Registered since September 28th, 2017
Has a total of 3394 bookmarks.
Showing top Tags within 8 bookmarks
Tag selected: verify.
Saved by uncleflo on January 18th, 2019.
The waterfall model is a relatively linear sequential design approach for certain areas of engineering design. In software development, it tends to be among the less iterative and flexible approaches, as progress flows in largely one direction ("downwards" like a waterfall) through the phases of conception, initiation, analysis, design, construction, testing, deployment and maintenance. The waterfall development model originated in the manufacturing and construction industries; where the highly structured physical environments meant that design changes became prohibitively expensive much sooner in the development process. When first adopted for software development, there were no recognized alternatives for knowledge-based creative work.
waterfall iterative incremental phase linear revise agile code structure verify conflict documentation software acknowledge initiation specification model test discrete modify howto methodology system design approach development method administration administrator supervisor business workflow
Saved by uncleflo on January 6th, 2019.
We supply generic versions of graphics drivers for general purposes. Computer manufacturers might have changed the features, incorporated customizations, or made other changes to the graphics driver software or software packaging. To avoid potential installation incompatibilities, we recommend that you check first with your computer manufacturer and use the driver software provided by them. Click or select your operating system for a video demonstration of manual installation steps.
browser install verify manually setup documentation installation feedback demonstration graphics driver restricted steps recommended useful consider operating product article support information terms howto device card windows intel system video potential customization manufacture software packaging computer version purpose incompatible performance
Saved by uncleflo on February 25th, 2018.
This is a follow-up blog post that expands on the subject of highly available cluster, discussed in MariaDB MaxScale High Availability: Active-Standby Cluster. Replication Manager is a tool that manages MariaDB 10 clusters. It supports both interactive and automated failover of the master server. It verifies the integrity of the slave servers before promoting one of them as the replacement master and it also protects the slaves by automatically setting them into read-only mode. You can find more information on the replication-manager from the replication-manager GitHub repository. Using Replication Manager allows us to automate the replication failover. This reduces the amount of manual work required to adapt to changes in the cluster topology and makes for a more highly available database cluster. In this blog post, we'll cover the topic of backend database HA and we’ll use Replication Manager to create a complete HA solution. We build on the setup described in the earlier blog post and integrate Replication Manager into it. We're using Centos 7 as our OS and we'll use the 0.7.0-rc2 version of the replication-manager.
replication cluster high availability manager manage administration topology master slave automatic failover failsafe integration howto article description use software mariasql verify repository expansion readonly server information standby blog post subject discuss backend solution
Saved by uncleflo on December 28th, 2017.
ING's zero knowledge range-proof precompiled contract for the go-ethereum client. One fundamental concern in blockchain technology is the confidentiality of the data on the blockchain. In order to reach consensus between all independent nodes in a blockchain network, each node must be able to validate all transactions (for instance against double-spent), in most cases this means that the content of the transactions is visible to all nodes. Fortunately several solutions exist that preserve confidentiality on a blockchain (private transactions, HyperLedger Fabric Channels, Payment Channels, Homomorphic encryption, transaction-mixing, zero knowledge proofs etc.). This article describes the implementation of a zero-knowledge range-proof in Ethereum. The zero knowledge range proof allows the blockchain network to validate that a secret number is within known limits without disclosing the secret number. This is useful to reach consensus in a variety of use cases: Validate that someone's age is between 18 and 65 without disclosing the age; Validate that someone is in Europe without disclosing the exact location; Validate that a payment-amount is positive without disclosing the amount (as done by Monero). The zero-knowledge range-proof requires a commitment on a number by a trusted party (for instance a government committing on someone's age), an Ethereum-user can use this commitment to generate a range-proof. The Ethereum network will verify this proof.
official golang implementation ethereum cryptocurrency library zero range proof validation commit verify transaction encryption description knowledge blockchain network number limit europe location disclose trust solution confidential ing payment
Saved by uncleflo on July 19th, 2016.
A credit card deposit is required to the full replacement value of the equipment being hired and payment for the rental fee on return of the goods. You are required to submit Photo ID such as a current passport or drivers licence and 2 recent proofs of address (no older than 2 months old) which will be security checked. It is best to email this in advance and bring the originals along to your first collection.
Saved by uncleflo on September 15th, 2013.
Marco Fioretti suggests some ways in Linux to automatically compare the contents of multiple directories in order to find missing, duplicate, or unwanted files. Many of us end up, inevitably, with so many files and folders that it is impossible to keep them under control without some specialized help. Luckily, as I'll show you in a moment, under Linux there are several, very efficient solutions to this problem. Multiple copies of many files, scattered all over the computer, waste space, create confusion, and slow down desktop indexers like DocFetcher. I have already explained how to find and remove the unwanted extra copies here.
Saved by uncleflo on March 27th, 2013.
Apple recently switched to requiring a DUNS number to open a company developer account. Previously, they only required a company to upload their incorporation documents. Unfortunately, manually validating those documents themselves became too much of a burden, so they decided to rely on the same international database that the government uses to identify companies instead. Basically, it allows Apple to offload the manual labor of verifying companies to a third party at no cost.
Saved by uncleflo on September 24th, 2012.
Lossless Audio Checker is a utility to check whether a FLAC or WAVE file is truly lossless or not, by detecting cutoff frequencies. It can show you the full frequency range for each file, with any cutoff made clearly visible. Nowadays, the process of audio mastering sometimes upconverts, upsamples and upscales songs, resulting in CDs and so-called "lossless" tracks that are in fact, incomplete. Lossless Audio Checker helps you identify these tracks. Our goal is to raise awareness on these bad practices from the music industry and pressure them to deliver true lossless music. Help us by testing your music and reporting your results — it's free!
No further bookmarks found.