-
**Describe the bug you encountered:**
The capture of the response to the very first setup packet fails. I think this is the very first time anything is captured by the RX PIO. Maybe its initial sta…
-
Due to their predictive power, AI/deep learning methods are increasingly used in many predictive tools. The availability of libraries like tensor-flow or scikit-learn, which allow relatively easy impl…
-
/spec a web3-enabled Scantron testing system for desktop, mobile, and tablet
-
**Is your feature request related to a problem? Please describe.**
Sometimes we need to persist resources on the device's database without creating local changes to be synced to the server. Such res…
-
List of features/functionality that has to be added, in no particular order:
- [x] Indexing Mechanism
- [ ] Compaction
- [ ] Get and Delete
- [ ] CLI
- [ ] Export and Import db
- [ ] Data Inte…
-
Hi,
I want to encrypt a pretty big string, around 60 mo (which come from file).
Since i want to have a responsive ui, i chunked the string into small parts.
And i encrypt each part one after the oth…
-
I am able to leave the goal event name empty. If the goal event name is empty, how do I find the goal event name?
![image.png](https://raw.githubusercontent.com/Barbaracwx/pe/main/files/910e1d68-1da…
-
We have encountered an issue where we are unable to open the MDB files provided for downstream tasks locally using Access. When attempting to open these files, Access prompts that the file is corrupte…
-
Don't know what this means or what constitutes sensitive
`Alter sensitive tables to utilize system versioning.`
```
-- suggested fix
ALTER TABLE InsurancePolicy
ADD PERIOD FOR SYSTEM_TIME (S…
-
VernamTunnel provides no integrity protection for data sent through the tunnel. This means that an attacker with knowledge of some of the plaintext can easily modify the ciphertext to be the plaintext…
thejh updated
9 years ago