-
Previously https://github.com/sfosc/sfosc/issues/85#issuecomment-505336323 I raised the idea of a single purpose website to explains security policies in an easy to link to format as a starting point.…
-
There should be a general document about how to review code in a pull request process. This document should include:
- How the process works
- The actors in the process and their individual resp…
-
@wbinzhe FYI: This is how I think about the motivation of this paper (the real estate part hasn't been discussed yet). We can talk about these in more detail tomorrow.
Numerous earlier studies hav…
-
This issue is used to keep a record of the research emphasis and engineering effort of each research period.
-
The three policy oriented items that are critical to government facing applications includes Security, Privacy, and Accessibility (Section 508 compliance, specifically). That needs to be added as it i…
-
The group policy option "Enable Win32 long paths" is not enabled in the standard Windows Server 2016 Datacenter image for Azure Batch. This is problematic since Batch has quite a deep folder hierarchy…
-
### Description
Currently, astronomer-cosmos provides an abstraction layer to map dbt objects to Airflow operators, allowing seamless integration between dbt and Airflow for orchestrating data pipeli…
-
I am attempting to run the example and when reading data from the websocket I get the following error:
```
level=error time=2018-05-17T21:12:47.556428787Z caller=service_websocket.go:35 wsRead="we…
-
As a policymaker,
I'd like to read a quick summary of the key policy messages in a storyboard,
so I can judge if the story is relevant for me
-
### Initial request
I refer to the [Application Areas Codes list in the WMDR](http://codes.wmo.int/wmdr/_ApplicationArea).
INFCOM-2 recommended changes to WIGOS Manual in relation to the evolved Ro…