Welcome to the ARM Infocenter. The Infocenter contains all ARM non-confidential† Technical Publications, including:
- ARM Architecture Reference Manuals
- Cortex-A, Cortex-R, Cortex-M, ARM11, ARM9, and ARM7 Technical Reference Manuals
- AMBA specifications and design tools and CoreLink peripherals and controllers product manuals
- CoreSight on-chip debug and trace TRMs and Architecture documentation
- ARM Software Development tools and Modeling tools documentation
- Application Notes and Technical Support Knowledge Articles (FAQs).
Tag Archives: reference
Quantum cryptography: yesterday, today, and tomorrow
Imagine you have a product of two prime numbers, say, 221. Now, we set that number to be an endpoint—for the purposes of our game, there are no higher integers. If we multiply two numbers together and get a number larger than 221, it wraps around, so 15 times 15 results in 225-221 = 4. If we multiply two by itself, we only get four, which doesn’t wrap, and we can do that 7 times before it wraps. But 28 results in 35. Got that? Great.
via Quantum cryptography: yesterday, today, and tomorrow | Ars Technica.
Let’s consider a consequence of using phase to calculate prime factors: 221 has prime factors 17 and 13, and factors 1 and 221. We can eliminate the latter in the classical part of our algorithm. But, what about two and 111? “Wait,” you say. “That is not a factor. The product is 222.” Nevertheless, we need to think about it, because quantum algorithms are probabilistic. 17 and 13 have the highest probabilities, but two and 111 only have a phase error of 0.5 percent. The probability of Shor’s algorithm returning the incorrect result is rather high. Unfortunately, a near miss (though easy to spot, since it is very quick to calculate that 2×111=222 not 221). This is likely not very useful in terms of decrypting a message, so we need to do something to increase the chance of getting the correct answer.
MythTV, Open Source DVR
Initially, installation of MythTV seems like a huge task. There are lots of dependencies, and various distributions seem to do the same thing different ways. This document will attempt to give general installation instructions, as well as including distribution-specific instructions where necessary.
Configuring and Managing a Red Hat Cluster
Configuring and Managing a Red Hat Cluster describes the configuration and management of Red Hat cluster systems for Red Hat Enterprise Linux 5. It does not include information about Red Hat Linux Virtual Servers (LVS). Information about installing and configuring LVS is in a separate document.
Set Up the Master Boot Record
When setting up the Master Boot Record, you need to enter appropriate partition information. In this example, Grub is in the first partition on the first hard drive, which is (hd0,0) in Grub. Change this to whatever partition Grub is in.
After getting the Grub prompt, type:
root (hd0,0)
setup (hd0)
quit
via Set Up the Master Boot Record.
This has been sitting as draft since August 5 and works in setting the MBR on a hard drive and since things like this can be easily forgotten, it has become a reference. Even Testdisk couldn’t write the MBR correctly when I tried to transfer a Fedora14 VM onto a real hard drive. After setting the MBR and getting it to boot the network and graphic interfaces required manual intervention. I’m not convinced transferring a virtual image to a physical image is much of a time saver.
Note: Not all installations have grub installed by default. The command to get the grub prompt is /sbin/grub run as root.
List of TCP and UDP port numbers
List of TCP and UDP port numbers – Wikipedia, the free encyclopedia.
This site was also a good reference when I tried to find out what common services used port 9000.
IETF Network Management RFCs by SMI/MIB modules
Network management RFCs sorted by SMI/MIB modules
Via The Simpleweb – IETF Network Management RFCs by SMI/MIB modules.
Raising the dead: Can a regular person repair a damaged hard drive?
This is a story of my efforts to repair the drive myself, my research into the question of whether or not users can repair modern hard drives, and the results of my efforts. If your drive is still detected in BIOS, you may be able to use software tools to retrieve your data. Here, we’re going to focus exclusively on hardware-related failures, and what your options are.
via Raising the dead: Can a regular person repair a damaged hard drive? | ExtremeTech.
Surf the internet for more than two minutes, and you’ll find people who recommend you do one of the following things:
- Stick your hard drive in the freezer
- Pop your hard drive into the oven
- Give it a few taps with a hammer or rubber mallet
LOL. I have been desparate to try the freezer trick a couple of times without luck.
Natural Language Toolkit — NLTK 2.0 documentation
NLTK is a leading platform for building Python programs to work with human language data. It provides easy-to-use interfaces to over 50 corpora and lexical resources such as WordNet, along with a suite of text processing libraries for classification, tokenization, stemming, tagging, parsing, and semantic reasoning.
via Natural Language Toolkit — NLTK 2.0 documentation.
From: http://www.cloudera.com/blog/2010/03/natural-language-processing-with-hadoop-and-python/
NLP is a highly interdisciplinary field of study comprising of concepts and ideas from Mathematics, Computer Science and Linguistics. Naturally occurring instances of human language, be it text or speech, are growing at an exponential rate given the popularity of the Web and social media. In addition, people are increasingly becoming more and more reliant on internet services to search, filter, process and, in some cases, even understand the subset of such instances they encounter in their daily lives.
NLP = Natural Language Processing
Choosing the Right Security Tools to Protect VMs
As enterprises move towards virtualizing more of their servers and data center infrastructure, protective technologies—plentiful and commonplace in the physical world—become few and far between. When your Windows Server or SQL database is running in a virtual machine (VM), you still need to protect it from viruses and other attacks while providing the same level of access controls you have for physical servers. Let’s look at the different approaches to protecting your VMs, as well as the major issues involved with deploying these technologies.
via Choosing the Right Security Tools to Protect VMs.
Anyone seriously invested in virtualization is going to need more than one protection product. So before you dive into this marketplace, you should carefully consider the types of protective features you really need at present, and where you want to end up in the next 12 months. You should look at covering five different functional areas: