Displaying 20 results from an estimated 20 matches for "diametr".
Did you mean:
diameter
2005 Apr 05
4
lists: removing elements, iterating over elements,
...ia Tech.
http://www.cc.gatech.edu/~tucker/index2.html
While I work on this, I realize (again) that I'm a C programmer
masquerading in R, and its really tricky working with R lists. Here are
things that surprise me, I wonder what your experience/advice is.
I need to calculate overlapping U-diametric clusters of a given radius.
(Again, I apologize this looks so much like C.)
## Returns a list of all U-diametric clusters of a given radius
## Give an R distance matrix
## Clusters may overlap. Clusters may be identical (redundant)
getUDClusters <-function(distmat,radius){
mem <-...
2015 Sep 09
2
Compiling the code generated by LLVM C++ backend
...y questions follow:
1. I can see that there is a significant difference between the code
generated by C and C++ backends. Former one generates code to be compiled
by gcc to generate a native executable, while the later one is targeted to
generated LLVM IR itself. Surprisingly, both the diametrically opposite
functionalities have been put together in the same utility called ''llc'. I
wonder if there is any official doc available online to point out the
striking difference.
2. This question is simpler even: How can I make use of the C++ code
generated by LLVM C++...
2015 Jul 29
5
Fedora change that will probably affect RHEL
...rote:
> Just because one particular method of prophylaxis fails to protect against all threats doesn?t mean we should stop using it, or increase its strength.
Actually it does.There is no more obvious head butting than with
strong passwords vs usability. Strong login passwords and usability
are diametrically opposed.
The rate of brute force attack success is exceeding that of human
ability (and interest) to remember ever longer more complex passwords.
I just fired my ISP because of the asininity of setting a 180
compulsory expiration on passwords.
Now I use Google. They offer MFA opt in. And no...
2009 Mar 28
2
recommended computing server for R (March 2009)?
...-difference, fixed-effects, blundell-bond, etc.. the data set is
about 10MB, so 1GB per CPU core should be plenty for my operations, and
with $10/GB of DRAM, this is no longer a bottleneck. For my application,
parallelism is a given, since most of it is monte-carlo simulations. (I
guess the diametrically opposite need would be when one cannot parallelize,
in which case the recommendations would be quite different.)
My operating system will probably be ubuntu. (I also run a little of it on
an OSX Mac Pro I own.)
I want to use an Intel/AMD system with a prebuilt R executable. I do not
w...
2012 Jul 18
4
asterisk 1.8 on Solaris/sparc
I've got the latest asterisk 1.8 running on a Netra X1 with Solaris 10 u10.
The system itself is happy and phone calls (between two parties) seem fine.
Unfortunately, when a caller listens to a Playback recording, there
seems to be moments of stutter - perhaps 1 second of stutter for every
10 seconds of Playback. The stutter is not consistent at the same point
of the playback file.
To
2016 May 18
2
Working on FP SCEV Analysis
>What situations are they common in?
ICC Vectorizer made a paradigm shift a while ago.
If there aren’t a clear reason why something can’t be vectorized, we should try our best to vectorize.
The rest is a performance modeling (and priority to implement) question, not a capability question.
We believe this is a good paradigm to follow in a vectorizer development. It was a big departure from
2015 Jul 30
0
Fedora change that will probably affect RHEL
...method of prophylaxis fails to protect
>> against all threats doesn???t mean we should stop using it, or increase
>> its strength.
>
> Actually it does.There is no more obvious head butting than with
> strong passwords vs usability. Strong login passwords and usability
> are diametrically opposed.
>
> The rate of brute force attack success is exceeding that of human
> ability (and interest) to remember ever longer more complex passwords.
> I just fired my ISP because of the asininity of setting a 180
> compulsory expiration on passwords.
>
> Now I use Goog...
2015 Jul 29
0
Fedora change that will probably affect RHEL
...use one particular method of prophylaxis fails to protect against all threats doesn?t mean we should stop using it, or increase its strength.
>
> Actually it does.There is no more obvious head butting than with
> strong passwords vs usability. Strong login passwords and usability
> are diametrically opposed.
Security is *always* opposed to convenience.
The question is not ?security or no security,? it?s ?how much security??
The correct answer must balance the threats and risks. Given that the threats and risks here are nontrivial, the password quality restrictions should also be nont...
2023 Jan 09
7
How verbose should NUT be by default?
Hello all,
During discussion of https://github.com/networkupstools/nut/issues/1782
me and Greg uncovered a diametral difference of opinion about the verbosity
of NUT programs in general, and of `upsmon -K` (checking for POWERDOWNFLAG
during shutdown integration) in particular.
To me as a sysadmin type often (in the past at least) having to
troubleshoot the tails and ends of systems' untimely (or unclean)...
2023 Jan 09
7
How verbose should NUT be by default?
Hello all,
During discussion of https://github.com/networkupstools/nut/issues/1782
me and Greg uncovered a diametral difference of opinion about the verbosity
of NUT programs in general, and of `upsmon -K` (checking for POWERDOWNFLAG
during shutdown integration) in particular.
To me as a sysadmin type often (in the past at least) having to
troubleshoot the tails and ends of systems' untimely (or unclean)...
2007 Dec 17
3
Trixbox Phones Home
I just read on Slashdot (at
http://yro.slashdot.org/article.pl?sid=07/12/16/222243 ) that Trixbox
"has been phoning home with statistics about their installations", as a
Trixbox user exposed in "Trixbox Phones Home" at
http://www.trixbox.org/forums/trixbox-forums/open-discussion/trixbox-phones-home .
--
(C) Matthew Rubenstein
2015 Jul 29
2
Fedora change that will probably affect RHEL
On Tue, Jul 28, 2015 at 6:32 PM, Warren Young <wyml at etr-usa.com> wrote:
> On Jul 28, 2015, at 4:37 PM, Nathan Duehr <denverpilot at me.com> wrote:
>> Equating this to ?vaccination? is a huge stretch.
>
> Why?
It's not just an imperfect analogy it really doesn't work on closer scrutiny.
Malware itself is not a good analog to antigens. Vaccinations provide
2016 May 12
2
LLVM Releases: Upstream vs. Downstream / Distros
I'll bite:
Do you really believe you could ever get these folks to choose consistent
llvm versions anyway?
Or will you always have to do the work yourself anyway?
In my talks with a number of these projects, they pretty much don't care
what anyone else does, and plan to stick to their own import/etc schedules
no matter what LLVM does with stable releases :)
(For reference, Google
2012 Dec 27
8
how well will this work
Hi Folks,
I find myself trying to expand a 2-node high-availability cluster from
to a 4-node cluster. I'm running Xen virtualization, and currently
using DRBD to mirror data, and pacemaker to failover cleanly.
The thing is, I'm trying to add 2 nodes to the cluster, and DRBD doesn't
scale. Also, as a function of rackspace limits, and the hardware at
hand, I can't separate
2018 Aug 19
0
IDTCA.
...es not much wizardry of precognition to see that when
posed with the question ... given the case that bullets can be made to
disappear in mid air should we allow them to continue to fly towards the
innocent .. that it really does fly in the face of everything that we are
inside ... that it's so diametrically opposed to our morality and our
goodness to allow anything like that to happen ... to see it really is this
"fact" and our innate and right desires that move the whole of civilization
across that line basically overnight ... and " anything less would be
uncivilized . "
&l...
2007 Jan 18
16
5.1 surround channel coupling
It obviously would be nice to have such a mode available, for e.g. DVD audio
compression. Apparently, the list doesn''t tell me too much about it. My
questions are:
1. What is the current status of the 5.1 channel coupling in Vorbis?
2. If I''ll be interested in participation in its development, what is the
recommended reading?
-------------- next part --------------
An HTML
2007 Jan 21
35
Collection proxies need to be stubbed ?
Hi all !
I just started writing specs on a new project. I would just like to
validate that this is the way you would write it. I know about mocks,
stubs and expectations. I don''t think this is a problem for me.
My question really boils down to:
def index
@projects = current_user.projects.active
end
My spec needs to return the proxy, no ? Here''s my code:
context "A
2018 Aug 15
0
Look!! ... "up in the sky" ... while free will is in play ... there are Hogs flying across your screen
...es not much wizardry of precognition to see that when
posed with the question ... given the case that bullets can be made to
disappear in mid air should we allow them to continue to fly towards the
innocent .. that it really does fly in the face of everything that we are
inside ... that it's so diametrically opposed to our morality and our
goodness to allow anything like that to happen ... to see it really is this
"fact" and our innate and right desires that move the whole of civilization
across that line basically overnight ... and " anything less would be
uncivilized . "...
2008 Jan 15
32
A challenge from a CMS implementer
Hey guys
RoR evangelists keep telling us that they have the #1 framework for
developing webapps. OK, but show us something that works and is useful
to many people out there. I could be wrong, but it doesn''t seem as if
there is anything that qualifies, as yet?
So I''ve got a little challenge for you: come up with a decent plugin
WYSIWYG visual editor for CMS. There are several
2011 Jul 23
9
Securing Asterisk
I beg to differ. Digium is hiding from the real world and somebody is
going take the software and run with it. My customers lost in excess
of $50.000 and cut my pay in half, because of hackers. The hackers
figured out how to scan every asterisk for weak passwords or open
ports, and bang them real good. We need two things: a) disable in
sip.conf the reply for INVITES that have wrong user