Displaying 20 results from an estimated 78 matches for "weakest".
Did you mean:
weaker
2017 Jul 18
3
Thanks to every one
...never seen wrath like a computational
> scientist whose 200 day calculation has just failed because you needed
> to reboot the node it was running on.
I too was a HPC admin, and I knew people who believed the above, and
their clusters were compromised. You're running a service where the
weakest link are the researchers who use your cluster -- they're able
to run code on your nodes, so local exploits are possible. They often
have poor security practices (share passwords, use them for multiple
accounts).
Also, if your researchers can't write code that performs checkpoints,
they...
2019 Feb 11
4
Precise meaning of must alias?
...must be equal
when accessed at runtime. (This allows unequal sizes, and zero
sizes, but restricts the pointers to be equal.)
4. A must alias result indicates that *at least one* bit in memory is
accessed by both, unless one of the two accesses has size 0 at
runtime. (This is the weakest.)
I'd always thought that (1) was the correct answer, but now I find
myself wondering. From the code, (3) seems to be the closest match to
what we actually implement, but we're not entirely consistent there
either. What do others think?
Philip
-------------- next part -------------...
2015 Jan 12
3
TINC config files layout not human or script friendly
I would say the weakest part of the TINC design is the configuration
file layout.
There is no way to split out the essentially static configuration for
all nodes in the cluster and isolate the node specific settings to one
configuration file.
So that means I have to keep an inventory of configuration files per
node...
2008 May 21
1
How to use classwt parameter option in RandomForest
Hi,
I am trying to model a dataset with the response variable Y, which has
6 levels { Great, Greater, Greatest, Weak, Weaker, Weakest}, and
predictor variables X, with continuous and factor variables using
random forests in R. The variable Y acts like an ordinal variable, but
I recoded it as factor variable.
I ran a simulation and got OOB estimate of error rate 60%. I validated
against some external datasets and got about 59% mi...
2012 Jul 12
2
bcypt availability
Dear Timo,
Do you intend to introduce bcrypt into the built in password schemes?
In lew of all these hacks lately many larger companies appear moving
this way, we are looking at it too, but dovecot will then be the
weakest link in the database security.
So, are you planning on this and if so what sort of timeframe /
version would you expect it to be in beta ?
Nik
2006 Apr 22
1
Pinouts for T1/E1 crossover cable WAS "RE: whatcable to connect a legacy PBX to a TE410P ?"
...T&T) just came out and installed my PRI. FYI, they used Cat 5e cable. No special T1 cabling that costs a fortune to buy somewhere, just plain old Cat 5e cable. Guess what guys? If they are using this as customers' sites, they are probably using it elsewhere. It's only as good as the weakest link, so you can go out and spend lots of money on "T1 cable", or just use Cat 5e like the telco guys do.
--
Lacy Moore
Aspendora, Inc.
-------------- next part --------------
A non-text attachment was scrubbed...
Name: not available
Type: application/ms-tnef
Size: 4520 bytes
Desc: n...
2006 May 12
6
How to truly separate Logic from view with Rails?
It is something that I have been wondering. When working with other
application servers there is often/most of the time a 3 tiers/layers
architecture:
- Presentation layer/Web services
- Application layer
- Database layer
They often resides on separate machines, 3 different sets. So the
application code is logically AND physically separated from the
presentation layer.
Is this possible with
2008 Dec 17
1
pruning trees using rpart
...error is not more than one standard error above the error of the best
model.
However, in the rpart package I am not getting trees of all sizes but for
example three sizes are 1,2,5 in one example I am working with, while with
cv.tree in package tree it gives 1,2,3,4,5 like I would guess it should
(weakest link pruning successively collapses the internal nodes that
contrubute the least). What is the reason for this?
A second problem I am having in both packages is that the cross-validation
results are highly variable between different runs of the programs. This is
not unexpected as cross-validations...
2007 Oct 21
13
[ANN/RFC] Rathole, a fixtures extension plugin
Like lots of other folks, I''ve been searching for a way to scratch my
fixture itches. Rathole is my extraction of a few techniques we''ve
successfully applied at my day job.
We''ve been using Rathole for a month or so now, but I''d really like
some feedback from a wider audience. Rathole tackles:
* Conflicting PK''s (no more id''s in fixture
2019 Aug 27
4
Opus Todo
Hi,
I had found a Opus TODO list in
https://wiki.xiph.org/index.php?title=OpusTodo&mobileaction=toggle_view_desktop
.
The item "Opus-tools" interest me. And here is my question about "Port
opusdec to libopusfile/libopusurl":
1. Does this function have achieved? On one hand, I think not literally. On
the other hand, after briefly reviewing opusdec.c of opus-tools, I found
2024 Nov 27
1
Eaton 5PX 3rd party batteries
...* 3 x 10
> * 7 x 9
> * 2 x 8
>
> I don't know enough to know if this matters and I expect I'm merely overthinking this.
You are definitely overthinking it :-) Perhaps you've previously been
diagnosed as a nerd!
But, I would either put the 4 strongest in the UPS, or the 4 weakest,
making the external pack better, since it is more important.
I would suggest that you get a West Mountain CBA, if you want to
continue to overthink this. We are assuming that more lead is more
capacity, but there are also weak cells, not clearly related to missing
lead. What really matters, IM...
2007 Jan 21
1
APC Smartups protocol - Hidden Programming Mode
...I connected four el cheapo batteries (36Ah) in
series. They served almost five hours with 17% load on my SmartUPS 2200.
That sounds good, but I have no idea of the lifetime yet.
I'm a bit concerned about the different capacity of the batteries: Since
the batteries are connected in series, the weakest one will be
discharged the most, which in turn hurts its capacity. I'm thinking
about connecting a resistor (e.g. 220 Ohm, 1W) in parallel to each
battery, so that they at least get the same tension when being charged.
One thing to keep in mind is that car batteries produce emit hydrogen
gas,...
2024 Nov 29
1
Eaton 5PX 3rd party batteries
...y overthinking this.
>
> You are definitely overthinking it :-) Perhaps you've previously been
> diagnosed as a nerd!
Possibly. I also have a rain-barrel project underway, and I know I'm overthinking that one too.
> But, I would either put the 4 strongest in the UPS, or the 4 weakest,
> making the external pack better, since it is more important.
>
> I would suggest that you get a West Mountain CBA, if you want to
> continue to overthink this. We are assuming that more lead is more
> capacity, but there are also weak cells, not clearly related to missing
> le...
2010 Apr 24
7
Pushing a file only if another does not exist.
I am trying to write a module for tripwire. I need to push out the
twcfg.txt and twpol.txt files only if the tw.cfg and tw.pol files do
not currently exist.
How can do I this with File{}? I''m can''t seem to find a way to do it.
In general times, how can you deploy file A only when file B does not
exist?
And... tripwire... what a mess. I am trying to use push out the site
key,
2015 Jan 12
2
[SOLVED] Re: TINC config files layout not human or script friendly
...1/2015 10:47 PM, md at rpzdesign.com wrote:
> Oops, did I forget to mention how good a design the REST of tinc is,
> operationally speaking.
>
> Config files aside, it is a really good VPN.
>
> md
>
> On 1/11/2015 10:05 PM, md at rpzdesign.com wrote:
>> I would say the weakest part of the TINC design is the configuration
>> file layout.
>>
>> There is no way to split out the essentially static configuration for
>> all nodes in the cluster and isolate the node specific settings to one
>> configuration file.
>>
>> So that means I h...
2017 Oct 30
0
Password encription
...s brittle.
A robustly secure system will overlap protection: strong hashes, password
compliance systems, brute force countermeasures, file permissions/OS
hardening, network origins vetting, anti-DoS measures, etc.
Keep this picture in mind that I found on CLCERT
https://www.clcert.cl/humor/img/weakest-link-road.jpg
Joseph Tam <jtam.home at gmail.com>
2015 Jan 12
0
TINC config files layout not human or script friendly
Oops, did I forget to mention how good a design the REST of tinc is,
operationally speaking.
Config files aside, it is a really good VPN.
md
On 1/11/2015 10:05 PM, md at rpzdesign.com wrote:
> I would say the weakest part of the TINC design is the configuration
> file layout.
>
> There is no way to split out the essentially static configuration for
> all nodes in the cluster and isolate the node specific settings to one
> configuration file.
>
> So that means I have to keep an inventory of...
2006 Jun 09
1
An idea: add RYUL to Rails
Dear Friends,
I''d like to have a development suggestion for Rails.
Rails is an amazing framework, and clearly it''s weakest link is that it
relies on HTML in the end, which is not always the most appropriate GUI out
there. Another option could be XUL. Mozilla-based browsers (Firefox) can run
XUL apps right out of the box, others could use the XULRunner application.
Here you can find some wonderful demos of XUL applicat...
2007 Sep 13
2
Export Step Function Coefficients to Spreadsheet or Text File
Hello,
After I use the lm() function to perform a multiple linear regression, and
then use the step function to eliminate variables that predict the weakest,
I need to export the final equation to a spreadsheet or a text file. Below
is some sample code. In the end I want to export the coefficients to a
spreadsheet. Will you please direct me to the appropriate syntax? Thanks for
your time, --Eric
x <- read.csv('C:/path/*.csv', comment.char =...
2005 Mar 10
1
FWDout credits sharing
...ith country (via private email, not on, this list), make
sure you provide a specific route to it in FWDout so that your system
gets used, and I may call you in order to increase your credits
balance.
I think the credits system should be totally reorganized, this is what
appears to me as one of the weakest part of FWDout. For example, it
could be something like:
- receive 5 credits every day when your system is up
- allow credits transfer from one account to another
Also, being able to rate the quality of the various routes that have
been used by a user would be very helpful in selecting the bes...