search for: perimet

Displaying 20 results from an estimated 106 matches for "perimet".

Did you mean: permet
2011 Feb 18
1
How to calculate the perimeter and common border of polygons?
Dear R-users, Is there any way of calculating the perimeter of a polygon in a shapefile object? Furthermore, how to calculate the length of the common border of two polygons? I've searched the code of spded, but could not find a hint on how to do it. Thank you very much, Leo. [[alternative HTML version deleted]]
2012 Oct 30
2
bootstrapping quantile regression
...3L, 8209L, 8393L, 6425L, 9364L, 8624L, 10651L, 8868L, 9417L, 8874L, 10962L, 10743L, 11878L, 9867L, 7838L, 11876L, 12212L, 8233L, 6360L, 4193L, 7416L, 5246L, 6509L, 4895L, 6775L, 7894L, 5980L, 5318L, 7392L, 7894L, 3469L, 1468L, 3524L, 5267L, 5048L, 1016L, 5605L, 8793L, 3475L, 1651L, 5514L, 9718L), P.Perimeter = c(2791.9, 3892.6, 3930.66, 3869.32, 3948.54, 4010.15, 4345.75, 4344.75, 3682.04, 3098.65, 4480.05, 3986.24, 4036.54, 3518.04, 3999.37, 3629.07, 4608.66, 4787.62, 4864.22, 4479.41, 3428.74, 4353.14, 4697.65, 3518.44, 1977.39, 1379.35, 1916.24, 1585.42, 1851.21, 1239.66, 1728.14, 1461.06, 1426.76...
2015 Mar 04
1
IP drop list
...one. Besides, my > mail server is built for...serving mail. Not being a firewall. You can implement whatever type of security you are comfortable with, however, best practices is to have layered security, also known as the "belt and suspenders" method of keeping your pants up. A perimeter firewall and local firewalls (iptables usually) on each machine is the minimum level of security I set up. A perimeter firewall alone does not protect you from an attacker who is able to compromise one machine and install a scanner which then scan all the systems on your internal network loo...
2008 Jun 16
0
Problem while starting Perimeter
If I try to start Perimeter, nothing happen. He give me this Code in the Terminal: > preloader: Warning: failed to reserve range 00000000-60000000 > preloader: Warning: failed to reserve range 00000000-60000000 > err:dosmem:setup_dos_mem Cannot use first megabyte for DOS address space, please report > preloader...
2015 Oct 16
2
Is there any solution, or even work on, limiting which keys gets forwarded where?
On Thu, Oct 15, 2015 at 07:02:58PM -0400, Nico Kadel-Garcia wrote: > On Thu, Oct 15, 2015 at 10:34 AM, hubert depesz lubaczewski > <depesz at depesz.com> wrote: > > Hi, > > > > I'm in a situation where I'm using multiple SSH keys, each to connect to > > different set of servers. > > > > I can't load/unload keys on demand, as I usually am
2015 May 30
6
Using two agents
...nd only key2 is allowed >> to be forwarded to other hosts. > > As validation for what Kasper is saying, so that others know that it's > not just him: > > $work would use the feature you describe. At present, the key1 that you > describe is unencrypted :( but is used for perimeter access, while key2 > is used for intra-cluster access, but because it's forwarded onto less > trusted hosts, can't be allowed to be used for getting into the cluster > in the first place -- we constrain the impact of a breach. Not ideal. > > We'd like to move to using...
2015 May 30
3
Using two agents
On 30/05/15 08.34, Nico Kadel-Garcia wrote: > On Sat, May 30, 2015 at 8:00 AM, Kasper Dupont > <kasperd at kdxdx.23.may.2015.kasperd.net> wrote: > > As far as I can tell when the ssh command uses an agent to > > authenticate to a server and then forwards an agent to that > > server, it will always use the same agent for both purposes. > > > > Has there
2004 Apr 23
2
use keep state(strict) to mitigate tcp issues?
Hi, When deploying a BSD with IPF in at the network perimeter and using rules like these: pass in .. proto tcp ... keep state(strict) it's possible to refuse tcp packets which arrive out of order. This would increase the difficulty doing blind attack resets and blind data injection attack, cause then you'd have to "guess" the exact expec...
2005 Aug 22
1
How to add legend of plot.Design function (method=image)? (if (!.R.) )
...y <- ifelse(runif(n) < plogis(L), 1, 0) ddist <- datadist(age, blood.pressure, cholesterol, sex) options(datadist='ddist') fit <- lrm(y ~ blood.pressure + sex * (age + rcs(cholesterol,4)), x=TRUE, y=TRUE) boundaries <- perimeter(age, cholesterol, lowess=TRUE) plot(age, cholesterol) # show bivariate data density lines(boundaries) # and perimeter that will be used for 3-D plot z <- plot(fit, age=NA, cholesterol=NA, perim=boundaries, method='image') # draws i...
2008 Oct 11
6
Force backup of files modified outside of puppet's File Type
...augeas { "sshd_config_port" : notify => [ Service["sshd"], File["sshd_config"] ] context => "/files/etc/ssh/sshd_config", changes => "set Port 22", onlyif => "get Port != 22", } } -- Joel Nimety Perimeter eSecurity Product Architect, Email Defense 203.541.3416 jnimety@perimeterusa.com http://www.perimeterusa.com -- The sender of this email subscribes to Perimeter eSecurity''s email anti-virus service. This email has been scanned for malicious code and is believed to be virus free. Fo...
2005 Jul 01
0
[LLVMdev] execution time of bytecode and native
...3005 727 406 | 32 79 58 1 | voronoi/voronoi | 1.11 0.1900 0.0601 0.0081 0.0755 0.0024 0.0009 | 8676 2205 322 | 141 275 761 38 | health/health | 0.97 0.0800 0.0298 0.0036 0.0171 0.0004 0.0002 | 3438 823 268 | 35 49 101 6 | perimeter/perimeter | 0.64 0.0800 0.0307 0.0040 0.0149 0.0002 0.0002 | 4266 987 79 | 21 57 * * | mst/mst | 0.21 0.0500 0.0167 0.0025 0.0117 0.0001 0.0001 | 2094 491 223 | 15 33 * * | This recursively traverses llvm-test building all of the...
2005 Jul 01
1
[LLVMdev] execution time of bytecode and native
Hello , I am compiling SPEC 2000 benchmarks with llvm .Got stuck with calculating "execution time" of all the .bc and native files. The log for nightly test itself gives execution times but I am passing the bytecode files to my pass which gives another bytecode file.I have to calculate execution time of such bytecode and native files as well.If i simply do this: time lli
2019 Jan 11
3
Running off pre-created keytabs
...sample_script_RODC_join <http://technet.microsoft.com/en-us/library/dd728035(v=ws.10).aspx#sample_script_RODC_join> Before running the script, a registry key needs to be added: reg add HKLM\System\CurrentControlSet\Services\Netlogon\Parameters /v SiteName /t REG_SZ /d Default-First-Site-Name-Perimeter Then run the script like: cscript JoinScript.vbs /domain YOURDOMAIN /machinepassword "THE_PASSWORD" /dc RODC_FQDN /readonly I spend a lot of time trying to join a Samba domain member server to an Windows read-only AD, but I couldn't get it to work. My impression is that Samba is...
2005 Jul 21
1
[LLVMdev] execution time of bytecode and native
...48 | 17 64 * * | em3d/em3d | 2.84 0.0600 0.0569 0.0034 0.0195 0.0003 0.0002 | 3005 727 406 | 32 79 58 1 | voronoi/voronoi | 1.11 0.1900 0.0601 0.0081 0.0755 0.0024 0.0009 | 8676 2205 322 | 141 275 761 38 | health/health | 0.97 0.0800 0.0298 0.0036 0.0171 0.0004 0.0002 | 3438 823 268 | 35 49 101 6 | perimeter/perimeter | 0.64 0.0800 0.0307 0.0040 0.0149 0.0002 0.0002 | 4266 987 79 | 21 57 * * | mst/mst | 0.21 0.0500 0.0167 0.0025 0.0117 0.0001 0.0001 | 2094 491 223 | 15 33 * * | This recursively traverses llvm-test building all of the programs in the subdirectory from where you start. The report stu...
2017 Oct 25
2
RFC: Switching to the new pass manager by default
...nch/fourinarow/fourinarow 1018.58% > How real is this? -Hal > MultiSource/Benchmarks/Fhourstones/fhourstones > 9.06% > > MultiSource/Benchmarks/Ptrdist/yacr2/yacr2 > 7.23% > > MultiSource/Benchmarks/Olden/perimeter/perimeter > 6.87% > > MultiSource/Benchmarks/MiBench/consumer-typeset/consumer-typeset 6.02% > > MultiSource/Benchmarks/Trimaran/enc-pc1/enc-pc1 > 5.59% > > MultiSource/Benchmarks/ASC_Sequoia/AMGmk/AMGmk...
2008 Oct 08
10
Puppet Augeas Plugin
...augeas.rb I noticed that "onlyif" is only processed if the result is not nil. Is this intended behavior? I propose that if the return value is nil it should be treated as an empty string so comparisons can still happen, I''ve attached a patch if this suits you. -- Joel Nimety Perimeter eSecurity Product Architect, Email Defense 203.541.3416 jnimety@perimeterusa.com http://www.perimeterusa.com -- The sender of this email subscribes to Perimeter eSecurity''s email anti-virus service. This email has been scanned for malicious code and is believed to be virus free. F...
2015 Aug 29
1
Active Directory clients in DMZ
...vide access to underlaying LDAP. However it is not able > to understand setting e. g. AD permissions or other things the classic > LDAP don't have. > > > Regards, > Marc > > Microsoft has a doc for this, but being microsoft they don't call it a DMZ, it's a 'perimeter network' see: http://www.microsoft.com/en-us/download/details.aspx?id=3957#tm Rowland
2009 Mar 06
2
Hint to overcome the problem with animated cursors??
Hi I'm looking for a instruction (for dummies) about how to overcome the problem of invisible mouse pointers (animated cursors) that seem to be common amongs strategy games. (example: perimeter) I'm a newbie with linux and i've been spoiled by the point&click and plug&play usage of computers since Amiga 500 around 1987. :) kind regards - kimmok
2005 Aug 22
0
How to add legend of plot.Design function ( method=image)?
...y <- ifelse(runif(n) < plogis(L), 1, 0) ddist <- datadist(age, blood.pressure, cholesterol, sex) options(datadist='ddist') fit <- lrm(y ~ blood.pressure + sex * (age + rcs(cholesterol,4)), x=TRUE, y=TRUE) boundaries <- perimeter(age, cholesterol, lowess=TRUE) plot(age, cholesterol) # show bivariate data density lines(boundaries) # and perimeter that will be used for 3-D plot z <- plot(fit, age=NA, cholesterol=NA, perim=boundaries, method='image') # draws i...
2011 Jun 02
1
barplot - change width of bar outline
Dear R users I am modifying a column chart which I have created in R using barplot to make it clearer. I have been able to change the settings to increase the width of the axes lines and the text size but I cannot find the code to change the width of the lines which create the bars/columns themselves. Can anyone point me in the right direction please? Many thanks Claire -- View this message in