You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Run Multiple Independent Instances of the Same App on macOS (Electron Apps)
macOS App Cloning (Per-Instance Data Isolation, No Keychain)
This is a practical, reality-tested method for running multiple independent instances of the same macOS app with separate local data (sessions, cache, settings, extensions, etc.).
It deliberately avoids false guarantees:
This does not create full OS-level isolation
This does not isolate Keychain, iCloud, or permissions
This works only if the app supports alternate data directories or profiles
ffmpeg to quickly cut video from start to specific time
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
# Not many mention this (I'm no expert so maybe there is a catch), but if your file has other streams like subtitles and other metadata like chapters and so on, it's possible to cut/trim and keep all streams with the following command
// With -map 0 you take all the streams in the file, and with -c copy you copy all them as they are.
// Using -to omitting the start via -ss will cut the input video from start to **second 60.**
// Fiddling with map is useful also if you want only specific streams to be kept in the cut (maybe you don't need all the audio sources in the file, or only some subtitles).
Part 1 of the TUHH Engineering Math Notes by by 0xdawg
Usage
The subdivisions or "Chapters" are clusters of knowledge around Numerical Mathematics, more or less strictly ordered by increasing specificity or involvedness.
Use this to guide your learning journey around anything that involves calculations on computers with limited precision (the vast majority of cases).
This is relevant for instance for complex computations involving a very large number of multiplication or division operations, especially when the sought values are in the [0..1] range.
Practical relevance for this lies in the training of neural networks and their deployment on less capable infrastructure, for instance. Other applications revolve around
eigenvalue, singular value computations etc. as part of numerical simulations aka. interpolation, approximation, FEMs and other methods.
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Prep new environment for cadCAD simulation (Windows, Anaconda)
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
tl;dr: AWS mining is against TOC so even if you have credits you will be invoiced and your credits burned. Watch out. These methods only help mitigate or lower the risk of discovery. Share responsibly.
Problem
AWS is firewalled af on top of the policy mentioned in tl;dr. A good way is to use a mining proxy with TLS. Even better would be a point-to-point VPN.
Using VPN directly is also a good solution - but services that let you configure that you only want one certain port to run via VPN and not the SSH connection that is your lifeline are costly.
This document sketches a few solutions, provides some links, and documents one particular approach.
And remember, methods of detection will soon encompass deep learning: https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=9178288
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
2018-11-30 05:31:51.392 [debug] <0.13017.0>@aec_pow_cuckoo:parse_generation_result:479 GeForce GTX 1070 with 8118MB @ 256 bits x 4004MHz
2018-11-30 05:31:51.392 [debug] <0.13017.0>@aec_pow_cuckoo:parse_generation_result:479 Looking for 42-cycle on cuckoo30("phKSnfGl5v79ClgPnSn0QzEriFy5ESr+6tEW1xIuUyk=qD1PuHduWCY=",0) with 50% edges, 64*64 buckets, 17