Displaying 20 results from an estimated 26 matches for "debunk".
Did you mean:
debug
2010 Mar 17
2
Is samba right for me?
...use it because "samba can't provide
everything Server 2008 R2 does."
The more and more I read up on Samba (especially Samba4; which I realize
isn't going to be released stable for a while) it feels like it
*can*provide all the features Server 2008 R2 does.
Can you do a bit of myth debunking for me?
Would you suggest samba for managing Windows clients (any other tools you
can recommend in addition?)
I really would like to use Samba + Linux because of the cost of ownership
and the open-source community, I just want to make sure it's up to par with
Server 2008 R2s offerings.
Tha...
2010 Nov 17
1
Lexical Scope: How does it work?
Let me start by saying that I am a fan of lexical scoping as a way of
increasing confidence in your execution models. I am hoping to move
from the now thoroughly debunked "wackyscope" model that used to plague
many programming languages over to proper lexical scoping in my puppet
configs. I''m just having trouble finding documentation of how this
works for puppet.
I understand that a lexically-scoped puppet config would need to use
parameterize...
2002 May 22
3
Want to help Wine project?
...ks
available:
* we *badly* need application owners. An application
owner is a person who often uses some application and
will help to make it work perfectly under Wine.
Does anybody use Lotus Notes regulary under Wine?
* confirm and research bugs in Wine Bugzilla
http://bugs.winehq.com
* Add a 'Debunking Wine Myths' web page
http://bugs.winehq.com/show_bug.cgi?id=606
Examples of the easiest programming tasks available:
* Help Wine hackers - document Wine debugging channels
http://bugs.winehq.com/show_bug.cgi?id=638
* Improve RichEdit headers
http://bugs.winehq.com/show_bug.cgi?id=330
Easy,...
2007 Sep 25
0
[EVENT] Asterisk and VoIP in enterprise
...nformation about the possibility to use Asterisk in professional
environments, and will feature talks based on real world experience by
professionals, including Kevin P. Fleming, Asterisk's co-maintainer.
The talks will cover case studies, the integration of a proprietary
product with Asterisk, debunking Asterisk myths, how to improve
customer service with Asterisk, and more.... A round table with closed
source vendors of competing products (with amongst themCISCO and
Avaya) will also be organised so participants can get a global view of
the VoIP market. Talks won't be commercial shows!
Thi...
2011 Jan 04
1
See also: Myths 6 and 8.... there is not Myths 6 and 8!
While waiting for a compilation I was reading Debunking Wine Myths (http://wiki.winehq.org/Debunking_Wine_Myths#head-b7ba8535e8210369749ee2940a7f2bceac4d8ea2)...
Nice read (there are really some crazy people....) until Myth 14 where I read: ``See also: Myths 6 and 8.'' There is not Myth 6 and 8! It is a mistake or some kind of joke?
In the l...
2001 Dec 17
3
benchmarks
http://www.xent.com/FoRK-archive/apr99/0265.html
read this.. how this is posible??
2015 Nov 11
4
UPnP support in tinc
...Google search for "pf cone nat"
returns somewhat depressing results: apparently it's not even possible
to configure pf to act as an EIM-NAT, and people asking for such an
option are basically being told to go away with demonstrably weak
security-related arguments (which can easily be debunked by pointing
out that NATs and firewalls have different goals, and that providing
endpoint-independent mapping does not preclude endpoint-dependent
*filtering*, which would still allow UDP hole punching to work). But I
digress.
So, I'm afraid there's still work to be done to ensure that t...
2015 Nov 12
0
UPnP support in tinc
...quot;pf cone nat" returns somewhat depressing results:
> apparently it's not even possible to configure pf to act as an
> EIM-NAT, and people asking for such an option are basically being told
> to go away with demonstrably weak security-related arguments (which
> can easily be debunked by pointing out that NATs and firewalls have
> different goals, and that providing endpoint-independent mapping does
> not preclude endpoint-dependent *filtering*, which would still allow
> UDP hole punching to work).
Yes, and they are not RFC 4787 compliant.
> The only way we can t...
2012 Mar 23
2
wiki - vnc -gerald and walsh, update?
...about
the ssh, but it references only another vnc server.
so, is the only way to get an ssh connection is to download a windows
vncserver, and connect with that to the vncserver on my linux box? (box
is on the internet, not local)
anyway, this helpful how to really saves a lot of time, really debunked
a lot of myths about not needing a desktop installed (which was really
furstrating trying to make it work without one).
Centos 6 is a bit different in that one file...and it would be great to
know how to connect though ssh with a viewer.
still, it freaking works!!
2007 Jan 13
5
Filling holes in a FLAC file from an old Vorbis file
I have a partly damaged CD, from which I extracted 192Kb/s Vorbis files
a while ago (before it got damaged) and I'd like to get FLAC files.
`cdparanoia' extracted most of the data from the CD, but there are some
holes due to the damages.
How could I fill those holes in my FLAC files using the Vorbis files?
Stefan
2007 Jan 13
5
Filling holes in a FLAC file from an old Vorbis file
I have a partly damaged CD, from which I extracted 192Kb/s Vorbis files
a while ago (before it got damaged) and I'd like to get FLAC files.
`cdparanoia' extracted most of the data from the CD, but there are some
holes due to the damages.
How could I fill those holes in my FLAC files using the Vorbis files?
Stefan
2007 Jan 13
5
Filling holes in a FLAC file from an old Vorbis file
I have a partly damaged CD, from which I extracted 192Kb/s Vorbis files
a while ago (before it got damaged) and I'd like to get FLAC files.
`cdparanoia' extracted most of the data from the CD, but there are some
holes due to the damages.
How could I fill those holes in my FLAC files using the Vorbis files?
Stefan
2011 Feb 04
3
[LLVMdev] CPS
Hi everybody,
I'd like to try implementing a pass that transforms all functions (and
function calls, returns, etc.) to CPS, so that TCO can get rid of all
(or most of) the function calling overhead (because, as you probably
know, the side effect of using CPS is that all function calls become
tail calls).
That being said, and since I'm pretty new to LLVM, I'd like to ask a
couple
2004 Sep 09
2
UDP routing issues with multiple NICs
...ugh NIC2 will not catch the packets because the source address, at the time, is 0.0.0.0.
If I force a specific IP to be routed through NIC2, then that IP can connect successfuly to the server over NIC2.
I''m looking for possible solutions, but so far have only found one to have it later debunked. I have considered NAT, and determined that it won''t work. I can''t DNAT from IP2 to IP1, for reasons still not entirely known to me. For some reason DNAT from IP2 to IP1 doesn''t get any sort of response from the server. Even after I have removed ALL firewall rules. I ca...
2016 Feb 08
7
Utility to zero unused blocks on disk
DBAN is obsolete. NIST 800-88 for some time now says to use secure erase or
enhanced security erase or crypto erase if supported.
Other options do not erase data in remapped sectors.
Chris Murphy
2004 Sep 30
2
FXO/FXS card
Hi, I thought I remember seeing somewhere on the Asterisk website a card
that had 16 ports fxo or fxs, that was user selectable with straps on the
card. Am I going crazy, I can't seem to find it now.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: http://lists.digium.com/pipermail/asterisk-users/attachments/20040930/86c8ae69/attachment.htm
2017 Aug 07
3
Has For bucle be impooved in R
Hi!
I am doing a lapply and for comparaison and I get that for is faster than lapply.
What I have done:
n<-100000
set.seed(123)
x<-rnorm(n)
y<-x+rnorm(n)
rand.data<-data.frame(x,y)
k<-100
samples<-split(sample(1:n),rep(1:k,length=n))
res<-list()
t<-Sys.time()
for(i in 1:100){
modelo<-lm(y~x,rand.data[-samples[[i]]])
2008 Mar 03
5
on the philosophical aspects of a specification
a specification will _eventually_ be used, by someone,
to tell the user they are doing things "wrong", won't it?
and doesn't that turn markdown's genesis upside-down?
heck, next thing you know we'll be telling them to r.t.f.m.
i would prefer that implementers get more sophisticated
about teasing out the user's intent in "ambiguous" cases.
of course,
2016 Jun 02
0
[ANNOUNCE] nftables 0.6 release
...e have to resolve a conflict in first place
evaluate: don't adjust offset from resolve_protocol_conflict()
evaluate: only try to replace dummy protocol from link-layer context
evaluate: assert on invalid base in resolve_protocol_conflict()
evaluate: wrap protocol context debunk into function
evaluate: generate ether type payload after meta iiftype
proto: proto_dev_type() returns interface type for base protocols too
src: annotate follow up dependency just after killing another
tests/py: test vlan on ingress
netlink_delinearize: prune implicit...
2004 Aug 03
0
Fw: Digium FXO Interfaces don't support groundstart???
A thought occurred to me to on how to further quantify the impact of "glare"
on a properly dimensioned trunk group and debunk the ground start glare
concern. A cursory traffic analysis clarifies:
1. Assume you have a two-way trunk group, dimensioned for average busy
hour, average busy season for P01 grade of service, Erlang B or Poison
distribution.
2. Further assume that the average holding time per call is the nati...