Displaying 5 results from an estimated 5 matches for "egt".
Did you mean:
eg
2003 Jul 24
2
'which' and installing Linux software on -STABLE
...'uname'
returns 'Linux'
But the SUn code does 'which uname' to get the path to 'uname' before
running it. the ;which' command is a bash builtin, and this returns
the '/usr/bin/uname' command rather than '/bin/uname'. Thus it
runs /usr/bin;uname, egts the answer 'FreeBSD' and refuses to install.
Any ideas ? I did a search on this but didnt come up with any answers.
-pcf.
2012 Jan 02
0
Reading mcmc/coda into a big.matrix efficiently
...es, so you
can see the formatting. The index file tells you each variable's name
and the range or rows in the chain file containing the variable's
values. The chain file contains the iteration number the value was
taken from, and
CODAindex.txt
egu[1] 1 10000
egu[2] 10001 20000
egt[1] 20001 30000
egt[2] 30001 40000
ept[1] 40001 50000
ept[2] 50001 60000
...
CODAchain1.txt
10001 -0.289963
10011 -0.310657
10021 -0.290596
10031 -0.286273
10041 -0.319877
10051 -0.299019
....
Thanks in advance for any tips!
--Guy W. Cole
R version 2.14.0 (2011-10-31) x86_64-appl...
2011 Aug 04
0
R check mis-identifying Illumina data file format as executable and other thoughts.
This is somewhat a summary/continuation of an R bug report:
(https://bugs.r-project.org/bugzilla3/show_bug.cgi?id=14645)
Illumina's cluster definition files (*.egt) are one of the proprietary and
undocumented file formats used by their GenomeStudio line of products for
genomic studies.
snpMatrix 1.17.0.7 onwards
(http://sourceforge.net/projects/outmodedbonsai/files/snpMatrix%20next/)
contains codes for reading that file format, as well as two example files...
1999 Jan 24
0
Re: util-linux compromised
...&"@]UZ_'F+,E;F++8UY5\3Z8UA"R7JX-QH,1\,]&G.HIRM=]&=!7"Z^CXTQ
> # M_;R8$^U\N2KB^:)D0EWZ=Y__/>C*M*LXO`V*2)_T]3N:K+>%1FC[51;V353M
> # MJ&=*Q5F85)'1_?[N^?''BW>G[Q6H?UJ8PN@RU\NJU&F0Z64P-_;/2IV/+UY]
> # MIY\^G478?1J4_5<ZO;7WP1(?K"EGT;)(^Z\>D)C&65#$1.&9GA@\7AC=B3.8
> # M59)T=%$Y:=)C"//6]C7^I]3DA],+6BV]G5FWCE(WDRMZW/!0+ZS4R?4QO^`O
> # M\2PS?]6=Y]O'ES<['=VQRZ`(.^!@9L-;'6219KKW<9+H,$^7T&E73\%MR:S'
> # M5F>YOC5%9A)MJ^4R+TJ=9YK)L"!&WSW?IM\[3+&?QEG\A04RL_Z7>\8[H>...
2009 May 14
6
Dealing with brute force attacks
Over the weekend one of our servers at a remote location was
hammered by an IP originating in mainland China. This attack was
only noteworthy in that it attempted to connect to our pop3 service.
We have long had an IP throttle on ssh connections to discourage
this sort of thing. But I had not considered the possibility that
other services were equally at risk. Researching this on the web
does