search for: leach

Displaying 20 results from an estimated 148 matches for "leach".

Did you mean: each
2008 Jun 05
1
choosing an appropriate linear model
I am trying to model the observed leaching of wood preservative chemicals from treated wood during an outdoor experiment where leaching is caused by rainfall events. For each rainfall event, the amount of rainfall was recorded as well as the amount of preservative chemical leached. A number of climatic variables were measured, but the...
2007 Jun 11
5
Access Windows AD share From Linux
...tory and try to list the contents I get a "Permission Denied" error. I am unable to allow an AD trust with the Linux client to the AD domain, so any solution cannot require joining the Linux host to the AD domain. Any assistance would be greatly appreciated. Thank You. Kenneth R. Leach Computer Sciences Corporation 100 Decadon Dr. Egg Harbor Township, NJ 08234 kleach2@csc.com
2005 Apr 03
8
CentOS for commercial use
...oyer is a firm believer in RHEL - license costs are just a business decision. I would like to know how those of you who use CentOS in commercial endeavors justify the decsion - ethics, community vs. vendor support, etc., etc. I've heard many comments to the effect that we CentOS users are just leaches, since RedHat does the major work. What do you think? -- Collins When I saw the Iraqi people voting three weeks ago, 8 million of them, it was the start of a new Arab world.... The Berlin Wall has fallen. - Lebanese Druze leader Walid Jumblatt
2001 Oct 31
3
Alternative Auth Methods.
...I could do Samba it would wrap it up into one nice DB for authentication. It does not have to be much, just the ability to get the data from a SQL query rather than a flat file query. Anyone interested in working on this if it does not exist? Thanks, j. -- ...................... ..... Jason C. Leach .. PGP/GPG Public key at http://www.keyserver.net/ Key ID: 157BD48C
2007 Apr 28
6
Determine how many documents a term occurs in
Is there a fast way to determine how many documents a term occurs in, besides iterating through every document with TermDocEnum? -- Best regards, Stian Gryt?yr
2015 May 26
6
FREAK/Logjam, and SSL protocols to use
List, good afternoon, I was reading up on a TLS Diffie Hellman protocol weakness described here https://weakdh.org/sysadmin.html which is similar to the earlier FREAK attack, and can result in downgrade of cipher suites. Part of the solution workaround that the researchers describe for Dovecot here https://weakdh.org/sysadmin.html includes altering DH parameters length to 2048, and
2005 Jan 25
4
RAID card recommendation
Hey all, After seeing the horrible lack of support for Promise cards in Redhat Enterprise/CentOS, I am looking for a recommendation for a good IDE RAID controller that is supported out of the box (i.e. I would prefer not to have to install via a driver disk). I would prefer ATA 133 over Serial ATA for now. Thanks! Sean
2006 Aug 01
5
Rails on .NET
http://www.eweek.com/article2/0,1759,1996960,00.asp?kc=EWEAUEMNL080106EOAD Just saw this and thought it was interesting...
2004 Dec 03
5
[Bug 959] enhancement: supporting a remote scp path option in scp
...ion in scp Product: Portable OpenSSH Version: -current Platform: All OS/Version: All Status: NEW Severity: normal Priority: P2 Component: scp AssignedTo: openssh-bugs at mindrot.org ReportedBy: dlssh at leach.net.au I've written some enhancements to scp.c and pathnames.h to enable the scp to arbitrarily set the remote scp path. (eg $ scp -e /usr/bin/scp foo user at bar:foo) I did read the "scp: command not found" FAQ entry but I'm not quite sure why we can't do this, unless it...
2002 Jul 17
1
Importing Data.
...irs like: x,y x,y x,y I can read them in fine with read.table(), but I need to do some cluster analysis on them, so I need it in a format cclust will understand, namely a Matrix. Can anyone help with the code to to convert the data type? Thanks, j. -- ...................... ..... Jason C. Leach .. Current PGP/GPG Key ID: 43AD2024 -.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.-.- r-help mailing list -- Read http://www.ci.tuwien.ac.at/~hornik/R/R-FAQ.html Send "info", "help", or "[un]subscribe" (in the "body", not the...
2006 Mar 28
8
1.1 broke my app
I upgraded to Rails 1.1 (ruby 1.8.2 and ruby 1.8.4 on RHEL 4 using webrick or fastcgi) and all of a sudden I get this hitting a controller: wrong number of arguments (1 for 0) RAILS_ROOT: script/../config/.. Application Trace | Framework Trace | Full Trace /usr/local/lib/ruby/gems/1.8/gems/actionpack-1.12.0/lib/action_controller/base.rb:379:in
2007 Jun 27
2
mystery data fills my target disk
...Scripts/nightly restore - exclusions.txt" "/Volumes/Compy 1 master/" "/Volumes/Compy 1" Is this behavior familiar to anyone? Can you see anything wrong with my command that might be causing it? Thanks in advance for your help. -Arlo _______________________________ Arlo Leach 773.769.6106 http://arlomedia.com Find. Be Found. http://www.newwhitepages.com
2006 May 11
2
How do you make in_place_edit fields appear when empty?
Here''s a simple one... When using in_place_edit fields, they don''t appear unless they already have a value. How can I get similar functionality when they are empty? Thanks, Nathan -------------- next part -------------- An HTML attachment was scrubbed... URL: http://wrath.rubyonrails.org/pipermail/rails/attachments/20060511/a98640cf/attachment.html
2007 Feb 22
4
Modifying Apache Conf To Block Leachers
Howdy, I''m using Apache 2.2 + Mongrel with great success, using the sample configs from the Mongrel site. We have some MP3s on the site and recently someone has been stealing them and basically leaching them from the site, linking to them from an off-site location. I''ve been trying to modify my Apache conf to check the referrer and adjust accordingly as below but no luck. I''m wondering if someone else has any suggestions on getting this to work... I would expect this...
2006 Jan 30
5
File management!
Hi, I''m new to ROR. I was wondering how to: 1. Check if the file is being read/downloaded/.... 2. Rename files If you can help or point out any document that I need to read to accomplish this, please do. Thanks a lot. -- Posted via http://www.ruby-forum.com/.
2017 Jun 11
1
Memory leak in nleqslv()
...648 3256 I've replicated this on OS-X and in Windows both on a desktop and a Surface Pro, however colleagues have run this on their machines and not found the same result. gc() does not rectify the issue, although re-starting R does. Any help would be much appreciated. AJL -- Andrew Leach Associate Professor of Natural Resources, Energy and Environment (NREE) Academic Director, Energy Programs Alberta School of Business| 3-20D Business Building University of Alberta |Edmonton, AB T6G 2R6 | Canada T. 780.492.8489 E. andrew.leach at ualberta.ca www.business.ualberta.ca Follow me on...
2006 Apr 19
3
Determining screen size and/or resolution?
What''s the easiest or best way to determine the screen size from within a controller or view in Rails? My "divs" look great at 1280x800, but not so hot on 800x600. I want to dynamically alter the layout based on the resolution. Any hints regarding screen size or alternate ways of handling this issue would be appreciated. Thanks! -------------- next part -------------- An
2014 Dec 23
4
[LLVMdev] [RFC] Stripping unusable intrinsics
...ve got hardcoded references to various target intrinsics scattered throughout the code. > > I was just writing to say exactly this. There are a number of ways we could work toward something like this. I’m completely in favor of a world where Intrinsics are properties of the targets and don’t leach out, however today they do in a lot of places. What are the specific problems here? Anything that does an equality comparison with the IntrinsicID can be changed to do strcmp with the name. That would handle the one-off cases like InstCombiner::SimplifyDemandedUseBits in InstCombine. The other...
2015 May 27
2
FREAK/Logjam, and SSL protocols to use
Quoting Gedalya <gedalya at gedalya.net>: > On 05/26/2015 10:37 AM, Ron Leach wrote: >> https://weakdh.org/sysadmin.html >> >> includes altering DH parameters length to 2048, and re-specifying the >> allowable cipher suites - they give their suggestion. > > It looks like there is an error on this page regarding regeneration. In > current dove...
2014 Nov 26
3
2.2.15: SMTP submission server?
On 17/11/2014 07:23, Ron Leach wrote: > On 16/11/2014 07:24, Robert Schetterer wrote (re-ordered): >> Am 16.11.2014 um 02:24 schrieb Reindl Harald: >> >>> * if you find a security issue in postfix running >>> on 587 over TLS cry out loud > > I'm thinking beyond that; I want to get to...