How is this β€œMil-Sim” if the mil-sim operators have identities, outfits, and entire bios? How are they different from normal operators at this point?
πŸ‘︎ 184
πŸ’¬︎
πŸ‘€︎ u/Flaano
πŸ“…︎ Apr 19 2021
🚨︎ report
β€œwannabe-operator identity”
πŸ‘︎ 593
πŸ’¬︎
πŸ‘€︎ u/reubadoob
πŸ“…︎ Feb 07 2021
🚨︎ report
[D] Taking a GIF trip through linear operator space from the identity function to the 2D Discrete Fourier transform. (OC) On the potential of fractional operators.

https://i.redd.it/thvnxea9lao61.gif

So this is more of just a fun post: I'm curious if anyone had any applications or ideas which used fractional operators . I also wanted to show of my gif.

A bit of background on what's in the GIF and fractional operators in general.

Recall that the 2D discrete Fourier transform, F, is a linear operator on a space of matrices (or d by d arrays). If we apply the Fourier transform 4 times it returns the identity function i.e. F^4 = F(F(F(F))) = I. Note that people have figured out how to let these exponents take non-integer values! This corresponds to fractional Fourier transforms. So for example the half Fourier transform F^(1/2) is something that functions like the square root of the Fourier transform. If we let G = F^(1/2) then we have that G(G)=F, or maybe a bit more concretely, for any matrix/image X, we have that G(G(X)) = F(X). These special exponents behave like regular old exponents in a lot of ways and it has been observed that one can construct F^a for arbitrary real-valued a.

The GIF I've posed takes an image of a pagoda X and applies increasing fractional degrees of Fourier transforms. Specifically the graph shows shows F^a (X) as a goes from 0 to 4.

Links, more on fractional operators

Conclusion
I'm curious if anyone has any interesting ideas...

πŸ‘︎ 12
πŸ’¬︎
πŸ‘€︎ u/robertavdm
πŸ“…︎ Mar 21 2021
🚨︎ report
Korea 'Digital Prison' reveals identities of child porn site operator and judges who released him koreatimes.co.kr/www/nati…
πŸ‘︎ 1k
πŸ’¬︎
πŸ‘€︎ u/INGLanguage
πŸ“…︎ Jul 20 2020
🚨︎ report
Hello there. I play for honor and r6. I was thinking. Damn rainbow has some cool design terrorist. Why don't they use them in story mode like FH. R6 Lacks a good story mode or even a movie. The plot: someone betrayed rainbow and some operators identity is no longer secret. They have to be prepared
πŸ‘︎ 5
πŸ’¬︎
πŸ‘€︎ u/Buff_reza_pls
πŸ“…︎ Dec 11 2020
🚨︎ report
Korea 'Digital Prison' reveals identities of child porn site operator and judges who released him koreatimes.co.kr/www/nati…
πŸ‘︎ 84
πŸ’¬︎
πŸ‘€︎ u/INGLanguage
πŸ“…︎ Jul 20 2020
🚨︎ report
Difference between identity linear map and linear operator

Both of these are linear transformation. Identity linear mapping [ I : V --> V] and linear operators [ T : V --> V]? Book says- identity linear map forms when V maps into itself, whereas linear operator, is formed when domain = range. Then how they are different I can't get it?

πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/fresh_A_F
πŸ“…︎ Aug 04 2020
🚨︎ report
New R6: Siege operator identity revealed
πŸ‘︎ 25
πŸ’¬︎
πŸ‘€︎ u/SmocksT
πŸ“…︎ May 20 2020
🚨︎ report
Identity operators and integers

Apologies if this has been asked before. Can someone help me understand the following:

>>> num1 = 256

>>> num2 = 256

>>> num1 == num2

True

>>> num1 is num2

True

>>> num3 = 257

>>> num4 = 257

>>> num3 == num4

True

>>> num3 is num4

False

πŸ‘︎ 16
πŸ’¬︎
πŸ‘€︎ u/StiffPrism
πŸ“…︎ Mar 02 2020
🚨︎ report
Government Seeks to Eliminate Internet Anonymity – With Severe Penalties - Users of online forums in Austria will have to provide operators with their true identities or risk fines that could run into the millions. derstandard.at/2000101677…
πŸ‘︎ 124
πŸ’¬︎
πŸ‘€︎ u/speckz
πŸ“…︎ Apr 20 2019
🚨︎ report
Type Comparison In C#- In this post, we will discuss different types of comparison methods, such as equality operators, object.equals method and IEquatable interface, used for comparing values in C#. We will also discuss differences between identity equality and value equality. codewithshadman.com/type-…
πŸ‘︎ 14
πŸ’¬︎
πŸ‘€︎ u/kudchikarsk
πŸ“…︎ Dec 08 2019
🚨︎ report
Why is the operator identity hidden when a defender goes outside if they have an Alibi?

I fail to see why the needed to include that.

πŸ‘︎ 15
πŸ’¬︎
πŸ‘€︎ u/greenpumpkin812
πŸ“…︎ May 26 2019
🚨︎ report
[News] MangaDex Targeted by Viz DMCA Subpoena, Cloudflare is to give up the identity of MangaDex's operator torrentfreak.com/mangadex…
πŸ‘︎ 14
πŸ’¬︎
πŸ‘€︎ u/alexaclova
πŸ“…︎ Jan 04 2020
🚨︎ report
[Relay Operator Question] Lost ed25519_master_id_secret_key, do I have to create a new identity?

I've been running my relay since 2013, and have my secret_id_key backed up.

I recently updated from a very old version (0.2.4.23) to the recent stable version of Tor (0.4.1.6).

I copied my secret_id_key over and it started up and everything was good, had the same fingerprint and showed up on the https://metrics.torproject.org explorer as updated.

Then I was doing some maintenance and accidentally nuked the Tor data dir. I restored my old secret_id_key and started up again, however now I'm getting these warnings in my logs:

>Oct 10 15:31:49.000 [warn] http status 400 ("Looks like your keypair has changed? This authority previously recorded a different RSA identity for this Ed25519 identity (or vice versa.) Did you replace or copy some of your key files, but not the others? You should either restore the expected keypair, or delete your keys and restart Tor to start your relay with a new identity.") response from dirserver '128.31.0.34:9131'. Please correct.

And the metrics site is showing my node is down while it's running.

After checking the keys directory, the newer Tor version generates some new files I'm not familiar with:

ed25519_master_id_public_key

ed25519_master_id_secret_key

ed25519_signing_cert

ed25519_signing_secret_key

I don't have those ed25519 keys from my first run backed up anywhere, I didn't know they existed. It seems like they were cached by other nodes on the first run and now they won't accept my node without the ed25519 keys. What are these keys? Are they generated randomly by the first version of Tor that uses them? Not deterministically from secret_id_key.

Is there anything I can do to resolve this?

I really don't want to nuke my keys and use a new identity, I've been running these keys for the last 6.5 years :/

πŸ‘︎ 2
πŸ’¬︎
πŸ‘€︎ u/dyslexiccoder
πŸ“…︎ Oct 10 2019
🚨︎ report
/r/ModeratePolitics mods ban all discussion on gender identity, the transgender experience, and surrounding laws, due to the realization that any form of contrarian thought on these topics violates Reddit's Anti-Evil Operations" team's rules on permissible speech. reddit.com/r/moderatepoli…
πŸ‘︎ 1k
πŸ’¬︎
πŸ‘€︎ u/TaskerTunnelSnake
πŸ“…︎ Apr 06 2021
🚨︎ report
Graphika | UK Trade Leaks: Operators keen to hide their identities disseminated leaked UK/US trade documents in a similar fashion to Russian operation β€œSecondary Infektion,” exposed in June 2019 [.pdf20] graphika.com/uploads/Grap…
πŸ‘︎ 4
πŸ’¬︎
πŸ‘€︎ u/-Ph03niX-
πŸ“…︎ Dec 08 2019
🚨︎ report
Variable VS String Literal, equality operator "==" vs identity operator "IS"

Forgot to include language: Python

I'm trying to put a concept I don't quite understand into my own words and I'd like to know if I'm on the right track.

sub_reddit = CS (creates the variable "CS")

sub_reddit == CS (would evaluate as true)

sub_reddit is CS (would evaluate to false because they are "bound to different objects")

Identity Operators make "CS" a separate object or "string literal" and since this new object is stored in a different memory location than "sub_reddit", this is why it equates to true.

PS: Would this rule hold true for all programming languages?

Thanks yall and I appreciate the help in advance for helping me understand this concept a bit.

πŸ‘︎ 9
πŸ’¬︎
πŸ‘€︎ u/TheGraysmith
πŸ“…︎ Apr 06 2019
🚨︎ report
How do sonar operators the identity of a contact?

For example, a sonar operator (or the person incharge) has a contact on the surface of a ship. How does he know

1- Whose ship it is? If not your own (you might have all of their locations), it could be a friendly?

2- What type is it?

Edit: The title should be "Know the identity of a contact". Sorry.

πŸ‘︎ 6
πŸ’¬︎
πŸ‘€︎ u/Jango214
πŸ“…︎ Dec 16 2018
🚨︎ report
Belgian banks and telecom operators launch one digital identity plusmagazine.knack.be/mul…
πŸ‘︎ 13
πŸ’¬︎
πŸ‘€︎ u/weymiensn
πŸ“…︎ May 30 2017
🚨︎ report
[Discussion] Revenge Porn Site Operator Sentenced to 18 years for Extortion and Identity Theft

http://www.latimes.com/local/lanow/la-me-ln-revenge-porn-sentenced-20150403-story.html

Sorry if someone has already posted this, I just saw it.

πŸ‘︎ 93
πŸ’¬︎
πŸ“…︎ Apr 05 2015
🚨︎ report
Michael Baylor: β€œFollowing up on @thejackbeyer's find, I can confirm that Deimos and Phobos are the names of two oil rigs purchased by SpaceX – likely for conversion to support Starship operations. ENSCO 8500 and ENSCO 8501 were the previous names of the rigs. They are nearly identical twins.” twitter.com/nextspaceflig…
πŸ‘︎ 3k
πŸ’¬︎
πŸ‘€︎ u/Broccoli32
πŸ“…︎ Jan 19 2021
🚨︎ report

Please note that this site uses cookies to personalise content and adverts, to provide social media features, and to analyse web traffic. Click here for more information.