136 private links
YARH.IO is a fully hackable and custamizable Raspberry Pi based handheld, running Raspberry Pi OS and supporting all other Operating Systems available for Raspberry Pi.
On this page, I want to share and document my experiences flying and using a kite antenna. There's nothing too special about a kite antenna. It's a fun, novel approach to the ham's age-old question about where to hang a wire antenna. When I lived inland, I could usually find a tall tree in which to hang an antenna. After relocating to the Galvston Island, tall trees are hard to come by. While the beach may lack trees, it usually does not lack wind.
A kite antenna setup is pretty straight forward and once you deploy it a couple times, it's downright simple. The key factor is having enough wind!
Neugierig wurde ich durch eine Veröffentlichung von W9SCH in der SPRAT Nr.69 unter 'A Four-Band UP & OUTER Antenna' und später durch einen Artikel im QRP-Report. Die Antenne ist als 'Upper & Outer' bekannt geworden. Sie besteht lediglich aus einem vertikale Strahler, dünner Draht, der locker um einen Glasfiebermast gewickelt wird und einem horizontalen 'elevated' Radial. Dieses Radial, als 'zweiter Strahler' bildet das einzige Gegengewicht, keine weitere Erdung. 'Wenn Strahler und Radial die gleiche Länge, λ/4 haben, funktioniert die Antenne schon recht brauchbar. Ein Tuner sollte aber eingeschleift werden, um das SWR zu optimieren.
Amateur radio (Ham radio) operators and engineers, have been experimenting with radio and antennas since Marconi. The use of a kite to support an antenna makes for great days operating and a wonderful HF antenna.
The linked pages that are listed below describe
various elements of a typical kite-antenna flying
field setup. One important lesson that we have
learned so far is that good kite-antenna contacts
result from flying the best possible antennas.
Another lesson learned is to keep the time that is
required to set up and put away as short and
convenient as possible - otherwise we will not do it!
Admittedly, we already have a page about our kite antenna exploits which makes for interesting reading. However those pages are about the practical use of these antennas. This talk given by Henryk M0HTB covers some of the background and the equipment considerations to supplement the practical exploits.
Sie finden hier zahlreiche Kartonmodelle zum Ausschneiden und Zusammenkleben, z.B. Burgen, Gebäude und technische Modelle.
Der 1831 gegründete Verlag J.F. Schreiber brachte bereits ab 1878 Kartonmodelle heraus. Seit 1998 wird das Programm der Schreiber-Bogen vom Aue-Verlag in Möckmühl weitergeführt.
- Inhaltszusammenfassung
Das Vorhaben umfasst hauptsächlich folgende Maßnahme(n):
-
sicherheitstechnisch gleichwertige Umsetzung für die vereinfachte smartphone-basierte Verwendung des E-ID
-
Zulässigkeit der Verwendung von Attributen aus dem Identitätsdokumentenregister sowie aus Registern von Verantwortlichen des privaten Bereichs über das System des E-ID und Bereitstellung dieser Daten an Dritte
- Kurze Begründung
Es sollen die technischen Weiterentwicklungen in Hinblick auf eine vereinfachte smartphone-basierte Verwendung des E-ID Berücksichtigung finden, um eine einfache, userfreundliche Nutzung des E-ID auf einem Smartphone zu erreichen.
Weiters soll durch die geplanten Maßnahmen die Datenqualität und Ausweitung der Nutzungsmöglichkeiten des E-ID gesteigert werden.
This .stl file was produced by scaling the original model and converting it directly to .stl format; it may not yet be ideal for printing. We welcome your feedback on your experience.
Description
Author/Origin: Eyes on the Solar System. NASA/JPL-Caltech
Relevant Mission: Rosetta
Date Added: July 9, 2012
Polygons: 8867
Vertices: 18054
Keywords: 3D Model, Spacecraft, Satellite, Eyes on the Solar System, Rosetta
GitHub Repository: Rosetta
We understand that 3D printing often involves trial and error. If you have to make adjustments or changes when printing these models, please share your experience with us:
arc-special-proj@lists.nasa.gov
These are the cartoons not only from the LA Free Press, included in RCD25, but also the cartoons he did at the Digger, in Australia, and the cartoons he did for the LA Free Press when he came back from his tour of Australia with Phil Ochs.
eDEX-UI is an open-source cross-platform terminal emulator that presents you with a Sci-Fi inspired look along with useful some features as well.
It was originally inspired from the DEX UI project. It is also worth noting that eDEX-UI is no longer maintained but it hasn’t been completely abandoned. You can learn more about the current status of the project here.
Even though eDEX-UI is more about the looks and the futuristic theme for a terminal, it could double up as a system monitoring tool for Linux in the future if the development resumes or if someone else forks it. How? Because it shows system stats in the sidebar while you work in the terminal.
Minimal Consent beantwortet Cookie Banner automatisch und sorgt somit für ein ungestörtes Surferlebnis. Minimal Consent lehnt alle Cookies ab, die für den Betrieb der Seite nicht nötig sind. Dazu gehören ua. Cookies zum Tracken des Nutzerverhaltens.
Wer seinen PC in eine PDP-11 von DEC mit der UNIX Time-Sharing System Seventh Edition (V7) als Betriebssystem verwandeln möchte, der kann den Sanos-Port von Bob Supnik’s PDP-11 simulator ausprobieren. Denn mit Diesem ist es möglich, UNIX so auszuführen, wie es Dennis Ritchie und Ken Thompson im Jahr 1979 getan haben.
Ein Sanos-Entwickler hat ein ISO-Image mit Sanos, dem PDP-11-Simulator und dem UNIX V7-Kit vom Computer History Simulation Project erstellt. Einfach eine CD-ROM in den PC einlegen und starten. Danach wird für alle nostalgischen UNIX-Geeks der PC zu einer PDP-11 mit dem UNIX V7.
Have you ever wanted a theme tune to play as you enter the room? Perhaps the imperial march, a pop hit or Super Mario’s Jolly Roger Bay. Well now you can thanks to the Human presence triggered music player – a small box which will wait for your arrival and serenade you when you step in trough the door and switch the lights on!
It’s designed for service rooms but has applications for all kinds of locations and establishments. The music is stored on an SD card, which can be selected by pressing the knob – which also controls the volume when turned. You might like to have some relaxing music to accompany a deep bath or something to get you pumped up for the home gym – whatever you choose it’s an unusual and ingenious device. Simply let it play out or turn off the lights to stop the music!
User-friendly, colorful output
Adjusts to your terminal's width
Sort the results according to your needs
Groups & filters devices
Can conveniently output JSON
In this course, students will learn to develop complex system-level software in the C programming language while gaining an intimate understanding of the Unix operating system (and all OS that belong to this family, such as Linux, the BSDs, and even Mac OS X) and its programming environment.
Topics covered will include the user/kernel interface, fundamental concepts of Unix, user authentication, basic and advanced I/O, fileystems, signals, process relationships, and interprocess communication. Fundamental concepts of software development and maintenance on Unix systems (development and debugging tools such as "make" and "gdb") will also be covered.
Students are expected to have a good working knowledge of the C programming language, have written non-trivial programs before, and to be able to competently use a Unix system with a command-line shell interface. All coursework will be done exclusively on a Unix system from the command-line. This is not an introduction to using Unix!
The modern day implementation of UUIDs can be tied back to RFC 4122 which introduced 5 different approaches for generating these identifiers. We’ll take a look at each one and we’ll step through the implementation details of Version 1 & Version 4 in a moment.
So you've heard of this thing called cgroups, and you are interested in finding out more. Perhaps you caught mention of it while listening to a talk about containerization. Maybe you were looking into Linux performance tuning, or perhaps you just happened to be traversing your file system one day and discovered /sys/fs/cgroups. Either way, you want to learn more about this functionality that has been baked into the kernel for quite some time. So sit back, grab some popcorn, and prepare to (hopefully) learn something you may not have known before.
Using the Awk programming language, you can manipulate or extract data, generate reports, match patterns, perform calculations, and more, with great flexibility. Awk allows you to accomplish somewhat difficult tasks with a single line of code. To achieve the same results using traditional programming languages such as C or Python would require additional effort and many lines of code.
You still generate a public-private key pair for each developer. However, you don’t upload the public keys to your servers.
Instead, you sign the public keys with a so-called certificate authority (CA) key which you generate before. This signing simply generates a third certificate file which you give back to the developer and they put it inside of their .ssh/ folder next to the private and public key.
On the servers, you simply tell the server the public key of your CA and the server can detect if a user has a properly signed certificate and only allows access to the developers who have such a signed certificate.