text
stringlengths
3
1.74M
label
class label
2 classes
source
stringclasses
3 values
How to automatically change wallpaper from interfacelift?. <p>This is something I'd like to work on. There is this site called <a href="http://interfacelift.com/wallpaper/downloads/date/any/" rel="nofollow">Interfacelift</a> which offers really good wallpapers for any screen resolution and is updated regularly. The site which has a google+ page, has agreed to provide beta testers with a <strong>MediaRSS link</strong>. </p> <p><em>Is there any way I can use this to allow ubuntu to change my wallpaper automatically to the newest wallpaper submitted on Interfacelift?</em> </p> <p>They somehow use this to create .theme files for windows to create dynamic wallpaper changing. I was wondering if something similar can be done in Ubuntu.</p>
0non-cybersec
Stackexchange
YSK a sudden loss of vision affecting both eyes is a sign of a stroke. 30-50% of strokes involve vision loss, yet most people do not know that you can lose vision from a stroke and it is not part of the FAST (Face, Arm, Speech, Time) acronym for stroke. I work with stroke victims a many noticed the vision loss but tried to sleep it off, not knowing it was a stroke and delaying their treatment during a crucial time. If you notice a loss of vision in the periphery of both eyes, call your doctor. Edit: everyone has a problem with the “call your doctor” part. Let’s modify that to “call the appropriate medical professionals.” That can be different for different people, so use your best judgement
0non-cybersec
Reddit
copy all files that have no extension. <p>We can copy some file by extensions like this:</p> <pre><code>cp *.txt ../new/ </code></pre> <p>but how can I copy all files that have no extension?</p>
0non-cybersec
Stackexchange
Will the E-Book Kill the Footnote? .
0non-cybersec
Reddit
Extremely photogenic bungee jumper..
0non-cybersec
Reddit
If we're throwing around what we want from Gen 8.
0non-cybersec
Reddit
References for &quot;closed form&quot; numeric solutions of $\tan x=-a x$. <p>I am looking for references that discuss solutions of the equation</p> <p>$\tan x=-a x$</p> <p>(for $x,a\in \mathbb{R}$). I know about the graphical approaches, and any number of numerical solution approaches, but I was wondering if there's a semi-closed form solution, which gives something like</p> <p>$x = f(a,c)$</p> <p>where $c$ is a (set of) numerically solved constants which are independent of $a$ (i.e. a set of constants corresponding to the set of roots).</p> <p>I've come up with an approach (i.e. a function $f$), but I figure this has been solved already, so I'd prefer to reference that ``known'' solution.</p>
0non-cybersec
Stackexchange
What did the boy with no hands get for his birthday?. Gloves!! just kidding....I don't know what he got....he hasn't opened it yet
0non-cybersec
Reddit
[IMAGE] No Sony, thank you!.
0non-cybersec
Reddit
Google Sheet Query returns first 3 rows in one row. <p>I have made a simple query that combines data from 4 separate sheets:</p> <pre><code>=query({'1.MA'!A13:O200;'2.PF'!A13:O200;'3.BM'!A13:O200;'4.C'!A13:O200},"Select * where Col2 is not null ") </code></pre> <p>The objective is to have all data in the sheets where Column B is filled in. This works for the majority, except for the first 3 rows in the first sheet. The query returns them combined in one row.</p> <p>All sheets are exactly the same, the error does not reproduce n the first 3 rows of the other sheets.</p>
0non-cybersec
Stackexchange
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
AT&T CEO: Net neutrality is ‘bad for the industry’.
0non-cybersec
Reddit
Root user inside Composer container. <p>I have a basic question when running running a <a href="https://hub.docker.com/r/composer/composer/" rel="noreferrer">Composer</a> in a Docker container.</p> <p>Is it OK to run the <code>composer</code> as user <code>root</code> inside the container? I am confusing that the owner of the created files (for example when using <code>composer require</code>) is <code>root</code>.</p> <p>Is run as <code>root</code> inside the container OK best practice?</p>
0non-cybersec
Stackexchange
How to make popover appear where my mouse enters the hover target?. <p>This is an example code to show the popover window display below my button:</p> <pre><code>$.fn.popover.defaults = $.extend({} , $.fn.tooltip.defaults, { placement: 'bottom', content: '' </code></pre> <p>Now I want the popover window appear on the place where my cursor moves on(not only top/bottom/left/right, but a specific location which depends on where user put their cursor on). </p> <p>How to get it? </p>
0non-cybersec
Stackexchange
Using custom hadoop input format in PySpark. <p>I am trying to use a custom defined Hadoop input format for reading some data on HDFS. This is the command that I am using on pyspark, <code>rdds=sc.newAPIHadoopFile("inputPATH","com.jet1.custom.spark.CustomInputFormat","org.apache.hadoop.io.LongWritable","com.jet1.spark.val",{"fs.defaultFS":"hdfs://localhost:8020"});</code></p> <p>I have already passed the corresponding jars while running pyspark. But I am getting the error</p> <p><code>py4j.Py4JException: Method newAPIHadoopFile([class org.apache.spark.api.java.JavaSparkContext, class java.lang.String, class java.lang.String, class java.lang.String, class java.lang.String, class java.util.HashMap, null, class java.util.HashMap, class java.lang.Integer]) does not exist</code></p> <p>I think this is because of some wrong configuration settings and not specifically because of something incorrect in the command. Also, JAVA_HOME is set in the terminal environment. Any idea on what might be wrong.</p>
0non-cybersec
Stackexchange
LPT Request: What's the best way to get out of bed in the morning and avoid hitting the snooze button?. Is there something I should be doing the night before to prepare? Is there something I should do first thing after waking up? I get 7-9 hours of sleep per night, on a regular schedule, yet I just can't help but feel exhausted in the mornings. I routinely set 5+ alarms, and even then I still have a hard time not sleeping in. I've tried the "hop out of bed and do 10 pushups" and "drink a glass of water immediately" and a few other methods, but nothing short of a cold shower seems to work (and I'd like to avoid taking a mandatory cold shower every morning, if possible). Before getting coffee or an energy drink after I leave the house, what can I do to quickly get up and stay awake?
0non-cybersec
Reddit
Updating distribution using Bayes&#39; theorem?. <p><strong>I got this question as home work but i am not able to understand how I will update distribution using Bayes' rule. I want to a direction to proceed?</strong></p> <p>Let X be the score of a randomly selected student in this class on the quiz. Let Y denote the mean score. If we knew Y , suppose that a reasonable model for X would be that X is <strong>normal</strong> with mean Y and variance 10.</p> <p><a href="https://i.stack.imgur.com/CYOzy.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/CYOzy.png" alt="enter image description here"></a></p> <p>When I write the quiz, I do not have a very good idea of what the mean Y will be. I think the mean is equally likely to be anywhere between 60 and 90, i.e.,</p> <p><a href="https://i.stack.imgur.com/adlSN.png" rel="nofollow noreferrer"><img src="https://i.stack.imgur.com/adlSN.png" alt="enter image description here"></a></p> <p>Suppose that I randomly select a quiz, grade it, and it turns out to receive a 100. Using Bayes rule, how should I update my distribution for Y ? That is, what is fY |X(y|X = 100)? (Simplify as much as possible, but you may leave your answer in terms of the standard normal cumulative distribution function Φ if you wish.)</p>
0non-cybersec
Stackexchange
Failed to start Snappy Daemon. <p>Tried restarting my computer and while it's booting Ubuntu 18.04, it gets hung up after:</p> <pre><code>[FAILED] Failed to start Snappy daemon, See 'systemct1 status snapd.service' for details, </code></pre>
0non-cybersec
Stackexchange
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
Do dominant males who enjoy having sex with married women do anything to control the women while they are at home with their husbands ?. I just read a comment on another web site about infidelity written by a female unfaithful spouse who said her affair partner used to control how she cut/colored her hair and the clothes she bought and wore. What is the point of this ? Control of the woman at her home ? Domination of the husband ?
0non-cybersec
Reddit
Will 8 GB of RAM be enough for the next 5 years?. OK this is such a weird question that I have been hesitating before posting. I am lost and need your help. I recently changed job. Previously I worked in a traditional environment I.e. MS Office and email via Outlook. Now, my company uses nearly in-browser tools: Google Suite (Gmail, Docs, Spreadsheets, Drive), BitBucket and JIRA. I spend all the time in Chrome. I have a 2013 basic MacBook Air (4GB RAM, Intel Core i5 1,3 GHz with Turbo Boost to 2,6 GHz) which was more than enough for previous stuff. Apple has really worked out the efficiency for Office and desktop apps. And I was using Safari for web browsing. Unfortunately, the Google Suite does not work well in Safari. It freezes all the time, especially when I browse the large company Drive directory with several documents open in other tabs. Chrome works much better but still far from satisfaction. I need a new Mac but am not sure which one. I am choosing between the MacBook and the non-Touchbar MacBook Pro with 16 GB of RAM. The MacBook is cool but it has max 8 GB of RAM. The Pro is heavier but can have more RAM. As I am on 4 GB of RAM now I am not sure: is 8 GB going to be enough or should I go for the 16? Thanks
0non-cybersec
Reddit
Why are my CSS properties being overridden/ignored?. <p>I'm having some issues with the CSS "hierarchy" (not sure if it's proper to call it a hierarchy). I'm trying to style the below bit of HTML.</p> <pre><code>&lt;body&gt; &lt;section id="content"&gt; &lt;article&gt; &lt;ul class="posts-list"&gt; &lt;li class="post-item"&gt; &lt;h2&gt;[post title]&lt;/h2&gt; &lt;p class="item-description"&gt;...&lt;/p&gt; &lt;p class="item-meta"&gt;...&lt;/p&gt; &lt;/li&gt; ... &lt;/ul&gt; &lt;/article&gt; &lt;/section&gt; &lt;/body&gt; </code></pre> <p>Since section#content changes on every page I have, I wanted to maintain consistent styles across all of them, so I wrote some "global" CSS rules.</p> <pre><code>#content { color: #000; margin-left: 300px; max-width: 620px; padding: 0px 10px; position: relative; } #content p, #content li { color: #111; font: 16px / 24px serif; } </code></pre> <p>I wanted to style HTML within a <code>ul.posts-list</code> differently, so I wrote these rules.</p> <pre><code>li.post-item &gt; * { margin: 0px; } .item-description { color: #FFF; } .item-meta { color: #666; } </code></pre> <p>However, I ran into some issues. Here is how Chrome is rendering the CSS:</p> <p><img src="https://i.stack.imgur.com/NSQzG.png" alt="Screenshot of how Chrome is rendering my CSS"></p> <p>For some reason, the rules <code>#content p, #content li</code> are overriding my rules for <code>.item-description</code> and <code>.item-meta</code>. My impression was that class/id names are considered specific and thus higher priority. However, it seems that I have a misunderstanding of how CSS works. What am I doing wrong here?</p> <p>Edit: Also, where can I read up more about how this hierarchy works?</p>
0non-cybersec
Stackexchange
restrict team/sharepoint/group creation. Hi, &#x200B; I want to prohibit the function that users can create groups/teams/sharepoint sites etc. I found this guide; &#x200B; [https://docs.microsoft.com/En-GB/office365/admin/create-groups/manage-creation-of-groups?view=o365-worldwide](https://docs.microsoft.com/En-GB/office365/admin/create-groups/manage-creation-of-groups?view=o365-worldwide) &#x200B; But here they create a security group to delegate the creation of sites/groups etc. (requires azuread prem lic). The tenant global admin should be the only person that can make groups/teams/sites. &#x200B; Is that something I can achieve easily? &#x200B; Thanks in advance.
0non-cybersec
Reddit
Raspberry Pi running a Twitter adventure game.. I don't know if there are any other examples of this kind of thing out there, but I'd like to let you know about my little project. It's a (very small) text adventure game that you play using Twitter. I wrote it using Python scripts, Twython and MySQL. The system checks for updates every 2 minutes, parses the messages and sends out responses. To start playing just send the word "start" (no quotes) to @soulsdarkest I've just finished making it so apologies if it breaks on you or can't handle very complicated instructions. Twitter doesn't like duplicate tweets either so to get around this it helps to add a small random number at the end of any tweet you send to the system, for example: @soulsDarkest examine fire 2459 I'll try to improve the parser over the next couple of days, and hopefully it can handle several people playing! Cheers!
0non-cybersec
Reddit
That's one way to not get hair on your car seats.
0non-cybersec
Reddit
Whats blue and doesn't fit anymore. A dead epileptic
0non-cybersec
Reddit
Where's the Food Going?. Before I started CICO/DASH, I would eat TONS of carbs all day, and binge every night--I was probably consuming around 3000-5000 calories per day. I've been CICO for a month, I've lost 18 pounds, and I feel great. And I'm obviously going to the bathroom a LOT less (BMs). I used to have one "epic" BM every single day, but now I'm down to one or two BMs per week, and they're not anywhere near as big. &#x200B; WHERE'S THE FOOD GOING? **Am I burning (my new, high quality food) in almost REAL TIME? to FUEL my body?** **Is that for real?** I'll eat a TON of broccoli, or quorn or yogurt one day, and expect to have a huge BM the next day that never comes. WHAT'S HAPPENING TO MY BODY?! Is this how normal (thin/healthy) bodies are supposed to work?
0non-cybersec
Reddit
Insta models!.
0non-cybersec
Reddit
Northern Ireland court to consider whether Brexit requires parliament vote.
0non-cybersec
Reddit
Web 2.0 Pivot Attacks - Attacking Websites through their Third Party Providers.
1cybersec
Reddit
Handle Angular 401 responses. <p>I have simple api and a authorization point</p> <p>when i request to api i get a 401 if the token is invalid (token loses validity past five minutes).</p> <p>i know i can intercept 401 for example with </p> <pre><code>app.factory("HttpErrorInterceptorModule", ["$q", "$rootScope", "$location", function($q, $rootScope, $location) { var success = function(response) { // pass through return response; }, error = function(response) { if(response.status === 401) { // dostuff } return $q.reject(response); }; return function(httpPromise) { return httpPromise.then(success, error); }; } ]).config(["$httpProvider", function($httpProvider) { $httpProvider.responseInterceptors.push("HttpErrorInterceptorModule"); } ]); </code></pre> <p>but i want capture and queue the request and show a login form if is success then change the token (it's a header) and execute request again</p>
0non-cybersec
Stackexchange
Google Chrome and Microsoft Edge Chrome Both Crash Instantly Upon Launching. <p>I have a single Windows server (Windows Server 2016 / 1607) which has peculiar issues with web browsers.</p> <p>Both Google Chrome and Microsoft Edge Chrome crash instantly when they are launched and display the <code>Aw Snap</code> / <code>This Page is having a problem</code> error respectively, even when I launch the about:chrome page. </p> <p>IE11 on the other hand works perfectly.</p> <p>First I thought it was the Chrome / Symantec bug from a couple of months ago, but I've already implemented policies enterprise-wide to fix that particular issue. </p> <p>I've tried the following:</p> <ul> <li>Reinstalling latest version of Chrome </li> <li>Installing latest version of Edge Chrome </li> <li>Disabling Symantec Endpoint Protection (SEP) </li> <li>Updating SEP to 14.2.xxxx</li> </ul>
0non-cybersec
Stackexchange
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
Travelling at light speed away from the sun doesn't really seem that fast.
0non-cybersec
Reddit
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
Saas vs. &quot;Cloud Based Service&quot;. <blockquote> <p><strong>Possible Duplicate:</strong><br> <a href="https://webapps.stackexchange.com/questions/301/what-is-cloud-vs-saas-vs-asp">What is Cloud vs. Saas vs. ASP?</a> </p> </blockquote> <p>What is the distinguishing factor(s) between these two?</p> <p>Cloud Based Service - You can come use our Cloud to store and manage your data SaaS - You can come use our Cloud application to store and manage your data</p> <p>When do you call it Saas vs a Service provided to a client who has a specific processing need in mind and that processing need uses a SW application (several out there to choose from but the Cloud Provider has picked one specifically and the user can't change that) </p> <p>In this case the SW app is not a cloud app - it does not make the cloud run, it does not link users to the systems, it is task specific. So is it always Saas if it is an application that "runs on the cloud". Or could it be considered a Computing service since customer can't choose the application used to perform the specific task</p>
0non-cybersec
Stackexchange
Finnaly completed it!.
0non-cybersec
Reddit
YSK not to touch "chocolate hair" (Especially if you are "curious/just trying to be nice")..
0non-cybersec
Reddit
Custom shortcut for special character - Word 2016 Mac. <p>Good evening!</p> <p>I am trying to find a way to assign a custom shortcut (for example control + s) for special characters found in the Latin section of Emoji &amp; Symbols tab on Word 2016 Mac (for example ț).</p> <p>On Windows its a rather trivial task - you can simply find it in the Insert - Symbols tab. Not so easy on Mac... </p> <p>Any help would be greatly appreciated. Thanks.</p>
0non-cybersec
Stackexchange
Vid of Kipchoge's 2 hour marathon from my perspective. Blistering pace.
0non-cybersec
Reddit
I tried being friends with my ex who dumped me. Here is my experience to those who might want to try the same.. She dumped me four months ago out of the blue. It hurt me very very much and i was so thirsty of her company that i tried to have her in my life at least in some way. But every meeting with her for coffe or something hurt because “that’s not it”. It is painful to have to kiss her on the cheek, not to talk the way we used to and to endure her cold and distant eyes. There was no warmth and love in her eyes any more. I feel so degraded and with smaller value when we hangout. When i make a suggestion for something more between us she rejects it away like its some filth. Everytime when she says that we’re just friends hurts so much because i am now just a dude like any other. There is nothing special anymore. Every meeting i was hoping i will get some spark which will put us in the old days but i get nothing. I return every time sadder and depressed and sometimes even crying. I don’t think i can endure it anymore and i want to end this”friendship”. The idea of not having her at all in my life scares me too. I feel so stretched. I wish i haven’t even met her so i don’t have to go through all of this.
0non-cybersec
Reddit
lldb breakpoint commands not working in XCode 8. <p><strong><em>EDIT: It now appears that it's not limited to <code>frame info</code> but in fact, NONE of the <code>breakpoint command add</code> commands work. They will only work if typed in manually at an (lldb) command prompt</em></strong></p> <p>I set some breakpoints in LLDB via the XCode console, to examine a class and how it's used in code. </p> <pre><code>(lldb) breakpoint set --func-regex "DVLayer" </code></pre> <p>Breakpoint 7: 73 locations.</p> <pre><code>(lldb) breakpoint command add 7 </code></pre> <p>Enter your debugger command(s). Type 'DONE' to end.</p> <pre><code> frame info continue DONE </code></pre> <p>This has worked fine in all previous versions of XCode going back to XCode 4. Now however, all I get are these statements in the console, and no frame info. I have tried the breakpoint commands on 5 different classes, and it worked on none of them... always this output.</p> <p>Command #2 'continue' continued the target.</p> <p>Command #2 'continue' continued the target.</p> <p>Command #2 'continue' continued the target.</p> <p>Command #2 'continue' continued the target.</p> <p>Command #2 'continue' continued the target.</p> <p>Command #2 'continue' continued the target.</p> <p>Command #2 'continue' continued the target.</p> <p>Command #2 'continue' continued the target.</p> <p>Command #2 'continue' continued the target.</p> <p>Also note that <strong>THIS ONLY FAILS TO WORK INSIDE A <code>breakpoint command add</code> statement</strong></p> <p>If I am simply stopped at a breakpoint in LLDB at the (lldb) command prompt, I can type <code>frame info</code> and it works as expected, however, as indicated above, adding <code>frame info</code> as a breakpoint command completely fails with the output above.</p>
0non-cybersec
Stackexchange
Child Domain Migration to Parent Domain. <p>Our company is planning on moving from a single forest with multiple domains to a single forest with a single domain.</p> <p>This is my infrastructure:</p> <p><strong>Forest Root</strong></p> <pre><code>ROOT-DC.techtunes.lan ROOT-ADC.techtunes.lan ROOT-ADC2.techtunes.lan </code></pre> <hr> <p><strong>SITES:</strong></p> <p><strong>Cambridge</strong> </p> <pre><code>dc1cam.cambrdige.techtunes.lan adc1cam.cambrdige.techtunes.lan </code></pre> <hr> <p><strong>Oxford</strong> </p> <pre><code>dc1oxf.oxford.techtunes.lan adc1oxf.oxford.techtunes.lan </code></pre> <hr> <p><strong>Karachi</strong></p> <pre><code>dc1khi.karachi.techtunes.lan adc1khi.karachi.techtunes.lan </code></pre> <hr> <p>Now, we are planning to move our child domains on root-dc.techtunes.lan then we will create separate OU for each site and also place Global Catalogs on each site for backup purposes.</p> <p>I have read that the Active Directory Migration Tool v3.2 is an important tool to migrate our users, but I have some questions about it.</p> <p>What happens with users whose names are duplicated in each domain? For example: one user named <code>abc</code> is in Cambridge and also in Karachi. What happens when we move both <code>acb</code> accounts to a single domain?</p> <p>What about other services like DHCP and DNS? We want to run DHCP locally at each site.</p> <p>I'd appreciate answers on how to proceed.</p>
0non-cybersec
Stackexchange
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
Returning abstract type in base class. <p>In a design of a class hierarchy, I'm using an abstract base class that declares various methods that the derived classes would implement. In a sense, the base class is as close to an interface as you can get in C++. However, there is an specific issue. Consider the code below which declares our interface class:</p> <pre><code>class Interface { public: virtual Interface method() = 0; }; class Implementation : public Interface { public: virtual Implementation method() { /* ... */ } }; </code></pre> <p>Of course, this wouldn't compile, because you cannot return an abstract class in C++. To get around this problem I'm using the following solution:</p> <pre><code>template &lt;class T&gt; class Interface { public: virtual T method() = 0; }; class Implementation : public Interface&lt;Implementation&gt; { public: virtual Implementation method() { /* ... */ } }; </code></pre> <p>This solution works and is all fine and dandy, however, to me, it doesn't look very elegant, because of the redundant bit of text which would be the parameter for interface. I'd be happy if you guys could point our any other technical issues with this design, but that is my only concern at this point.</p> <p>Is there any way to get rid of that redundant template parameter? Possibly using macros?</p> <p><strong>Note:</strong> The method in question has to return an instance. I'm aware that if <code>method()</code> returned a pointer or a reference, there would be no issue.</p>
0non-cybersec
Stackexchange
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
OS X 10.8.4 update available now..
0non-cybersec
Reddit
The European response to PRISM must be protecting privacy.
0non-cybersec
Reddit
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
Huck's Honeymoon.
0non-cybersec
Reddit
So peaceful when not disembowling.
0non-cybersec
Reddit
Can wifi speed on a laptop be limited by i7 core processor?. <p>Can someone dumb this down for me or help with a solution? I have an i7 Core Processor in my Inspiron HP laptop and am not getting full wifi speeds from our Comcast/Xfinity X6 modem/router. Sitting at my desk, my laptop only gets around 100MBPS. But sitting at my desk next to my laptop, I get over 400MBPS download speed on my iPhone from that same router/modem. Also get the same higher speed from an iPad. Could it be that my laptop processor won't handle that speed? Thx for any help on this.</p>
0non-cybersec
Stackexchange
So I gave a bus tour to the Eagles Rookies about a month ago....
0non-cybersec
Reddit
Google Sheets conditional formatting with AND for value range. <p>I'm trying to set a colour range of conditional formatting based on another cells value. So if A1 is larger than A2 it will be Blue, if A1 is between 0 and A2 it will be Yellow and if A1 is less than 0 it will be red. </p> <p>I'm struggling with the second function - if A1 is between 0 and A2 it will be Yellow. Please can someone advise how to do this?</p>
0non-cybersec
Stackexchange
Finally the true next-generation console!.
0non-cybersec
Reddit
Crash of Garbage Collection Work Queue if dylib is loaded. <p>We are porting an app from 10.6 to 10.8. I am looking at dylib we load in app. I am facing very unusual crash in <strong>Garbage Collection Work Queue</strong> with following message.</p> <pre><code>malloc: Thread::suspend(): unable to suspend a thread: err = 268435459, Thread 0x111000000: _pthread = 0x108129000, _thread = 0x8b07, _stack_base = 0x108129000, enlivening on, 0 local blocks </code></pre> <p>For application <code>GCC_ENABLE_OBJC_GC = required</code> is set. If I have <code>GCC_ENABLE_OBJC_GC = required</code> in dylib it will still crash. I cannot turn off garbage collector in application. I have to manage it crash from my dylib.</p> <p>Reason for crash turns out to be that garbage collector is not able to suspend the thread. (as it says in log). This thread is created using <a href="http://web.mit.edu/darwin/src/modules/xnu/osfmk/man/thread_create.html" rel="noreferrer">thread_create()</a>. If I put a indefinite while loop (with sleep) in constructor of dylib, I dont get crash. I get crash when constructor has finished its execution.</p> <p>Is their a way to tell garbage collector not to try and suspend the thread? Or to increase reference count of thread? or anything I can do to stop garbage collector not to interfere with my dylib code. </p>
0non-cybersec
Stackexchange
Determining if Server/Client&#39;s TLS configuration is Vulnerable to SLOTH. <p>In the context of SSL/TLS protocol and <a href="http://www.mitls.org/pages/attacks/SLOTH" rel="nofollow">SLOTH</a> vulnerability. I want to find out if certain websites(webservers) or applications that use TLS are vulnerable. I need some guidance for this. </p> <p>My idea is to develop/find a tool(maybe openssl) that connects to the servers and in the client hello asks for RSA-MD5 SignatureAndHashAlgorithm to test if the server sends the corresponding certificate under this configuration and conclude that the server is vulnerable.</p> <p>Likewise for the client certificates, I want to ask for client certificates signed by RSA-MD5 and if the client sends its certificates under this setup I'll conclude that the client is vulnerable to SLOTH.</p> <p>First, is my approach right? or am I off the road?</p> <p>Second, what types of tools do I need to use? Is openssl capable of producing such requests and responses?</p>
0non-cybersec
Stackexchange
How to find the solution to this system of integer variables?. <p>Let $x_i$ be nonnegative integer variables in $\mathbb{N}$. The system is to find $x_i$ in</p> <p>$$\sum_{i=1}^nx_i=3n,\\\quad \quad \quad \quad \;\;\,x_i\leqslant3,\,\forall\, i\in\{1,\ldots,n\}.$$</p> <p>I find the solution to be $x_i=3$ for all $i$ but I cannot prove that it is the unique solution.</p>
0non-cybersec
Stackexchange
So I wanted to build a pc since 5 years, and its happening now! I need help in fine-tuning the parts tho. Any suggestions? 1300 around is my budget.. So I live overseas (India, actually). I have an uncle in the US, who is willing to gather the parts and ship it here. I will mainly be using it for gaming, streaming and a slight video editing. Here's my newegg list: https://drive.google.com/file/d/1RziKg7aEGNlsAZQ4cFMn99oU8rTwoR1X/view?usp=drivesdk For the monitor, I was done with my 1600x900 60hz one, so went for the most popular, cheapest one ASUS TUF Gaming VG24VQ 24" https://www.newegg.com/product/N82E16824281027
0non-cybersec
Reddit
Paul Peschisolido on Neil Warnock taking the Sheffield Utd players bowling: "He convinced us all to put £10 in a pot, winner takes all. We agreed for some fun, then he pulled out his own bowling shoes and custom ball, shot 250 and took all our money"..
0non-cybersec
Reddit
If $A^2=I$ and $\lambda \not =-1$, then $A=I$. <blockquote> <p>Given an <span class="math-container">$n\times n$</span> matrix <span class="math-container">$A$</span> with <span class="math-container">$A^2=I$</span>, assume that <span class="math-container">$-1$</span> is not an eigenvalue of <span class="math-container">$A$</span>. Prove <span class="math-container">$A=I$</span>.</p> </blockquote> <p><strong>Proof attempt:</strong> Since <span class="math-container">$A^2=I,$</span> we have <span class="math-container">$A^{-1}=A$</span>. Using that fact that <span class="math-container">$\det(A)=\prod_{i=1}^n\lambda_i$</span>, we see that each of the eigenvalues is nonzero. For any eigenvector <span class="math-container">$v$</span> of <span class="math-container">$A$</span>, we see <span class="math-container">$Av=\lambda v$</span>, so <span class="math-container">$\frac{1}{\lambda} v = A^{-1}v=Av$</span>. This implies <span class="math-container">$\lambda^2=1$</span>. By assumption, we conclude that each eigenvalue is <span class="math-container">$1$</span>. Hence, <span class="math-container">$\det A=1$</span>.</p> <p>(1) How do we know that <span class="math-container">$A$</span> actually has any eigenvectors? E.g., the map which rotates a vector in the plane by <span class="math-container">$\pi/2$</span> clockwise is invertible but has no eigenvectors. (Perhaps there should be some given information about the underlying field.)</p> <p>(2) How do I use <span class="math-container">$\lambda=1$</span> to conclude <span class="math-container">$A=I$</span>? </p> <p>I tried using <span class="math-container">$A=A^{-1} = \frac{C^T}{\det A}=C^T$</span>, where <span class="math-container">$C$</span> is the matrix of cofactors of <span class="math-container">$A$</span>. From this, I conclude that each entry of <span class="math-container">$A$</span> equals its corresponding co-factor -- i.e., <span class="math-container">$A_{i,j} = \det(\overline{A_{i,j}})$</span>, where <span class="math-container">$\overline{A_{i,j}}$</span> is the sub-matrix of <span class="math-container">$A$</span> obtained by deleting row <span class="math-container">$i$</span> and column <span class="math-container">$j$</span>. Using the co-factor expansion of the determinant along row <span class="math-container">$i$</span>, we also conclude <span class="math-container">$$1=\det A=\sum_{j=1}^n A_{i,j}(-1)^{i+j}\det(\overline{A_{i,j}})=\sum_{j=1}^n(A_{i,j})^2(-1)^{i+j}.$$</span></p>
0non-cybersec
Stackexchange
Iceland..
0non-cybersec
Reddit
Find the ratio between the radius and the height. <blockquote> <p>A coffee filter has the shape of an inverted cone. Water drains out of the filter at a rate of 10 cm<span class="math-container">$^3$</span>/min. When the depth of water in the cone is 8 cm, the depth is decreasing at 2 cm/min. What is the ratio of the height of the cone to the radius?</p> </blockquote> <p>So,</p> <p><span class="math-container">${dV \over dt} = -10$</span></p> <p><span class="math-container">$h=8$</span></p> <p><span class="math-container">${dh \over dt}= -2$</span></p> <p>Now,</p> <p><span class="math-container">$${V}= {1 \over 3} \pi r^2h$$</span></p> <p>However, it seems like I am not given enough information.</p> <p>What do I do?</p> <hr> <p>I tried:</p> <p><span class="math-container">$${dV \over dh} = {2\over 3} \pi r {dr \over dh}$$</span></p> <p>However, it feels like I am not given enough information since I don't have <span class="math-container">${dr \over dh}$</span></p>
0non-cybersec
Stackexchange
Sets finding biggest value and minimum value using inclusion exclusion principle. <p>Consider the set A1, A2, A3 of | A1 | = 15, | A2 | = 12, | A3 | = 6, <span class="math-container">$| A1 \cap A2 \cap A3 | =3$</span> What is the minimum and maximum value of <span class="math-container">$|A1\cup A2 \cup A3|$</span>?</p> <p>My attempt: the minimum value is 15 Because A1 is biggest set can contain 9 from A2 + 3 from A3 and 3 from <span class="math-container">$| A1 \cap A2 \cap A3 | =3$</span> so all satisfy</p> <p>But for biggest possible value</p> <p><span class="math-container">$| A1 | + |A2 | + |A3 | - (|A1 \cup A2 | + |A2 \cup A3| + |A3 \cup A1) +3 $</span> </p> <p>Suppose a is <span class="math-container">$|A1 \cup A2 |$</span> and b= <span class="math-container">$|A2 \cup A3| $</span> and c= <span class="math-container">$|A3 \cup A1|$</span> </p> <p><span class="math-container">$15+12+6-(a+b+c)+3=$</span></p> <p><span class="math-container">$a +b+c =36$</span></p> <p>But we know also that </p> <p><span class="math-container">$a+b \leq 12$</span></p> <p><span class="math-container">$a+c \leq 9$</span></p> <p><span class="math-container">$b+c \leq 3$</span></p> <p>Sum above <span class="math-container">$ 2a+2b+2c=24$</span></p> <p>So <span class="math-container">$a+b+c=12$</span></p> <p>Then how can i conclude what is the biggest value that is possible?</p> <p>Consider the sets as people and there are 3 circle for every sets in venn diagram</p>
0non-cybersec
Stackexchange
I see your Pulse Bomb Volleyball and present to you Hammond Uppercut Volleyball!.
0non-cybersec
Reddit
So that’s what Apple did with Workflow. Anyone notice how Siri shortcuts looks oddly familiar?
0non-cybersec
Reddit
django admin save_model not saving model changes. <p>This is my admin.py:</p> <pre><code>class TransactionInfoAdmin(admin.ModelAdmin): search_fields=['transactionId','subscriptionInfo__customerNumber'] save_on_top = False def has_add_permission(self,request): return False def has_delete_permission(self, request, obj=None): return False def get_readonly_fields(self, request, obj=None): if obj: return self.readonly_fields + ('subscriptionInfo','transactionId','authorizationId','responseCode','operation','batchNumber','merchantId') return self.readonly_fields def save_model(self, request, obj, form, change): #SUCCESS ACTIONS obj.subscriptionInfo.paid = 1 obj.save() pass </code></pre> <p>When I am saving the <code>obj.subscriptionInfo.paid = 1</code> its not updating the data row, any ideas why?</p> <p><strong>NOTE: subscriptionInfo is foreign key in the above model TransactionInfo.</strong> </p> <p>-------------------------- UPDATE --------------------------</p> <p>My model.py</p> <pre><code>class SubscriptionInfo(models.Model): subscriptionId = models.CharField(max_length=50) customerNumber = models.IntegerField() subscriptionType = models.CharField(max_length=50, default="basic") currency = models.CharField(max_length=50, default="NOK") paid = models.IntegerField(default=0) class Meta: verbose_name = "Subscription Information" verbose_name_plural = "Subscription Information" def __unicode__(self): return u'%s' % self.customerNumber class TransactionInfo(models.Model): subscriptionInfo = models.ForeignKey(SubscriptionInfo, db_column='f') authorizationId = models.IntegerField() transactionId = models.TextField() batchNumber = models.IntegerField() merchantId = models.IntegerField() operation = models.CharField(max_length=50) responseCode = models.CharField(max_length=50) paidDate = models.DateField(_("Date"), default=datetime.date.today) class Meta: verbose_name = "Transaction Information" verbose_name_plural = "Transaction Information" def __unicode__(self): return u'Transaction : %s' % self.pk </code></pre> <p>Anyone?</p>
0non-cybersec
Stackexchange
Getting function Content and function name in C with regular expression in python. <p>I am trying to get function content (body) if the function's name matches a defined pattern</p> <p>what I tried so far:</p> <blockquote> <p>(Step1) get with a recursion all function bodies in a define C file {(?:[^{}]+|(?R))*+}</p> <p>(Step2) find all matches of wanted function' s name</p> <p>(Step3) Combine both steps. This where I am struggling</p> </blockquote> <h3>Input</h3> <pre><code>TASK(arg1) { if (cond) { /* Comment */ function_call(); if(condIsTrue) { DoSomethingelse(); } } if (cond1) { /* Comment */ function_call1(); } } void FunctionIDoNotWant(void) { if (cond) { /* Comment */ function_call(); } if (cond1) { /* Comment */ function_call1(); } } </code></pre> <p>I am looking for the function TASK. When I add the regex to match TASK in front of "{(?:[^{}]+|(?R))*+}", nothing works.</p> <pre><code>(TASK\s*\(.*?\)\s)({((?&gt;[^{}]+|(?R))*)}) </code></pre> <h3>Desired Output</h3> <pre><code>Group1: TASK(arg1) Group2: if (cond) { /* Comment */ function_call(); if(condIsTrue) { DoSomethingelse(); } } if (cond1) { /* Comment */ function_call1(); } </code></pre>
0non-cybersec
Stackexchange
Poodles love to help with instructions..
0non-cybersec
Reddit
Applebee's mirror twitter comments about them on their home page - they often aren't very complimentary at the moment..
0non-cybersec
Reddit
iPhone max users with small hands. How is using the max compared with the X?
0non-cybersec
Reddit
Yellowfin Tuna Burrito - My Ceviche, Miami.
0non-cybersec
Reddit
Use a password to protect a text file. <p>Is there any easy/simple way to protect a .txt file with a password? So whenever open the file, password is required, just like opening .pdf with a password protected. Though I still want to be able to edit the text file in general text editors (notepad).</p>
0non-cybersec
Stackexchange
How to access dataset in current scope generated by a call to a stored procedure in TSQL?. <h2>Problem Background</h2> <p>Generating and accessing data of a fixed column layout is easy. You can create local temp tables up-front, and populate them by calling stored procedures.</p> <p>On the other hand, if you want to generate data with a dynamic column layout, you must generally build an SQL statement dynamically and execute it with "exec sp_executesql". Since the data layout is unknown at run-time, you cannot create a temp-table up-front, and once inside the "exec sp_executesql" statement, any temporary tables created there are bound to that scope and vanish when the call returns, so it's much more difficult to access the data (i.e. your options are more limited).</p> <h2>My Specific Situation</h2> <p>I have a query that needs to access data in a dynamically generated table.</p> <p>The table is generated by a stored procedure, which dynamically builds a query, stores it in a variable "@sql nvarchar(max)", and runs it by calling "exec sp_executesql @statement = @sql".</p> <p>The @sql statement was something like "select * into #temptable from...", but #temptable was destroyed by the time "exec sp_executesql" returned. A quick fix for this was to just use "##temptable" instead (i.e. a global temp table), because it survives when the stored procedure returns AND I can easily access it in the calling scope (because it has a known/static name).</p> <p>I don't like this solution because global temp tables aren't thread-safe (name collistion-wise), and I don't want to have to mess with dynamically-generated unique names, because I'll just end up having to use more dynamic SQL to access them... which puts me right back at square one, leaving the data inaccessible outside the SP.</p> <p>I don't think returning table variables (through output parameters) is an option (new to SQL Server 2008 too), unless it can be done without having to define a static table type. The tables my stored procedure generates are dynamic, and depend on the input parameter(s) passed.</p> <p>Inline table-valued functions are not an option, because I'm running code loops to build the @sql query and calling "exec sp_executesql".</p> <p>Multi-statement table-valued functions (instead of the stored procedure), is also not an option, because such a function must have a well-defined table format, whereas I'm running dyanmic SQL to return a table with a variable number of columns and column names depending on the input parameter values.</p> <p>All I really want to do is select the result set of the dynamic query into a new table, but I'm finding it difficult, as none of the above works; particularly irritating is how local temporary tables aren't local to the session, but local to the stored procedure so that they vanish upon returning. The only <a href="https://stackoverflow.com/questions/653714/how-to-select-into-temp-table-from-stored-procedure">solution</a> I've seen insists that using OPENROWSET is the only way, but I don't want to mess with connection strings inside my stored procedure, for the same reason I don't want to include unique-name-management code... it's just way more complicated than it ought to be.</p> <p>In summary, I just want to execute dynamic SQL that generates a dataset of an unknown format, and be able to easily access it from the calling scope.</p>
0non-cybersec
Stackexchange
Is java.lang.OutOfMemoryError: Metaspace normal in sbt REPL?. <p>I am new to Scala, sbt and its <a href="https://en.wikipedia.org/wiki/Read%E2%80%93eval%E2%80%93print_loop" rel="noreferrer">REPL</a>. One thing I really love is the <code>~</code> option to loop a run or compile when editing files. So I end up running <code>~run</code> quite often.</p> <p>But it leaks memory. As after 20-30 runs the whole sbt interactive shell crashes with:</p> <pre><code>[info] Compiling 1 Scala source to /home/[redacted] sbt appears to be exiting abnormally. The log file for this session is at /tmp/sbt853875123365456892.log java.lang.OutOfMemoryError: Metaspace Error during sbt execution: java.lang.OutOfMemoryError: Metaspace </code></pre> <p>Honestly it's not a big deal, but while I understand what an OOME is, the question I am trying to figure out - is it really what it's supposed to be? The answer is "no", but...</p> <ul> <li>is it a sbt bug? (should I try to report it?)</li> <li>is something wrong with my program? (memory leak?)</li> </ul>
0non-cybersec
Stackexchange
J=?.
0non-cybersec
Reddit
Proof that number of definable sets is countable. <p>I did the following two related exercises in Just/Weese on page 114:</p> <p>18: Show that if $z$ is a finite set and $y \subset z$ then there exists a formula $\varphi(x)$ of $L_S$ such that $y = \{x \in z: \varphi (x) \}$.</p> <p>19: Let $Y$ be the collection of all $y \subset \omega$ for which there exists a formula $\varphi (x)$ without parameters such that $y = \{x \in \omega : \varphi (x) \}$. Show that $Y$ is countable. </p> <p>One problem I have is that the first one is rated "difficult" and the second one is rated "extra difficult" but both of my answers are not only very simple but it also only took me a minute to come up with each so both are probably wrong and I am missing something. Here they are:</p> <hr> <p>18: Let $y$ be the set $y = \{y_1 , \dots , y_n \} \subset z$. Let $\varphi(x) = (x = y_1) \lor \dots (x=y_n)$. Then $y = \{ x \in \omega : \varphi (x) \}$.</p> <hr> <p>19: Let $F_n$ be the set of all formulas $\varphi$ in $L_S$ such that $\varphi$ consists of $n$ characters. Since there are only finitely many symbols in $L_S$, logical and non-logical combined, $F_n$ is finite. Then $F = \bigcup_{n \in \mathbb N} F_n$, the set in which each element corresponds to a definable $y \subset \omega$, is a countable union of finite sets and hence countable. </p> <p>Could you point out what I am missing? Thanks for your help!</p>
0non-cybersec
Stackexchange
Can&#39;t manually install a driver (.inf). <p>I have an AOC monitor with Freesync and I'm trying to install the driver the driver that they provide (<a href="http://aoc-europe.com/fr/products/g2260vwq6#product-detail-accessoires" rel="nofollow noreferrer">http://aoc-europe.com/fr/products/g2260vwq6#product-detail-accessoires</a>)</p> <p>It's a .inf file, I read many tutorials on how to install them (for example <a href="https://superuser.com/questions/316206/installing-a-drivers-inf-file">Installing a driver&#39;s INF file?</a>) </p> <p>The problem I have is that I can not see the file (though I can see the directory that contains it) and when I enter the path manually it gives me an error saying "The specified path does not exist or can not be accessed" </p> <p>Here's a gif demonstrating this : <a href="https://i.imgur.com/OYiGmiM.gifv" rel="nofollow noreferrer">http://i.imgur.com/OYiGmiM.gifv</a></p>
0non-cybersec
Stackexchange
How to use spot instance with amazon elastic beanstalk?. <p>I have one infra that use amazon elastic beanstalk to deploy my application. I need to scale my app adding some spot instances that EB do not support.</p> <p>So I create a second autoscaling from a launch configuration with spot instances. The autoscaling use the same load balancer created by beanstalk.</p> <p>To up instances with the last version of my app, I copy the user data from the original launch configuration (created with beanstalk) to the launch configuration with spot instances (created by me).</p> <p>This work fine, but:</p> <ol> <li><p>how to update spot instances that have come up from the second autoscaling when the beanstalk update instances managed by him with a new version of the app?</p> </li> <li><p>is there another way so easy as, and elegant, to use spot instances and enjoy the benefits of beanstalk?</p> </li> </ol> <p><strong>UPDATE</strong></p> <p>Elastic Beanstalk add support to spot instance since 2019... see: <a href="https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html" rel="nofollow noreferrer">https://docs.aws.amazon.com/elasticbeanstalk/latest/relnotes/release-2019-11-25-spot.html</a></p>
0non-cybersec
Stackexchange
I hear people from Illinois get mad when you pronounce the S,. It really ill-annoys them.
0non-cybersec
Reddit
Completely intentional in Dirt 3.
0non-cybersec
Reddit
Samba Domain Member Slow Authentication. <p>I have a Samba 4 domain controller set up with about 100 member computers connected to it on a private LAN. </p> <p>As I was rolling this out, I found a couple clients that were improperly configured with the wrong DNS address after a reboot and it took about 10 minutes to log in as a local user to fix it. Is there any kind of timeout that you can configure to make that 30s or less? I need all of these machines to allow local users to log on relatively quickly. </p>
0non-cybersec
Stackexchange
Weight Watchers Super Bowl ad narrated by Aaron Paul.
0non-cybersec
Reddit
YOUNG MAN....
0non-cybersec
Reddit
Methodologies for performance-testing a WAN link. <p>We have a pair of new diversely-routed 1Gbps Ethernet links between locations about 200 miles apart. The 'client' is a new reasonably-powerful machine (HP DL380 G6, dual E56xx Xeons, 48GB DDR3, R1 pair of 300GB 10krpm SAS disks, W2K8R2-x64) and the 'server' is a decent enough machine too (HP BL460c G6, dual E55xx Xeons, 72GB, R1 pair of 146GB 10krpm SAS disks, dual-port Emulex 4Gbps FC HBA linked to dual Cisco MDS9509s then onto dedicated HP EVA 8400 with 128 x 450GB 15krpm FC disks, RHEL 5.3-x64).</p> <p>Using SFTP from the client we're only seeing about 40Kbps of throughput using large (>2GB) files. We've performed server to 'other local server' tests and see around 500Mbps through the local switches (Cat 6509s), we're going to do the same on the client side but that's a day or so away.</p> <p>What other testing methods would you use to prove to the link providers that the problem is theirs?</p>
0non-cybersec
Stackexchange
No fat shaming please.
0non-cybersec
Reddit
1 Multi-Entity and Multi-Enrollment Key Agreement with Correlated Noise Onur Günlü, Member, IEEE Abstract—A basic model for key agreement with a remote (or hidden) source is extended to a multi-user model with joint secrecy and privacy constraints over all entities that do not trust each other. Multiple entities using different measurements of the same source through broadcast channels (BCs) to agree on mutually-independent local secret keys are considered. Our model is the proper multi-user extension of the basic model since the encoder and decoder pairs are not assumed to trust other pairs, unlike assumed in the literature. Strong secrecy constraints imposed on all secret keys jointly, which is more stringent than separate secrecy leakage constraints for each secret key considered in the literature, are satisfied. Inner bounds for maximum key rate, and minimum privacy-leakage and database- storage rates are proposed for any finite number of entities. Inner and outer bounds for degraded and less-noisy BCs are given to illustrate cases with strong privacy. A multi-enrollment model that is used for common physical unclonable functions is considered to establish inner and outer bounds for key-leakage- storage regions that differ only in the Markov chains imposed. For this special case, the encoder and decoder measurement channels have the same channel transition matrix and secrecy leakage is measured for each secret key separately. We illustrate cases for which it is useful to have multiple enrollments as compared to a single enrollment and vice versa. Index Terms—Information theoretic privacy, multiple enroll- ments, multiple entities, physical unclonable functions. I. INTRODUCTION A natural source of randomness is biometric identifiers such as fingerprints that are generally transformed into a frequency domain and quantized to obtain bit sequences that are unique to an individual [1]. Similarly, physical identifiers such as fine variations of ring oscillator (RO) outputs or random start- up values of static random access memories (SRAMs) that are caused by uncontrollable manufacturing variations, are safer and cheaper alternatives to key storage in a non-volatile memory [2]. Physical identifiers for digital devices, such as Internet-of-Things (IoT) devices, can be implemented using physical unclonable functions (PUFs) [2]. One can use PUFs in various coding schemes as a source of local randomness [3, Chapter 1], e.g., in the randomized encoder of the wiretap channel [4] and of the strong coordination problem [5], [6]. We use the basic source model for key agreement from [7], [8] to find achievable rate regions for key agreement with PUFs and biometric identifiers. In this classic model, an encoder observes a source output to generate a secret key and Manuscript received April 30, 2020. O. Günlü is supported by the German Federal Ministry of Education and Research (BMBF) within the national initiative for “Post Shannon Communication (NewCom)” under the Grant 16KIS1004. O. Günlü is with the Information Theory and Applications Chair, Tech- nische Universität Berlin, 10623 Berlin, Germany (e-mail: guenlue@tu- berlin.de). sends public side information, i.e., helper data, to a decoder, so the decoder can reliably reconstruct the same secret key by observing another source output and the helper data. The main constraints are that the information leaked about the secret key, i.e., secrecy leakage, is negligible and the information leaked about the identifier output, i.e., privacy leakage, is small [9], [10]. Furthermore, the amount of storage should also be minimized to limit the hardware cost [11]. Suppose the encoder generates a key from a noisy measure- ment of a hidden (or remote) source output, and a decoder has access to another noisy measurement of the same source and the helper data to reconstruct the same key. We call this model the generated-secret (GS) model with a hidden source. This model is introduced in [12] as an extension of the visible (noiseless) source outputs observed by the encoder, considered in [9], [10]. Similarly, for the chosen-secret (CS) model, an embedded (or chosen) key and noisy identifier measurements are combined by the encoder to generate the public helper data. We consider both models to address different applications. A. Related Work and Motivation The same identifier is used by multiple encoder and decoder pairs in [13], where the identifier outputs observed by different encoders are the same because the encoder measurements are assumed to be noiseless. Therefore, the multiple use of the same noiseless source output allows all encoders to know the secret key of the other encoders. This model does not fit well to the practical key agreement with identifiers scenarios because there is noise in every identifier measurement. Multiple enrollments of a hidden source using noisy mea- surements are considered in [14], where weakly secure secret keys are generated without privacy leakage and storage con- straints. Furthermore, there is a causality assumption in [14] on the availability of the helper data, i.e., any decoder has access to all previously-generated helper data. This assumption is not necessarily realistic as a decoder of, e.g., an IoT device that embodies a PUF should be low complexity and the amount of data to process increases linearly with the number of enrollments. In addition, any manipulation in any of the helper data can cause the complete multi-enrollment system to fail. A classic method used for key agreement, i.e., the fuzzy commitment scheme (FCS) [15], is used in [16] in combina- tion with an SRAM PUF to enroll the noisy outputs of the same SRAM multiple times. The symmetry condition in [16, Eq. (16)] conditioned on a fixed SRAM cell state is entirely similar to the symmetry satisfied by binary-input symmetric output (BISO) channels; see e.g., [17, p. 613], [12, Eq. (14)]. For SRAM outputs that satisfy this symmetry, the normalized ar X iv :2 00 5. 08 21 0v 2 [ cs .I T ] 2 3 Ju l 20 20 2 (weak) secrecy leakage about each separate secret key is shown to be zero. It is discussed in [18, Section 3.4] that any uniformly-distributed hidden identifier output with BISO measurement channels satisfies the results in [16]. In [18, Theorem 1] the secret-key capacity of the two-enrollment key agreement problem is established for measurement channels with the same channel transition matrix. However, these multi- enrollment models do not consider the privacy leakage and storage constraints, there is no constraint on the independence of the secret keys of different enrollments, and the secrecy leakage constraint is weak and is not applied jointly on all se- cret keys. Furthermore, optimal random linear code construc- tions that achieve the boundaries of the key-leakage-storage regions are given in [19], where the classic code constructions FCS and code-offset fuzzy extractors [20] are shown to be strictly suboptimal. Therefore, the multi-enrollment models and constructions in the literature are strictly suboptimal and not necessarily realistic. We therefore list stronger secrecy constraints jointly on all entities, which approximates the re- ality better in combination with storage rate and joint privacy- leakage rate constraints. These constraints define the multi- entity key agreement problem, where the entities that use the same identifier do not have to trust other entities. Therefore, the multi-entity key agreement problem is a proper multi-user extension of single-enrollment models. Every measurement of an identifier is considered to be noisy due to, e.g., local temperature and voltage changes in the hardware of the PUF circuit or a cut on the finger. Noise components at the encoder and decoder measurements of a hidden source can be also correlated due to, e.g., the surrounding logic in the hardware [21] or constant fingertip moisture. This correlation between the noise sequences is modeled in [22] as a broadcast channel (BC) [23] with an input that is the hidden source output and with outputs that are the noisy encoder and decoder measurements. We use this model for multi-entity key agreement with identifiers, where each entity (i.e., each encoder and decoder pair) observes noisy identifier outputs of the same hidden source through different BCs. We allow the BCs to be different as trusted entities generally use different hardware implementations of the encoder and decoder pairs, which results in different correlations between noise components. We also consider physically-degraded (PD) and less-noisy (LN) BCs to give finer inner and outer bounds to the key- leakage-storage regions for the GS and CS models of the multi-entity key agreement problem. For the considered PD and LN BCs, we prove that strong privacy can be achieved. In [9], [10], [24], an extra common randomness that is available to the encoder and decoder and that is hidden from the eavesdropper is required to obtain strong privacy. This assumption is not realistic since such a common randomness requires hardware protection against invasive attacks, and if such a protection is feasible, then it is not necessary to use an identifier for key agreement. B. Models for Identifier Outputs We study physical and biometric identifier outputs that are independent and identically distributed (i.i.d.) according to a given probability distribution. These models are reasonable if one uses transform-coding algorithms from [25] that occupy a small hardware area to extract almost i.i.d. bits from PUFs under varying environmental conditions. Similar transform- coding based algorithms have been applied to biometric identifiers to obtain independent output symbols [26]. These transform-coding algorithms provide almost i.i.d. identifier outputs and noise sequences; however, the correlation between the noise components on the encoder and decoder components are not removed using these methods. Furthermore, PUFs are used for on-demand key reconstruction and physical attacks on PUFs permanently change the identifier outputs [27], so we assume that the eavesdropper cannot obtain information correlated with the PUF outputs, unlike biometric identifiers. C. Summary of Contributions We extend the key-leakage-storage rate tuple analysis of the single-enrollment model for hidden identifier outputs mea- sured through general BCs in [22] to consider multi-entity key agreement with a set of stringent secrecy constraints. A summary of the main contributions is as follows. • We derive achievable key-leakage-storage rate tuples for the GS model with strong secrecy for any finite number of entities using the same identifier’s measurements through different BCs for key agreement. Separate identifier mea- surements considered in [12], [28] correspond to a PD BC and the visible source model in [9], [10] corresponds to a semi-deterministic BC. • For a set of PD and LN BCs, the privacy-leakage rates for the two-entity key agreement problem are calculated. These PD and LN BCs are shown to provide strong privacy without the need of a common randomness. An outer bound is given for the considered PD and LN BCs. • We consider a special case of the multi-enrollment key agreement problem, where all measurement channels are separate (i.e., PD BCs) and they have the same transition matrix. This is a common model used for SRAM PUFs [16]. Using a less stringent secrecy leakage constraint that bounds the information leakage for each secret key sep- arately and without the mutual independence constraint on the secret keys, we establish inner and outer bounds for the strong-secrecy key-leakage-storage region for this two-enrollment key agreement problem. The bounds dif- fer only in the Markov chains imposed. This result is a significant improvement to the two-enrollment secret- key rate region (without storage and privacy-leakage rate constraints) established in [18] for weak secrecy, which is recovered by eliminating auxiliary random variables in the proposed rate regions. • All inner and outer bounds for the GS model are extended to the CS model, which comprises secret-key binding methods that embed a chosen secret key to the encoder. • We give two scenarios to compare single-enrollment and two-enrollment models and illustrate that for different assumptions on measurement channels, either of the two models can perform better in terms of the privacy-leakage vs. secret-key rate boundary tuples. 3 D. Organization This paper is organized as follows. In Section II, we describe the multi-entity key agreement problem with BC measure- ments. We give achievable key-leakage-storage regions for the GS and CS models with strong secrecy and BC measurements for any finite number of entities in Section III in addition to inner and outer bounds for PD and LN BCs that satisfy strong privacy. The proposed inner bounds for the two-entity key agreement problem in Section IV are shown to differ from the outer bounds only in the Markov chains imposed for a special case with less stringent secrecy constraints. In Sections V and VI, proofs of the given rate regions for the general multi-entity key agremeent problem and for the two- enrollment key agreement problem, respectively, are given. Section VII concludes the paper. E. Notation Upper case letters represent random variables and lower case letters their realizations. A superscript denotes a string of variables, e.g., Xn=X1, X2, . . . , Xi, . . . , Xn, and a subscript i denotes the position of a variable in a string. A random variable X has probability distribution PX . Calligraphic letters such as X denote sets, set sizes are written as |X | and their complements as X c. [1 : J ] denotes the set {1, 2, . . . , J} for an integer J ≥ 1 and [1 : J ] \ {j} denotes the set {1, 2, , . . . , j − 1, j + 1, . . . , J} for any j ∈ [1 : J ]. Hb(x) = −x log x− (1− x) log(1− x) is the binary entropy function, where we take logarithms to the base 2, and H−1b (·) denotes its inverse with range [0, 0.5]. X ∼ Bern(α) is a binary random variable with Pr[X = 1] = α. A binary symmetric channel (BSC) with crossover probability p is denoted by BSC(p). Q(·) is the Q-function that gives the tail probability for the standard normal distribution. II. PROBLEM DEFINITIONS Consider hidden identifier outputs Xn that are i.i.d. ac- cording to a probability distribution PX . If there are a finite number J of trusted entities that use the same identifer, the j-th encoder and decoder pair observes noisy source measurements that are outputs of a BC P X̃jYj |X , with abuse of notation, for j ∈ [1 : J ], where X̃j , Yj , and X are finite sets. For the GS model shown in Fig. 1(a) for J = 2 trusted entities, the j-th encoder fGS,j(·) generates helper data Wj and a secret key Sj from X̃nj . All secret keys are stored in a secure database, whereas helper data are stored in a public database so that an eavesdropper has access only to the helper data. Using the helper data Wj and the noisy measurements Y nj , the j-th decoder gj(·, ·) generates the key estimate Ŝj . Similar steps are applied for the CS model in Fig. 1(b) also for J = 2 trusted entities, except that each Sj should be embedded into the j-th encoder fCS,j(·, ·). Denote a set of secret keys as SK = {Sj : j ∈ K} (1) and a set of helper data as WK = {Wj : j ∈ K} (2) PX (S1,W1) (a) = fGS,1(X̃ n 1 ) W1 (b) = fCS,1(X̃ n 1 , S1) Key Database Public Database = ? P X̃1Y1|X Ŝ1 = g1 (Y n 1 ,W1) Xn Y n1 S1 S1 W1 Ŝ1 X̃n1 (b)(a) (a) (b) (S2,W2) (a) = fGS,2(X̃ n 2 ) W2 (b) = fCS,2(X̃ n 2 , S2) Key Database Public Database = ? P X̃2Y2|X Ŝ2 = g2 (Y n 2 ,W2) Y n2 S2 S2 W2 Ŝ2 X̃n2 (b)(a) (a) (b) Fig. 1. Illustration of the multi-entity key agremeent problem for J = 2 entities with encoder and decoder measurements through BCs for (a) the GS model and (b) the CS model. for any K ⊆ [1 : J ]. A (secret-key, privacy-leakage, storage), or key-leakage-storage, rate tuple is denoted as (Rs, R`, Rw). Similarly, we denote a set of secret-key rates, for any K ⊆ [1 : J ], as Rs,K = {Rs,j : j ∈ K} (3) and a set of storage rates as Rw,K = {Rw,j : j ∈ K}. (4) We next define the key-leakage-storage regions for the GS and CS models. Definition 1. A key-leakage-storage rate tuple (Rs,[1:J], R`,Rw,[1:J]) is achievable for the GS and CS models with j-th encoder and decoder measurements through a BC P X̃jYj |X if, given any δ>0, there is some n≥1, and J encoder and decoder pairs for which Rs,j = log |Sj | n for all j ∈ [1 : J ] and Pr   ⋃ j∈[1:J] {Sj 6= Ŝj}   ≤ δ (reliability) (5) 4 1 n H(Sj) ≥ Rs,j − δ, ∀j∈ [1 : J ] (key uniformity) (6) I (SK;SKc) ≤ δ, ∀K⊆ [1 : J ] (key ind.) (7) 1 n I(Xn;W[1:J])≤R`+δ (privacy) (8) I ( S[1:J];W[1:J] ) ≤ δ (strong secrecy) (9) 1 n log |Wj | ≤ Rw,j+δ, ∀j∈ [1 : J ] (storage). (10) The key-leakage-storage regions Cgs for the GS model and Ccs for the CS model are the closures of the set of all achievable rate tuples (Rs,[1:J], R`,Rw,[1:J]). Both secret-key uniformity (6) and storage rate (10) con- straints correspond to J separate constraints. However, relia- bility (5), strong and mutual key independence (7), privacy- leakage rate (8), and secrecy leakage (9) constraints are joint constraints for all J trusted entities. The mutual key independence constraint in (7) is not im- posed in the multi-enrollment key agreement problem consid- ered in [16]. Furthermore, a normalized (weak) version of this constraint is imposed in the multi-enrollment key agreement problem considered in [14], where the j-th decoder gj(·, ·) is assumed to have access to the set of helper data W[1:j] for all j ∈ [1 : J ]. The lack of the mutual key independence constraint and the assumption of availability of all previous helper data require that different encoder and decoder pairs should trust each other. This can be the case, e.g., if all enrollments are made by the same entity. Therefore, the multi- entity key agreement problem imposes strictly more stringent constraints than the multi-enrollment key agreement problem. The unnormalized secrecy leakage constraint (9) provides strong secrecy, which is a stronger notion than the weak secrecy considered in [9], [10], [12], [14], [16], [28]. Further- more, (9) is more stringent than the set of individual secrecy leakage constraints I(Sj ;W[1:J]) imposed for all j ∈ [1 : J ], considered in [16] for symmetric SRAM PUF outputs in combination with the suboptimal FCS. The unnormalized privacy leakage I(Xn;W[1:J]) cannot be bounded by a finite number in general. We illustrate special strong privacy cases in the next section. III. INNER BOUNDS We are interested in characterizing the optimal trade-off among the secret-key, privacy-leakage, and storage rates with strong secrecy for BC measurements at the encoders and decoders of any finite number J of entities that use the same hidden identifier outputs. We give achievable rate regions for the GS and CS models in Theorem 1. The proofs are given in Section V. Denote UK = {Uj : j ∈ K} (11) and define a function max{·, ·} that gives the maximum of the input values as its output. Theorem 1 (Inner Bounds for Multi-entity GS and CS Mod- els). An achievable rate region Rgs for the GS model with J entities is the union over all P Uj |X̃j for all j ∈ [1 : J ] of the rate tuples such that Rs,j ≥ 0 for all j ∈ [1 : J ] and Rs,j ≤ I(Uj ;Yj)− I(Uj ;U[1:J]\{j}), ∀j ∈ [1 : J ] (12) R` ≥ J∑ j=1 max{0, I(Uj ;X)−I(Uj ;Yj)}, (13) Rw,j≥I(Uj ; X̃j)− I(Uj ;Yj), ∀j ∈ [1 : J ] (14) Rs,j +Rw,j ≤ H(Uj | U[1:J]\{j}), ∀j ∈ [1 : J ]. (15) An achievable rate region Rcs for the CS model with J entities is the union over all P Uj |X̃j for all j ∈ [1 : J ] of the rate tuples such that Rs,j ≥ 0 for all j ∈ [1 : J ], (12), (13), and Rw,j≥I(Uj ; X̃j)− I(Uj ;U[1:J]\{j}), ∀j ∈ [1 : J ] (16) Rw,j ≤ H(Uj | U[1:J]\{j}), ∀j ∈ [1 : J ]. (17) For the achievable rate regions Rgs and Rcs, we have PU[1:J]X̃[1:J]XY[1:J] = PX J∏ j=1 P Uj |X̃j P X̃jYj |X . (18) Corollary 1. Suppose for all j ∈ [1 : J ] that • X̃j−Yj−X form a Markov chain, i.e., X is a PD version of Yj with respect to X̃j , or • P XYj |X̃j is a LN BC with I(Uj ;Yj) ≥ I(Uj ;X) for all P Uj |X̃j . For these cases, strong privacy, i.e., R` ≥ 0 (19) can be achieved for the GS and CS models in combination with the other corresponding bounds given in Theorem 1. The proof of Corollary 1 follows from Theorem 1 because I(Uj ;X) − I(Uj ;Yj) ≤ 0 for all j ∈ [1 : J ] for BCs considered in Corollary 1. Corollary 1 illustrates that it is possible to obtain strong privacy, i.e., negligible unnormalized privacy leakage, without the requirement of a common randommness that is hidden from an eavesdropper assumed in [9], [10], [24]. This is the case because the observation Y nj of each decoder is “better” than the observation X̃nj of the corresponding encoder with respect to the hidden source Xn for all entities. Remark 1. The rate regions for our problem depend on the joint conditional probability distributions P XYj |X̃j rather than only the marginal conditional distributions. Thus, the key- leakage-storage regions for the stochastically-degraded BCs are not necessarily equal to the regions for the corresponding PD BCs, unlike in the classic BC problem. Furthermore, since PX̃[1:J]XY[1:J] is fixed, the distinction between the LN BCs and essentially-less noisy BCs [29], is not necessary. We next give simple outer bounds for the key-leakage- storage regions Cgs for the GS model and Ccs for the CS model when the BCs P XYj |X̃j for all j ∈ [1 : J ] are PD BCs or LN BCs as defined in Corollary 1. These simple outer bounds give insights into the reason for different bounds on the secret-key rates. Based on these insights, we show a special case in the 5 next section with a less stringent secrecy constraint, for which the inner and outer bounds differ only in the Markov chains imposed and we illustrate that they match for simpler models. Lemma 1. Suppose one of the cases given in Corollary 1 is satisfied by the BCs P XYj |X̃j for all j ∈ [1 : J ]. An outer bound on the key-leakage-storage region Cgs is the union over all P Uj |X̃j , where Uj − X̃j − (X,Yj) form a Markov chain, for all j ∈ [1 : J ] of the rate tuples such that Rs,j ≥ 0 for all j ∈ [1 : J ], (14), (19), and Rs,j ≤ I(Uj ;Yj), ∀j ∈ [1 : J ]. (20) An outer bound to the key-leakage-storage region Ccs for the same BCs P XYj |X̃j is the union over all P Uj |X̃j , where Uj − X̃j − (X,Yj) form a Markov chain, for all j ∈ [1 : J ] of the rate tuples such that Rs,j ≥ 0 for all j ∈ [1 : J ], (19), (20), and Rw,j ≥ I(Uj ; X̃j), ∀j ∈ [1 : J ]. (21) The proof of Lemma 1 follows straightforwadly by fol- lowing the steps in [12, Section VI], defining the auxiliary random variables Uj,i = (Sj ,Wj , Y i−1 j ) for all j ∈ [1 : J ] and i ∈ [1 : n], and by bounding I(Xn;W[1:J]) ≥ 0; therefore, we omit the proof. The outer bounds do not include the inequalities in (15) and (17). Furthermore, the secret-key rate achieved by the inner bound in (12) is smaller than the outer bound given in (20), where the difference is the term −I(Uj ;U[1:J]\{j}). This term is a result of the constraint in (44) that is imposed to satisfy the strong and mutual key independence constraint given in (7). Therefore, we next consider a model without the constraint in (7) and use a secrecy-leakage constraint that is less stringent than the one in (9), i.e., replace (9) by I(Sj ;W[1:J]) ≤ δ, ∀j ∈ [1 : J ] (22) which is also a strong secrecy metric. Due to the lack of a mutual key independence constraint, the model in the next section is not a multi-entity model but rather a multi- enrollment model. For a special case of this multi-enrollment key agreement problem, we establish inner and outer bounds for the key-leakage-storage regions that comprise the same bounds but for different Markov chains. IV. BOUNDS FOR A MULTI-ENROLLMENT MODEL Consider J = 2 entities that measure the noisy outputs of the same hidden source Xn through separate channels that have the same channel transition matrices, i.e., for all j ∈ [1 : 2], x̃j ∈ X̃ , and yj ∈ X̃ we have P X̃jYj |X (x̃j , yj |x) = PX̃|X(x̃j |x)PX̃|X(yj |x). (23) This model is commonly used for, e.g., SRAM PUFs [30]. Using (23), we define a new multi-enrollment model. Definition 2. A key-leakage-storage rate tuple ( sRs,1, sRs,2, sR`, sRw,1, sRw,2) is achievable for the GS and CS models with measurements through a BC P X̃Y |X(x̃, y|x) as in (23) if, given any δ > 0, there is some n ≥ 1, and two encoder and decoder pairs for which sRs,1 = log |S1| n , sRs,2 = log |S2| n , sRw,1 = H(W1) n , sRw,2 = H(W2) n , and Pr [ {S1 6= Ŝ1} ⋃ {S2 6= Ŝ2} ] ≤ δ (reliability) (24) 1 n H(Sj) = sRs,j − δ, j = 1, 2 (key uniformity) (25) 1 n I(Xn;W1,W2)= sR`+δ (privacy) (26) I (Sj ;W1,W2) ≤ δ, j = 1, 2 (strong secrecy) (27) 1 n log |Wj | = sRw,j+δ, j = 1, 2 (storage) (28) I(W1;W2) ≤ δ (storage ind.). (29) The key-leakage-storage regions sCgs,J=2 for the GS model and sCcs,J=2 for the CS model are the closures of the set of all achievable rate tuples ( sRs,1, sRs,2, sR`, sRw,1, sRw,2). We characterize in Theorem 2 inner and outer bounds for key-leakage-storage regions sCgs,J=2 and sCcs,J=2. The proofs of Theorem 2 are given in Section VI, where the reason for the necessity of the secrecy-leakage constraint in (27) that is less stringent than the joint secrecy-leakage constraint in (9) is given in Remark 2. Similarly, the reason for the necessity of the strong helper data (storage) independence constraint in (29) is discussed in Remark 4. Denote j′ = 3− j, j = 1, 2. (30) Theorem 2. (Inner Bounds): An achievable key-leakage- storage region ĎRgs,J=2 is the union over all PU1|X̃1 and P U2|X̃2 of the rate tuples such that sRs,j ≥ 0 for j = 1, 2 and sRs,j ≤ I(Uj ;Yj), j = 1, 2 (31) sR` ≥ 2∑ j=1 ( I(Uj ;X)−I(Uj ;Yj) ) , (32) sR` ≤ 2∑ j=1 ( I(Uj ;X)−I(Uj ; X̃j)+ sRw,j ) , (33) sRw,j≥I(Uj ; X̃j)− I(Uj ;Yj), j = 1, 2 (34) sRs,j + sRw,j ≤ H(Uj), j = 1, 2 (35) sRs,j + sRw,j + sRw,j′ ≤ H(Uj , Uj′), j = 1, 2. (36) An achievable key-leakage-storage region ĎRcs,J=2 is the union over all P U1|X̃1 and P U2|X̃2 of the rate tuples such that sRs,j ≥ 0 for j = 1, 2, (31)-(33), and sRw,j≥I(Uj ; X̃j), j = 1, 2 (37) sRw,j ≤ H(Uj), j = 1, 2 (38) sRw,j+ sRw,j′≤H(Uj , Uj′)+ sRs,j′ , j = 1, 2. (39) For both achievable rate regions ĎRgs,J=2 and ĎRcs,J=2, we 6 have P U1U2X̃1X̃2XY1Y2 (u1, u2, x̃1, x̃2, x, y1, y2) = P U1|X̃1 (u1|x̃1)PU2|X̃2(u2|x̃2)PX̃|X(x̃1|x)PX̃|X(x̃2|x) × P X̃|X(y1|x)PX̃|X(y2|x)PX(x). (40) (Outer Bounds) An outer bound for the key-leakage-storage region sCgs,J=2 is the union over all PU1|X̃1 and PU2|X̃2 of the rate tuples such that sRs,j ≥ 0, (31) - (36), and Uj − X̃j − X − Yj form a Markov chain for j = 1, 2. An outer bound for the key-leakage-storage region sCcs,J=2 is the union over all P U1|X̃1 and P U2|X̃2 of the rate tuples such that sRs,j ≥ 0, (31) - (33), (37) - (39), and Uj − X̃j −X −Yj form a Markov chain for j = 1, 2. The inner and outer bounds differ because the outer bounds define rate regions for the Markov chains U1 − X̃1 −X − Y1 and U2− X̃2−X −Y2, which are larger than the rate regions defined by the inner bounds that satisfy (40). For instance, in the achievability proof of Theorem 2, we apply the properties of the Markov chain U2 − X̃2 − U1 in (87)(b), which does not form a Markov chain for the choice of U1 and U2 in the outer bounds. Therefore, inner and outer bounds do not match in general. Corollary 2. Choosing U1 = X̃1 and U2 = X̃2, it is straight- forward to show that inner and outer bounds in Theorem 2 match if we do not impose any storage or privacy constraints, i.e., impose only (24), (25), and (27). This result improves on the secret-key capacity region given in [18, Theorem 1] for a weak secrecy constraint. Example 1. Consider the RO PUF model from [25, Section 4.1] where a transform-coding method is applied to conser- vatively model the measurement channels PY |X = PX̃|X as independent BSCs with the same crossover probability of pA and where the hidden source output is Bern( 1 2 ). We therefore can apply the achievability results from Theorem 2 to this RO PUF model. Using [12, Theorem 3] to evaluate the boundary tuples of ĎRgs,J=2, it suffices to consider probability distributions P Uj |X̃j for j = 1, 2 such that P X̃j |Uj are BSCs with crossover probabilities x̃j = H−1b (H(X|Uj))− pA 1− 2pA . (41) Consider the projection of the boundary tuples of ĎRgs,J=2 onto key-leakage plane, i.e., (31) and (32). We plot in Fig. 2 single- enrollment results where the privacy-leakage rate is measured with respect to single helper data and two-enrollment results for the sum rate of the two keys, both for pA = 0.06 [25]. To achieve a total secret-key rate of I(X̃1;Y1) = I(X̃2;Y2), the privacy-leakage rate for the two-enrollment model is approximately 13.5% less than the privacy-leakage rate for the single-enrollment model for RO PUFs. The reason for this gain is the information bottleneck problem that arises from (31) and (32) to find the boundary tuples. Example 2. Consider uniform binary antipodal measurements over an additive white Gaussian noise (AWGN) channel. 0 0.05 0.1 0.15 0.2 0 0.1 0.2 0.3 0.4 0.5 0.6 Privacy-leakage Rate sR` (bits/symbol) S ec re t- ke y R at e s R s (b it s/ sy m bo l) Single Enrollment Two-enrollment Sum Rate Fig. 2. Privacy-leakage vs. secret-key rate projection of the boundary tuples of the single- and two-enrollment RO PUF models with BSCs(pA = 0.06). Define the signal power as PS and the noise power as PN, so we have a signal-to-noise ratio (SNR) of SNR = PS PN . If a matched filter, which maximizes the SNR at the sampling instant for the AWGN channel, is applied at the encoder and decoder, the bit error probability Pb is given by [31, pp. 96] Pb = Q (√ SNR ) . (42) The channel between the input binary symbols and the outputs of the matched filter is a BISO channel. Using [12, Theorem 3], we have that P X̃j |Uj for j = 1, 2 that are BSCs with crossover probabilities given in (41) by replacing pA with Pb, suffice to obtain the boundary tuples of ĎRgs,J=2. We remark that pA = 0.06 used in Example 1 corresponds to an SNR of approximately 3.83dB. In Fig. 3, the privacy-leakage rate vs. secret-key rate bound- ary tuples are depicted for two cases. First, a two-enrollment model at SNR = 3.83dB with a sum rate for secret keys is depicted. For comparison, we plot a single-enrollment model where the signal power Ps is doubled, i.e., we have an SNR of approximately 6.84dB. Fig. 3 shows for the two cases with the same total signal power of 2Ps that the single enrollment boundary tuple can result in a gain of approximately 228.55% at the corner point in terms of the secret-key rates achieved for a given privacy- leakage rate. For such an AWGN channel with a fixed total signal power; therefore, the single-enrollment model can result in significant gains in terms of achieved secret-key rates as compared to the two-enrollment model for small sR` values. V. PROOF OF THEOREM 1 We provide a proof that follows from the output statistics of random binning (OSRB) method, proposed in [32] and further extended in [33], by applying the steps in [34, Section 1.6]. 7 0 0.02 0.04 0.06 0.08 0.1 0 0.2 0.4 0.6 0.8 1 Privacy-leakage Rate sR` (bits/symbol) S ec re t- ke y R at e s R s (b it s/ sy m bo l) Single Enrollment @SNR=6.84dB. Two-enrollment Sum Rate @SNR=3.83dB Fig. 3. Privacy-leakage vs. secret-key rate projection of the boundary tuples of the single- and two-enrollment RO PUF models with different SNRs. A. Proof for the GS Model Proof Sketch: Fix P U1|X̃1 , P U2|X̃2 , . . . , P UJ |X̃J . Let (Un [1:J] , X̃n [1:J] , Xn,Yn [1:J] ) be i.i.d. according to (18). Assign three random bin indices (Sj ,Wj , Cj) to each realization unj for all j ∈ [1 : J ], where Sj represents the secret key, Wj the helper data, and Cj a public index. Assume Sj ∈ [1 : 2nRs,j ], Wj ∈ [1 : 2nRw,j ], and Cj ∈ [1 : 2nRc,j ] such that Rs,j , Rw,j , Rc,j ≥ 0 for all j ∈ [1 : J ]. Apply the union bound to the reliability constraint in (5) to obtain the sum of J error probabilities. This sum vanishes for any finite number J when n → ∞ by using a Slepian-Wolf (SW) [35] decoder to estimate Unj from (Cj ,Wj , Y n j ) if [32, Lemma 1] Rc,j +Rw,j > H(Uj |Yj), ∀j ∈ [1 : J ]. (43) The key uniformity (6), mutual key independence (7), and strong secrecy (9) constraints are satisfied if [32, Theorem 1] Rs,j+Rw,j+Rc,j < H(Uj | U[1:J]\{j}), ∀j ∈ [1 : J ] (44) since (44) ensures that the three random indices (Sj ,Wj , Cj) are almost mutually independent and uniformly distributed, and they are almost independent of U[1:J]\{j}. Therefore, (Sj ,Wj , Cj) are almost independent of ( S[1:J]\{j},W[1:J]\{j}, C[1:J]\{j} ) because Unk determines (Sk,Wk, Ck) for all k ∈ [1 : J ]. Similarly, the public randomness Cj is almost independent of X̃nj , so it is almost independent of (X̃ n [1:J] , Xn,Yn [1:J] ), if we have [32, Theorem 1] Rc,j < H(Uj |X̃j), ∀j ∈ [1 : J ]. (45) Thus, the public indices C[1:J] can be fixed by generating them uniformly at random. The j-th encoder can generate Unj ac- cording to P Un j |X̃n j Cj obtained from the binning scheme above to compute the bins (Sj ,Wj) from Unj for all j ∈ [1 : J ]. This procedure induces a joint probability distribution that is almost equal to PU[1:J]X̃[1:J]XY[1:J] fixed in (18) [34, Section 1.6]. Applying the Fourier Motzkin elimination [36] using the software available in [37] to (43)-(45) for each j ∈ [1 : J ] separately, we obtain the inequalities Rw,j > I(Uj ; X̃j)− I(Uj ;Yj) (46) Rs,j < I(Uj ;Yj)− I(Uj ;U[1:J]\{j}) (47) Rw,j +Rs,j < H(Uj |U[1:J]\{j}) (48) for all j ∈ [1 : J ]. To satisfy the constraints (46)-(48), we can fix the rates to Rs,j = I(Uj ;Yj)−I(Uj ;U[1:J]\{j})−2�, ∀j ∈ [1 : J ] (49) Rw,j = I(Uj ; X̃j)− I(Uj ;Yj) + 2�, ∀j ∈ [1 : J ] (50) Rc,j = H(Uj |X̃j)− �, ∀j ∈ [1 : J ] (51) for some � > 0 such that �→ 0 when n→∞. Consider the privacy leakage. Since C[1:J] are public, we can bound the privacy leakage as follows. I(Xn;W[1:J], C[1:J]) (a) ≤ I(Xn;W[1:J]|C[1:J]) + J�n ≤ H(W[1:J])−H(W[1:J], C[1:J]|Xn) +H(C[1:J]) + J�n (b) = H(W[1:J])− J∑ j=1 H(Wj , Cj |Xn) +H(C[1:J]) + J�n ≤ J∑ j=1 ( H(Wj)+H(Cj)−H(Wj , Cj |Xn) ) +J�n (52) where (a) follows from the fact that Cj is almost independent of (X̃n [1:J] , Xn,Yn [1:J] ) for all j ∈ [1 : J ] due to (45). Therefore, Cj is almost independent of (Xn, C[1:J]\{j}) because Unk determines Ck and Unk − X̃ n k − X̃ n j − U n j form a Markov chain for all k 6= j and j, k ∈ [1 : J ], so we have I(Xn; C[1:J]) = I(Xn;C1) + I(X n;C2|C1) + . . .+ I(Xn;CJ |C[1:J−1]) ≤ J.�n (53) for some �n > 0 such that �n → 0 when n→∞; (b) follows because (Wj , Cj)−Xn−(W[1:j−1], C[1:j−1]) form a Markov chain for all j ∈ [2 : J ]. Consider two cases for the privacy leakage analysis. Case 1: Suppose for any j ∈ [1 : J ] that we have Rc,j +Rw,j < H(Uj |X) (54) i.e., H(Uj |X) > H(Uj |Yj), so (Wj , Cj , Xn) are almost mutually independent [32, Theorem 1]. Therefore, we have H(Wj)+H(Cj)−H(Wj , Cj |Xn) ≤ H(Wj)+H(Cj)−(H(Wj) +H(Cj)− �′n) = � ′ n (55) for some �′n > 0 such that � ′ n → 0 when n→∞. Combining (52) and (55) proves strong privacy. Case 2: Suppose for any j ∈ [1 : J ] that we have Rc,j +Rw,j ≥ H(Uj |X) (56) 8 i.e., H(Uj |X) ≤ H(Uj |Yj), so (Wj , Cj , Xn) can reliably estimate Unj [32, Lemma 1]. Therefore, we have H(Wj)+H(Cj)−H(Wj , Cj |Xn) (a) ≤ H(Wj)+H(Cj)−nH(Uj |X) + n�′′n (b) ≤ n(I(Uj ;X)− I(Uj ;Yj) + �+ �′′n) (57) where (a) follows because Unj determines (Wj , Cj), (Wj , Cj , X n) can realiably estimate Un for some �′′n > 0 such that �′′n → 0 when n→∞, and (Unj , X n) are i.i.d., and (b) follows by (50) and (51). Combining (52) and (57), we obtain I(Xn;W[1:J], C[1:J])− J�n ≤ J∑ j=1 j: H(Uj |X)≤H(Uj |Yj) n(I(Uj ;X)−I(Uj ;Yj)+�+�′′n). (58) Using the selection lemma [38, Lemma 2.2], these prove the achievability of the rate region Rgs. B. Proof for the CS Model We use the achievability proof for the GS model. Suppose the key S′j , generated as in the GS model together with the helper data W ′j and public index C ′ j , have the same cardinality as the corresponding embedded secret key Sj , i.e., |S ′j | = |Sj | for all j ∈ [1 : J ]. The chosen key Sj is uniformly distributed and independent of (Xn, X̃n [1:J] ,Yn [1:J] ,S[1:J]\{j}) for all j ∈ [1 : J ]. Consider the j-th encoder fcs,j(·, ·) with inputs (X̃nj , Sj) and output Wj = (S ′ j +Sj ,W ′ j), and the j-th decoder gj(·, ·) with inputs (Y nj ,Wj) and output Ŝj = S ′ j + Sj − Ŝ′j . All addition and subtraction operations are modulo- |Sj | for all j ∈ [1 : J ]. The j-th decoder of the GS model is used to obtain Ŝ′j for all j ∈ [1 : J ]. We have the error probability Pr   ⋃ j∈[1:J] {Sj 6= Ŝj}   = Pr   ⋃ j∈[1:J] {S′j 6= Ŝ ′ j}   (59) which is small due to the proof of achievability for the GS model. Using (49) and (50), and from the one-time padding oper- ation applied above, we can achieve a storage rate of Rw,j ≥ I(Uj ; X̃j)− I(Uj ;U[1:J]\{j}), ∀j ∈ [1 : J ] (60) for the CS model. We have the secrecy leakage of I(S[1:J];W[1:J], C′[1:J]) (a) = I(S[1:J];W[1:J]|C′[1:J]) =I(S[1:J];W ′[1:J]|C ′ [1:J])+I(S[1:J]; (S ′+S)[1:J]|W ′ [1:J], C ′ [1:J]) (b) = H((S ′+S)[1:J]|W ′ [1:J], C ′ [1:J])−H(S ′ [1:J]|W ′ [1:J], C ′ [1:J]) (c) ≤ n ( J∑ j=1 Rs,j ) −H(S ′[1:J]|C ′ [1:J]) + I(S ′ [1:J];W ′ [1:J]|C ′ [1:J]) (d) ≤ n ( J∑ j=1 Rs,j ) − ( n ( J∑ j=1 Rs,j ) − �′′′n ) + I(S ′[1:J];W ′ [1:J]|C ′ [1:J]) (e) ≤ �′′′n + � (4) n (61) where (a) follows since S[1:J] are chosen independently of the public indices C[1:J], (b) follows because S[1:J] are chosen independently of (W ′ [1:J] , C′ [1:J] ,S ′ [1:J] ), (c) follows because |S ′j | = |Sj | for all j ∈ [1 : J ], (d) follows because S ′ [1:J] and C′ [1:J] are almost mutually independent and each S′j is almost uniformly distributed due to (44) for some �′′′n > 0 such that �′′′n → 0 when n→∞, and (e) follows because the GS model satisfies the strong secrecy constraint (9) due to (44) for some � (4) n > 0 such that � (4) n → 0 when n→∞. Consider the privacy leakage: I(Xn;W[1:J], C′[1:J]) (a) ≤ I(Xn;W[1:J]|C′[1:J]) + J�n ≤ I(Xn;W ′[1:J]|C ′ [1:J]) +H((S + S ′)[1:J]|W ′[1:J], C ′ [1:J]) −H((S + S ′)[1:J]|Xn,W ′[1:J], C ′ [1:J],S ′ [1:J]) + J�n (b) ≤ I(Xn;W ′[1:J]|C ′ [1:J])+ ( J∑ j=1 log(|Sj |) ) −H(S[1:J])+J�n (c) = I(Xn;W ′[1:J]|C ′ [1:J]) + J�n (62) where (a) follows by (53), (b) follows because S[1:J] are chosen independently of (Xn,W ′ [1:J] ,S ′ [1:J] , C′ [1:J] ) and |S ′j | = |Sj | for all j ∈ [1 : J ], and (c) follows from the uniformity and mutual independence of S[1:J]. Using the selection lemma, these prove the achievability of the rate region Rcs. VI. PROOF OF THOREM 2 We use the OSRB method steps in [34, Section 1.6]. A. Achievability Proof for the GS Model Fix P U1|X̃1 = P U2|X̃2 = P U |X̃ . (63) Let (Un1 , U n 2 , X̃ n 1 , X̃ n 2 , X n, Y n1 , Y n 2 ) be i.i.d. according to (40). Assign three random bin indices (Sj ,Wj , Cj) to each realization unj for all j = 1, 2. Assume Sj ∈ [1 : 2 nĎRs,j ], Wj ∈ [1 : 2n ĎRw,j ], and Cj ∈ [1 : 2n ĎRc,j ] such that sRs,j , sRw,j , sRc,j ≥ 0 for j = 1, 2. Apply the union bound to the reliability constraint in (24), which vanishes when n → ∞ by using an SW decoder to estimate Unj from (Cj ,Wj , Y n j ) if [32, Lemma 1] sRc,j + sRw,j > H(Uj |Yj), j = 1, 2. (64) The key uniformity (25) constraint is satisfied if [32, The- orem 1] sRs,j+ sRw,j+ sRc,j < H(Uj), j = 1, 2 (65) since (65) ensures that the three random indices (Sj ,Wj , Cj) are almost mutually independent and uniformly distributed. 9 Suppose a virtual joint encoder assigns six indices (S1,W1, C1, S2,W2, C2) to each realization pair (un1 , u n 2 ). This virtual encoder is an operational dual of the virtual decoder used in the proof of [18, Theorem 1]. Using the virtual joint encoder, the strong secrecy constraint in (27) and the strong helper data independence constraint in (29) are satisfied if [32, Theorem 1] sRs,1+ sRw,1+ sRc,1+ sRw,2+ sRc,2 < H(U1, U2) (66) and sRs,2+ sRw,2+ sRc,2+ sRw,1+ sRc,1 < H(U1, U2) (67) because (66) ensures that (S1,W1, C1,W2, C2) are al- most mutually independent; whereas, (67) ensures that (S2,W2, C2,W1, C1) are almost mutually independent. Remark 2. The set of equations considered in (65)-(67) cannot be imposed for the joint secrecy-leakage constraint in (9) for general probability distributions P X̃1X̃2XY1Y2 , since to impose (9) one would replace (66) and (67) with sRs,1+ sRw,1+ sRc,1+ sRs,2 + sRw,2+ sRc,2 < H(U1, U2) (68) which would also imply the mutual independence of secret keys in (7). However, the inequalities in (65) and (68) cannot be satisfied simultaneously in general as H(U1) + H(U2) ≥ H(U1, U2). This problem is avoided in the proof of Theorem 1 by imposing the inequality in (44) rather than (65). The public randomness Cj is almost independent of X̃nj , so it is almost independent of (X̃n1 , X̃ n 2 , X n, Y n1 , Y n 2 ), if we have [32, Theorem 1] sRc,j < H(Uj |X̃j), j = 1, 2. (69) Thus, the public indices (C1, C2) can be fixed by generating them uniformly at random. Unj can be generated according to P Un j |X̃n j Cj for j = 1, 2 obtained from the binning scheme above to compute the bins (Sj ,Wj) from Unj for j = 1, 2. This procedure induces a joint probability distribution that is almost equal to P U1U2X̃1X̃2XY1Y2 that is fixed in (40) [34, Section 1.6]. Applying the Fourier Motzkin elimination to (64)-(67) and (69), we obtain the inequalities sRw,1 > H(U1|Y1)−H(U1|X̃1) (70) sRw,2 > H(U2|Y2)−H(U2|X̃2) (71) sRs,1 < I(U1;Y1) (72) sRs,2 < I(U2;Y2) (73) sRs,1 < −H(U1|Y1)−H(U2|Y2) +H(U1, U2) (74) sRs,2 < −H(U1|Y1)−H(U2|Y2) +H(U1, U2) (75) sRs,1 + sRw,2 < −H(U1|Y1) +H(U1, U2) (76) sRs,1 + sRw,1 < H(U1) (77) sRs,1 + sRw,1 < −H(U2|Y2) +H(U1, U2) (78) sRs,1 + sRw,1 + sRw,2 < H(U1, U2) (79) sRs,2 + sRw,2 < −H(U1|Y1) +H(U1, U2) (80) sRs,2 + sRw,2 < H(U2) (81) sRs,2 + sRw,1 < −H(U2|Y2) +H(U1, U2) (82) sRs,2 + sRw,2 + sRw,1 < H(U1, U2). (83) Observe that we have H(U1|X̃2) = H(U1|Y1) = H(U2|X̃1) = H(U2|Y2) (84) H(U1|X̃1) = H(U2|X̃2) (85) H(U1) = H(U2) (86) due to (23) and (63). We therefore obtain H(U1, U2)−H(U1|Y1) (a) = H(U2)+H(U1|U2)−H(U1|X̃2) (b) ≥ H(U2) (87) where (a) follows by (84) and (b) follows from the Markov chain U2−X̃2−U1. A similar result can be shown by swaping the indices. Therefore, the constraints in (78) and (80) are inactive due to the constraints, respectively, in (77) and (81) for the two-enrollment model given in Definition 2. Similarly, the constraints in (74) and (75) are inactive due to the constraints, respectively, in (72) and (73). Replace the inequalities in (76) and (82), respectively, with 2 sRs,1 + sRw,1 + sRw,2 < I(U1;Y1) +H(U1, U2) (88) 2 sRs,2 + sRw,2 + sRw,1 < I(U2;Y2) +H(U1, U2). (89) Then, (88) is inactive because (72) and (79) imply (88), and (89) is inactive because (73) and (83) imply (89). We remark that rate region represented by (70)-(83) is the same as the region represented by replacing (76) and (82) with (88) and (89) because the corner points of the two rate regions are the same. Therefore, the inequalities in (76) and (82) are inactive. To satisfy the constraints (70)-(83), we can fix the rates to sRs,j = I(Uj ;Yj)−5�, j = 1, 2 (90) sRw,j = I(Uj ; X̃j)− I(Uj ;Yj) + 2�, j = 1, 2 (91) sRc,j = H(Uj |X̃j)− �, j = 1, 2 (92) for some � > 0 such that �→ 0 when n→∞ due to (84)-(87). Since C1 and C2 are public, we can bound the privacy leakage as follows. I(Xn;W1,W2, C1, C2) (a) ≤ I(Xn;W1,W2|C1, C2) + 2�n (b) ≤ H(W1,W2)−H(W1, C1|Xn)−H(W2, C2|Xn) +H(C1, C2) + 2�n (c) ≤ H(W1) +H(W2)−H(Un1 |X n)−H(Un2 |X n) + 2n�′′n +H(C1) +H(C2) + 2�n (93) (d) ≤ n(I(U1;X)− I(U1;Y1) + I(U2;X)− I(U2;Y2)) + 2n�′′n + 2n�+ 2�n (94) where (a) follows by (53) for J = 2, (b) follows because (W1, C1)−Xn− (W2, C2) form a Markov chain, (c) follows for some �′′n > 0 such that � ′′ n → 0 when n→∞ because for the two-enrollment model considered, (56) is satisfied due to the Markov chain Uj −X − Yj for j = 1, 2, and (d) follows by (91) and (92), and because (Un1 , U n 2 , X n) are i.i.d. 10 Using (93) for general rate tuples that satisfy the constraints (70)-(83), i.e., not only (90)-(92), we can bound the privacy leakage as I(Xn;W1,W2, C1, C2) (a) ≤ n sRw,1 + n sRw,2 + nI(U1;X)− nI(U1; X̃1) + nI(U2;X)− nI(U2; X̃2) + 2n�′′n + 2�n (95) where (a) follows by (92) and because (Un1 , U n 2 , X n) are i.i.d. Using the selection lemma, these prove the achievability of the key-leakage-storage region ĎRgs,J=2. B. Achievability Proof for the CS Model The achievability proof for the CS model follows by apply- ing the one-time padding step used in Section V-B. C. Outer Bound Proofs for the GS and CS Models Suppose for some δn>0 and n, there is a pair of encoders and decoders such that (24)-(29) are satisfied by some key- leakage-storage tuple ( sRs,1, sRs,2, sR`, sRw,1, sRw,2). Using (24) and Fano’s inequality, we obtain H(Sj |Wj , Y nj ) (a) ≤ H(Sj |Ŝj)≤n�n, j = 1, 2 (96) where (a) permits randomized decoding, �n = δn max{ sRs,1, sRs,2}+Hb(δn)/n such that �n→0 if δn→0. Let Uj,i , (Sj ,Wj , Xi−1), which satisfies the Markov chain Uj,i − X̃j,i −Xi − Yj,i for all i ∈ [1 : n] and j = 1, 2. Remark 3. For the choice of Uj,i = (Sj ,Wj , Xi−1) (and similarly for Uj,i = (Sj ,Wj , Y i−1 j )) for j=1, 2, U1,i−X̃1,i− U2,i do not form a Markov chain for all i ∈ [1 : n] although for the inner bound we use this Markov chain. This is the reason why inner and outer bounds do not match in general. Proof for (31): We obtain for the GS and CS models for j = 1, 2 that n( sRs,j − δn) (a) ≤ H(Sj)−H(Sj |Wj , Y nj ) + n�n (b) ≤ I(Sj ;Y nj |Wj) + n�n + δn ≤ n∑ i=1 [ I(Sj ,Wj , Y i−1 j ;Yj,i) + �n + δn n ] (c) ≤ n∑ i=1 [ I(Sj ,Wj , X i−1;Yj,i) + �n + δn n ] (d) = n∑ i=1 [ I(Uj,i;Yj,i) + �n + δn n ] (97) (a) follows by (25) and (96), (b) follows by (27), (c) follows by applying the data-processing inequality to the Markov chain Y i−1j − (Wj , Sj , X i−1)− Yj,i, j = 1, 2, ∀i ∈ [1 :n] (98) and (d) follows from the definition of Uj,i. Proof for (32): We have for the GS and CS models that n( sR` + δn) (a) = H(W1,W2)−H(W1|Xn)−H(W2|Xn) (b) = H(W1|Y n1 )−H(W1|X n) +H(W2|Y n2 )−H(W2|X n) + I(W1; X̃ n 2 ) + I(W2;Y n 2 )− I(W1;W2) (c) ≥ 2∑ j=1 [ H(Wj |Y nj )−H(Wj |X n) ] ≥ 2∑ j=1 [ H(Sj ,Wj , Y n j )−H(Sj |Wj , Y n j )−H(Y n j ) −H(Sj ,Wj |Xn) ] (d) ≥ 2∑ j=1 [ I(Sj ,Wj ;X n)− I(Sj ,Wj ;Y nj )− n�n ] (e) ≥ 2∑ j=1 n∑ i=1 [ I(Sj ,Wj , X i−1;Xi)−I(Sj ,Wj , Xi−1;Yj,i)−�n ] (f) = 2∑ j=1 n∑ i=1 [ I(Uj,i;Xi)− I(Uj,i;Yj,i)− �n ] (99) where (a) follows by (26) and from the Markov chain W1 − Xn −W2, (b) follows because I(W1;Y n1 ) = I(W1; X̃n2 ) due to (23), (c) follows from the Markov chain W1−X̃n2 −W2, (d) follows by (96), (e) follows because the channel and source are memoryless and from the Markov chain in (98), and (f) follows from the definition of Uj,i. Proof for (33): We have for the GS and CS models that n( sR` + δn) (a) ≤ H(W1) +H(W2)−H(W1|Xn)−H(W2|Xn) (b) ≤ 2∑ j=1 [ n sRw,j +H(Sj ,Wj |X̃nj )−H(Sj ,Wj |X n) + n�n ] (c) = 2∑ j=1 [ n sRw,j + n∑ i=1 I(Sj ,Wj , X i−1;Xi) − n∑ i=1 I(Sj ,Wj , X̃ i−1 j ; X̃j,i) + n�n ] (d) ≤ 2∑ j=1 [ n sRw,j + n∑ i=1 I(Sj ,Wj , X i−1;Xi) − n∑ i=1 I(Sj ,Wj , X i−1; X̃j,i) + n�n ] (e) ≤ 2∑ j=1 [ n sRw,j + n∑ i=1 (I(Uj,i;Xi)− I(Uj,i; X̃j,i)) + n�n ] (100) where (a) follows by (26) and from the Markov chain W1 − Xn−W2, (b) follows by (96) and from the Markov chain Sj− (Wj , X n)− Y n for j = 1, 2, (c) follows because the channel and source are memoryless, (d) follows from the Markov chain Xi−1−(Wj , Sj , X̃i−1j )−X̃j,i, j = 1, 2, ∀i ∈ [1 :n] (101) 11 and (e) follows from the definition of Uj,i. Proof for (34): Observe for the GS model for j = 1, 2 that n( sRw,j + δn) (a) ≥ H(Wj |Y nj ) + I(Wj ;Y n j ) (b) ≥ H(Sj ,Wj , Y nj )−H(Y n j )−H(Sj |Wj , Y n j ) −H(Sj ,Wj |X̃nj ) + I(Wj ;Y n j ) (c) ≥ I(Sj ,Wj ; X̃nj )− I(Sj ,Wj ;Y n j )− n�n (d) = n∑ i=1 [I(Sj ,Wj , X̃ i−1 j ; X̃j,i)−I(Sj ,Wj , Y i−1 j ;Yj,i)−n�n] (e) ≥ n∑ i=1 [I(Sj ,Wj , X i−1; X̃j,i)−I(Sj ,Wj , Xi−1;Yj,i)−n�n] (f) = n∑ i=1 [I(Uj,i; X̃j,i)−I(Uj,i;Yj,i)−n�n] (102) where (a) follows by (28), (b) follows from the encoding steps, (c) follows by (96), (d) follows because the source and channel are memoryless, (e) follows from the data-processing inequality applied to the Markov chains in (98) and (101), and (f) follows from the definition of Uj,i. Proof for (37): Observe for the CS model for j = 1, 2 that n( sRw,j+δn) (a) ≥ I(Sj ,Wj ; X̃nj )−H(Sj |Wj)+H(Sj ,Wj |X̃ n j ) (b) ≥ I(Sj ,Wj ; X̃nj ) + I(Sj ;Wj) (c) ≥ n∑ i=1 I(Sj ,Wj , X̃ i−1 j ; X̃j,i) (d) ≥ n∑ i=1 I(Sj ,Wj , X i−1; X̃j,i) (e) = n∑ i=1 I(Uj,i; X̃j,i) (103) where (a) follows by (28), (b) follows because X̃n is indepen- dent of Sj and from the encoding step, (c) follows because the source and channel are memoryless, (d) follows by applying the data-processing inequality to the Markov chain in (101), and (e) follows from the definition of Uj,i. Proof for (35): We have for the GS model for j = 1, 2 that n( sRs,j + sRw,j) (a) = H(Sj ,Wj) + I(Sj ;Wj) + nδn (b) ≤ n∑ i=1 [ H(Sj ,Wj , X i−1) + δn n + δn ] (c) = n∑ i=1 [ H(Uj,i) + δn n + δn ] (104) where (a) follows by (25), (b) follows by (27), and (c) follows from the definition of Uj,i. Proof for (38): Similarly, we have for the CS model for j = 1, 2 that n sRw,j ≤ n∑ i=1 H(Sj ,Wj , X i−1) (a) = n∑ i=1 H(Uj,i) (105) where (a) follows from the definition of Uj,i. Proof for (36): We obtain for the GS model for j = 1, 2 and j′ as defined in (30) that n( sRs,j + sRw,j + sRw,j′) (a) = H(Sj ,Wj ,Wj′) + I(Sj ;Wj ,Wj′) + I(Wj ;Wj′) + nδn (b) ≤ n∑ i=1 [ H(Sj ,Wj ,Wj′ , Sj′ , X i−1) + 2δn n + δn ] (106) (c) = n∑ i=1 [ H(Uj,i, Uj′,i) + 2δn n + δn ] (107) where (a) follows by (25), (b) follows by (27) and (29), and (c) follows from the definitions of Uj,i and Uj′,i. Proof for (39): We have for the CS model for j = 1, 2 and j′ as defined in (30) that n( sRw,j+ sRw,j′) ≤ n∑ i=1 H(Wj ,Wj′ , Sj , Sj′ , X i−1) + I(Wj ;Wj′) + n sRs,j′ (a) ≤ n∑ i=1 [ H(Wj ,Wj′ , Sj , Sj′ , X i−1) + δn n + sRs,j′ ] (108) (b) = n∑ i=1 [ H(Uj,i, Uj′,i) + δn n + sRs,j′ ] (109) where (a) follows by (29) and (b) follows from the definitions of Uj,i and Uj′,i. Remark 4. (106) and (108) are the only places we use the strong helper data independence constraint in (29) and it does not seem straightforward to obtain the inequalities in (106) and (108) without (29). Introduce a uniformly distributed time-sharing random vari- able Q ∼ Unif[1 : n] independent of other random variables. Define X=XQ, X̃j=X̃j,Q, Y =Yj,Q, and Uj=(Uj,Q,Q) so that Uj−X̃j−X−Yj form a Markov chain for j = 1, 2. The outer bound for the GS model follows by using the introduced random variables in (97), (99), (100), (102), (104), and (107), and letting δn → 0. Similarly, the outer bound for the CS model follows by using the introduced random variables in (97), (99), (100), (103), (105), and (109), and letting δn → 0. VII. CONCLUSION We derived inner bounds for the multi-entity key-leakage- storage regions for GS and CS models with strong secrecy, a hidden identifier source, and correlated noise components at the encoder and decoder measurements that are modeled as BCs. The inner bounds are valid for any finite number of entities that use the same hidden source to agree on a secret key. We argued that the mutual key independence constraint we impose makes the proposed multi-entity key agreement problem a proper multi-user extension of the classic single-enrollment key agreement problem, unlike the multi- enrollment key agreement problem considered in the literature. A set of degraded and less-noisy BCs was shown to provide strong privacy without a need for a common randomness. We established inner and outer bounds for the key-lekage- storage regions for a two-enrollment model with measurement 12 channels that are valid for SRAM and RO PUFs. Inner and outer bounds were shown to differ only in the Markov chains imposed and they match if the storage and privacy-leakage rate constraints are removed. Two examples illustrated that depending on the constraints of the practical scenario, single or multiple enrollment might perform better in terms of the secret-key vs. privacy-leakage rate ratio. In future work, we will find a set of probability distributions for which the strong helper data independence constraint in the two-enrollment model can be eliminated. ACKNOWLEDGMENT O. Günlü thanks Rafael F. Schaefer for fruitful discussions. REFERENCES [1] P. Campisi, Security and Privacy in Biometrics. London, U.K.: Springer-Verlag, 2013. [2] B. Gassend, “Physical random functions,” Master’s thesis, M.I.T., Cam- bridge, MA, Jan. 2003. [3] O. Günlü, “Key agreement with physical unclonable functions and biometric identifiers,” Ph.D. dissertation, TU Munich, Germany, Nov. 2018, published by Dr. Hut Verlag. [4] A. D. Wyner, “The wire-tap channel,” Bell Labs Tech. J., vol. 54, no. 8, pp. 1355–1387, Oct. 1975. [5] P. W. Cuff, H. H. Permuter, and T. M. Cover, “Coordination capacity,” IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4181–4206, Sep. 2010. [6] G. Cervia, L. Luzzi, M. L. Treust, and M. R. Bloch, “Strong coordi- nation of signals and actions over noisy channels with two-sided state information,” Mar. 2018, [Online]. Available: arxiv.org/abs/1801.10543. [7] R. Ahlswede and I. Csiszár, “Common randomness in information theory and cryptography - Part I: Secret sharing,” IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121–1132, July 1993. [8] U. M. Maurer, “Secret key agreement by public discussion from common information,” IEEE Trans. Inf. Theory, vol. 39, no. 3, pp. 2733–742, May 1993. [9] T. Ignatenko and F. M. J. Willems, “Biometric systems: Privacy and secrecy aspects,” IEEE Trans. Inf. Forensics Security, vol. 4, no. 4, pp. 956–973, Dec. 2009. [10] L. Lai, S.-W. Ho, and H. V. Poor, “Privacy-security trade-offs in biometric security systems - Part I: Single use case,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 122–139, Mar. 2011. [11] I. Csiszár and P. Narayan, “Common randomness and secret key generation with a helper,” IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 344–366, Mar. 2000. [12] O. Günlü and G. Kramer, “Privacy, secrecy, and storage with multiple noisy measurements of identifiers,” IEEE Trans. Inf. Forensics Security, vol. 13, no. 11, pp. 2872–2883, Nov. 2018. [13] L. Lai, S. Ho, and H. V. Poor, “Privacy–security trade-offs in biometric security systems - Part II: Multiple use case,” IEEE Trans. Inf. Forensics Security, vol. 6, no. 1, pp. 140–151, Mar. 2011. [14] L. Kusters and F. M. J. Willems, “Secret-key capacity regions for multiple enrollments with an SRAM-PUF,” IEEE Trans. Inf. Forensics Security, vol. 14, no. 9, pp. 2276–2287, Sep. 2019. [15] A. Juels and M. Wattenberg, “A fuzzy commitment scheme,” in ACM Conf. Comp. Commun. Security, New York, NY, Nov. 1999, pp. 28–36. [16] L. Kusters, T. Ignatenko, F. M. J. Willems, R. Maes, E. van der Sluis, and G. Selimis, “Security of helper data schemes for SRAM-PUF in multiple enrollment scenarios,” in IEEE Int. Symp. Inf. Theory, Aachen, Germany, June 2017, pp. 1803–1807. [17] I. Land, S. Huettinger, P. A. Hoeher, and J. B. Huber, “Bounds on information combining,” IEEE Trans. Inf. Theory, vol. 51, no. 2, pp. 612–619, Feb. 2005. [18] L. Kusters, O. Günlü, and F. M. Willems, “Zero secrecy leakage for multiple enrollments of physical unclonable functions,” in Symp. Inf. Theory Sign. Process. Benelux, Twente, The Netherlands, May-June 2018, pp. 119–127. [19] O. Günlü, O. Iscan, V. Sidorenko, and G. Kramer, “Code constructions for physical unclonable functions and biometric secrecy systems,” IEEE Trans. Inf. Forensics Security, vol. 14, no. 11, pp. 2848–2858, Nov. 2019. [20] Y. Dodis, R. Ostrovsky, L. Reyzin, and A. Smith, “Fuzzy extractors: How to generate strong keys from biometrics and other noisy data,” SIAM J. Comput., vol. 38, no. 1, pp. 97–139, Jan. 2008. [21] D. Merli, F. Stumpf, and C. Eckert, “Improving the quality of ring oscillator PUFs on FPGAs,” in ACM Workshop Embedded Sys. Security, New York, NY, Oct. 2010, pp. 9:1–9:9. [22] O. Günlü, R. F. Schaefer, and G. Kramer, “Private authentication with physical identifiers through broadcast channel measurements,” in IEEE Inf. Theory Workshop, Visby, Sweden, Aug. 2019. [23] T. M. Cover and J. A. Thomas, Elements of Information Theory, 2nd ed. Hoboken, NJ: John Wiley & Sons, 2012. [24] R. A. Chou, M. R. Bloch, and E. Abbe, “Polar coding for secret-key generation,” IEEE Trans. Inf. Theory, vol. 61, no. 11, pp. 6213–6237, Nov. 2015. [25] O. Günlü, T. Kernetzky, O. İşcan, V. Sidorenko, G. Kramer, and R. F. Schaefer, “Secure and reliable key agreement with physical unclonable functions,” Entropy, vol. 20, no. 5, May 2018. [26] J. Wayman, A. Jain, D. Maltoni, and D. M. (Eds), Biometric Systems: Technology, Design and Performance Evaluation. London, U.K.: Springer-Verlag, 2005. [27] R. Pappu, “Physical one-way functions,” Ph.D. dissertation, M.I.T., Cambridge, MA, Oct. 2001. [28] O. Günlü, K. Kittichokechai, R. F. Schaefer, and G. Caire, “Controllable identifier measurements for private authentication with secret keys,” IEEE Trans. Inf. Forensics Security, vol. 13, no. 8, pp. 1945–1959, Aug. 2018. [29] C. Nair, “Capacity regions of two new classes of two-receiver broadcast channels,” IEEE Trans. Inf. Theory, vol. 56, no. 9, pp. 4207–4214, Sep. 2010. [30] R. Maes, P. Tuyls, and I. Verbauwhede, “A soft decision helper data algorithm for SRAM PUFs,” in IEEE Int. Symp. Inf. Theory, Seoul, South Korea, June 2009, pp. 2101–2105. [31] J. Hagenauer, “Lecture Notes in Digital Communications 1,” G. Kramer and O. Günlü, Eds. Singapore: TU Munich Asia, Feb. 2019. [32] M. H. Yassaee, M. R. Aref, and A. Gohari, “Achievability proof via output statistics of random binning,” IEEE Trans. Inf. Theory, vol. 60, no. 11, pp. 6760–6786, Nov. 2014. [33] M. Nafea and A. Yener, “A new wiretap channel model and its strong secrecy capacity,” IEEE Trans. Inf. Theory, vol. 64, no. 3, pp. 2077– 2092, Mar. 2018. [34] M. Bloch, Lecture Notes in Information-Theoretic Security. Atlanta, GA: Georgia Inst. Technol., July 2018. [35] D. Slepian and J. Wolf, “Noiseless coding of correlated information sources,” IEEE Trans. Inf. Theory, vol. 19, no. 4, pp. 471–480, July 1973. [36] A. Schrijver, Theory of Linear and Integer Programming. Chichester, England: John Wiley & Sons, June 1998. [37] I. B. Gattegno, Z. Goldfeld, and H. H. Permuter, “Fourier-Motzkin elimination software for information theoretic inequalities,” 2016. [38] M. Bloch and J. Barros, Physical-layer Security. Cambridge, U.K.: Cambridge Uni. Press, 2011. I Introduction I-A Related Work and Motivation I-B Models for Identifier Outputs I-C Summary of Contributions I-D Organization I-E Notation II Problem Definitions III Inner Bounds IV Bounds for a Multi-Enrollment Model V Proof of Theorem 1 V-A Proof for the GS Model V-B Proof for the CS Model VI Proof of Thorem 2 VI-A Achievability Proof for the GS Model VI-B Achievability Proof for the CS Model VI-C Outer Bound Proofs for the GS and CS Models VII Conclusion References
1cybersec
arXiv
Nintendo Switch will release March 3 with an MSRP of $299.99 USD.
0non-cybersec
Reddit
ST_MakeEnvelope with Google Maps Coordinates problem. <p>In postgress I have the following function that uses <code>ST_MakeEnvelope</code> based on the Google Maps viewport coordinates to returns all projects within that viewport.</p> <pre><code>CREATE OR REPLACE FUNCTION public.search_projects_area( lngw double precision, lats double precision, lnge double precision, latn double precision ) RETURNS SETOF project_locations LANGUAGE sql STABLE AS $ function $ SELECT A.* FROM project_locations A WHERE st_intersects( A.location :: geography, ST_MakeEnvelope(lngw, lats, lnge, latn, 4326) :: geography ) $ function $ </code></pre> <p>Below is how I get the coordinates to create the envelope:</p> <pre><code>const bounds = this.map.getBounds(); const sw = this.map.getBounds().getSouthWest(); const ne = this.map.getBounds().getNorthEast(); const lngw = sw.lng(); const lats = sw.lat(); const lnge = ne.lng(); const latn = ne.lat(); </code></pre> <p>The problem is that projects in specific areas are not fetched sometimes depending on where I have the map zoomed or positioned. The projects are defenitely inside the viewport though in all cases.</p> <p>Its as if the <code>ST_MakeEnvelope</code> method doesnt create the correct rectangle based on the map viewport.</p> <p>Is my code above correct?</p>
0non-cybersec
Stackexchange
history manipulation in tcsh, substitute every match. <p>I know everybody will tell me that I should switch from using <code>tcsh</code> to <code>bash</code> or something else, but hysteresis is a powerful force, so I'm not going to. Most of the time I find <code>tcsh</code> perfectly adequate but there's one thing I can't figure out how to do in it, but is easy to do in <code>bash</code>: globally substitute one variable for another in a history entry. For example: suppose history says</p> <pre><code>1 mv dog.tex cat.tex </code></pre> <p>and I want to execute the command</p> <pre><code>mv dog.pdf cat.pdf </code></pre> <p>In <code>bash</code> this is easy:</p> <pre><code>!1:gs/tex/pdf/ </code></pre> <p>But the global operator doesn't work in <code>tcsh</code>. Is there something else that does? Thanks</p>
0non-cybersec
Stackexchange
How do I setup “name based” virtual hosts using Ubuntu 12.04?. <p>How do I setup “name based” virtual hosts using Ubuntu 12.04?</p> <p>I have followed the instructions given at <a href="https://help.ubuntu.com/12.04/serverguide/httpd.html#http-configuration" rel="noreferrer">https://help.ubuntu.com/12.04/serverguide/httpd.html#http-configuration</a> .</p> <p>I've done the following...</p> <ol> <li><code>cp default newsite</code></li> <li>replace “/var/www” with “/var/www/newsite” in newsite</li> <li>add “ServerName newsite.example.com” to newsite</li> </ol> <p>After some research, I found a blog entry that stated I needed to disable the default site using <code>a2dissite default</code>. After I did that, it worked. Is that correct? This is never mentioned in the Ubuntu server guide. The guide also includes this line... </p> <blockquote> <p>“The default virtual host has no ServerName directive specified, so it will respond to all requests that do not match a ServerName directive in another virtual host.”</p> </blockquote> <p>Which seems to imply that both the default site and others can co-exist.</p> <p>I'm running a fresh install of 12.04 Server and have reloaded the apache config each time I made an adjustment.</p> <p><strong>In summary... after adding a new file under /etc/apache2/sites-available (an altered copy of the “default” file with the ServerName directive added)  and the corresponding symlink under /etc/apache2/sites-enabled, is it necessary to disable or rename the default site symlink in order for the new site to function? The documentation and one answer given below seems to infer that it is not necessary to do so, but if so, what have I done wrong? Using the config below, when trying to access newsite.example.com I get the default site.</strong></p> <p>/etc/apache2/sites-available$ cat default</p> <pre><code>&lt;VirtualHost *:80&gt; ServerAdmin webmaster@localhost DocumentRoot /var/www &lt;Directory /&gt; Options FollowSymLinks AllowOverride None &lt;/Directory&gt; &lt;Directory /var/www/&gt; Options Indexes FollowSymLinks MultiViews AllowOverride None Order allow,deny allow from all &lt;/Directory&gt; ScriptAlias /cgi-bin/ /usr/lib/cgi-bin/ &lt;Directory "/usr/lib/cgi-bin"&gt; AllowOverride None Options +ExecCGI -MultiViews +SymLinksIfOwnerMatch Order allow,deny Allow from all &lt;/Directory&gt; ErrorLog ${APACHE_LOG_DIR}/error.log # Possible values include: debug, info, notice, warn, error, crit, # alert, emerg. LogLevel warn CustomLog ${APACHE_LOG_DIR}/access.log combined Alias /doc/ "/usr/share/doc/" &lt;Directory "/usr/share/doc/"&gt; Options Indexes MultiViews FollowSymLinks AllowOverride None Order deny,allow Deny from all Allow from 127.0.0.0/255.0.0.0 ::1/128 &lt;/Directory&gt; &lt;/VirtualHost&gt; </code></pre> <p>/etc/apache2/sites-available$ cat newsite</p> <pre><code>&lt;VirtualHost *:80&gt; DocumentRoot /var/www/newsite ServerName newsite.example.com &lt;Directory /&gt; Options FollowSymLinks AllowOverride None &lt;/Directory&gt; &lt;Directory /var/www/newsite/&gt; Options Indexes FollowSymLinks MultiViews AllowOverride None Order allow,deny allow from all &lt;/Directory&gt; ErrorLog ${APACHE_LOG_DIR}/error.log # Possible values include: debug, info, notice, warn, error, crit, # alert, emerg. LogLevel warn CustomLog ${APACHE_LOG_DIR}/access.log combined &lt;/VirtualHost&gt; </code></pre> <p>/etc/apache2/sites-enabled# ls -l</p> <pre><code>root@sandbox:/etc/apache2/sites-enabled# ls -l total 0 lrwxrwxrwx 1 root root 26 Mar 18 09:56 000-default -&gt; ../sites-available/default lrwxrwxrwx 1 root root 26 Mar 7 13:36 newsite -&gt; ../sites-available/newsite </code></pre>
0non-cybersec
Stackexchange
Number of different positions of rooks on chessboard. <p>I know that this topic as been mentioned before, but no accurate answer has been provided.</p> <p>Suppose we have to place $n$ rooks on $n \times n$ chessboard so that no one attacks another. How to count the number of different ways to place them up to rotations of the chessboard?</p> <p>I have been trying the Burnside's lemma but did not obtain satisfactory results...</p>
0non-cybersec
Stackexchange
Boston fire fire museum can’t figure out where this helmet is from. Can we figure it out?.
0non-cybersec
Reddit
How to disable the button next to Activities in GNOME?. <p>I'm using Ubuntu 18.04 version, there is a GNOME extension that allows you to disable the 'close button' next to "Activities" corner on the left side of top bar. I really dislike to see a button which covers a lot of space and just has a 'close' effect, nothing else.</p> <p>Do you guys know the extension name? I just can't find it.</p>
0non-cybersec
Stackexchange
Let R be the intersection of two lines, how do I prove that it lies on the radical axis?. <p>Given two circles $C_1$ and $C_2$ with centre $O_1$ and $O_2$ respectively. Choose two arbitrary points, one on $C_1$ and one on $C_2$. We name them $P_1$ and $P_2$. Draw the line $P_1P_2$ and mark the midpoint, $M$ of the line. Draw two lines $O_1M$ and $O_2M$. Then, drop a perpendicular line from $P_1$ to $O_1M$ and a perpendicular line from $P_2$ to $O_2M$. How can I show that the intersection of the two perpendicular lines lies on the radical axis of two circles?</p>
0non-cybersec
Stackexchange
How to resolve app uninstall without adhoc. <p>When I installed the app with help of this <a href="http://www.securitylearn.net/2012/12/26/build-ipa-file-using-xcode-without-provisioning-profile/" rel="nofollow noreferrer">link</a> onto my device but this procedure has problems under iOS 7 which i have reported to apple but i'm wondering if someone knows of a fix in the mean time?</p> <p>When you click the link to install, the app installing icons appears and after a short time a second icon appears with the proper app icon but the install one does not disappear (see image below) even if i delete the app the installing icon stays. Any ideas on how to fix this would be much appreciated.</p> <p><img src="https://i.stack.imgur.com/xAcv5.jpg" alt="enter image description here"></p>
0non-cybersec
Stackexchange
[No Spoilers] Game of Thrones Wedding Cake.
0non-cybersec
Reddit
This one time when someone accidentally bought a Linux computer from Dell, couldn't install Microsoft Office, so called the news to tell them about it..
0non-cybersec
Reddit
speech -100.
0non-cybersec
Reddit
Converting false to pointer type void*?. <p>Can someone explain me what is going on here...?</p> <p>I had this code:</p> <pre><code>#include &lt;fstream&gt; #include &lt;string&gt; #include &lt;iostream&gt; int main(){ std::ifstream file("test.txt"); std::string x; while (true) { if (!(file &gt;&gt; x)) return 0; std::cout &lt;&lt; x &lt;&lt; "\n"; } } </code></pre> <p>...compiles fine, does what it is supposed to do, no problem so far. Sometimes I dont like the <code>!</code> so much, because it can be overlooked easily, so I replaced the <code>if</code> with</p> <pre><code>if ((file &gt;&gt; x)==false) return 0; </code></pre> <p>..and suddenly my compiler (gcc 4.8.5) complains with a warning:</p> <pre><code> warning: converting ‘false’ to pointer type ‘void*’ [-Wconversion-null] if ((file &gt;&gt; x)==false) return 0; </code></pre> <p>and this is where I am starting to be puzzled. Where is the <code>void*</code> coming from? Doesnt <code>&gt;&gt;</code> return a reference that should be casted to a <code>bool</code>? Why is <code>false</code> converted to <code>void*</code>? Why isnt the same warning triggered when I dont explicitly write <code>false</code>?</p> <p>Out of curiosity I also tried this:</p> <pre><code>if ((file&gt;&gt;x)==true) return 0; </code></pre> <p>which causes a storm of errors starting with </p> <pre><code>error: no match for ‘operator==’ (operand types are ‘std::basic_istream&lt;char&gt;’ and ‘bool’) if ((file&gt;&gt;x)==true) return 0; ^ </code></pre> <p>and now I am completely lost. How is <code>false</code> a differnt <code>bool</code> than <code>true</code>? Different values of course, but I always thought <code>true</code> and <code>false</code> are of same type.</p>
0non-cybersec
Stackexchange