Engineering and technology notes

Is there a way to “auto login” in PuTTY with a password? – Super User

Combining two different packages for a security solution can be dangerous. This is the PuTTY-only way to do it, only using software from the PuTTY site.

You should first use PuTTYgen to create a key pair, then install the private key in PuTTY, and copy the public key to the remote site. Here is how you do this.

Download PuTTYgen, and execute it to generate a SSH2-RSA key. I’d use at least 4098 bits. Click the Generate button, move the mouse around, until the key pair is generated.

enter image description here

Once it’s generated, your screen will look like this: enter image description here

Describe the account in the “Key Comment” field. Then save the private key in one file, and the public key in another file.

Your public key will look like this:

---- BEGIN SSH2 PUBLIC KEY ----
Comment: "rsa-key-20160822"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---- END SSH2 PUBLIC KEY ----

You have to edit this to a form that is suitable for your remote site. Let’s assume it’s a Linux machine using ssh.

Edit the file so it has three fields:

  1. The first should say “ssh-rsa”
  2. The second should be your public key all on one line with no spaces.
  3. The third is a comment – which can correspond to your key comment field.

So it should look like this when done

ssh-rsa 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 rsa-key-20160822

Personally, I would copy the file over to the Linux machine, and then edit it, because editors like vim are much more tolerant of long lines. I’d use the ‘J’ command to join two lines, then search for spaces and delete the spaces between the lines. When I copied this file over to Windows, the system insisted on splitting the single long line into multiple lines with “\” between the lines. Yuck. To continue…

Log into the remote machine, and copy/edit, then append the public key into the ~/.ssh/authorized_keys file in the same format as the other keys. It should be a single line. There should be three fields on a single line. The first says “ssh-rsa”. The second is the key which should end with the characters “=” the third field is optional, and will contain what you put in the Key Comment field.

If this is the first time you have created the ~/.ssh/authorized_keys file, make sure the directory and file are not group or world readable.

Once this is done, then you have to create a PuTTY session where the private key is used.

In the PuTTY session, go to Connection=>SSH=>Auth and click browse and select where you stored your private key “It’s a *.ppk” file. enter image description here

Then save this session (I’m assuming you also set up the account, IP address, etc.).

Once this is done, you just have to select the session, and you are logged in.

A more secure way is to store your private key in an encrypted file, using a passphrase. Then use Pageant to manage your passphrase. That way the private key is always encrypted, and you only have to type in a passphrase once in a while.

Source: Is there a way to “auto login” in PuTTY with a password? – Super User

Perfect fourth

A fourth is a musical interval encompassing four staff positions in the music notation of Western culture, and a
Play ) is the fourth spanning five semitones (half steps, or half tones). For example, the ascending interval from C to the next F is a perfect fourth, as the note F is the fifth semitone above C, and there are four staff positions between C and F. Diminished and augmented fourths span the same number of staff positions, but consist of a different number of semitones (four and six, respectively).

The perfect fourth may be derived from the harmonic series as the interval between the third and fourth harmonics. The term perfect identifies this interval as belonging to the group of perfect intervals, so called because they are neither major nor minor (unlike thirds, which are either minor or major) but perfect.

A perfect fourth in just intonation corresponds to a pitch ratio of 4:3, or about 498 cents, while in equal temperament a perfect fourth is equal to five semitones, or 500 cents (see additive synthesis).

Until the late 19th century, the perfect fourth was often called by its Greek name, diatessaron. Its most common occurrence is between the fifth and upper root of all major and minor triads and their extensions.

An example of a perfect fourth is the beginning of the “Bridal Chorus” from Wagner‘s Lohengrin (“Treulich geführt“, the colloquially-titled “Here Comes the Bride“). Other examples are the first two notes of the Christmas carol Hark! The Herald Angels Sing” and “El Cóndor Pasa“, and, for a descending perfect fourth, the second and third notes of “O Come All Ye Faithful“.[citation needed]

The perfect fourth is a perfect interval like the unison, octave, and perfect fifth, and it is a sensory consonance. In common practice harmony, however, it is considered a stylistic dissonance in certain contexts, namely in two-voice textures and whenever it appears above the bass. If the bass note also happens to be the chord’s root, the interval’s upper note almost always temporarily displaces the third of any chord, and, in the terminology used in popular music, is then called a suspended fourth.

Conventionally, adjacent strings of the double bass and of the bass guitar are a perfect fourth apart when unstopped, as are all pairs but one of adjacent guitar strings under standard guitar tuning. Sets of tom-tom drums are also commonly tuned in perfect fourths. The 4:3 just perfect fourth arises in the C major scale between G and C.

https://en.wikipedia.org/wiki/Perfect_fourth

Linear network coding – Wikipedia

Network coding is a field of research founded in a series of papers from the late 1990s to the early 2000s. However, the concept of network coding, in particular linear network coding, appeared much earlier. In a 1978 paper, a scheme for improving the throughput of a two-way communication through a satellite was proposed. In this scheme, two users trying to communicate with each other transmit their data streams to a satellite, which combines the two streams by summing them modulo 2 and then broadcasts the combined stream. Each of the two users, upon receiving the broadcast stream, can decode the other stream by using the information of their own stream.

The 2000 paper gave the butterfly network example (discussed below) that illustrates how linear network coding can outperform routing. This example is equivalent to the scheme for satellite communication described above. The same paper gave an optimal coding scheme for a network with one source node and three destination nodes. This is the first example illustrating the optimality of convolutional network coding (a more general form of linear network coding) over a cyclic network.

Linear network coding may be used to improve a network’s throughput, efficiency and scalability, as well as resilience to attacks and eavesdropping. Instead of simply relaying the packets of information they receive, the nodes of a network take several packets and combine them together for transmission. This may be used to attain the maximum possible information flow in a network.

It has been mathematically proven in theory that linear coding is enough to achieve the upper bound in multicast problems with one source. However linear coding is not sufficient in general (e.g. multisource, multisink with arbitrary demands), even for more general versions of linearity such as convolutional coding and filter-bank coding.[4] Finding optimal coding solutions for general network problems with arbitrary demands remains an open problem.

 

Source: Linear network coding – Wikipedia

Bésame Mucho, Español-English

Bésame Mucho
Letra y Música de Consuelo Velázquez (1940)

4/4
(introducción instrumental de 9 medidas)

Bésame,
bésame mucho —
como si fuera esta noche
la ultima vez.
Bésame,
bésame mucho —
que tengo miedo a per-derte,
perderte después. —

(repite, y entonces la música cambia un poquito) …-derte, perderte después. —

Quiero tenerte muy cerca
mirar me en tus ojos
verte junto a mi.
Piensa que tal vez mañana
yo ya estaré lejos
muy lejos de ti.

Bésame,
bésame mucho —
como si fuera esta noche
la ultima vez.
Bésame,
bésame mucho —
que tengo miedo a perderte,
perderte des-pués. —

(“-pués” tiene 3 tiempos, se sigue con un tiempo y entonces 7 medidas de música)

Bésame,
bésame mucho —
que tengo miedo a perderte,
perderte después. —
Que tengo miedo a perderte, —
perderte des-pués. — — —

(el ultimo “-pués” tiene 5 y 3/4 medidas, un instrumental sigue con 7 y 1/4)

<><><><><><><><><>

Bésame Mucho (a translation)
Words and Music by Consuelo Velázquez (1940)

4/4
(instrumental introduction of 9 measures)

Kiss me now,
kiss me with passion —
kiss me as if this were to be
our very last night.
Kiss me now,
kiss me with passion —
for you I may never-more see
once past early light.

(repeat, then the music changes a little bit) …-more see once past early light. —

I want to hold you so closely,
look into your eyes to find
you mirroring me.
I’m sure dawn will find me lonely
cast away so far behind
where you then will be.

Kiss me now,
kiss me with passion —
kiss me as if this were to be
our very last night.
Kiss me now,
kiss me with passion —
for you I may nevermore see
once past early light.

(“light” has three beats followed by one beat then 7 measures of music)

Kiss me now
kiss me with passion —
fearing tomorrow I’ll lose you
past dawn’s early light; —
and I may forever lose you, —
forever lose you. — — —

(the last “you” has 5 and 3/4 measures, followed by 7 and 1/4 measures of music)

<><><><><><><><><>

https://manuelgarciajr.com/2013/12/24/besame-mucho-espanol-english/

Kubernetes

Kubernetes (commonly stylized as k8s) is an open-source container orchestration system for automating application deployment, scaling, and management.It was originally designed by Google and is now maintained by the Cloud Native Computing Foundation. It aims to provide a “platform for automating deployment, scaling, and operations of application containers across clusters of hosts”. It works with a range of container tools, including Docker. Many cloud services offer a Kubernetes-based platform or infrastructure as a service (PaaS or IaaS) on which Kubernetes can be deployed as a platform-providing service. Many vendors also provide their own branded Kubernetes distributions.

Source: Kubernetes – Wikipedia

Prostate Cancer: How Young is too Young?

Prostate cancer is the most common non-cutaneous malignancy in men. It is generally considered a cancer of the elderly, and the median age of presentation is 68 years. However 10% of new diagnoses in the USA occur in men aged ≤ 55 years. This may be due to more prevalent screening nowadays, and may also reflect the diagnosis of an increasingly recognized but underappreciated entity, i.e. early-onset prostate cancer. Patients with early onset prostate cancer pose unique challenges. Current data suggest that early-onset prostate cancer is a distinct phenotype—from both an etiological and clinical perspective— that deserves further attention. We present a case of a 28-year-old man who presented with lower urinary tract symptoms and was diagnosed with advanced stage prostate cancer.

Source: Prostate Cancer: How Young is too Young?

Amilcare Ponchielli – Wikipedia

Amilcare Ponchielli (Italian: [aˈmilkare poŋˈkjɛlli], 31 August 1834 – 16 January 1886) was an Italian opera composer, best known for his opera La Gioconda. He was married to the soprano Teresina Brambilla.

Amilcare Ponchielli (Italian: [aˈmilkare poŋˈkjɛlli], 31 August 1834 – 16 January 1886) was an Italian opera composer, best known for his opera La Gioconda. He was married to the soprano Teresina Brambilla.

Source: Amilcare Ponchielli – Wikipedia