Creating Your Own SSL Certificate Authority (and Dumping Self Signed Certs) | The Data Center Overlords
datacenteroverlords.com/2012/03/01/creating-your-own-ssl-certificate-authority/, posted 1 Dec by peter in howto reference security toread
So you have the choice, buy an overpriced SSL certificate from a CA (certificate authority), or get those errors. Well, there’s a third option, one where you can create a private certificate authority, and setting it up is absolutely free.
Espresso 101: How to Adjust Dose and Grind Setting by Taste - Tips and Techniques • Home-Barista.com
www.home-barista.com/tips/espresso-101-how-to-adjust-dose-and-grind-setting-by-taste-t16968.html, posted 25 Nov by peter in drink howto reference toread
There are two sections. The first section teaches you how to initially set your grind range and coffee doses. In the US, the prevalence of latte drinking has resulted in many cafes using grind settings that are much too coarse, and doses that are much too high, for straight espresso. The result is that they taste much too bitter and sour. The second section teaches you how to analyze the taste of the shot in a way that allows you to adjust the taste balance to your liking. This is the way the best baristas fine tune their shots. Knowing which taste details go with which shot preparation details is the fastest way to improve your skills.
youarenotsosmart.com/2013/05/23/survivorship-bias/, posted 25 Nov by peter in business cognition inspiration statistics
, which Wald saw instantly, was that the holes showed where the planes were strongest. The holes showed where a bomber could be shot and still survive the flight home, Wald explained. After all, here they were, holes and all. It was the planes that weren’t there that needed extra protection, and they had needed it in places that these planes had not. The holes in the surviving planes actually revealed the locations that needed the least additional armor. Look at where the survivors are unharmed, he said, and thatâs where these bombers are most vulnerable; thatâs where the planes that didnât make it back were hit.
The thrust of this argument is simple: terrorism is such a minor threat to American life and limb that it's simply bizarre—just stupefyingly irrational and intellectually unserious—to suppose that it could even begin to justify the abolition of privacy rights as they have been traditionally understood in favour of the installation of a panoptic surveillance state. Would Americans give up their second-amendment rights if it were to save 3000 lives? Well, it would, but we won't. Surely the re-abolition of alchohol would save more than 3000 lives, but we're not about to discuss it. Why not? Because liberty is important to us and we won't sell it cheaply. Why should we feel differently about our precious fourth-amendment rights?
The Plex Home Theater port for the Raspberry Pi mini computer
wastholm.tumblr.com/post/65603373775/shinjuku-gyoen-national-park-at, posted 31 Oct by peter
I took a somewhat grainy picture of the view from our hotel room. (at 東急ステイ西新宿 (TOKYU STAY NISHI-SHINJUKU))
wastholm.tumblr.com/post/65522533592/i-took-a-somewhat-grainy-picture-of-the-view-from, posted 30 Oct by peter
These water issues are clearly major problems that will take decades, new technologies and billions of yen to resolve, but they are a completely different beast from the problems of the accident’s early days. Fukushima’s problems are fodder for debates on broader issues, making it crucial that these latest concerns about leaks and groundwater contamination be neither overblown nor understated. Our goal here is to try to draw a clear and evenhanded picture of the situation at Fukushima Daiichi today and the risks it poses. § [An MSM article refreshingly free of both alarmism and "everything is fine" rhetoric. Only discusses water, though, and not, for example, structural integrity of buildings.]
K-tree is a tree structured clustering algorithm. It is also refered to as a Tree Structured Vector Quantizer (TSVQ). The goal of cluster analysis is to group objects based on similarity. Each object in a K-tree is represented by an n-dimensional vector. All vectors in the tree must have the same number of dimensions.