search for: weakest

Displaying 20 results from an estimated 74 matches for "weakest".

Did you mean: weaker
2017 Jul 18
3
Thanks to every one
...never seen wrath like a computational > scientist whose 200 day calculation has just failed because you needed > to reboot the node it was running on. I too was a HPC admin, and I knew people who believed the above, and their clusters were compromised. You're running a service where the weakest link are the researchers who use your cluster -- they're able to run code on your nodes, so local exploits are possible. They often have poor security practices (share passwords, use them for multiple accounts). Also, if your researchers can't write code that performs checkpoints, they...
2019 Feb 11
4
Precise meaning of must alias?
...must be equal when accessed at runtime.  (This allows unequal sizes, and zero sizes, but restricts the pointers to be equal.) 4. A must alias result indicates that *at least one* bit in memory is accessed by both, unless one of the two accesses has size 0 at runtime.  (This is the weakest.) I'd always thought that (1) was the correct answer, but now I find myself wondering.  From the code, (3) seems to be the closest match to what we actually implement, but we're not entirely consistent there either.  What do others think? Philip -------------- next part -------------...
2015 Jan 12
3
TINC config files layout not human or script friendly
I would say the weakest part of the TINC design is the configuration file layout. There is no way to split out the essentially static configuration for all nodes in the cluster and isolate the node specific settings to one configuration file. So that means I have to keep an inventory of configuration files per node...
2008 May 21
1
How to use classwt parameter option in RandomForest
Hi, I am trying to model a dataset with the response variable Y, which has 6 levels { Great, Greater, Greatest, Weak, Weaker, Weakest}, and predictor variables X, with continuous and factor variables using random forests in R. The variable Y acts like an ordinal variable, but I recoded it as factor variable. I ran a simulation and got OOB estimate of error rate 60%. I validated against some external datasets and got about 59% mi...
2012 Jul 12
2
bcypt availability
Dear Timo, Do you intend to introduce bcrypt into the built in password schemes? In lew of all these hacks lately many larger companies appear moving this way, we are looking at it too, but dovecot will then be the weakest link in the database security. So, are you planning on this and if so what sort of timeframe / version would you expect it to be in beta ? Nik
2006 Apr 22
1
Pinouts for T1/E1 crossover cable WAS "RE: whatcable to connect a legacy PBX to a TE410P ?"
...T&T) just came out and installed my PRI. FYI, they used Cat 5e cable. No special T1 cabling that costs a fortune to buy somewhere, just plain old Cat 5e cable. Guess what guys? If they are using this as customers' sites, they are probably using it elsewhere. It's only as good as the weakest link, so you can go out and spend lots of money on "T1 cable", or just use Cat 5e like the telco guys do. -- Lacy Moore Aspendora, Inc. -------------- next part -------------- A non-text attachment was scrubbed... Name: not available Type: application/ms-tnef Size: 4520 bytes Desc: n...
2006 May 12
6
How to truly separate Logic from view with Rails?
It is something that I have been wondering. When working with other application servers there is often/most of the time a 3 tiers/layers architecture: - Presentation layer/Web services - Application layer - Database layer They often resides on separate machines, 3 different sets. So the application code is logically AND physically separated from the presentation layer. Is this possible with
2008 Dec 17
1
pruning trees using rpart
...error is not more than one standard error above the error of the best model. However, in the rpart package I am not getting trees of all sizes but for example three sizes are 1,2,5 in one example I am working with, while with cv.tree in package tree it gives 1,2,3,4,5 like I would guess it should (weakest link pruning successively collapses the internal nodes that contrubute the least). What is the reason for this? A second problem I am having in both packages is that the cross-validation results are highly variable between different runs of the programs. This is not unexpected as cross-validations...
2007 Oct 21
13
[ANN/RFC] Rathole, a fixtures extension plugin
Like lots of other folks, I''ve been searching for a way to scratch my fixture itches. Rathole is my extraction of a few techniques we''ve successfully applied at my day job. We''ve been using Rathole for a month or so now, but I''d really like some feedback from a wider audience. Rathole tackles: * Conflicting PK''s (no more id''s in fixture
2019 Aug 27
4
Opus Todo
Hi, I had found a Opus TODO list in https://wiki.xiph.org/index.php?title=OpusTodo&mobileaction=toggle_view_desktop . The item "Opus-tools" interest me. And here is my question about "Port opusdec to libopusfile/libopusurl": 1. Does this function have achieved? On one hand, I think not literally. On the other hand, after briefly reviewing opusdec.c of opus-tools, I found
2007 Jan 21
1
APC Smartups protocol - Hidden Programming Mode
...I connected four el cheapo batteries (36Ah) in series. They served almost five hours with 17% load on my SmartUPS 2200. That sounds good, but I have no idea of the lifetime yet. I'm a bit concerned about the different capacity of the batteries: Since the batteries are connected in series, the weakest one will be discharged the most, which in turn hurts its capacity. I'm thinking about connecting a resistor (e.g. 220 Ohm, 1W) in parallel to each battery, so that they at least get the same tension when being charged. One thing to keep in mind is that car batteries produce emit hydrogen gas,...
2010 Apr 24
7
Pushing a file only if another does not exist.
I am trying to write a module for tripwire. I need to push out the twcfg.txt and twpol.txt files only if the tw.cfg and tw.pol files do not currently exist. How can do I this with File{}? I''m can''t seem to find a way to do it. In general times, how can you deploy file A only when file B does not exist? And... tripwire... what a mess. I am trying to use push out the site key,
2015 Jan 12
2
[SOLVED] Re: TINC config files layout not human or script friendly
...1/2015 10:47 PM, md at rpzdesign.com wrote: > Oops, did I forget to mention how good a design the REST of tinc is, > operationally speaking. > > Config files aside, it is a really good VPN. > > md > > On 1/11/2015 10:05 PM, md at rpzdesign.com wrote: >> I would say the weakest part of the TINC design is the configuration >> file layout. >> >> There is no way to split out the essentially static configuration for >> all nodes in the cluster and isolate the node specific settings to one >> configuration file. >> >> So that means I h...
2017 Oct 30
0
Password encription
...s brittle. A robustly secure system will overlap protection: strong hashes, password compliance systems, brute force countermeasures, file permissions/OS hardening, network origins vetting, anti-DoS measures, etc. Keep this picture in mind that I found on CLCERT https://www.clcert.cl/humor/img/weakest-link-road.jpg Joseph Tam <jtam.home at gmail.com>
2015 Jan 12
0
TINC config files layout not human or script friendly
Oops, did I forget to mention how good a design the REST of tinc is, operationally speaking. Config files aside, it is a really good VPN. md On 1/11/2015 10:05 PM, md at rpzdesign.com wrote: > I would say the weakest part of the TINC design is the configuration > file layout. > > There is no way to split out the essentially static configuration for > all nodes in the cluster and isolate the node specific settings to one > configuration file. > > So that means I have to keep an inventory of...
2006 Jun 09
1
An idea: add RYUL to Rails
Dear Friends, I''d like to have a development suggestion for Rails. Rails is an amazing framework, and clearly it''s weakest link is that it relies on HTML in the end, which is not always the most appropriate GUI out there. Another option could be XUL. Mozilla-based browsers (Firefox) can run XUL apps right out of the box, others could use the XULRunner application. Here you can find some wonderful demos of XUL applicat...
2007 Sep 13
2
Export Step Function Coefficients to Spreadsheet or Text File
Hello, After I use the lm() function to perform a multiple linear regression, and then use the step function to eliminate variables that predict the weakest, I need to export the final equation to a spreadsheet or a text file. Below is some sample code. In the end I want to export the coefficients to a spreadsheet. Will you please direct me to the appropriate syntax? Thanks for your time, --Eric x <- read.csv('C:/path/*.csv', comment.char =...
2005 Mar 10
1
FWDout credits sharing
...ith country (via private email, not on, this list), make sure you provide a specific route to it in FWDout so that your system gets used, and I may call you in order to increase your credits balance. I think the credits system should be totally reorganized, this is what appears to me as one of the weakest part of FWDout. For example, it could be something like: - receive 5 credits every day when your system is up - allow credits transfer from one account to another Also, being able to rate the quality of the various routes that have been used by a user would be very helpful in selecting the bes...
2006 Apr 22
1
Pinouts for T1/E1 crossover cable WAS "RE: whatcable to connect a legacy PBX to a TE410P ?"
I agree. I haven't had a problem using CAT-5, even for long runs, however it's not a real T-Carrier cable and I didn't know how old the PBX is. Paul >I have not in my experience seen any problems with using a Good Quality >Cat5 vs. Cat 3 (telco standard) cable for X-connects. YMMV, but you >should be fine. As far as the shielding goes, I use UTP cables and >Connectors
2006 Nov 22
2
G722?
In a recent interview someone from Digum indicated that the G722 wideband codec was being worked into Asterisk. This will make Asterisk compatible with Polycom's new HDVoice products like the IP650 phone. This is very interesting, potentially exciting, but it brings up certain questions. Who will benefit as long as calls must typically pass into existing PSTN infrstructure, and so be