search for: diametrically

Displaying 20 results from an estimated 20 matches for "diametrically".

2005 Apr 05
4
lists: removing elements, iterating over elements,
I'm writing R code to calculate Hierarchical Social Entropy, a diversity index that Tucker Balch proposed. One article on this was published in Autonomous Robots in 2000. You can find that and others through his web page at Georgia Tech. http://www.cc.gatech.edu/~tucker/index2.html While I work on this, I realize (again) that I'm a C programmer masquerading in R, and its really
2015 Sep 09
2
Compiling the code generated by LLVM C++ backend
...y questions follow: 1. I can see that there is a significant difference between the code generated by C and C++ backends. Former one generates code to be compiled by gcc to generate a native executable, while the later one is targeted to generated LLVM IR itself. Surprisingly, both the diametrically opposite functionalities have been put together in the same utility called ''llc'. I wonder if there is any official doc available online to point out the striking difference. 2. This question is simpler even: How can I make use of the C++ code generated by LLVM C++ backe...
2015 Jul 29
5
Fedora change that will probably affect RHEL
...rote: > Just because one particular method of prophylaxis fails to protect against all threats doesn?t mean we should stop using it, or increase its strength. Actually it does.There is no more obvious head butting than with strong passwords vs usability. Strong login passwords and usability are diametrically opposed. The rate of brute force attack success is exceeding that of human ability (and interest) to remember ever longer more complex passwords. I just fired my ISP because of the asininity of setting a 180 compulsory expiration on passwords. Now I use Google. They offer MFA opt in. And now I...
2009 Mar 28
2
recommended computing server for R (March 2009)?
...-difference, fixed-effects, blundell-bond, etc.. the data set is about 10MB, so 1GB per CPU core should be plenty for my operations, and with $10/GB of DRAM, this is no longer a bottleneck. For my application, parallelism is a given, since most of it is monte-carlo simulations. (I guess the diametrically opposite need would be when one cannot parallelize, in which case the recommendations would be quite different.) My operating system will probably be ubuntu. (I also run a little of it on an OSX Mac Pro I own.) I want to use an Intel/AMD system with a prebuilt R executable. I do not want to...
2012 Jul 18
4
asterisk 1.8 on Solaris/sparc
I've got the latest asterisk 1.8 running on a Netra X1 with Solaris 10 u10. The system itself is happy and phone calls (between two parties) seem fine. Unfortunately, when a caller listens to a Playback recording, there seems to be moments of stutter - perhaps 1 second of stutter for every 10 seconds of Playback. The stutter is not consistent at the same point of the playback file. To
2016 May 18
2
Working on FP SCEV Analysis
>What situations are they common in? ICC Vectorizer made a paradigm shift a while ago. If there aren’t a clear reason why something can’t be vectorized, we should try our best to vectorize. The rest is a performance modeling (and priority to implement) question, not a capability question. We believe this is a good paradigm to follow in a vectorizer development. It was a big departure from
2015 Jul 30
0
Fedora change that will probably affect RHEL
...method of prophylaxis fails to protect >> against all threats doesn???t mean we should stop using it, or increase >> its strength. > > Actually it does.There is no more obvious head butting than with > strong passwords vs usability. Strong login passwords and usability > are diametrically opposed. > > The rate of brute force attack success is exceeding that of human > ability (and interest) to remember ever longer more complex passwords. > I just fired my ISP because of the asininity of setting a 180 > compulsory expiration on passwords. > > Now I use Google. Th...
2015 Jul 29
0
Fedora change that will probably affect RHEL
...use one particular method of prophylaxis fails to protect against all threats doesn?t mean we should stop using it, or increase its strength. > > Actually it does.There is no more obvious head butting than with > strong passwords vs usability. Strong login passwords and usability > are diametrically opposed. Security is *always* opposed to convenience. The question is not ?security or no security,? it?s ?how much security?? The correct answer must balance the threats and risks. Given that the threats and risks here are nontrivial, the password quality restrictions should also be nontrivial...
2023 Jan 09
7
How verbose should NUT be by default?
Hello all, During discussion of https://github.com/networkupstools/nut/issues/1782 me and Greg uncovered a diametral difference of opinion about the verbosity of NUT programs in general, and of `upsmon -K` (checking for POWERDOWNFLAG during shutdown integration) in particular. To me as a sysadmin type often (in the past at least) having to troubleshoot the tails and ends of systems'
2023 Jan 09
7
How verbose should NUT be by default?
Hello all, During discussion of https://github.com/networkupstools/nut/issues/1782 me and Greg uncovered a diametral difference of opinion about the verbosity of NUT programs in general, and of `upsmon -K` (checking for POWERDOWNFLAG during shutdown integration) in particular. To me as a sysadmin type often (in the past at least) having to troubleshoot the tails and ends of systems'
2007 Dec 17
3
Trixbox Phones Home
I just read on Slashdot (at http://yro.slashdot.org/article.pl?sid=07/12/16/222243 ) that Trixbox "has been phoning home with statistics about their installations", as a Trixbox user exposed in "Trixbox Phones Home" at http://www.trixbox.org/forums/trixbox-forums/open-discussion/trixbox-phones-home . -- (C) Matthew Rubenstein
2015 Jul 29
2
Fedora change that will probably affect RHEL
On Tue, Jul 28, 2015 at 6:32 PM, Warren Young <wyml at etr-usa.com> wrote: > On Jul 28, 2015, at 4:37 PM, Nathan Duehr <denverpilot at me.com> wrote: >> Equating this to ?vaccination? is a huge stretch. > > Why? It's not just an imperfect analogy it really doesn't work on closer scrutiny. Malware itself is not a good analog to antigens. Vaccinations provide
2016 May 12
2
LLVM Releases: Upstream vs. Downstream / Distros
I'll bite: Do you really believe you could ever get these folks to choose consistent llvm versions anyway? Or will you always have to do the work yourself anyway? In my talks with a number of these projects, they pretty much don't care what anyone else does, and plan to stick to their own import/etc schedules no matter what LLVM does with stable releases :) (For reference, Google
2012 Dec 27
8
how well will this work
Hi Folks, I find myself trying to expand a 2-node high-availability cluster from to a 4-node cluster. I'm running Xen virtualization, and currently using DRBD to mirror data, and pacemaker to failover cleanly. The thing is, I'm trying to add 2 nodes to the cluster, and DRBD doesn't scale. Also, as a function of rackspace limits, and the hardware at hand, I can't separate
2018 Aug 19
0
IDTCA.
...es not much wizardry of precognition to see that when posed with the question ... given the case that bullets can be made to disappear in mid air should we allow them to continue to fly towards the innocent .. that it really does fly in the face of everything that we are inside ... that it's so diametrically opposed to our morality and our goodness to allow anything like that to happen ... to see it really is this "fact" and our innate and right desires that move the whole of civilization across that line basically overnight ... and " anything less would be uncivilized . " <http...
2007 Jan 18
16
5.1 surround channel coupling
It obviously would be nice to have such a mode available, for e.g. DVD audio compression. Apparently, the list doesn''t tell me too much about it. My questions are: 1. What is the current status of the 5.1 channel coupling in Vorbis? 2. If I''ll be interested in participation in its development, what is the recommended reading? -------------- next part -------------- An HTML
2007 Jan 21
35
Collection proxies need to be stubbed ?
Hi all ! I just started writing specs on a new project. I would just like to validate that this is the way you would write it. I know about mocks, stubs and expectations. I don''t think this is a problem for me. My question really boils down to: def index @projects = current_user.projects.active end My spec needs to return the proxy, no ? Here''s my code: context "A
2018 Aug 15
0
Look!! ... "up in the sky" ... while free will is in play ... there are Hogs flying across your screen
...es not much wizardry of precognition to see that when posed with the question ... given the case that bullets can be made to disappear in mid air should we allow them to continue to fly towards the innocent .. that it really does fly in the face of everything that we are inside ... that it's so diametrically opposed to our morality and our goodness to allow anything like that to happen ... to see it really is this "fact" and our innate and right desires that move the whole of civilization across that line basically overnight ... and " anything less would be uncivilized . " <ht...
2008 Jan 15
32
A challenge from a CMS implementer
Hey guys RoR evangelists keep telling us that they have the #1 framework for developing webapps. OK, but show us something that works and is useful to many people out there. I could be wrong, but it doesn''t seem as if there is anything that qualifies, as yet? So I''ve got a little challenge for you: come up with a decent plugin WYSIWYG visual editor for CMS. There are several
2011 Jul 23
9
Securing Asterisk
I beg to differ. Digium is hiding from the real world and somebody is going take the software and run with it. My customers lost in excess of $50.000 and cut my pay in half, because of hackers. The hackers figured out how to scan every asterisk for weak passwords or open ports, and bang them real good. We need two things: a) disable in sip.conf the reply for INVITES that have wrong user