search for: debunk

Displaying 20 results from an estimated 26 matches for "debunk".

Did you mean: debug
2010 Mar 17
2
Is samba right for me?
...use it because "samba can't provide everything Server 2008 R2 does." The more and more I read up on Samba (especially Samba4; which I realize isn't going to be released stable for a while) it feels like it *can*provide all the features Server 2008 R2 does. Can you do a bit of myth debunking for me? Would you suggest samba for managing Windows clients (any other tools you can recommend in addition?) I really would like to use Samba + Linux because of the cost of ownership and the open-source community, I just want to make sure it's up to par with Server 2008 R2s offerings. Tha...
2010 Nov 17
1
Lexical Scope: How does it work?
Let me start by saying that I am a fan of lexical scoping as a way of increasing confidence in your execution models. I am hoping to move from the now thoroughly debunked "wackyscope" model that used to plague many programming languages over to proper lexical scoping in my puppet configs. I''m just having trouble finding documentation of how this works for puppet. I understand that a lexically-scoped puppet config would need to use parameterize...
2002 May 22
3
Want to help Wine project?
...ks available: * we *badly* need application owners. An application owner is a person who often uses some application and will help to make it work perfectly under Wine. Does anybody use Lotus Notes regulary under Wine? * confirm and research bugs in Wine Bugzilla http://bugs.winehq.com * Add a 'Debunking Wine Myths' web page http://bugs.winehq.com/show_bug.cgi?id=606 Examples of the easiest programming tasks available: * Help Wine hackers - document Wine debugging channels http://bugs.winehq.com/show_bug.cgi?id=638 * Improve RichEdit headers http://bugs.winehq.com/show_bug.cgi?id=330 Easy,...
2007 Sep 25
0
[EVENT] Asterisk and VoIP in enterprise
...nformation about the possibility to use Asterisk in professional environments, and will feature talks based on real world experience by professionals, including Kevin P. Fleming, Asterisk's co-maintainer. The talks will cover case studies, the integration of a proprietary product with Asterisk, debunking Asterisk myths, how to improve customer service with Asterisk, and more.... A round table with closed source vendors of competing products (with amongst themCISCO and Avaya) will also be organised so participants can get a global view of the VoIP market. Talks won't be commercial shows! Thi...
2011 Jan 04
1
See also: Myths 6 and 8.... there is not Myths 6 and 8!
While waiting for a compilation I was reading Debunking Wine Myths (http://wiki.winehq.org/Debunking_Wine_Myths#head-b7ba8535e8210369749ee2940a7f2bceac4d8ea2)... Nice read (there are really some crazy people....) until Myth 14 where I read: ``See also: Myths 6 and 8.'' There is not Myth 6 and 8! It is a mistake or some kind of joke? In the l...
2001 Dec 17
3
benchmarks
http://www.xent.com/FoRK-archive/apr99/0265.html read this.. how this is posible??
2015 Nov 11
4
UPnP support in tinc
...Google search for "pf cone nat" returns somewhat depressing results: apparently it's not even possible to configure pf to act as an EIM-NAT, and people asking for such an option are basically being told to go away with demonstrably weak security-related arguments (which can easily be debunked by pointing out that NATs and firewalls have different goals, and that providing endpoint-independent mapping does not preclude endpoint-dependent *filtering*, which would still allow UDP hole punching to work). But I digress. So, I'm afraid there's still work to be done to ensure that t...
2015 Nov 12
0
UPnP support in tinc
...quot;pf cone nat" returns somewhat depressing results: > apparently it's not even possible to configure pf to act as an > EIM-NAT, and people asking for such an option are basically being told > to go away with demonstrably weak security-related arguments (which > can easily be debunked by pointing out that NATs and firewalls have > different goals, and that providing endpoint-independent mapping does > not preclude endpoint-dependent *filtering*, which would still allow > UDP hole punching to work). Yes, and they are not RFC 4787 compliant. > The only way we can t...
2012 Mar 23
2
wiki - vnc -gerald and walsh, update?
...about the ssh, but it references only another vnc server. so, is the only way to get an ssh connection is to download a windows vncserver, and connect with that to the vncserver on my linux box? (box is on the internet, not local) anyway, this helpful how to really saves a lot of time, really debunked a lot of myths about not needing a desktop installed (which was really furstrating trying to make it work without one). Centos 6 is a bit different in that one file...and it would be great to know how to connect though ssh with a viewer. still, it freaking works!!
2007 Jan 13
5
Filling holes in a FLAC file from an old Vorbis file
I have a partly damaged CD, from which I extracted 192Kb/s Vorbis files a while ago (before it got damaged) and I'd like to get FLAC files. `cdparanoia' extracted most of the data from the CD, but there are some holes due to the damages. How could I fill those holes in my FLAC files using the Vorbis files? Stefan
2007 Jan 13
5
Filling holes in a FLAC file from an old Vorbis file
I have a partly damaged CD, from which I extracted 192Kb/s Vorbis files a while ago (before it got damaged) and I'd like to get FLAC files. `cdparanoia' extracted most of the data from the CD, but there are some holes due to the damages. How could I fill those holes in my FLAC files using the Vorbis files? Stefan
2007 Jan 13
5
Filling holes in a FLAC file from an old Vorbis file
I have a partly damaged CD, from which I extracted 192Kb/s Vorbis files a while ago (before it got damaged) and I'd like to get FLAC files. `cdparanoia' extracted most of the data from the CD, but there are some holes due to the damages. How could I fill those holes in my FLAC files using the Vorbis files? Stefan
2011 Feb 04
3
[LLVMdev] CPS
Hi everybody, I'd like to try implementing a pass that transforms all functions (and function calls, returns, etc.) to CPS, so that TCO can get rid of all (or most of) the function calling overhead (because, as you probably know, the side effect of using CPS is that all function calls become tail calls). That being said, and since I'm pretty new to LLVM, I'd like to ask a couple
2004 Sep 09
2
UDP routing issues with multiple NICs
...ugh NIC2 will not catch the packets because the source address, at the time, is 0.0.0.0. If I force a specific IP to be routed through NIC2, then that IP can connect successfuly to the server over NIC2. I''m looking for possible solutions, but so far have only found one to have it later debunked. I have considered NAT, and determined that it won''t work. I can''t DNAT from IP2 to IP1, for reasons still not entirely known to me. For some reason DNAT from IP2 to IP1 doesn''t get any sort of response from the server. Even after I have removed ALL firewall rules. I ca...
2016 Feb 08
7
Utility to zero unused blocks on disk
DBAN is obsolete. NIST 800-88 for some time now says to use secure erase or enhanced security erase or crypto erase if supported. Other options do not erase data in remapped sectors. Chris Murphy
2004 Sep 30
2
FXO/FXS card
Hi, I thought I remember seeing somewhere on the Asterisk website a card that had 16 ports fxo or fxs, that was user selectable with straps on the card. Am I going crazy, I can't seem to find it now. -------------- next part -------------- An HTML attachment was scrubbed... URL: http://lists.digium.com/pipermail/asterisk-users/attachments/20040930/86c8ae69/attachment.htm
2017 Aug 07
3
Has For bucle be impooved in R
Hi! I am doing a lapply and for comparaison and I get that for is faster than lapply. What I have done: n<-100000 set.seed(123) x<-rnorm(n) y<-x+rnorm(n) rand.data<-data.frame(x,y) k<-100 samples<-split(sample(1:n),rep(1:k,length=n)) res<-list() t<-Sys.time() for(i in 1:100){ modelo<-lm(y~x,rand.data[-samples[[i]]])
2008 Mar 03
5
on the philosophical aspects of a specification
a specification will _eventually_ be used, by someone, to tell the user they are doing things "wrong", won't it? and doesn't that turn markdown's genesis upside-down? heck, next thing you know we'll be telling them to r.t.f.m. i would prefer that implementers get more sophisticated about teasing out the user's intent in "ambiguous" cases. of course,
2016 Jun 02
0
[ANNOUNCE] nftables 0.6 release
...e have to resolve a conflict in first place evaluate: don't adjust offset from resolve_protocol_conflict() evaluate: only try to replace dummy protocol from link-layer context evaluate: assert on invalid base in resolve_protocol_conflict() evaluate: wrap protocol context debunk into function evaluate: generate ether type payload after meta iiftype proto: proto_dev_type() returns interface type for base protocols too src: annotate follow up dependency just after killing another tests/py: test vlan on ingress netlink_delinearize: prune implicit...
2004 Aug 03
0
Fw: Digium FXO Interfaces don't support groundstart???
A thought occurred to me to on how to further quantify the impact of "glare" on a properly dimensioned trunk group and debunk the ground start glare concern. A cursory traffic analysis clarifies: 1. Assume you have a two-way trunk group, dimensioned for average busy hour, average busy season for P01 grade of service, Erlang B or Poison distribution. 2. Further assume that the average holding time per call is the nati...