Linux Format
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Minetest Forums
Minetest Forums The official Minetest discussion board Skip to content Search… Search Advanced search Board index ‹ User-contributed Content ‹ Subgames ‹ Subgame Releases Print view FAQMembersRegisterLogin [Game] Dreambuilder [20160114-2006] Post a reply Search this topic… Search 544 posts • Page 1 of 22 • 1, 2, 3, 4, 5 ... 22 Reply with quote [Game] Dreambuilder [20160114-2006] VanessaE Moderator by VanessaE » Mon Apr 28, 2014 01:37 Posts: 3642 "If you can imagine it, you can build it." Joined: Sun Apr 01, 2012 12:38 Location: Waynesville, Dreambuilder is my attempt to give the player pretty much everything they'll ever want to build with, and all the tools NC they should ever need to actually get the job done. This game was originally based on minetest_game, minus a couple GitHub: VanessaE of mods that I don't like, with a number of minor things changed, and a number of extra mods added on. Since then, IRC: VanessaE many things have changed - while much of the base game is still the same, some stuff is different, and many more mods In-game: have been added. Many of the mods contained in this game have been tweaked from their deault states. Mods are VanessaEzekowitz generally kept up-to-date, and from time to time, if an interesting feature pops up in minetest_game, I may port that over also. Website This game is in use on my Creative server and my Survival server. Both servers have a few extra mods installed for their specific needs, but should give you a pretty good idea nonetheless. -
Technical Details of the Elliott 152 and 153
Appendix 1 Technical Details of the Elliott 152 and 153 Introduction The Elliott 152 computer was part of the Admiralty’s MRS5 (medium range system 5) naval gunnery project, described in Chap. 2. The Elliott 153 computer, also known as the D/F (direction-finding) computer, was built for GCHQ and the Admiralty as described in Chap. 3. The information in this appendix is intended to supplement the overall descriptions of the machines as given in Chaps. 2 and 3. A1.1 The Elliott 152 Work on the MRS5 contract at Borehamwood began in October 1946 and was essen- tially finished in 1950. Novel target-tracking radar was at the heart of the project, the radar being synchronized to the computer’s clock. In his enthusiasm for perfecting the radar technology, John Coales seems to have spent little time on what we would now call an overall systems design. When Harry Carpenter joined the staff of the Computing Division at Borehamwood on 1 January 1949, he recalls that nobody had yet defined the way in which the control program, running on the 152 computer, would interface with guns and radar. Furthermore, nobody yet appeared to be working on the computational algorithms necessary for three-dimensional trajectory predic- tion. As for the guns that the MRS5 system was intended to control, not even the basic ballistics parameters seemed to be known with any accuracy at Borehamwood [1, 2]. A1.1.1 Communication and Data-Rate The physical separation, between radar in the Borehamwood car park and digital computer in the laboratory, necessitated an interconnecting cable of about 150 m in length. -
Developer Guide(KAE Encryption & Decryption)
Kunpeng Acceleration Engine Developer Guide(KAE Encryption & Decryption) Issue 15 Date 2021-08-06 HUAWEI TECHNOLOGIES CO., LTD. Copyright © Huawei Technologies Co., Ltd. 2021. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without prior written consent of Huawei Technologies Co., Ltd. Trademarks and Permissions and other Huawei trademarks are trademarks of Huawei Technologies Co., Ltd. All other trademarks and trade names mentioned in this document are the property of their respective holders. Notice The purchased products, services and features are stipulated by the contract made between Huawei and the customer. All or part of the products, services and features described in this document may not be within the purchase scope or the usage scope. Unless otherwise specified in the contract, all statements, information, and recommendations in this document are provided "AS IS" without warranties, guarantees or representations of any kind, either express or implied. The information in this document is subject to change without notice. Every effort has been made in the preparation of this document to ensure accuracy of the contents, but all statements, information, and recommendations in this document do not constitute a warranty of any kind, express or implied. Issue 15 (2021-08-06) Copyright © Huawei Technologies Co., Ltd. i Kunpeng Acceleration Engine Developer Guide(KAE Encryption & Decryption) Contents Contents 1 Overview....................................................................................................................................1 -
Github: a Case Study of Linux/BSD Perceptions from Microsoft's
1 FLOSS != GitHub: A Case Study of Linux/BSD Perceptions from Microsoft’s Acquisition of GitHub Raula Gaikovina Kula∗, Hideki Hata∗, Kenichi Matsumoto∗ ∗Nara Institute of Science and Technology, Japan {raula-k, hata, matumoto}@is.naist.jp Abstract—In 2018, the software industry giants Microsoft made has had its share of disagreements with Microsoft [6], [7], a move into the Open Source world by completing the acquisition [8], [9], the only reported negative opinion of free software of mega Open Source platform, GitHub. This acquisition was not community has different attitudes towards GitHub is the idea without controversy, as it is well-known that the free software communities includes not only the ability to use software freely, of ‘forking’ so far, as it it is considered as a danger to FLOSS but also the libre nature in Open Source Software. In this study, development [10]. our aim is to explore these perceptions in FLOSS developers. We In this paper, we report on how external events such as conducted a survey that covered traditional FLOSS source Linux, acquisition of the open source platform by a closed source and BSD communities and received 246 developer responses. organization triggers a FLOSS developers such the Linux/ The results of the survey confirm that the free community did trigger some communities to move away from GitHub and raised BSD Free Software communities. discussions into free and open software on the GitHub platform. The study reminds us that although GitHub is influential and II. TARGET SUBJECTS AND SURVEY DESIGN trendy, it does not representative all FLOSS communities. -
Netbackup ™ Enterprise Server and Server 8.0 - 8.X.X OS Software Compatibility List Created on September 08, 2021
Veritas NetBackup ™ Enterprise Server and Server 8.0 - 8.x.x OS Software Compatibility List Created on September 08, 2021 Click here for the HTML version of this document. <https://download.veritas.com/resources/content/live/OSVC/100046000/100046611/en_US/nbu_80_scl.html> Copyright © 2021 Veritas Technologies LLC. All rights reserved. Veritas, the Veritas Logo, and NetBackup are trademarks or registered trademarks of Veritas Technologies LLC in the U.S. and other countries. Other names may be trademarks of their respective owners. Veritas NetBackup ™ Enterprise Server and Server 8.0 - 8.x.x OS Software Compatibility List 2021-09-08 Introduction This Software Compatibility List (SCL) document contains information for Veritas NetBackup 8.0 through 8.x.x. It covers NetBackup Server (which includes Enterprise Server and Server), Client, Bare Metal Restore (BMR), Clustered Master Server Compatibility and Storage Stacks, Deduplication, File System Compatibility, NetBackup OpsCenter, NetBackup Access Control (NBAC), SAN Media Server/SAN Client/FT Media Server, Virtual System Compatibility and NetBackup Self Service Support. It is divided into bookmarks on the left that can be expanded. IPV6 and Dual Stack environments are supported from NetBackup 8.1.1 onwards with few limitations, refer technote for additional information <http://www.veritas.com/docs/100041420> For information about certain NetBackup features, functionality, 3rd-party product integration, Veritas product integration, applications, databases, and OS platforms that Veritas intends to replace with newer and improved functionality, or in some cases, discontinue without replacement, please see the widget titled "NetBackup Future Platform and Feature Plans" at <https://sort.veritas.com/netbackup> Reference Article <https://www.veritas.com/docs/100040093> for links to all other NetBackup compatibility lists. -
Installer Des Logiciels Sous Gnu/Linux
INSTALLER DES LOGICIELS SOUS GNU/LINUX Introduction : Nous allons aborder succintement 5 méthodes d©installation de logiciels sur le système GNU/Linux. L©objectif est de poser les bases pour débuter sous linux. La plupart du temps, lorsqu©on commence à se servir d©une distribution GNU/Linux on se limite à utiliser les logiciels inclus par défaut ; mais rapidement on ne tarde pas à vouloir utiliser d©autres logiciels... 1. Le Binaire Le binaire est un fichier prêt à etre executé par l©ordinateur. Il se présente en général sous la forme d©un fichier compressé qui contient un dossier avec tous les fichiers prêts à l©emploi. L©exemple Firefox : on télécharge sur : http://www.mozilla.com/en-US/firefox/all.html#fr un fichier : firefox-2.0.tar.gz Si on suppose que le paquet a été téléchargé sur le bureau, Il faudra pour l©installer taper dans une fenêtre de terminal, la ligne de commande suivante : tar -xvzf /home/utilisateur/Desktop/firefox-2.0.tar.gz fera la décompression de l©archive. On peux aussi extraire le fichier avec un logiciel de compression-decompression de manière graphique. Pour exécuter le programme, il suffira de lancer la commande : /home/utilisateur/Desktop/firefox/firefox (on peux ensuite créer un lanceur pour avoir un icône sur le bureau pour lanver le programme) 2. Le .DEB Synaptic permet la gestion graphique des paquets logiciels. Dans l©ennvironnement Gnome, il faut aller dans : Système > Administration > gestionnaire de paquets Synaptic. Vous pouvez ajouter d©avantage de logiciels en ajoutant des dépôts dans le fichier : /etc/apt/sources.lists ou en passant par le menu catégories > dépots de synaptic. -
Chapter 1. Origins of Mac OS X
1 Chapter 1. Origins of Mac OS X "Most ideas come from previous ideas." Alan Curtis Kay The Mac OS X operating system represents a rather successful coming together of paradigms, ideologies, and technologies that have often resisted each other in the past. A good example is the cordial relationship that exists between the command-line and graphical interfaces in Mac OS X. The system is a result of the trials and tribulations of Apple and NeXT, as well as their user and developer communities. Mac OS X exemplifies how a capable system can result from the direct or indirect efforts of corporations, academic and research communities, the Open Source and Free Software movements, and, of course, individuals. Apple has been around since 1976, and many accounts of its history have been told. If the story of Apple as a company is fascinating, so is the technical history of Apple's operating systems. In this chapter,[1] we will trace the history of Mac OS X, discussing several technologies whose confluence eventually led to the modern-day Apple operating system. [1] This book's accompanying web site (www.osxbook.com) provides a more detailed technical history of all of Apple's operating systems. 1 2 2 1 1.1. Apple's Quest for the[2] Operating System [2] Whereas the word "the" is used here to designate prominence and desirability, it is an interesting coincidence that "THE" was the name of a multiprogramming system described by Edsger W. Dijkstra in a 1968 paper. It was March 1988. The Macintosh had been around for four years. -
Tips and Tricks for OS X Lion 10.7 Introduction
Mac Information Tips and Tricks for OS X Lion 10.7 Introduction: Lion was introduced in the middle of 2011 and came with lots of changes such as Mission Control and Launchpad. However here are a list of smaller changes, ones which you may never have noticed... 1/ Put your contact info on the login screen Lion now allows you to place a personal message with your contact information on the login screen which may be useful if your laptop is lost or stolen. To enable the feature, go to your Security & Privacy in System Preferences, click on the General tab and click on the padlock in the lower left corner to unlock your settings. Then tick the box labeled "Show a message when the screen is locked”. Click on the “Set Lock Message...” button and type in the message which you would like to appear on your login screen. 2/ Always Display Scroll Bars Under Lion, scroll bars on the side have been reduced in importance. In the past, users dragged the scroll bar or used the arrows under the scroll bar. to navigate a document or window. With the advent of trackpads these scroll bars are now just an indication of your position on a page. Under Lion the scroll bars fade out after a few seconds unless you change a setting. In System Preferences, click on the General section, and then choose the “Always” option. 3/ Turn Off Restore Windows Lion also brought in a “restore windows” feature which means that windows which are open when you quit an app re-open the next time you choose that app. -
Information Technology 3 and 4/1998. Emerging
OCCASION This publication has been made available to the public on the occasion of the 50th anniversary of the United Nations Industrial Development Organisation. DISCLAIMER This document has been produced without formal United Nations editing. The designations employed and the presentation of the material in this document do not imply the expression of any opinion whatsoever on the part of the Secretariat of the United Nations Industrial Development Organization (UNIDO) concerning the legal status of any country, territory, city or area or of its authorities, or concerning the delimitation of its frontiers or boundaries, or its economic system or degree of development. Designations such as “developed”, “industrialized” and “developing” are intended for statistical convenience and do not necessarily express a judgment about the stage reached by a particular country or area in the development process. Mention of firm names or commercial products does not constitute an endorsement by UNIDO. FAIR USE POLICY Any part of this publication may be quoted and referenced for educational and research purposes without additional permission from UNIDO. However, those who make use of quoting and referencing this publication are requested to follow the Fair Use Policy of giving due credit to UNIDO. CONTACT Please contact [email protected] for further information concerning UNIDO publications. For more information about UNIDO, please visit us at www.unido.org UNITED NATIONS INDUSTRIAL DEVELOPMENT ORGANIZATION Vienna International Centre, P.O. Box 300, 1400 Vienna, Austria Tel: (+43-1) 26026-0 · www.unido.org · [email protected] EMERGING TECHNOLOGY SERIES 3 and 4/1998 Information Technology UNITED NATIONS INDUSTRIAL DEVELOPMENT ORGANIZATION Vienna, 2000 EMERGING TO OUR READERS TECHNOLOGY SERIES Of special interest in this issue of Emerging Technology Series: Information T~chn~~ogy is the focus on a meeting that took INFORMATION place from 2n to 4 November 1998, in Bangalore, India. -
Inspiron 1521 Owner's Manual
Dell™ Inspiron™ 1521 Owner’s Manual Model PP22L www.dell.com | support.dell.com Notes, Notices, and Cautions NOTE: A NOTE indicates important information that helps you make better use of your computer. NOTICE: A NOTICE indicates either potential damage to hardware or loss of data and tells you how to avoid the problem. CAUTION: A CAUTION indicates a potential for property damage, personal injury, or death. ____________________ Information in this document is subject to change without notice. © 2007 Dell Inc. All rights reserved. Reproduction in any manner whatsoever without the written permission of Dell Inc. is strictly forbidden. Trademarks used in this text: Dell, the DELL logo, Inspiron, Wi-Fi Catcher, and Dell MediaDirect are trademarks of Dell Inc.; AMD, AMD Turion, HyperMemory, ATI Radeon and combinations thereof are trademarks of Advanced Micro Devices, Inc.; Microsoft, Windows, and Windows Vista are either trademarks or registered trademarks of Microsoft Corporation in the United States and/or other countries; Bluetooth is a registered trademark owned by Bluetooth SIG, Inc. and is used by Dell under license. Other trademarks and trade names may be used in this document to refer to either the entities claiming the marks and names or their products. Dell Inc. disclaims any proprietary interest in trademarks and trade names other than its own. Model PP22L September 2007 P/N RT722 Rev. A02 Contents 1 Finding Information . 13 2 About Your Computer . 19 Determining Your Computer’s Configuration . 19 Front View . 20 Left Side View . 25 Right Side View . 27 Back View . 28 Bottom View . 30 3 Setting Up Your Computer . -
TI3800 Bachelorproject
TI3800 Bachelorproject Android Tor Tribler Tunneling Final Report Authors: Supervisor: Rolf Jagerman Dr. Ir. Johan Pouwelse Laurens Versluis Project coach: Martijn de Vos Ir. Egbert Bouman June 23, 2014 Abstract Tribler is a decentralized peer-to-peer file sharing system. Recently the Tribler development team has introduced anonymous internet communication using a Tor-like protocol in their trial version. The goal of our bachelor project is to port this technology to Android devices. This is a challenging task because cross-compiling the necessary libraries to the ARM CPU architecture is uncharted territory. We have successfully ported all dependencies of Tribler to Android. An application called Android Tor Tribler Tunneling (AT3) has been developed that tests whether these libraries work. This application downloads a test torrent and measures information such as CPU usage and download speed. Based on this information we have concluded that it is currently not viable to run the anonymous tunnels on an Android smartphone. Creating circuits with several hops that use encryption is very computationally expensive and modern smartphones can hardly keep up. By using optimized cryptographic libraries such as gmp or with the recently announced ARMv8 architecture which supports hardware-accelerated AES encryption, creating such circuits might become possible. Preface This document describes the bachelor project we performed at the TU Delft. Without the help of certain people at the TU Delft (and outside), this project would not be possible. In particular, we would like to thank the following people: Johan Pouwelse, for his excellent guidance, deep insights and feedback. The Tribler team, for always being able to help us with problems and questions. -
Universidad De San Carlos De Guatemala Facultad De Ingeniería Escuela De Ingeniería En Ciencias Y Sistemas
Universidad de San Carlos de Guatemala Facultad de Ingeniería Escuela de Ingeniería en Ciencias y Sistemas HERRAMIENTA PARA AUTOMATIZAR LA CREACIÓN DE LIVE CDS PERSONALIZADOS Sergio Arnaldo Méndez Aguilar Asesorado por el Ing. Edgar René Ornelis Hoíl Guatemala, octubre de 2009 UNIVERSIDAD DE SAN CARLOS DE GUATEMALA FACULTAD DE INGENIERÍA HERRAMIENTA PARA AUTOMATIZAR LA CREACIÓN DE LIVE CDS PERSONALIZADOS TRABAJO DE GRADUACIÓN PRESENTADO A JUNTA DIRECTIVA DE LA FACULTAD DE INGENIERÍA POR: SERGIO ARNALDO MÉNDEZ AGUILAR ASESORADO POR EL ING. EDGAR RENÉ ORNELIS HOÍL AL CONFERÍRSELE EL TÍTULO DE INGENIERO EN CIENCIAS Y SISTEMAS GUATEMALA, OCTUBRE DE 2009 UNIVERSIDAD DE SAN CARLOS DE GUATEMALA FACULTAD DE INGENIERÍA NÓMINA DE JUNTA DIRECTIVA DECANO Ing. Murphy Olympo Paiz Recinos VOCAL I Inga. Glenda Patricia García Soria VOCAL II Inga. Alba Maritza Guerrero de López VOCAL III Ing. Miguel Ángel Dávila Calderón VOCAL IV Br. José Milton De León Bran VOCAL V Br. Isaac Sultán Mejía SECRETARIA Inga. Marcia Ivónne Véliz Vargas TRIBUNAL QUE PRACTICÓ EL EXAMEN GENERAL PRIVADO DECANO Ing. Murphy Olympo Paiz Recinos EXAMINADOR Ing. Victor Hugo de León Barrios EXAMINADOR Ing. Juan Alvaro Díaz Ardavín EXAMINADOR Ing. Pedro Pablo Hernández Ramírez SECRETARIA Inga. Marcia Ivónne Véliz Vargas ACTO QUE DEDICO A: Dios en primer lugar, por haberme permitido conocerlo en esta universidad y darme una nueva oportunidad, para empezar a cambiar mi vida en mi actuar y en mi forma de pensar. Mis padres y a mi hermana, que me brindaron todo el apoyo posible de acuerdo a sus capacidades, ya que ellos trabajaron muy duro para poder brindarme la oportunidad de lograr finalizar mis estudios universitarios.