Wednesday, July 26, 2017

Network management with LXD (2.3+)

*Back to the grind

Introduction

When LXD 2.0 shipped with Ubuntu 16.04, LXD networking was pretty simple. You could either use that “lxdbr0” bridge that “lxd init” would have you configure, provide your own or just use an existing physical interface for your containers.
While this certainly worked, it was a bit confusing because most of that bridge configuration happened outside of LXD in the Ubuntu packaging. Those scripts could only support a single bridge and none of this was exposed over the API, making remote configuration a bit of a pain.
That was all until LXD 2.3 when LXD finally grew its own network management API and command line tools to match. This post is an attempt at an overview of those new capabilities.

Basic networking

Right out of the box, LXD 2.3 comes with no network defined at all. “lxd init” will offer to set one up for you and attach it to all new containers by default, but let’s do it by hand to see what’s going on under the hood.
To create a new network with a random IPv4 and IPv6 subnet and NAT enabled, just run:
stgraber@castiana:~$ lxc network create testbr0
Network testbr0 created
You can then look at its config with:
stgraber@castiana:~$ lxc network show testbr0
name: testbr0
config:
 ipv4.address: 10.150.19.1/24
 ipv4.nat: "true"
 ipv6.address: fd42:474b:622d:259d::1/64
 ipv6.nat: "true"
managed: true
type: bridge
usedby: []
If you don’t want those auto-configured subnets, you can go with:
stgraber@castiana:~$ lxc network create testbr0 ipv6.address=none ipv4.address=10.0.3.1/24 ipv4.nat=true
Network testbr0 created
Which will result in:
stgraber@castiana:~$ lxc network show testbr0
name: testbr0
config:
 ipv4.address: 10.0.3.1/24
 ipv4.nat: "true"
 ipv6.address: none
managed: true
type: bridge
usedby: []
Having a network created and running won’t do you much good if your containers aren’t using it.
To have your newly created network attached to all containers, you can simply do:
stgraber@castiana:~$ lxc network attach-profile testbr0 default eth0
To attach a network to a single existing container, you can do:
stgraber@castiana:~$ lxc network attach my-container default eth0
Now, lets say you have openvswitch installed on that machine and want to convert that bridge to an OVS bridge, just change the driver property:
stgraber@castiana:~$ lxc network set testbr0 bridge.driver openvswitch
If you want to do a bunch of changes all at once, “lxc network edit” will let you edit the network configuration interactively in your text editor.

Static leases and port security

One of the nice thing with having LXD manage the DHCP server for you is that it makes managing DHCP leases much simpler. All you need is a container-specific nic device and the right property set.
root@yak:~# lxc init ubuntu:16.04 c1
Creating c1
root@yak:~# lxc network attach testbr0 c1 eth0
root@yak:~# lxc config device set c1 eth0 ipv4.address 10.0.3.123
root@yak:~# lxc start c1
root@yak:~# lxc list c1
+------+---------+-------------------+------+------------+-----------+
| NAME |  STATE  |        IPV4       | IPV6 |    TYPE    | SNAPSHOTS |
+------+---------+-------------------+------+------------+-----------+
|  c1  | RUNNING | 10.0.3.123 (eth0) |      | PERSISTENT | 0         |
+------+---------+-------------------+------+------------+-----------+
And same goes for IPv6 but with the “ipv6.address” property instead.
Similarly, if you want to prevent your container from ever changing its MAC address or forwarding traffic for any other MAC address (such as nesting), you can enable port security with:
root@yak:~# lxc config device set c1 eth0 security.mac_filtering true

DNS

LXD runs a DNS server on the bridge. On top of letting you set the DNS domain for the bridge (“dns.domain” network property), it also supports 3 different operating modes (“dns.mode”):
  • “managed” will have one DNS record per container, matching its name and known IP addresses. The container cannot alter this record through DHCP.
  • “dynamic” allows the containers to self-register in the DNS through DHCP. So whatever hostname the container sends during the DHCP negotiation ends up in DNS.
  • “none” is for a simple recursive DNS server without any kind of local DNS records.
The default mode is “managed” and is typically the safest and most convenient as it provides DNS records for containers but doesn’t let them spoof each other’s records by sending fake hostnames over DHCP.

Using tunnels

On top of all that, LXD also supports connecting to other hosts using GRE or VXLAN tunnels.
A LXD network can have any number of tunnels attached to it, making it easy to create networks spanning multiple hosts. This is mostly useful for development, test and demo uses, with production environment usually preferring VLANs for that kind of segmentation.
So say, you want a basic “testbr0” network running with IPv4 and IPv6 on host “edfu” and want to spawn containers using it on host “djanet”. The easiest way to do that is by using a multicast VXLAN tunnel. This type of tunnels only works when both hosts are on the same physical segment.
root@edfu:~# lxc network create testbr0 tunnel.lan.protocol=vxlan
Network testbr0 created
root@edfu:~# lxc network attach-profile testbr0 default eth0
This defines a “testbr0” bridge on host “edfu” and sets up a multicast VXLAN tunnel on it for other hosts to join it. In this setup, “edfu” will be the one acting as a router for that network, providing DHCP, DNS, … the other hosts will just be forwarding traffic over the tunnel.
root@djanet:~# lxc network create testbr0 ipv4.address=none ipv6.address=none tunnel.lan.protocol=vxlan
Network testbr0 created
root@djanet:~# lxc network attach-profile testbr0 default eth0
Now you can start containers on either host and see them getting IP from the same address pool and communicate directly with each other through the tunnel.
As mentioned earlier, this uses multicast, which usually won’t do you much good when crossing routers. For those cases, you can use VXLAN in unicast mode or a good old GRE tunnel.
To join another host using GRE, first configure the main host with:
root@edfu:~# lxc network set testbr0 tunnel.nuturo.protocol gre
root@edfu:~# lxc network set testbr0 tunnel.nuturo.local 172.17.16.2
root@edfu:~# lxc network set testbr0 tunnel.nuturo.remote 172.17.16.9
And then the “client” host with:
root@nuturo:~# lxc network create testbr0 ipv4.address=none ipv6.address=none tunnel.edfu.protocol=gre tunnel.edfu.local=172.17.16.9 tunnel.edfu.remote=172.17.16.2
Network testbr0 created
root@nuturo:~# lxc network attach-profile testbr0 default eth0
If you’d rather use vxlan, just do:
root@edfu:~# lxc network set testbr0 tunnel.edfu.id 10
root@edfu:~# lxc network set testbr0 tunnel.edfu.protocol vxlan
And:
root@nuturo:~# lxc network set testbr0 tunnel.edfu.id 10
root@nuturo:~# lxc network set testbr0 tunnel.edfu.protocol vxlan
The tunnel id is required here to avoid conflicting with the already configured multicast vxlan tunnel.
And that’s how you make cross-host networking easily with recent LXD!

Conclusion

LXD now makes it very easy to define anything from a simple single-host network to a very complex cross-host network for thousands of containers. It also makes it very simple to define a new network just for a few containers or add a second device to a container, connecting it to a separate private network.
 Stéphane Graber

While this post goes through most of the different features we support, there are quite a few more knobs that can be used to fine tune the LXD network experience.
A full list can be found here: https://github.com/lxc/lxd/blob/master/doc/configuration.md

Truth

As promised before I get back to sharing information for you to "grow" by, I promised to share the meaning of a philosophy that I created named, "Share the Ball". (I guess you didn't believe I worked from anywhere they have WiFi)


"Share the Ball", Nick Johnson

 I built this and many other blogs because anything you share comes back to you two fold. I really don't expect most Americans to get that one.
 By helping you achieve your goals, you're actually helping me. The more I invest my time, wisdom and knowledge with you, the greater my life becomes.
 The God I believe in doesn't require religion, all that he requires is that I share all that I have with others. He has already paid me to do this by the life I have. No one can pay me any amount of money to even come close to that.

So, I'm living by a technology not written in any book, well except my own books that I have written.
No matter your troubles, remember who told you this, "You are not limited to your situation, you are limited "of" the solution".

I will get back to the regular hidden faces and all that soon enough, it's just a source of humor, no more to it.

And once again, thanks,

 Nick Johnson

Throw the ball

When I return, I will explain to the best of my ability a mental technology that can take you around this world. I call it, "Throw the ball".
Real name, "Nick Johnson" born in New York State, 1963'.

Tuesday, July 25, 2017

Apologies

This is no cloak and dagger fun show. I'm a real person.
I only came home from Asia to visit. My mother has just had a major accident at the age of 86.
I will return as soon as possible.

Thank You, "Niko"

Did Nostradamus predict President Trump?


Michel de Nostradame, the 16th century apothecary and seer, published prophecies that remain chilling to this day. Their power is in their peculiar mix of vagueness and specifics: they describe nightmarish scenes with names and analogies that adhere with unsettling elegance to the political forces and personas of later ages.
Here, for example, is a classic quatrain held to describe the French Revolution

Once you've decided what any given quatrain is about, it reads like an eyewitness report by an educated man from an earlier era, trying naively to describe in terms meaningful to him the sights of an apocalyptic technological future. You can imagine him getting high, looking into the fire or a glass ball, and feverishly transcribing the incomprehensible terrors he observes.
Among Nostradamus' greatest hits were Hitler (to whom references to "Hister" are said to apply); Saddam Hussein, whose name accommodates the terrifying "Mabus" character; and Barack Obama, of course, who fits that name even better.
Sure, it's all quite silly, a load of could-mean-anything Renaissance creepypasta. And there's humor to be found in the fact that Nostradamus is so good at predicting things that have already happened.

He's mad, he's bad, and he's on track to be the Republican nominee for U.S. President in the 2016 general election—to the horror of everyone not already supporting him, including his own party.

I took a quick poke around the Internet and it seems troublingly light on "Nostradamus predicted Trump" stuff, so I figure we could start a collection here. Now, I'm no Erika Cheetham, but I've done some preliminary searches and found the following. (Yes, I'm searching English translations off the Internet for the word "Trumpet" and "Orange". Hey, if "Hister" is Hitler, it'll do.)

My findings are quite disturbing!

Century I: 40

The false trumpet concealing madness 
will cause Byzantium to change its laws. 
From Egypt there will go forth a man who wants 
the edict withdrawn, changing money and standards.

If you ask me, Nostradamus is pretty much nailing it right out the gate here. Donald Trump ("the false trumpet") is concealing his own madness. As U.S. President, he will cause Byzantium, i.e. Greece — a key entry point into the west for refugees! — to change its laws. The president of Egypt will "want the edict withdrawn," presumably because if the displaced millions are not going north, they're going south. As a result of all this, the Euro collapses.

Holy fucking shit! We're four lines in and already on the brink of World War 3.

Century I: 57

The trumpet shakes with great discord. 
An agreement broken: lifting the face to heaven: 
the bloody mouth will swim with blood; 
the face anointed with milk and honey lies on the ground.

If the first example was the sort of quatrain that shows off the Nostradamean illusion of specificity, this one shows off why he's so goddamn scary. Trump, here, is enraged: someone or something has betrayed him. In the name of religion, he talks blood and he ends up swimming in it. The land of "milk and honey" is, of course, Israel—the last line perhaps means he makes a big show of friendship and eating dirt for his efforts.

Trump has described his intention of being a 'neutral broker' between Israel and Palestine—the sort of hubris that could make things much worse when he learns everyone is smarter than he expected and not giving an inch. What options would President Trump then have, given a $700 billion military budget and a desperate, narcissistic need to solve whatever problem is making a fool of him?

Century III: 50

The republic of the great city 
Will not want to consent to the great severity: 
King summoned by trumpet to go out, 
The ladder at the wall, the city will repent.

Such vague Nostradamus metaphors tend to have established interpretations. But for the purposes of blogging, this looks to me like Trump being unable to get America (the republic) to go on some expensive military adventure. So he tells Britain (the King — sorry, Liz, times up!) to do the work. As it begins (ladder at the wall!) America realizes it needs to do its part. Trump looks like a fool and must repent.

This could be some kind of risky humanitarian thing that reeks of more immigrants, perhaps -- evacuating Tripoli from an ISIS siege would be ultra-Nostradamean.

Century X: 76

The great Senate will ordain the triumph 
For one who afterwards will be vanquished, driven out: 
At the sound of the trumpet of his adherents there will be 
Put up for sale their possessions, enemies expelled.

This one's easy but boring. The U.S. Senate makes a show of supporting Trump, but stabs him in the back: he's impeached or ditched after four years. But then "at the sound of the trump his adherents will be there", selling their possessions and expelling enemies. The final apotheosis of Trumpism: the personality cult of a one-term loser.

(In a good Nostradamus book, there'd be a wargames-esque picture of Europe here with arrows flying this way and that to indicate where the invasions and refugees are going, which Middle Eastern countries end up frozen in a tranquil seas of glass, what year and month Jesus turns up, etc.)

The Role of Technology in the Transformation of Sexuality



In the present master thesis I aim to describe how technology reshapes and transforms sexuality, but also to present a normative account of how the role of technology in the transformation of sexuality should be addressed as an issue of sexual education. The starting point of my analysis is the split between sex and reproduction.



I argue that contraception technologies freed sexuality from the needs of reproduction, played an important role in the emergence of what Anthony Giddens defines as plastic sexuality and in the reordering of sexuality in relations to lifestyles. I then use the work of Don Ihde and Peter-Paul Verbeek in order to present how contraception technologies determine the very possibilities we have for interpreting our sexuality due to their role in our bodily and sensory involvement in a sexual act. My next step is to use Anthony Giddens’ approach towards modernity. I argue that our sexual identities, as part of our self-identities, are reflexively organized in the light of new information and knowledge. I then proceed in introducing pornography. I elaborate on its new cultural position and role and the role of technology in the transformation of pornography, both in qualitative and quantitative terms. I argue that due to the emergence of plastic sexuality and due to the reflexive organization of our sexual-identities, pornography emergence as a source of information about sex and sexuality. By using this analysis I argue that the role of technology in the transformation of sexuality should be addressed as an issue of sexual education and should be understood in connection with plastic sexuality, the reflexive organization of our sexual identities in the conditions of modernity and pornification.
Philosophy of Science, Technology and Society MSc (60024)
Link to this item:http://purl.utwente.nl/essays/70619

4 Tips to Understanding Bandwidth


When you purchase a plan from a hosting company, you will notice that  an amount of bandwidth is included in that package. So what exactly is bandwidth? How does it effect you and your website? How does it relate to web hosting?  Here are the keys elements explained. 

  1. Bandwidth is actually a term containing several components. It is not only the amount of traffic or data transfer passing through a website, it is also the size of the conduit that this data passes through and the speed of the conduit. There are some technical equations that calculate all of this into a number that really doesn’t mean much to a website owner.
  2. Bandwidth can be easier to understand if we use an analogy from everyday life that we can all relate to.Think of Bandwidth as highway “traffic”. If someone was to ask you “what was the traffic like on your way over?” Your answer would most likely take into consideration the number of lanes, the max speed of the highway, the speed you were actually able to travel and the number of cars on the road at the time, all factoring in to your answer as to how you perceived the “traffic” to be.
  3. In website hosting, the term “bandwidth” is often incorrectly used to describe the amount of data transferred to or from the website or server within a prescribed period of time, for example understanding bandwidth consumption accumulated over a month measured in gigabytes per month, ie.. the number of cars actually passing through the highway. The more accurate way to state this is the amount of data passing through a hosting account each month or “monthly data transfer”. If you happen to exceed the amount of monthly data transfer that is allocated to your plan you will run into additional charges, just like you would on a cell phone when you go over your minutes. Every hosting plan has a limit. Hosting companies offering “unlimited” bandwidth will usually have some fine print explaining exceptions or will simply slow your rate of transfer. There is no such thing as unlimited, so if it sounds too good to be true- chances are it is.
  4. What you can do to reduce your monthly transfer: Be careful to choose a hosting plan that includes more than enough bandwidth space to fit your sites needs. Its better to have too much than too little. If you find that you are experiencing constant overage fees, you will want to to determine if you should upgrade to a higher hosting plan.
Let’s finish by stating that most personal or small business sites will not need more than a few GB of bandwidth per month. If you do go over the amount of bandwidth allocated in your plan, your hosting company could charge you overage fees. If you think the traffic to your site will be high, you will want to calculate the bandwidth required in a hosting plan that will fit your needs. For full details on hosting plans, please check out our site 

A Robot Has Just Passed a Classic Self-Awareness Test For The First Time


A researcher at Ransselaer Polytechnic Institute in the US has given three Nao robots an updated version of the classic 'wise men puzzle' self-awareness test... and one of them has managed to pass.
In the classic test, a hypothetical King calls forward the three wisest men in the country and puts either a white or a blue hat on their heads. They can all see each other's hats, but not their own, and they're not allowed to talk to each other. The King promises that at least one of them is wearing a blue hat, and that the contest is fair, meaning that none of them have access to any information that the others don't. Whoever is smart enough to work out which colour hat they're wearing using that limited information will become the King's new advisor.
In this updated AI version, the robots are each given a 'pill' (which is actually a tap on the head, because, you know, robots can't swallow). Two of the pills will render the robots silent, and one is a placebo. The tester, Selmer Bringsjord, chair of Rensselaer’s cognitive science department, then asks the robots which pill they received. 
There's silence for a little while, and then one of the little bots gets up and declares "I don't know!" But at the sound of its own voice it quickly changes his mind and puts its hand up. "Sorry, I know now," it exclaims politely. "I was able to prove that I was not given the dumbing pill."
It may seem pretty simple, but for robots, this is one of the hardest tests out there. It not only requires the AI to be able to listen to and understand a question, but also to hear its own voice and recognise that it's distinct from the other robots. And then it needs to link that realisation back to the original question to come up with an answer.
But don't panic, this isn't anything close to the type of self-awareness that we have as humans, or the kind that the AI Skynet experiences in The Terminator, when it decides to blow up all humans.
Instead, the robots have been programmed to be self-conscious in a specific situation. But it's still an important step towards creating robots that understand their role in society, which will be crucial to turning them into more useful citizens. "We’re talking about a logical and a mathematical correlate to self-consciousness, and we’re saying that we’re making progress on that," Bringsjord told Jordan Pearson at Motherboard.
Right now, the main thing holding AI back from being truly self-aware is the fact that they simply can't crunch as much data as the human brain, as Hal Hodson writes for New Scientist"Even though cameras can capture more data about a scene than the human eye, roboticists are at a loss as to how to stitch all that information together to build a cohesive picture of the world," he says.
Still, that doesn't mean that we don't need to be careful when creating smarter AI. Because, really, if we can program a machine to have the mathematical equivalent of wants and desires, what's to stop it from deciding to do bad things?
"This is a fundamental question that I hope people are increasingly understanding about dangerous machines," said Bringsjord. "All the structures and all the processes, informationally speaking, that are associated with performing actions out of malice could be present in the robot."
Bringsjord will present his research this August at the IEEE RO-MAN conference in Japan, which is focussed on "interactions with socially embedded robots".
Oh, and in case you were wondering, the answer to the King's original 'wise men test' is that all the participants must have been given blue hats, otherwise it wouldn't have a been fair contest. Or at least, that's one of the solutions.
FIONA MACDONALD

Could You Handle an Emergency? What to Do in 12 Scary Situations

*I didn't have time to go through the details of this post yet I strongly advise you take my 2 cents:
 - Remain calm.
 - If you do not know the medications a person takes, dig through drawers and cabinets.
 - Explain Slowly to the emergency staff the nature of your situation
 - Talk to the victim even if they are not alert.
 - Remain calm
 - Remain calm.
I have buried more men and women than I can count and for those who have followed me since American Citizen's Admin - This probably sounds like a broken record.


You see your toddler at the bottom of the pool.

Imagine this: You take your eyes off your toddler for just a few seconds in your neighbor's backyard, and suddenly you see her body at the bottom of the deep end of the swimming pool. Terrified, your first instinct is to leap in.
Don't do it. First tell another person to call 911, and then grab something that floats -- like a raft or a chair cushion -- before you jump in, experts warn. "Most people actually aren't strong enough swimmers to get a child out of a pool without using a flotation device," says B.J. Fisher, director of health and safety for the American Lifeguard Association. "The child will drag you back down." This is just one of the many errors that parents make in those types of scary situations you have nightmares about. Sometimes, we simply react without thinking. Other times, we rely on outdated medical information or home remedies that have no scientific evidence to back them up. Here are more worst-case scenarios, and the right and wrong ways to help your family.

    A cup of hot coffee spills on your child's leg.

    Wrong response: Put ice on it.
    Smart move: Quickly remove any clothing, run cool water on the burn for 10 minutes, and then cover it loosely with gauze. Ice and even cold water may further damage the skin. "Your child can actually get a frostbite-like injury if you put ice directly on the skin, especially if the skin is already damaged from a burn," says Bob Waddell, who trains paramedics in pediatric care for the National Association of Emergency Medical Technicians. Don't put butter or antibiotic ointment on the burn either. If the wound blisters, call the doctor, especially if the blisters are larger than a quarter.

      You're driving and see a tornado approaching.

      Wrong response: Take shelter under an overpass as soon as possible.
      Smart move: If traffic is light and you can see that the tornado is distant, try to drive out of its path by moving at a right angle to it. Otherwise, park your car and go inside a sturdy building, says Roger Edwards, a meteorologist at the Storm Prediction Center. If you're in open country, run to low ground away from cars and trees, which could be blown onto you. Lie facedown, protecting the back of your head with your arms, and tell your children to do the same. "Seeking shelter under a bridge or an overpass offers little protection against deadly flying debris," Edwards says.
      Smart move: Call out to your child, do a quick search, and then immediately find a store worker. "Don't be afraid to ask for help," says Nancy McBride, national safety director for the National Center for Missing and Exploited Children. "Store associates have been trained to know what to do if a child is missing -- manning exits and entrances, checking restrooms, and looking under clothing displays." If you don't find your child soon, call the police.

        You're confronted by a black bear in the woods.

        Wrong response: Play dead.
        Smart move: Most black bears are not interested in people and can be scared away, says Tim Smith, a former wilderness EMT and owner of Jack Mountain Bushcraft and Guide Service, in Masardis, Maine. Stand up as tall as you can (hold your arms up to appear bigger), and speak in a deep, loud voice while backing up slowly. If the bear charges or starts to attack, believe it or not, you should fight back vigorously. If you can, hit him in the nose, since that's a bear's main sensory organ. Whatever you do, don't run. "If you run, the bear is going to chase you, and it can run faster than you can," says Smith. However, you should play dead if a brown grizzly bear charges at you, because they typically won't be scared away. (There are no grizzlies east of the Rocky Mountains.)

          You find your toddler holding medicine, but don't know if she's eaten any.

          Wrong response: Watch her carefully for signs of sickness.
          Smart move: Call Poison Control immediately at 800-222-1222 -- experts are available 24/7. "Don't wait to see what happens," says Richard Dart, MD, director of the Rocky Mountain Poison and Drug Center. "They'll be able to tell you right away if the medicine is toxic and whether you should take your child to the emergency room." Some poisons take a while to have a serious impact, and by that time it could be too late.

            You and your child get caught in a riptide.

            Wrong response: Try to swim directly toward shore.
            Smart move: Swim parallel to the beach until you're beyond the pull of the current, and then slowly swim back to shore so you don't get tired. Most riptides are only 20 to 60 feet wide, says Fisher. People can drown when they panic or become exhausted struggling against the current.

              Your child gets hit in the head and falls to the ground, unconscious.

              Wrong response: Take him to the hospital.
              Smart move: Call 911. He could have a spinal or brain injury, and moving him could make the injury worse, says Anne Stack, MD, clinical chief of pediatric emergency medicine at Children's Hospital Boston. Make sure that your child is breathing and that he has a pulse. If he doesn't, start CPR immediately. Otherwise, shake him very gently and call his name to see whether he'll wake up.

                Your child gets stung by a jellyfish.

                Wrong response: Put rubbing alcohol or urine on the wound.
                Smart move: Rinse it with sea water (fresh water will make the wound even more painful) and remove any visible tentacles, recommends Paul Auerbach, MD, an emergency physician at Stanford University Medical Center and author of Medicine for the Outdoors. Then soak a napkin or cloth with white vinegar and apply continuously until your child no longer seems to be in pain. (Lifeguards often carry a vinegar solution. But if none is on hand, send someone to get some from a nearby home, store, or restaurant.) Vinegar will deactivate the stinging cells of most jellyfish, which otherwise can cause pain for 30 minutes or more. If your child has any sign of an allergic reaction (difficulty breathing, wheezing, or hives), seek emergency medical care right away.

                Re:
                 I disabled the feature that shows my followers, it's not about the numbers. Read the side bar.

                Easiest Way to Load Your Task Bar Windows 10

                (Here I go trying to Explain)
                Click the Windows logo in the left hand corner like always >

                When your program appears, don't open it. Left click and there will be a drop down menu.
                Click > Pin to the Task Bar >
                Basically the same on all Windows OS

                Finished product

                If you've been with my blog for 30 days or so, this picture was taken with the cell phone hybrid camera that I designed and built. I don't have a name for it yet, call it a hybrid.

                Ghosting


                Ghosting may refer to any of the following:
                1.ghost image is a permanent discoloration in a certain area on an electronic display; more specifically, those which use cathode ray tubes. See our burn in page for further information on this term.
                2. A ghost is a description of a person who has gone offline, yet appears as though they are still logged into chat or another service. When this occurs, the user will receive an error indicating they are already logged in upon attempting to rejoin, forcing them to wait for their account time out.
                3. Ghosting is a form of cheating in online games where players are privileged to information they shouldn't have about another player's whereabouts, hand, etc.
                For example, in many first-person shooters, dead players may disclose the location of living players on the opposing team to their teammates. Another example would be watching a Hearthstone: Heroes of Warcraft player who is streaming on Twitch to discover what cards are in their hand.
                4. When describing an LCD or flat-panel display, ghosting is used to describe an artifact caused by a slow response time. As the screen refreshes, the human eye still perceives the image previously displayed; causing a smearing or blurring visual effect.
                5. When using Norton's Ghost, ghosting is the method of copying the complete hard drivecontents to a CD or network drive. Once ghosted, this image can be distributed over several computers. Ghosting is commonly done in a corporate environment where the same operating system and corporate software needs to be installed on dozens of different computers.
                Computer Hope

                Featured Posts

                Beautiful American Bully Pups for Sale

                 

                Popular Posts