uncleflo

profile picture

Some cool dude. Higher order of decision making. Absolute.

Registered since September 28th, 2017

Has a total of 4246 bookmarks.

Showing top Tags within 17 bookmarks

howto   information   development   guide   reference   administration   design   website   software   solution   service   product   online   business   uk   tool   company   linux   code   server   system   application   web   list   video   marine   create   data   experience   description   tutorial   explanation   technology   build   blog   article   learn   world   project   boat   download   windows   security   lookup   free   performance   javascript   technical   network   control   beautiful   support   london   tools   course   file   research   purchase   library   programming   image   youtube   example   php   construction   html   opensource   quality   install   community   computer   profile   feature   power   browser   music   platform   mobile   work   user   process   database   share   manage   hardware   professional   buy   industry   internet   dance   advice   installation   developer   3d   search   camera   access   material   customer   travel   test   standard   review   documentation   css   money   engineering   webdesign   engine   develop   device   photography   digital   api   speed   source   program   management   phone   discussion   question   event   client   story   simple   water   marketing   yacht   app   content   setup   package   fast   idea   interface   account   communication   cheap   compare   script   study   market   easy   live   google   resource   operation   startup   monitor   training  


Tag selected: detection.

Clear all

Showing 17 results.

Looking up detection tag. Showing 17 results. Clear

No Fly Drones

https://www.noflydrones.co.uk/

Saved by uncleflo on February 12th, 2022.

Ever asked yourself "Where can't I fly my drone in the UK?" or "What does a Flight Restriction Zone mean?" NoFlyDrones.co.uk can help. Your free, easy to use tool showing no fly zones in the UK. We use the rules and regulations of the UK Air Navigation Order (CAP393) to present a simple graphical tool to aid safe flight planning for hobbyists and professional drone operators alike. Danger Areas are areas of military airspace often used for activities such as fighter pilot training, live ammunition training or weapons and systems testing (including GPS jamming exercises). The official definition is “An airspace of defined dimensions within which activities dangerous to the flight of aircraft may exist at specified time”. HIRTA’s are High Intensity Radio Transmission Areas and flying through these areas could interfere with the electronics on board your drone. Prohibited Areas are areas of airspace which for one reason or another have been prohibited from having aircraft enter them. The official definition is “An airspace of defined dimensions above the land areas or territorial waters of a State within which the flight of aircraft is prohibited” You will have to investigate the NATS AIP for more information about why the area is prohibited.

drone airspace aerodrome bounds map unmanned restriction forbid jamming font geometry marker export comment zoom prohibit remote browser flight assign protect privacy interfere dimension check arrange fly detection safety training military danger activity hobby gps area electronic show tool plan


QVerity

http://www.qverity.com/

Saved by uncleflo on January 14th, 2022.

QVerity is a provider of behavioral analysis and screening services for private- and public-sector clients worldwide. Founded and staffed by former Central Intelligence Agency experts in deception detection and critical interviewing techniques, QVerity uses proven information-gathering methodologies, developed within the U.S. intelligence community, for commercial applications. Our services yield an exclusive level of analysis that enables competitive advantage and high-value insight for organizational and individual benefit. QVerity is privately held and is headquartered in Greenville, N.C.

deceptive deception detection behaviour insight organizational teach provider manual learn analysis advantage course product service information gather screen intelligence agency expert critical technique application benefit online company


Mandiant Advantage Threat Intelligence | FireEye

https://www.fireeye.com/mandiant/advantage.html

Saved by uncleflo on April 10th, 2021.

A global network of support experts available 24x7. We offer simple and flexible support programs to maximize the value of your FireEye products and services. The new standard in threat intelligence. Access for our registered Partners to help you be successful with FireEye.
Collateral, deal registration, request for funds, training, enablement, and more. Read our digital magazine providing expert-authored stories, information, unique insights, and advice on cyber security.

comprehensive enable alert api hacker threat attack vulnerability privacy intelligence global financial motivate emerge documentation incident detection advantage information lookup understand insight value product service flexible support program maximize


Super 800A 1200A 28S high powerful Brushless controller ESC For Car electric motorcycle or Air-in Parts & Accessories from Toys & Hobbies on AliExpress

https://www.aliexpress.com/item/1527053425.html

Saved by uncleflo on December 22nd, 2019.

Super 800A-1200A 28S high powerful Brushless controller ESC For Car electric motorcycle or Air. Latest design for more efficient water cooling structure. The firmware is upgraded recently. Two way communication while connecting it with computer. Motor wire can be checked while connecting the power battery. Simply set function value by programming box or by PC via USB cable. Li-MH/Li-Po,Ne-Cd/Ne-mH,LiFe battery can be used. Enables settings the voltage per cell for the point at which the controller's cut off circuitry engages,Li-MH/Li-Po from 2.0-3.6,Ne-Cd/Ne-4-1.0V.LiFe from 2.2-2.8V. Reverse function,the delay time of reverse is adjustable. The power of the motor forward/reverse can be set. Automatically detection the throttle route or can be set a fixed number by manual operation. Auto cut off the power within 3 seconds if no radio signs. Timing setting may be adjusted(0-30) to suit the motor type.

brushless controller esc electric motorcycle car air efficient watercooled structure firmware communication computer motor wire battery programming usb voltage controller reverse detection throttle manual operation engine electronics transport


ISO 12233 — Resolution and spatial frequency responses | imatest

http://www.imatest.com/solutions/iso-12233/

Saved by uncleflo on January 6th, 2019.

This new standard defines three test charts. The new Imatest eSFR ISO module performs a highly automated analysis of the new low contrast (4:1) Edge SFR chart and is available in Imatest Master and Image Sensor 4.0. This chart does not work with the highly automated Imatest eSFR ISO module, described below. For highly automated measurements (including squares near the corners, color patches, and wedges) we recommend one of the Imatest eSFR ISO charts shown below. These charts are fully compliant with ISO 12233:2017. Supported by the Imatest Star Chart module. Optional automatic region detection is available when used with a star pattern that has registration marks on the sides of the image.

sharpness glare sharp wedge automate reflective square module finer diagonal compliant photographic frame conform chart detection recommend enhanced aspect horizontal image requirement compliance corners edge vertical angle contrast test testing photography camera lens iso analysis registration video resolution compare


Certified Ethical Hacker - Cyber Security Academy

http://www.cybersecurityacademy.com/Certified-Ethical-Hacker.html

Saved by uncleflo on June 30th, 2017.

The Certified Ethical Hacker course through CyberSecurity Academy will help you to stop hackers by learning to think like one. This class immerses students in an interactive environment where they will scan, test, hack, and secure their own systems. CEH candidates will learn how intruders escalate privileges and what steps can be taken to secure a system. Also covered will be Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. All students will leave the class with a detailed plan on conducting vulnerability assessments and penetration tests.

ethical hacker academy intruder course howto learn secure detection popular demand privilege engineer policy create virus plan conduct assessment penetrate vulnerable center


Ray / Triangle intersection code - Math and Physics - GameDev.net

http://www.gamedev.net/topic/447861-ray--triangle-intersection-code/

Saved by uncleflo on December 7th, 2014.

Hallo, Im working on the collision detection part of my program and have it partially working. Right now it works in some cases, but fails in other A triangle made like this works.

raytracer study detection program development solution guide discussion forum triangle case physics game intersection code ray work collision partial suggestion howto cpp c++ compile math advice community


None

https://www.redscan.com/

Saved by uncleflo on November 14th, 2014.

Redscan enables businesses to manage their IT security risks by providing a subscription service that combines the people, process, technology, and intelligence needed to proactively identify and manage threats and breaches. The IT security challenge facing most businesses today is that cyber-attacks are increasingly advanced and too easily evade traditional signature-based defences such as next generation firewall, IPS and anti-virus. Organisations need to be able to identify and stop these attacks quickly before they cause significant damage. However, the time, resource, and cost to do this effectively is too high.

red scan business it security risk provide secure network threat detection client industry design size experience guide device manage event report forensic install operation centre deliver technology intelligence advanced subscribe service attack preventative prevent account law study certification deploy reduce mountain data incident


Google Maps Has Been Tracking Your Every Move, And There’s A Website To Prove It | Junkee

http://junkee.com/google-maps-has-been-tracking-your-every-move-and-theres-a-website-to-prove-it/39639#rqfIUBDL4v1lxHIe.01

Saved by uncleflo on September 2nd, 2014.

Remember that scene in Minority Report, where Tom Cruise is on the run from the law, but is unable to avoid detection because everywhere he goes there are constant retina scans feeding his location back to a central database? That’s tomorrow. Today, Google is tracking wherever your smartphone goes, and putting a neat red dot on a map to mark the occasion. Read more at http://junkee.com/google-maps-has-been-tracking-your-every-move-and-theres-a-website-to-prove-it/39639#LcAcPVvVY28uzmSR.99

story google location track move website map data transparancy central database detection scan sensor gps phone show demonstrate useful interesting world article privacy breach challenge nerd technical


Secure Your Apache With mod_security | HowtoForge - Linux Howtos and Tutorials

http://www.howtoforge.com/apache_mod_security

Saved by uncleflo on September 12th, 2013.

This article shows how to install and configure mod_security. mod_security is an Apache module (for Apache 1 and 2) that provides intrusion detection and prevention for web applications. It aims at shielding web applications from known and unknown attacks, such as SQL injection attacks, cross-site scripting, path traversal attacks, etc. In the first chapter I will show how to install mod_security on Debian Sarge, Ubuntu 6.06 LTS (Dapper Drake), and on Fedora Core 5, and in the second chapter I will describe how to configure Apache for mod_security which is independent from the distribution you're using. I want to say first that this is not the only way of setting up such a system. There are many ways of achieving this goal but this is the way I take. I do not issue any guarantee that this will work for you!

system secure apache module security linux howto guide tutorial configuration setup detection prevention attack sql injection shield intrusion


ISPrime.com - Main Page

http://www.isprime.com/

Saved by uncleflo on May 17th, 2013.

ISPrime is a privately held professional managed service company. We provide guaranteed reliable web hosting, comprehensive security services, website design and powerful managed services that enable our customers to realize their business goals. Through our industry strength and expertise ISPrime leads the managed services market by providing state of the art technology with flexibility and control that guarantee the right solution at the right price for clients with any size, and clients with diverse needs. ISPrime is one of the largest Managed Service companies allowing us to provide our customers and partners unparalleled stability and reliability. ISPrime offers a 24/7/365 support via toll free telephone number, ICQ and E-mail. ISPrime offers a multi-homed network with over 95,000 Mbps transit capacity, top-notch service and 100% network uptime: this is why we have been consistently rated as the top rated managed hosting company in the industry.

isprime network center data support server hosting bandwidth realtime monitor detection security surveillance managed service encoding


A battle of three descriptors: SURF, FREAK and BRISK

http://www.tuicool.com/articles/ZrUjuu

Saved by uncleflo on August 27th, 2012.

I think developers and research guys who works with object recognition, image registration and other areas that uses keypoint extraction can find this post useful. Recently (from 2.4.2) a new feature descriptor algorithm was added to OpenCV library. FREAK descriptor is claimed to be superior to ORB and SURF descriptors, yet it's very fast (comparable to ORB). Also people in comments on my blog mentioned BRISK descriptor which is also new and more efficient than SURF. Well, finally i find a time to compare them and publish my research results.

tui cool articles algorithms feature detection object recognition keypoint extraction descriptor speed efficient


OpenCV Tutorial 5

http://dasl.mem.drexel.edu/~noahKuntz/openCVTut5.html

Saved by uncleflo on June 24th, 2012.

The first transform I will cover is Canny Edge Detection. The book describes Sobel and Laplace operators for gradient detection, for more technical details about their function please see the text. The Canny Edge Detection algorithm takes the derivative of an image to find the gradients, then determines the direction of these gradients (vertical, horizontal, diagonal up, diagonal down). Then if the amplitude of a given gradient is high enough (the high threshold), the algorithm will trace along that gradient in its direction until the amplitude falls below the low threshold, or the gradient changes direction sharply. The algorithm will also suppress local non-maximums around the edges. cvCanny implements this algorithm. The inputs are the two images to be used, the thresholds, and the aperature size of the convolution kernal. For this example I created two sliders that adjust the thresholds, try moving the sliders and see the effect of the thresholds on the resulting edges.

opencv solution canny algorithm detection technical edge gradient function user image


Military Aviation

http://sirviper.com/index.php?page=usaf/gunships/ac130

Saved by uncleflo on May 19th, 2012.

These heavily armed aircraft incorporate side-firing weapons integrated with sophisticated sensor, navigation and fire control systems to provide surgical firepower or area saturation during extended loiter periods, at night and in adverse weather. The sensor suite consists of a television sensor, infrared sensor and radar. These sensors allow the gunship to visually or electronically identify friendly ground forces and targets any place, any time. The AC-130U employs synthetic apertures strike radar for long-range target detection and identification. The gunship's navigational devices include the inertial navigation systems and global positioning system. The AC-130U employs the latest technologies and can attack two targets simultaneously. It also has twice the munitions capacity of the AC-130H.

military aviation target detection airplane gunship gun ship heavy support information


Xorg.conf and incorrect resolution detection

http://grenage.com/xorg.html

Saved by uncleflo on March 9th, 2012.

With the release of Ubuntu 9.10 (Karmic) xorg.conf was left largely redundant, at least, that was the theory. Something called EDID can be used for detecting a monitor's display capabilities, but it doesn't always work. This is usually down to monitor issues, or the video cable connected to it. If the EDID data cannot get through to the graphics adapter, then the graphics adapter knows nothing! For some reason Intel cards seem to be particularly prone to dodgy display detection, and my examples here will reflect that.

config xorg resolution detection intel adapter edid hardware screen crt monitor linux blog information commands bash


Hochiki America Corporation

http://hochiki.specialbrand.net/

Saved by uncleflo on February 28th, 2012.

Through our sophisticated life safety, fire detection and emergency devices, people's lives and property are kept protected, helping make the world a safer place to live. We strive to improve the lifestyle of each employee, stockholder, and member of the community. Hochiki would like to introduce the HCA Conventional Fire Alarm Control Panel. The HCA series will be available in a 2, 4, or 8 zone conventional panel design. The HCA series are fully programmable using simple front panel menu options and will support releasing of agent on the 4 and 8 zone models. This panel offers programming features to the user and is a single board construction which is installer friendly. The panel will be compatible with a wide range of Hochiki America detection devices. Click here to view the HCA data sheet.

control board panel hca device loop actuator detector sensor systems detection corporation america hochiki detect fire


VES - The future of fire detection

http://www.ves-network.com/

Saved by uncleflo on September 6th, 2011.

Welcome to the launch page for the VES Fire Detection Systems websites. Please select your area of interest below. Once inside navigate between sites using the "Quick Links" box on the left.

ves kentec system home website company information services products business fire detection


No further bookmarks found.