-
### Prerequisites
- [x] make sure you're are using the latest version by `csvtk version`
- [x] read the [usage](http://bioinf.shenwei.me/csvtk/usage/)
### Describe your issue
* [x] describe …
-
**Note:** The following proposal is inspired by the lightweight _slock.it incubed_ concept for verifying read transactions from a remote blockchain node.
**Problem Statement**
As as user of DID…
-
Feel free to ignore this issue, but I would like to understand what is the chain of trust of this installation method.
Why should I trust this in ANY way? What you are building here is a rootkit a…
-
Inspired by the discussion here:
https://github.com/dotnet/corefxlab/issues/1751
One of the challenges that .NET faces with its Unicode support is that it is rooted on a design that is nowadays …
-
-
The only thing preventing Linux from getting "gold" is the odd "Secured delivery against man-in-the-middle (MITM) attacks" issue. https://www.kernel.org does not have any scripting or frames or abili…
-
As with IH we will map all entities to both an institution and a collection. The first step is to create a mapping for the institutions. Once that is done we can map/create the collections belonging t…
-
Quote: "When in doubt, use brute force."
Quotee: Ken Thompson
Requirements:
- vector graphic
- monochromatic
- iconography is OK
- dimensions should be 4:3
Here are some examples of relatively conv…
-
I would like to propose Go add support for a [HEREDOC](https://en.wikipedia.org/wiki/Here_document) syntax to make adding literals of particular precarious strings easier.
A common syntax in many…
-
Could you add some books about the golang?
I think this language is neccessary for the worker about the informational security!
> Go, also known as Golang, is a statically typed, compiled programm…