16 Matching Annotations
  1. Mar 2021
    1. In the three-minute music video, which was directed by Vania Heymann and Gal Muggia, Lipa appears as the British ship's performer, offering numbers to guest during their lobster dinners. Scenes of the restaurant-goers eating cut in and out as one lone lobster watches from the water tank. However, the clip takes an unexpected turn when the restaurant loses hot water, leading viewers to learn that the ship is heading underwater and, in fact, the Titanic. At the end of the clip, we see that the ship's descent into the North Atlantic Ocean, but it does have a happy ending for the lobster, who is set free into the dark sea.
  2. Feb 2021
    1. In 2014, Tabriz started an effort to drive adoption of HTTPS on the web.[13][14] In 2015, less than 50% of traffic seen by Chrome was over HTTPS, and by 2019, the percentage of HTTPS traffic had increased to 73-95% across all platforms.[15] Tabriz has spoken out against government interception of HTTPS connections on the public Internet.[16]
  3. Jan 2021
  4. memory-alpha.fandom.com memory-alpha.fandom.com
    1. In 2370, while discussing interspecies relationships with Ensign Melora Pazlar, Lieutenant Jadzia Dax used the story of a hydrogen-breathing Lothra and an Oxygene who had fallen in love and were only able to spend forty minutes a day together without their breathing apparatus. This was to illustrate how Pazlar and Doctor Bashir could find a way to make a relationship work, despite her hailing from a planet with lower gravity than Bashir's homeworld, Earth. According to Dax, the couple were together 57 years despite their difficulties. (DS9: "Melora")
  5. Dec 2020
    1. Her television credits included a PBS interview with the late French novelist and essayist, Simone de Beauvoir and appearance in a 1998 BBC documentary, The Evolution of Desire.

      The lady who came up with the idea of limerence did a PBS interview with Simone de Beauvoir????

    1. The term "limerence" has been invoked in many popular media,[according to whom?] including self-help books, popular magazines, and websites. However, according to a paper by Wakin and Vo, "In spite of the public’s exposure to limerence, the professional community, particularly clinical, is largely unaware of the concept."[22]
  6. Nov 2020
    1. Industry experts believe that deep-ultraviolet lithography will reach its limits around 2004 and 2005, which means that Moore's law would also come to an end without a new chipmaking technology. But once deep-ultraviolet hits its ceiling, we will see chipmakers move to a new lithography process that will enable them to produce the industry's first 10-gigahertz (GHz) microprocessor by 2007.

      hilariously wrong

  7. Oct 2020
    1. I too faced the same problem and after some search came up with this solution: Add to your .bash_aliases this: # Execute "script" command just once smart_script(){ # if there's no SCRIPT_LOG_FILE exported yet if [ -z "$SCRIPT_LOG_FILE" ]; then # make folder paths logdirparent=~/Terminal_typescripts logdirraw=raw/$(date +%F) logdir=$logdirparent/$logdirraw logfile=$logdir/$(date +%F_%T).$$.rawlog # if no folder exist - make one if [ ! -d $logdir ]; then mkdir -p $logdir fi export SCRIPT_LOG_FILE=$logfile export SCRIPT_LOG_PARENT_FOLDER=$logdirparent # quiet output if no args are passed if [ ! -z "$1" ]; then script -f $logfile else script -f -q $logfile fi exit fi } # Start logging into new file alias startnewlog='unset SCRIPT_LOG_FILE && smart_script -v' # Manually saves current log file: $ savelog logname savelog(){ # make folder path manualdir=$SCRIPT_LOG_PARENT_FOLDER/manual # if no folder exists - make one if [ ! -d $manualdir ]; then mkdir -p $manualdir fi # make log name logname=${SCRIPT_LOG_FILE##*/} logname=${logname%.*} # add user logname if passed as argument if [ ! -z $1 ]; then logname=$logname'_'$1 fi # make filepaths txtfile=$manualdir/$logname'.txt' rawfile=$manualdir/$logname'.rawlog' # make .rawlog readable and save it to .txt file cat $SCRIPT_LOG_FILE | perl -pe 's/\e([^\[\]]|\[.*?[a-zA-Z]|\].*?\a)//g' | col -b > $txtfile # copy corresponding .rawfile cp $SCRIPT_LOG_FILE $rawfile printf 'Saved logs:\n '$txtfile'\n '$rawfile'\n' } And to the end of your .bashrc file add this: smart_script After you've done this, "script" command will be executed once in every terminal session, logging everything to ~/Terminal_typescripts/raw. If you want, you can save current session log after the fact (in the end of the session) by typing savelog or savelog logname – this will copy current raw log to ~/Terminal_typescripts/manual and also create readable .txt log in this folder.  (If you forget to do so, raw log files will still be in their folder; you'll just have to find them.)  Also you may start recording to a new log file by typing startnewlog. There will be a lot of junk log files, but you can clean old ones from time to time, so it's not a big problem. (Based on https://answers.launchpad.net/ubuntu/+source/gnome-terminal/+question/7131 , https://askubuntu.com/a/493326/473790 )

      way to record future terminal sessions

  8. Feb 2016
  9. Dec 2015
    1. confused deputy problems.

      As defined later in this paper:

      A deputy is a program that must manage authorities coming from multiple sources. A confused deputy [10] is a deputy that has been manipulated into wielding its authority inappropriately.

      The origin of the confused deputy problem seems to be an incident at Tymshare, back in the AT&T Unix days.

      Wikipedia describes a confused deputy as a program that is fooled into using its authority to do something on behalf of a user that the user does not have authority to do.

    2. Simple SecurityProperty and the*-Property

      This is called the Bell–LaPadula model.

    3. Of this pair, we may call F the forwarding facet, and R the revoking facet.

      Not clear why the revoking facet is needed as well as the forwarding facet. I suppose it depends on the nature of the object capability system, but I can imagine these two being collapsed into a single object.

    4. In order for Alice to authorize Bob to access Carol, Alice must herself be authorized to accessboth Boband Carol. The requirement for both capabilities makes confinement possible, since no capability transfer canintroduce a new connection between two objects thatwere not already connected by some path.Confinement of authorities within a set of objects canbe determined simply by observing that the subgraphcontaining the set of objects is not connected to the rest of the object graph.

      In summary, object capability systems manage access by only letting you get a reference (capability) with appropriate privileges if another component with the appropriate authority delegates that authority to you.

      This seems to dramatically reduce the scope of where attacks within such a capability system (as opposed to attacks on the implementation of the capability system, or other underlying infrastructure) can take place. Probably dramatically simplifies reasoning about correctness.

    5. Although Lampson’s definition of the access matrixdoes not prohibit the possibility offine-grained subjects4, even in an ACL system, the difficulty justexplained strongly motivates ACL systems to define subjects at a coarse granularity so as to keep the set ofsubjects relatively static. Thus, ACL systems inpractice map processes toprincipals (broadequivalence classes of processes), such as useraccounts5, wherethe set of principals does not changein the course of normal operation. These principalsthen serve as the subjects of the access matrix.Subjects in an ACL system do not generally6 have theability to create an unbounded number of new subjects.The appeal of the ACL model rests on the ability ofadministrators to enumerate subjects whose identitiesthey can know and reason about, such as humans.

      This really summarizes why a capability system is more expressive than ACLs. It allows for efficient permission delegation and propagation at effectively arbitrary granularity. It seems that without capability systems, you can't have user extensibility of the permission system.

    6. confinement

      According to this page, confinement is about preventing leakage of information across some boundary, among other things.

    1. Considerthesimplecaseofdiscs.Atypicaldiscfailsaboutonceayear.Failuresarisefrombadspotsonthedisc,physicalfailureofthespindleorelectronicfailureofthepathtothedisc.Ittakesaboutanhourtofixadiscorgetasparedisctoreplaceit.Ifthediscsareduplexed(mirrored),andiftheyfailindependently,thenthepairwillbothbedownaboutonceeverythreethousandyears.Morerealisticanalysisgivesamean-time-to-failureof800years.Soasystemwitheightpairsofdiscswouldhaveanunavailablediscpairaboutonceacentury.Withoutmirroring,thesamesystemwouldhaveanunavailablediscabouteighttimesayear.Althoughduplexeddiscshavebeenusedsincethelatesixties[Heistand],wehavebeenslowtogeneralizefromthisexperiencetotheobservationthat:∑Mean-time-to-failureofmodulesaremeasuredinmonths.∑Modulescanbemadefail-fast:eithertheyworkproperlyortheyfailtowork.∑Sparemodulesgivetheappearanceofmeantimetorepairmeasuredinsecondsorminutes.∑Duplexingsuchmodulesgivesmeantimestofailuremeasuredincenturies.Thesystematicapplicationoftheseideastobothhardwareandsoftwareproduceshighlyreliableandhighlyavailablesystems.

      Perhaps the first general statement of how high availability can be achieved by redundancy. Really like the reasoning here.