-
Data Sharing Agreement Project:
I would consider this weekend a success if we can complete these two processes on a basic level:
1) Create a basic top-level form with questions for people interested …
-
Hello,
Thanks for making this repo and data public. I have been working in the Way Lab for the past year to develop a tool for streaming IDR image data downloading and processing ([IDR_stream](http…
-
I want to create a c++ program with my own binary tree class and show BFS and DFS traversals for hacktober2024
-
### Describe the bug
The Watchguard T10 is unbootable with the current SNAPSHOT image.
After upgrading from 23.05.x to SNAPSHOT, or when booting an initramfs image, the boot log displays a kerne…
-
In order to be less dependent on certification authorities under SSL, maybe we could have a scheme to map a nostr key onto an X.509 signature key (RSA or DSA I guess), and a way for nostr clients to i…
-
### ⭐ Request Type
I would like to add a lesson to explain the Binary Search algorithm. The lesson would cover the following:
1) Detailed explanation of how the Binary Search algorithm works.
2) …
-
I used NSEC3 until the deprecation of SHA1. In my head, since SHA1 is deprecated, then NSEC3 is also deprecated, because its available DNSSEC algorithms are DSA-NSEC3-SHA1 and RSASHA1-NSEC3-SHA1. Havi…
-
I have a two part question, looking for clarification on the semantics for deleting an attached buffer to an active XFB object.
#### Part 1: Deleting buffers attached to active XFB
Take the foll…
-
### Current Behavior
Currently it is not possible to verify the authenticity or cryptographic integrity of the [downloads from flarum.org](https://docs.flarum.org/install/#installing-by-unpacking-an-…
-
WDYT? Is this publication in scope?
```
@inproceedings{Aranha_2020,
author = {Aranha, Diego F. and Novaes, Felipe Rodrigues and Takahashi, Akira and Tibouchi, Mehdi and Yarom, Yuval},
booktitle = {P…