SDI over fibre with a cheap converter if you need to push multi hindered metres. Then people moves to 222-6 which packetised the SDi over IP, and now 2110 which breaks out the SDI to its components.
For most long haul links people still compress, good old h264 or 265 with latencies in the 200-500ms range (plus network propagation), or J2k/JXS and NDI which are more like 50-150ms. Ultimately 200mbit of h265 is far cheaper to transmit than 10ish gbit of 2110, and in many cases the extra 500ms doesn’t matter.
But it's not easy to tell what one's looking at if one doesn't already understand the system, and conditions of "extreme danger" (which is what my phone told me about half an hour ago) are not a good moment to figure these out.
The "Pacific Tsunami Warning Center" is in Hawaii, which is why it is mentioned at the start of the message. Did you by chance just misread this? See the page below:
I use this zsh function and define my git alias in my git config.
# No arguments: `git status`
# With arguments: acts like `git`
function g() {
if [[ $# > 0 ]]; then
git $@
else
git st
fi
}
# Complete g like git
compdef g=git
I've always avoided that for fear that my or someone else's editor will accidentally replace the tabs with space. Mixed is not a common configuration, these days.
a commonly used feature that has been a part of the unix standard since before "bash" only meant to hit something with a heavy object, while linus was getting his diaper changed is not an "obscure feature."
a five year old took his first aware car ride, and at a gas station saw the trunk of the car next to theirs open. he said "seriously, bmw has too many obscure features." after all, a car for him was where you put the baby seat. and why would you put that in a compartment with no windows or air, that's too small to even fit a baby seat.
Location: Seattle Area
Remote: Yes
Willing to relocate: No
Technologies: Linux, NixOS, Python, Docker, iOS, Networking.
Résumé/CV: Available upon request.
Email: admin [at] psophis.com
Looking for a mid level devops position somewhere in the Seattle area. Currently working as a Network/Linux Admin and sole developer at a local small school district.
Another thing I just tested using “includeexpr”, “path” and “suffixesadd” is that it is not possible (as far as my knowledge goes) to let vim open files correctly if the import path is a directory. Which my module does very well for javascript-like projects.
I am not sure if I get your point according to your reference, but the expression in your reference is way simpler than mine, although I should have used includeexpr rather than remapping fg itself. I’ll put that on my todo list, since that is the recommended way.
The main difference is that I want “fg” to be better, smarter to detect file paths. As I mentioned already, javacript-like projects use lots of absolute imports these days and these are not resolved by gf.
This method even worked for Wiresharking all PS3 traffic in real time for a GTA Online session, running the tcpdump on a little plastic old mipsel SoC OpenWrt router that was also doing all the routing (not a passive sniffing box), without noticeable effect on gameplay. (I was trying to detect cheaters.)
BTW, for anyone new to tcpdump, you can also specify selectors/filtering on the command line, to reduce the traffic. The filtering in Wireshark is on top of that.
online games are pretty low volume though, data is usually transmitted at a few Kbps per player. Just out of interest, how did you try to spot cheaters doing that?
Correct, not working for Rockstar. And I'm pretty sure R* stopped caring about cheaters ruining Online for last-gen console, shortly after that could push people to buy the game again, for current-gen. :)
Perhaps he was looking for an abnormal amount of traffic, attempting to resend the same message, and hoping the server will do it multiple times in the same frame. I would guess trying to find spots where the client is overly trusted.
Indeed, this method is cool. It allowed me to sniff the traffic between some poorly documented IoT device and a remote server (unencrypted, what else) via OpenWrt:
OK, it's not NSA-level tech, but a $10 hidden mic with location and GSM cellular built into a charging cable, that 95% of us never think twice about is scarey cool.