search for: egt

Displaying 5 results from an estimated 5 matches for "egt".

Did you mean: eg
2003 Jul 24
2
'which' and installing Linux software on -STABLE
...'uname' returns 'Linux' But the SUn code does 'which uname' to get the path to 'uname' before running it. the ;which' command is a bash builtin, and this returns the '/usr/bin/uname' command rather than '/bin/uname'. Thus it runs /usr/bin;uname, egts the answer 'FreeBSD' and refuses to install. Any ideas ? I did a search on this but didnt come up with any answers. -pcf.
2012 Jan 02
0
Reading mcmc/coda into a big.matrix efficiently
...es, so you can see the formatting. The index file tells you each variable's name and the range or rows in the chain file containing the variable's values. The chain file contains the iteration number the value was taken from, and CODAindex.txt egu[1] 1 10000 egu[2] 10001 20000 egt[1] 20001 30000 egt[2] 30001 40000 ept[1] 40001 50000 ept[2] 50001 60000 ... CODAchain1.txt 10001 -0.289963 10011 -0.310657 10021 -0.290596 10031 -0.286273 10041 -0.319877 10051 -0.299019 .... Thanks in advance for any tips! --Guy W. Cole R version 2.14.0 (2011-10-31) x86_64-appl...
2011 Aug 04
0
R check mis-identifying Illumina data file format as executable and other thoughts.
This is somewhat a summary/continuation of an R bug report: (https://bugs.r-project.org/bugzilla3/show_bug.cgi?id=14645) Illumina's cluster definition files (*.egt) are one of the proprietary and undocumented file formats used by their GenomeStudio line of products for genomic studies. snpMatrix 1.17.0.7 onwards (http://sourceforge.net/projects/outmodedbonsai/files/snpMatrix%20next/) contains codes for reading that file format, as well as two example files...
1999 Jan 24
0
Re: util-linux compromised
...&"@]UZ_'F+,E;F++8UY5\3Z8UA"R7JX-QH,1\,]&G.HIRM=]&=!7"Z^CXTQ > # M_;R8$^U\N2KB^:)D0EWZ=Y__/>C*M*LXO`V*2)_T]3N:K+>%1FC[51;V353M > # MJ&=*Q5F85)'1_?[N^?''BW>G[Q6H?UJ8PN@RU\NJU&F0Z64P-_;/2IV/+UY] > # MIY\^G478?1J4_5<ZO;7WP1(?K"EGT;)(^Z\>D)C&65#$1.&9GA@\7AC=B3.8 > # M59)T=%$Y:=)C"//6]C7^I]3DA],+6BV]G5FWCE(WDRMZW/!0+ZS4R?4QO^`O > # M\2PS?]6=Y]O'ES<['=VQRZ`(.^!@9L-;'6219KKW<9+H,$^7T&E73\%MR:S' > # M5F>YOC5%9A)MJ^4R+TJ=9YK)L"!&WSW?IM\[3+&?QEG\A04RL_Z7>\8[H>...
2009 May 14
6
Dealing with brute force attacks
Over the weekend one of our servers at a remote location was hammered by an IP originating in mainland China. This attack was only noteworthy in that it attempted to connect to our pop3 service. We have long had an IP throttle on ssh connections to discourage this sort of thing. But I had not considered the possibility that other services were equally at risk. Researching this on the web does