entropy   1910

« earlier    

How bad can it git? Characterizing secret leakage in public GitHub repositories | the morning paper
How bad can it git? Characterizing secret leakage in public GitHub repositories Meli et al., NDSS'19 On the one hand you might say there’s no new news here. We know that developers shouldn’t commit secrets, and we know that secrets leaked to GitHub can be discovered and exploited very quickly. On the other hand, this…
github  security  secret  detection  entropy 
16 days ago by fmjrey
Saarbrücken research team uses artificial muscles to develop an air conditioner for the future | Universität des Saarlandes
Using nitinol shape memory alloys as the thermal medium/matrix in a thermal wheel rotary air heat exchanger, where the wheel itself is the HVAC system!
rotary  heat  exchanger  thermal  wheel  air  entropy  nitinol  shape  memory  alloy  metal  conditioner  heater  HVAC  mechanical  materials  science  research  technology  cooling  heating 
6 weeks ago by asteroza
Entropy Explained, With Sheep
An explorable blog post about entropy, with sheep.
physics  science  entropy  learning  education 
9 weeks ago by garrettc
A better description of entropy
Uses a Stirling Engine
He likes the "spreading out of energy"
thermo  entropy  310 
10 weeks ago by paulmr
How to Diagnose a Linux Entropy Issue on WebLogic Server Instances (Doc ID 1574979.1)
Choose one of the following approaches.

1. Feed the /dev/random device with additional I/O operations or using a random number generator tool (like rngd).

2. Instruct WebLogic server to use a non-blocking entropy device.

2.1 Long term solution

a) WebLogic Server Scope

i. Edit the Weblogic startup script ($DOMAIN_HOME/bin/startWebLogic.sh)
ii. Add the following to the JAVA_OPTIONS variable: -Djava.security.egd=file:/dev/./urandom
iii. Save the file.
iv. Set the domain environment. ($DOMAIN_HOME/bin/setDomainEnv.sh)
v. Start WebLogic instances.

b) JDK Scope

i. Edit the Java Security Properties file ($JAVA_HOME/jre/lib/security/java.security)
ii. The securerandom.source property specifies the source of seed data for secure random. If that property points to /dev/random, set it as one of the options listed below.


iii. Save changes and start the WebLogic Server instances.

2.2 Temporary solution (usually applied for testing purposes)

i. Override the JAVA_OPTIONS environment variable before starting WebLogic Server via shell scripts.
$ export JAVA_OPTIONS="${JAVA_OPTIONS} -Djava.security.egd=file:/dev/./urandom"

ii. Start WebLogic instances.
oracle  linux  weblogic  manage  start  timeout  entropy 
11 weeks ago by iteruel

« earlier    

related tags

/dev/random  /dev/urandom  -  1979  1997  2019  310  5*  a  activations  advice  affection  air  alloy  ans  antipattern  article  ast  asymmetric  attachment  attraction  ayahuasca  bash  bestpractices  better  bigballofmud  binary  biophysical.economics  books  brain  brains  bug  business  ca  career  caticha  causality  chemistry  circular  cloud  cloudflare  cms  cognitive  command  complex_systems  complexity  compression  computational  conditioner  conspiracy  containers  control  cooling  cross  cryptography  csprng  data  debt  debugging  definitionoflife  deliberate  description  design  desire  detection  discussion  divergence  divergences  docker  dorothytennov  economics  education  emotion  encoder  encoding  encryption  engine  engineering  environment  epidemic_spreading  estimation  estimations  evaporation  everything  exchanger  experience  experimentation  explaination  facts  false-vacuum  fantasy  favorites  file  film  finite  free-energy-principle  freeipa  future  generator  gini  github  growth  hacking  haveged  hea  heat  heater  heating  high  how_things_work  how_we_live  hrng  human-all-too-human  human-exceptionalism  hvac  hwrng  identifier  inadvertent  inequality  information-theory  information.theory  information  informationtheory  inspiration  intelligence  java  kl-divergence  knn  knowledge  labor  language  lavarand  ldap  learning  life  limbo  limerence  limerent  line  linguistics  linux  lists  literature  log-loss  log  longing  longread  loss  love  lsd  ltg  lz77  lzturbo  machine-learning  maintenance  manage  management  materials  math  mcmc  measure  mechanical  memory  metal  methods  ml  monte.carlo  murphys_law  myths  narrative  networks  neuralnetworks  nitinol  number  numeral  object  of  oracle  password  passwords  perception-training  persistence  petri_g  phd  philosophy  physics  pi  power  predictability  prediction  privacy  prng  probabilistic_embeddings  probability  process-and-procedure  procrastination  program  prudent  pseudorandom  psychedelics  psychology  pymc3  r  radiation  random  randomness  randum  raspberry-pi  raspberry  raspberrypi  reckless  recycling  refractory  renyi  research  resistance  resource!  rethinking  rhel  rng  rotary  scarpino_s  science  secret  security  sense  shannon-entropy  shannon  shape  sharing  shift  siderand  simulations  software  space  start  statcomp  statistics  sterling  stewardship  stories  string  supercookie  synthesis  system  systems  tchnicaldebt  technology  temperature  temporality  tensorflow  theory  thermal  thermo  thermodynamics  thought  tim.jackson  time  timeout  tips  tools  tricks  trng  tungsten  turing  undefined  universe  unrequited  urbanism  video  videos  virtualization  wabisabi  web  weblogic  wheel  where-no-man-dares  wisdom  word_embeddings  work  written 

Copy this bookmark: