.e. chlorophyll, TSM and so on, how would I read in only the necessary variables? I guess I'm confused by what the z-axis in my files is and I am not sure how to check it.</description><pubDate>Thu, 02 Apr 2026 07:26:00 GMT</pubDate></item><item><title>Using xarray in JupyterLab to read NC file from url</title><link>https://stackoverflow.com/questions/79409001/using-xarray-in-jupyterlab-to-read-nc-file-from-url</link><description>Using xarray in JupyterLab to read NC file from url Asked 1 year, 2 months ago Modified 1 year, 2 months ago Viewed 289 times</description><pubDate>Sun, 05 Apr 2026 11:40:00 GMT</pubDate></item></channel></rss>