Displaying 7 results from an estimated 7 matches for "loosest".
Did you mean:
looses
2012 Apr 15
1
[LLVMdev] Representing -ffast-math at the IR level
...precise as normal, but might do odd things for NaNs
or Infty, etc.) - I'd suppose this is a strictest "fast" option.
- algebraic-equivalence - The compiler might do anything that is
algebraically the same (even if the numerics could be quite
different) - This is probably the loosest "fast" option.
-Hal
>
> So that metadata would be able to say "fast", "fast, but no fma
> allowed", "strict, but fma allowed", I.e. metadata should be a
> base-level + optional set of adjustments from the list above.
>
> And, again, I t...
2008 Nov 14
2
performance problem with access database
Hello
I have problem with a access application, when I try to start the
application then I must wait 5 minutes ago before he started.
I do this from a WinXp Workstation to a Linux Debian Etch and samba
3.0.24 installation.
What can I do for better performance.
best regards
pat
2012 Jun 05
1
best way to access samba shares remotely without VPN
Hi all,
I'm wondering what is the best way to access samba shares securely over the
net. I saw sslbridge and davenport but they don't seem to be managed
properly. I was thinking of using webdav via https. I dont want to use VPN
as im using openvpn and it is not support well with Mac iOS and OSX client.
webdav is supported well.
Regards
J
2020 Apr 22
0
Recommendations on intrusion prevention/detection?
...mised ;)
* Re-used passwords where data is exposed from another site's breach
(Users WANT to re-use passwords, this is where 2FA shines)
* Weak Passwords
(Users like using weak passwords, so implement password restrictions)
Hackers are still brute forcing in incredible numbers, using the loosest
1012 passwords.. (or smaller subset of about 64 patterns) if you have a
user with a <username|domain>NNNN password, a < 8 char numeric, or the
one of the following, it is only a matter of time before it is compromised.
000000
111111
123123
123456
12345678
222222
333333
444444
555555
66...
2020 Apr 22
6
Recommendations on intrusion prevention/detection?
Dear all,
what are the key strategies for intrusion prevention and detection with
dovecot, apart from installing fail2ban?
It is a pity that the IMAP protocol does not support 2 factor
authentication, which seems to stop 90% of intrusion attempts in their
tracks. Without it, if someone has obtained your password and reads your
mail without modifying it, you will hardly ever notice.
Is there a
2012 Apr 14
0
[LLVMdev] Representing -ffast-math at the IR level
On Sun, Apr 15, 2012 at 1:02 AM, Duncan Sands <baldrick at free.fr> wrote:
> Hi Dmitry,
>
>
> The kinds of transforms I think can reasonably be done with the current
>> information are things like: x + 0.0 -> x; x / constant -> x * (1 /
>> constant) if
>> constant and 1 / constant are normal (and not denormal) numbers.
>>
>> The
2012 Apr 14
4
[LLVMdev] Representing -ffast-math at the IR level
Hi Dmitry,
> The kinds of transforms I think can reasonably be done with the current
> information are things like: x + 0.0 -> x; x / constant -> x * (1 / constant) if
> constant and 1 / constant are normal (and not denormal) numbers.
>
>
> The particular definition is not that important, as the fact that this
> definition exists :) I.e. I think we need a