rpg.pbem.online

Search

Items tagged with: Images

Google updates Images to make it easier to compare products | Engadget

Google has unveiled an update to the Images interface that will allow users to compare and contrast related pictures. Entering a term like "green dress" or "black lamp" into Google Images can yield hundreds of results -- and it can be tough to narrow down the selection. Now, after users select an image, it will appear in a side panel on the page next to the search results. The image will continue to stay there as the user scrolls, allowing them to compare it with different versions of the same item.
#technology #internet #Google #Images #search
 

Hedge funds use satellite images to beat Wall Street


HN Discussion: https://news.ycombinator.com/item?id=20243810
Posted by jonbaer (karma: 45771)
Post stats: Points: 137 - Comments: 118 - 2019-06-21T16:11:30Z

\#HackerNews #beat #funds #hedge #images #satellite #street #use #wall
HackerNewsBot debug: Calculated post rank: 130 - Loop: 115 - Rank min: 100 - Author rank: 42
How hedge funds use satellite images to beat Wall Street—and Main Street
 

CVE-2019-5021: Official Alpine Linux Docker images have NULL for root password


HN Discussion: https://news.ycombinator.com/item?id=19861725
Posted by alpb (karma: 4573)
Post stats: Points: 132 - Comments: 64 - 2019-05-08T18:45:29Z

\#HackerNews #alpine #cve-2019-5021 #docker #for #have #images #linux #null #official #password #root
HackerNewsBot debug: Calculated post rank: 109 - Loop: 74 - Rank min: 100 - Author rank: 45
 

Cost of serving billions of images per month


HN Discussion: https://news.ycombinator.com/item?id=19827521
Posted by ghoshbishakh (karma: 113)
Post stats: Points: 126 - Comments: 50 - 2019-05-04T16:39:39Z

\#HackerNews #billions #cost #images #month #per #serving
HackerNewsBot debug: Calculated post rank: 100 - Loop: 240 - Rank min: 100 - Author rank: 28
 

Full Disk Images of Earth from GOES-17


HN Discussion: https://news.ycombinator.com/item?id=19824534
Posted by Jerry2 (karma: 15513)
Post stats: Points: 114 - Comments: 28 - 2019-05-04T04:51:08Z

\#HackerNews #disk #earth #from #full #goes-17 #images
HackerNewsBot debug: Calculated post rank: 85 - Loop: 87 - Rank min: 80 - Author rank: 92
 

OpenCV-Python Cheat Sheet: From Importing Images to Face Detection


HN Discussion: https://news.ycombinator.com/item?id=19705432
Posted by salma-ghoneim (karma: 76)
Post stats: Points: 145 - Comments: 12 - 2019-04-20T08:33:06Z

\#HackerNews #cheat #detection #face #from #images #importing #opencv-python #sheet
HackerNewsBot debug: Calculated post rank: 100 - Loop: 469 - Rank min: 100 - Author rank: 253
 

Kroki – Convert plain text diagrams to images


Kroki provides a unified API with support for BlockDiag (BlockDiag, SeqDiag, ActDiag, NwDiag), C4 (with PlantUML), Ditaa, Erd, GraphViz, Mermaid, Nomnoml, PlantUML, SvgBob and UMLet... and more to…
Article word count: 723

HN Discussion: https://news.ycombinator.com/item?id=19486801
Posted by type0 (karma: 6136)
Post stats: Points: 143 - Comments: 20 - 2019-03-25T21:14:26Z

\#HackerNews #convert #diagrams #images #kroki #plain #text
Article content:




[1]logo

Kroki provides a unified API with support for BlockDiag (BlockDiag, SeqDiag, ActDiag, NwDiag), C4 (with PlantUML), Ditaa, Erd, GraphViz, Mermaid, Nomnoml, PlantUML, SvgBob and UMLet... and more to come!

Ready to use
Diagrams libraries are written in a variety of languages: Haskell, Python, JavaScript, Go, PHP, Java... some also have C bindings. Trust us, you have better things to do than install all the requirements to use them. Get started in no time!

Simple
Kroki provides a unified API for all the diagram libraries. Learn once convert anywhere!

Free & Open source
All the code is available on GitHub and our goal is to provide Kroki as a free service.

Fast
Built using a modern architecture, Kroki offers great performance.

Cache with CDN coming soon
Near-instant response time if your diagram has already been generated.

Kroki provides an HTTP API to convert plain text diagrams to images. Kroki handles both GET and POST requests. When using GET requests, your diagram must be encoded in the URL using a deflate + base64 algorithm. But donʼt worry, if youʼre not familiar with deflate or base64 (or if you donʼt want to use them), you can also send your diagram as plain text using POST requests ([2]see below).

Letʼs take an example with a GraphViz "Hello World":

hello.dot

digraph G { Hello->World
}

Here, we are using a Python one-liner to encode our diagram using deflate + base64:

cat hello.dot | python -c "import sys; import base64; import zlib; print(base64.urlsafe_b64encode(zlib.compress(sys.stdin.read(), 9)))"

In the [3]documentation, we provide code examples that demonstrate how to encode a diagram in Node.js, JavaScript, Java, Python and Go.

The above command will return a value that you can copy in the URL:

GET /graphviz/svg/eNpLyUwvSizIUHBXqPZIzcnJ17ULzy_KSanlAgB1EAjQ

And hereʼs the result:

Hello World

You can also call Kroki with POST:

POST /

{ "diagram_source": "digraph G {Hello->World}", "diagram_type": "graphviz", "output_format": "svg"
}

In this case, you donʼt need to encode your diagram.

Itʼs also possible to send your diagram as plain text using the Content-Type header. The output format will be specified using the Accept header and the diagram source will be sent as the request body:

POST /graphviz

Accept: image/svg+xml
Content-Type: text/plain digraph G { Hello->World
}

You can also define the output format in the URL if you donʼt want to add an Accept header:

POST /graphviz/svg

Content-Type: text/plain digraph G { Hello->World
}

The same concept applies when sending the diagram as JSON:

POST /graphviz/svg

{ "diagram_source": "digraph G {Hello->World}"
}

Please note that you can interact with the API using any HTTP client.
If you want to learn more, head to [4]our documentation. In particular, check out the "Usage" section to find out how to send requests to the Kroki API using:
\* [5]cURL and HTTPie 
 \* [6]Kroki CLI

Diagram

[[7]________________]

[8]
Main Base main.view singleton base.component component model main.ts

Looking for inspiration? Visit the [9]examples page.

The following diagram types and output formats are available:

The following diagram types will soon be available:

Diagram Type png svg jpeg pdf base64
[10]Syntrax
[11]Vega
[12]Vega-Lite
[13]WaveDrom

You donʼt see your favorite diagram tool in this list, please let us know [14]👋 [email protected]

Kroki is available as a Self-Managed instance.
We are also actively looking for sponsors to provide Kroki as a free service.

Self-Managed

Select this option if you want to download and install Kroki on your own infrastructure or in a cloud environment.

Please note that Kroki Self-Managed requires Linux experience to install.

Please refer to the documentation to [15]install Kroki.

Free service

We are actively looking for sponsors to provide Kroki as a free service.

If you are interested, please [16]👋 contact us.

We also provide a server for demonstration purpose at: [17]https://demo.kroki.io.

Please note that the demonstration server usage is restricted to reasonable, non-commercial use-cases.
We provide no guarantee regarding uptime or latency.

Kroki is [18]an open source project licensed under the [19]MIT license.

If you want to know more, please [20]👋 contact us.

References

Visible links
2. https://kroki.io/#post-request
3. https://docs.kroki.io/kroki/setup/encode-diagram/
4. https://docs.kroki.io/kroki/
5. https://docs.kroki.io/kroki/setup/http-client/
6. https://docs.kroki.io/kroki/setup/kroki-cli/
9. https://kroki.io/examples.html
10. https://github.com/kevinpt/syntrax
11. https://github.com/vega/vega
12. https://github.com/vega/vega-lite
13. https://github.com/wavedrom/wavedrom
14. mailto:[email protected]
15. https://docs.kroki.io/kroki/setup/install
16. mailto:[email protected]
17. https://demo.kroki.io/
18. https://github.com/yuzutech/kroki
19. https://opensource.org/licenses/mit-license.php
20. mailto:[email protected]

HackerNewsBot debug: Calculated post rank: 102 - Loop: 369 - Rank min: 100 - Author rank: 34
 

Ask HN: Is Someone Hijacking Google Images?


I was looking for ideas on how to build a simple network analyzer to test antennas, filters etc. so I typed "network analyzer schematic" (without quotes) on Google Images and it apparently returned some results I was expecting, but clicking on a lot of results from the first page opened some subscription only websites with suspicious names nagging me to create an account to see the actual images, some of which I'm 100% sure I already have seen on their original authors websites. Those websites are clearly made by the same entity, and to me it appears they're essentially hijacking Google Images results for their profit. Here are some of those results; many more on the 1st page. I had a hard time finding something that returned an actual loadable image or an article without asking for subscription. Note that they all return URLs containing "spectrum analyzer schematic" although I searched for "network analyzer schematic".

http://yyrfm.microdeo.de/spectrum_analyser_circuit_diagram.php

https://4.twizer.co/rf-spectrum-analyzer-schematic.html

http://5.6.gvapor.nl/rf_spectrum_analyzer_schematic.php

http://18.10.ulrich-temme.de/spectrum_analyzer_schematic_symbols.php

http://4.3.beckman-vitamin-d.de/vcr_tuner_based_rf_spectrum_analyzer_schematic.php

http://18.10.ulrich-temme.de/spectrum_analyzer_schematic_symbols.php

http://2.4.wohnungzumieten.de/gbppr_1_ghz_spectrum_analyzer_second_local_oscillator_schematic.php

http://5.6.gvapor.nl/rf_spectrum_analyzer_schematic.php

http://13.1.starpartybus.com/lm3915_spectrum_analyzer_schematic.php

Edit: it appears those pages are being slowly buried by legit results, but some of them still surface although much deeper.

Examples:

http://3.17.tierarztpraxis-ruffy.de/pna_x_block_diagram.php

http://10.10.artatec-automobile.de/block_diagram_power_antenna_wire.php

http://9.20.wohnungzumieten.de/logic_probe_with_sound_circuit_schematic.php

7.12.gvapor.nl/dds_function_generator_mcu_schematic.php

Note that I searched for the same exact phrase as above.

HN Discussion: https://news.ycombinator.com/item?id=19417561
Posted by squarefoot (karma: 2028)
Post stats: Points: 132 - Comments: 47 - 2019-03-17T23:46:08Z

\#HackerNews #ask #google #hijacking #images #someone
HackerNewsBot debug: Calculated post rank: 103 - Loop: 165 - Rank min: 100 - Author rank: 24
 

Top ten most popular docker images each contain at least 30 vulnerabilities


we found that 44% of docker image scans had known vulnerabilities, and for which there were newer and more secure base image available. Most vulnerabilities originate in the base image you selected.…
Article word count: 884

HN Discussion: https://news.ycombinator.com/item?id=19255603
Posted by vinnyglennon (karma: 10948)
Post stats: Points: 196 - Comments: 43 - 2019-02-26T16:24:41Z

\#HackerNews #contain #docker #each #images #least #most #popular #ten #top #vulnerabilities
Article content:




Welcome to Snyk’s annual State of Open Source Security report 2019.
This report is split into several posts:

Or download our lovely handcrafted pdf report which contains all of this information and more in one place.

[1]DOWNLOAD THE STATE OF OPEN SOURCE SECURITY REPORT 2019!

[2]Known vulnerabilities in docker images

The adoption of application container technology is increasing at a remarkable rate and is expected to grow by a further 40% in 2020, according to 451 Research. It is common for system libraries to be available in many docker images, as these rely on a parent image that is commonly using a Linux distribution as a base.
Docker images almost always bring known vulnerabilities alongside their great value

We’ve scanned through ten of the most popular images with Snyk’s recently released [3]docker scanning capabilities.

The findings show that in every docker image we scanned, we found vulnerable versions of system libraries. The official Node.js image ships 580 vulnerable system libraries, followed by the others each of which ship at least 30 publicly known vulnerabilities.

[4]Number of OS vulnerabilities by docker image

Snyk recently released its container vulnerability management solution to empower developers to fully own the security of their dockerized applications. Using this new capability, developers can find known vulnerabilities in their docker base images and fix them using Snyk’s remediation advice. Snyk suggests either a minimal upgrade, or alternative base images that contain fewer or even no vulnerabilities.
Fix can be easy if you’re aware. 20% of images can fix vulnerabilities simply by rebuilding a docker image, 44% by swapping base image

Based on scans performed by Snyk users, we found that 44% of docker image scans had known vulnerabilities, and for which there were newer and more secure base image available. This remediation advise is unique to Snyk. Developers can take action to upgrade their docker images.

Snyk also reported that 20% of docker image scans had known vulnerabilities that simply required a rebuild of the image to reduce the number of vulnerabilities.

[5]Vulnerability differentiation based on image tag

The current Long Term Support (LTS) version of the Node.js runtime is version 10. The image tagged with 10 (i.e: node:10) is essentially an alias to node:10.14.2- jessie (at the time that we tested it) where jessie specifies an obsolete version of Debian that is no longer actively maintained.

If you had chosen that image as a base image in your Dockerfile, you’d be exposing yourself to 582 vulnerable system libraries bundled with the image. Another option is to use the node:10-slim image tag which provides slimmer images without unnecessary dependencies (for example: it omits the main pages and other assets). Choosing node:10-slim however would still pull in 71 vulnerable system libraries.
Most vulnerabilities originate in the base image you selected. For that reason, remediation should focus on base image fixes

The node:10-alpine image is a better option to choose if you want a very small base image with a minimal set of system libraries. However, while no vulnerabilities were detected in the version of the Alpine image we tested, that’s not to say that it is necessarily free of security issues.

Alpine Linux handles vulnerabilities differently than the other major distros, who prefer to backport sets of patches. At Alpine, they prefer rapid release cycles for their images, with each image release providing a system library upgrade.

[6]Number of vulnerabilities by node image tag

Moreover, Alpine Linux doesn’t maintain a security advisory program, which means that if a system library has vulnerabilities, Alpine Linux will not issue an official advisory about it; Alpine Linux will mitigate the vulnerability by creating a new base image version including a new version of that library that fixes the issue, if one is available (as opposed to backporting as mentioned).

There is no guarantee that the newer fixed version, of a vulnerable library will be immediately available on Alpine Linux, although that is the case many times. Despite this, if you can safely move to the Alpine Linux version without breaking your application, you can reduce the attack surface of your environment because you will be using fewer libraries.

The use of an image tag, like node:10, is in reality an alias to another image, which constantly rotates with new minor and patched versions of 10 as they are released.

[7]Docker terminal screenshot

A practice that some teams follow is to use a specific version tag instead of an alias so that their base image would be node:10.8.0-jessie for example. However, as newer releases of Node 10 are released, there is a good chance those newer images will include fewer system library vulnerabilities.

Using the Snyk Docker scanning features we found that when a project uses a specific version tag such as node:10.8.0-jessie, we could then recommend newer images that contain fewer vulnerabilities.

[8]Known vulnerabilities in system libraries

There is an increase in the number of vulnerabilities reported for system libraries, affecting some of the popular Linux distributions such as Debian, RedHat Enterprise Linux and Ubuntu. In 2018 alone we tracked 1,597 vulnerabilities in system libraries with known CVEs assigned for these distros, which is more than four times the number of vulnerabilities compared to 2017.

[9]Linux OS vulnerabilities steadily increasing

As we look at the breakdown of vulnerabilities (high and critical) it is clear that this severity level is continuing to increase through 2017 and 2018.

[10]High and critical vulnerabilities in system libraries

Continue reading:

[11]DOWNLOAD THE STATE OF OPEN SOURCE SECURITY REPORT 2019!

References

Visible links
1. https://bit.ly/SoOSS2019
2. https://snyk.io/blog/top-ten-most-popular-docker-images-each-contain-at-least-30-vulnerabilities/#known-vulns-docker-images
3. https://snyk.io/blog/container-vulnerability-management-for-developers/
5. https://snyk.io/blog/top-ten-most-popular-docker-images-each-contain-at-least-30-vulnerabilities/#known-vulns-docker-image-tag
8. https://snyk.io/blog/top-ten-most-popular-docker-images-each-contain-at-least-30-vulnerabilities/#known-vulns-in-system-libraries
11. https://bit.ly/SoOSS2019

HackerNewsBot debug: Calculated post rank: 145 - Loop: 135 - Rank min: 100 - Author rank: 58
 
Later posts Earlier posts