« 1051 1052 1053 1054 1055 1506 »

Pages are deceptive. Live life in a basket.

nelhage/reptyr · GitHub

Skip to content Sign up Sign in This repository Explore Features Enterprise Blog Watch 66 Star 1,528 Fork 79 nelhage / reptyr /.container /.repohead Code Issues Pull requests Pulse Graphs HTTPS Subversion You can clone with HTTPS or Subversion . Download ZIP /.repository-sidebar Reparent a running program to a new terminal 183 commits 4 branches 11 releases 16 contributors C 96.4% Makefile 1.6% Shell 1.1% C Makefile Shell branch: master Switch branches/tags Branches Tags debian master pristine-tar release Nothing to show reptyr-0.6.2 reptyr-0.6.1 reptyr-0.6 reptyr-0.5 reptyr-0.4 reptyr-0.3 reptyr-0.2 reptyr-0.1 debian/rept...

Linked on 2015-03-27 00:59:45 | Similar Links
Object Store comparison

Compare cost, durability, and region support of public cloud object stores, e.g., Amazon S3. Columns Object Store Storage cost (cents/GB/mo) Egress cost (cents/GB) Ingress cost (cents/GB) PUT, POST, COPY, LIST cost (cents/1000 ops) HEAD, GET cost (cents/1000 ops) DELETE cost (cents/1000 ops) Durability % Availability % Regions Replicas Consistency References Amazon Glacier (US standard) 1.0 9.0 0.0 99.999999999 99.99 7 (N. Virginia, N. California, Oregon, Ireland, Frankfurt, Sydney, Tokyo) 1 2 3 Amazon S3 Standard (US standard) 3.0 9.0 0.0 0.5 0.04 0.0 99.999999999 99.99 9 (N. Virginia, N. California, Oregon, Ireland, Frankfurt, Singapore, Sydney, Tokyo, Sao Paulo) eventual 1 2 3 Amazon S3 Reduced Redundancy (US standard) 2.4 9.0 0.0 0.5 0.04 0.0 99.99 99.99 9 (N. Virginia, N. California, Oregon, Ireland, Fran...

Linked on 2015-03-27 00:47:49 | Similar Links
Are “warrant canaries” legal? Twitter wants to save tech’s warning signal of government spying | Gigaom

<![endif] generated 56 seconds ago generated in 0.791 seconds served from batcache in 0.003 seconds expires in 244 seconds Google Tag Manager End Google Tag Manager [if lt IE 9]> <div class="old-ie"> <p> We no longer support IE8. We recommend upgrading your browser to a newer version of Internet Explorer or use another browser when visiting Gigaom sites. </p> <ul> <li><a href="http://chrome.com">Chrome</a></li> <li><a href="http://firefox.com">Firefox</a></li> <li><a href="http://windows.microsoft.com/en-us/internet-explorer/download-ie">Internet Explorer</a></li> </ul> </div> <![endif] Gigaom Logo Events Research Subscribe Gigaom Newsletters Don't miss out. Sign up to get all the news you need delivered right to your inbox. Get started You're subscribed! If you like, you can update your settings Gigaom R...

Linked on 2015-03-26 23:50:02 | Similar Links
The Yale Law Journal - Forum: Warrant Canaries and Disclosure by Design: The Real Threat to National Security Letter Gag Orders

<![endif] Header /.header PRINT ARCHIVE FORUM SUBMISSIONS MASTHEAD ABOUT CONTACT CONTACT YLJ ALUMNI SUBSCRIPTIONS VOLUME 124 2014-2015 Forum 19 Dec 2014 Rebecca Wexler Since the 1980s, the FBI has issued documents referred to as National Security Letters (NSLs), which demand data from companies—including financial institution records and the customer records of telephone companies and communications service providers—for foreign intelligence investigations. 1 The use of the letters increased dramatically after the attacks of September 11, 2001 and the USA PATRIOT Act’s expansion of the FBI’s statutory NSL authority. 2 But these letters were rarely publicized or publicly challenged, 3 as they often included gag orders that required recipients not to reveal the contents of the letter, or even its existence. 4 After the leak of...

Linked on 2015-03-26 23:48:04 | Similar Links
Australia outlaws warrant canaries - Boing Boing

submit Google search box. About us Shop Archives Contact Form Advertise here Blog Features Video BBS Twitter Facebook Tumblr RSS Leaderboard ad top anchor for j/k navigation The main content area of the site IF IT'S AN AD, DISCLOSE IT A LARGE HEADLINE AND THE BYLINE By Cory Doctorow at 12:24 pm Thu, Mar 26, 2015 RIGHT HAND ADS UD 1 BB ad_squares UD 2, BB ad squares <div class="sidebar_item"> <div id="gpt-ad-right_side_2"></div> </div> UD 3 MAIN POST SHARING BUTTONS SHARE TWEET STUMBLE COMMENTS CONTENT OF THE POST The exceptionally broad new surveillance bill lets the government do nearly unlimited warrantless mass surveillance, even of lawyer-client privileged communications, and bans warrant canaries , making it an offense to "disclose information about the existence or non-existenc...

Linked on 2015-03-26 23:39:50 | Similar Links
WebScaleSQL | "We're Gonna Need A Bigger Database"

FAQ Contributing GitHub Join us on GitHub Update (2015-01-15): Please welcome Alibaba to WebScaleSQL! WebScaleSQL is a collaboration among engineers from several companies that face similar challenges in running MySQL at scale, and seek greater performance from a database technology tailored for their needs. Our goal in launching WebScaleSQL is to enable the scale-oriented members of the MySQL community to work more closely together in order to prioritize the aspects that are most important to us. We aim to create a more integrated system of knowledge-sharing to help companies leverage the great features already found in MySQL 5.6, while building and adding more features that are specific to deployments in large scale environments. In the last few months, engineers from all four companies have contributed code and provided feedback to each other to develop a new, more...

Linked on 2015-03-26 23:32:34 | Similar Links
Hacking Air-Gapped Computers Using Heat - Hacker News

Hacking News Defacement Hack Data Breach Credit Card Hacking Smartphone Hacking SCADA System Hacking Password Cracking Browser Security Malware Ransomware Malware Banking Trojan Malware/Virus Botnet attack Smartphone Malware Stuxnet Worm Cyber Espionage Cyber Attack DDoS Attack Cyber Security Malware/Virus State Sponsored Hackers Email/Gmail Hacking Cyber Warfare Cyber Espionage Vulnerabilities Vulnerability Disclosure Zero-Day Vulnerability Android Vulnerability iPhone Vulnerability SQL Injection MITM Attack XSS Vulnerability Brute Force attack Hacking Groups Syrian Electronic Army Anonymous Hacker Chinese Hacker Pakistani Hacker Indian Hacker Russian Hacker Iranian Hacker Israeli Hacker NSA Spying Edward Snowden National Security Agency(NSA) Online Privacy Encryption Tools Surveillance Tor Anonymity Network Bitcoin/Blockchain Menu +1,455,900 190,300 ...

Linked on 2015-03-26 20:56:53 | Similar Links
Adirondack chair - Wikipedia, the free encyclopedia

CentralNotice From Wikipedia, the free encyclopedia Jump to: navigation , search This article needs additional citations for verification . Please help improve this article by adding citations to reliable sources . Unsourced material may be challenged and removed. (July 2013) A typical Adirondack chair The Adirondack chair (or the Muskoka chair in Canada) is a simple rustic wooden chair for outdoor use. Originally made with 11 flat wooden boards, it features a straight back and seat and wide armrests. 1 Origin 1.1 Today 2 See also 3 References Origin [ edit ] The first Adirondack chair was designed by Thomas Lee while vacationing in Westport , New York , in the Adirondack Mountains in 1903. Needing outdoor chairs for his summer home, he tested his early efforts on his family. After arriving at a final design for a "Westport plank chair," he...

Linked on 2015-03-26 20:15:15 | Similar Links
Germanwings plane crash: Co-pilot 'wanted to destroy plane' - BBC News

[if IE]><body id="asset-type-sty" class="ie device--feature"><![endif] [if !IE]> <![endif] BBCDOTCOM bodyFirst Begin iStats 20100118 (UX-CMC 1.1009.3) End iStats (UX-CMC) [if (gt IE 8) | (IEMobile)]><! <![endif] [if (lt IE 9) & (!IEMobile)]> <![if (IE 8)]> <header id="orb-banner" role="banner" class="orb-old-ie orb-ie8"> <![endif]> <![if (IE 7)]> <header id="orb-banner" role="banner" class="orb-old-ie orb-ie7"> <![endif]> <![if (IE 6)]> <header id="orb-banner" role="banner" class="orb-old-ie orb-ie6"> <![endif]> <![endif] Skip to content Accessibility Help BBC iD News News Sport Weather Shop Earth Travel Capital iPlayer Culture Autos Future TV Radio CBBC CBeebies Arts WW1 Food History Learning Music Science Nature Earth Local Travel Full A-Z Menu Search the BBC Styling ...

Linked on 2015-03-26 19:40:59 | Similar Links
How to install dragonflybsd in vps step by step

Home .site-navigation .main-navigation Search Hosting Formula #masthead .site-header .entry-header Distrowatch told me about newest version of DragonFlyBSD (3.8.0) . This version also in my waiting list as I know this BSD variant since beginning. When DragonFlyBSD begin using ports  aka dports to their software installation management then I’m happily use this version as server. For documentation process when I delegate installation process for my staff I create this simple guide. Of course its VPS based as we try to minimize physical server for our company DragonFlyBSD provide .iso.bz2 link and I have to convert it to .iso first. The idea is create temporary location for iso file and use it for Vultr custom iso. I think my lowendspririt vps is good place to hold temporary image. $ ssh root@162.251.114.76 -p 17020 root@162.251.114.76’s password: We...

Linked on 2015-03-26 18:28:09 | Similar Links
dx
Miscellaneous Macros: GLib Reference Manual

Go to page content Go to main menu Go to the search field GNOME.org About Users Developers Administrators Search: Top | Description Miscellaneous Macros Miscellaneous Macros — specialized macros which are not used often #define g_auto () #define g_autoptr () #define G_DEFINE_AUTOPTR_CLEANUP_FUNC () #define G_DEFINE_AUTO_CLEANUP_CLEAR_FUNC () #define G_DEFINE_AUTO_CLEANUP_FREE_FUNC () #define G_VA_COPY () #define G_STRINGIFY () #define G_PASTE () #define G_STATIC_ASSERT () #define G_STATIC_ASSERT_EXPR () #define G_GNUC_ALLOC_SIZE () #define G_GNUC_ALLOC_SIZE2 () #define G_GNUC_DEPRECATED_FOR () #define G_GNUC_PRINTF () #define G_GNUC_SCANF () #define G_GNUC_FORMAT () #define G_DEPRECATED_FOR () #define G_UNAVAILABLE () #define G_LIKELY () #define ...

Linked on 2015-03-26 15:10:52 | Similar Links
s/log// · infoforcefeed/OlegDB@33788a3 · GitHub

Skip to content Sign up Sign in This repository Explore Features Enterprise Blog Watch 12 Star 78 Fork 7 infoforcefeed / OlegDB /.container /.repohead Code Issues Pull requests Pulse Graphs HTTPS Subversion You can clone with HTTPS or Subversion . Download ZIP /.repository-sidebar Permalink Browse files s/log// Loading branch information ... commit 33788a3274efdf486ffce1ee50e606bc6a74e728 1 parent be7959e kyleterry authored Jan 18, 2015 Unified Split Showing 1 changed file with 1 addition and 1 deletion . +1 −1    frontend/main.go Show notes View 2    frontend/main.go @@ -113,7 +113,7 @@ func main() { log. Println ( " Append-only log is enabled " ) } if config. SplayTreeEnab...

Linked on 2015-03-26 11:07:53 | Similar Links
Code review refactor. · infoforcefeed/OlegDB@d04c775 · GitHub

Skip to content Sign up Sign in This repository Explore Features Enterprise Blog Watch 12 Star 78 Fork 7 infoforcefeed / OlegDB /.container /.repohead Code Issues Pull requests Pulse Graphs HTTPS Subversion You can clone with HTTPS or Subversion . Download ZIP /.repository-sidebar Permalink Browse files Code review refactor. Loading branch information ... commit d04c775c8ed0165ebadb79b056b527c355e034cc 1 parent b02d20b qpfiffer authored Feb 11, 2015 Unified Split Showing 3 changed files with 45 additions and 40 deletions . +35 −32      frontend/dispatcher.go +6 −6      frontend/main.go +4 −2      scripts/torture.py Show notes View 67      frontend/dispatcher.go ...

Linked on 2015-03-26 11:07:46 | Similar Links
CONTRIBUTORS: add me · infoforcefeed/OlegDB@e5d5b82 · GitHub

Skip to content Sign up Sign in This repository Explore Features Enterprise Blog Watch 12 Star 78 Fork 7 infoforcefeed / OlegDB /.container /.repohead Code Issues Pull requests Pulse Graphs HTTPS Subversion You can clone with HTTPS or Subversion . Download ZIP /.repository-sidebar Permalink Browse files CONTRIBUTORS: add me Loading branch information ... commit e5d5b8200823626f38b1b9875a4cc24e5df7d011 1 parent c0856aa Xe authored Mar 4, 2015 Unified Split Showing 1 changed file with 1 addition and 0 deletions . +1 −0   CONTRIBUTORS Show notes View 1   CONTRIBUTORS @@ -3,6 +3,7 @@ General madness: * Kyle Terry (http://kyte.io/) * Alessandro Gatti (https://faulty.equipment/) * ...

Linked on 2015-03-26 10:59:52 | Similar Links
go fmt · infoforcefeed/OlegDB@031f470 · GitHub

Skip to content Sign up Sign in This repository Explore Features Enterprise Blog Watch 12 Star 78 Fork 7 infoforcefeed / OlegDB /.container /.repohead Code Issues Pull requests Pulse Graphs HTTPS Subversion You can clone with HTTPS or Subversion . Download ZIP /.repository-sidebar Permalink Browse files go fmt Loading branch information ... commit 031f470bfa422b2c3b5470b1b547a4979a9b89f2 1 parent c5a3d41 kyleterry authored Nov 26, 2014 Unified Split Showing 3 changed files with 5 additions and 6 deletions . +1 −1    frontend/goleg/goleg_test.go +1 −1    frontend/goleg/highlevel.go +3 −4      frontend/main.go Show notes View 2    frontend/goleg/goleg_test.go @@...

Linked on 2015-03-26 10:59:17 | Similar Links
Latent Dirichlet allocation - Wikipedia, the free encyclopedia

CentralNotice From Wikipedia, the free encyclopedia Jump to: navigation , search Not to be confused with linear discriminant analysis . In natural language processing , latent Dirichlet allocation ( LDA ) is a generative model that allows sets of observations to be explained by unobserved groups that explain why some parts of the data are similar. For example, if observations are words collected into documents, it posits that each document is a mixture of a small number of topics and that each word's creation is attributable to one of the document's topics. LDA is an example of a topic model and was first presented as a graphical model for topic discovery by David Blei , Andrew Ng , and Michael Jordan in 2003. [ 1 ] 1 Topics in LDA 2 Model 2.1 Mathematical definition 3 Inference 4 Applications, extensions and similar techniques 5 See also 6 Notes 7 Exter...

Linked on 2015-03-26 00:47:33 | Similar Links
goodjobyouuselesspeiceofshit

This is a dumb hack, we should only have one or the other from the the template context, so only one of the following will be rendered. ...

Linked on 2015-03-26 00:43:57 | Similar Links
congratulations

This is a dumb hack, we should only have one or the other from the the template context, so only one of the following will be rendered. ...

Linked on 2015-03-26 00:43:19 | Similar Links
sparsehash - An extremely memory-efficient hash_map implementation - Google Project Hosting

My favorites ▼ | Sign in [if lte IE 7]> <div style="text-align:center;"> Your version of Internet Explorer is not supported. Try a browser that contributes to open source, such as <a href="http://www.firefox.com">Firefox</a>, <a href="http://www.google.com/chrome">Google Chrome</a>, or <a href="http://code.google.com/chrome/chromeframe/">Google Chrome Frame</a>. </div> <![endif] sparsehash An extremely memory-efficient hash_map implementation Project Home Downloads Wiki Issues Source Export to GitHub Summary People Project Information Project feeds Code license New BSD License Labels hash , hashing , hash_map , hash_set , stl , cplusplus Members csilv...@gmail.com DonovanH...@gmail.com gp...@google.com 1 committer Featured Downloads sparsehash-2.0.2-1.noarch.rpm sparsehash-2.0.2.tar.g...

Linked on 2015-03-26 00:40:17 | Similar Links
ponies

This is a dumb hack, we should only have one or the other from the the template context, so only one of the following will be rendered. ...

Linked on 2015-03-26 00:39:27 | Similar Links
« 1051 1052 1053 1054 1055 1506 »

Pages are deceptive. Live life in a basket.