Created from the plain text reference card on orgmode.org Download this file, and open it in Emacs org-mode!
;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; Ant sim ;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;;; | |
; Copyright (c) Rich Hickey. All rights reserved. | |
; The use and distribution terms for this software are covered by the | |
; Common Public License 1.0 (http://opensource.org/licenses/cpl.php) | |
; which can be found in the file CPL.TXT at the root of this distribution. | |
; By using this software in any fashion, you are agreeing to be bound by | |
; the terms of this license. | |
; You must not remove this notice, or any other, from this software. | |
;dimensions of square world |
This bootstrap is useful if you want to deploy SparkR
applications that run arbitrary code on the EMR cluster's workers. The R
code will need to have its dependencies already installed on each of the workers, and will fail otherwise.
This is the case if you use functions such as gapply
or dapply
.
- You will first have to download the gist to a file and then upload it to S3 in a bucket of your choice.
- Using the AWS EMR Console create a cluster and choose advanced options.
- In Step 3 you can configure your bootstraps. Choose to Configure and add a Custom action
Below links provide source, reference link and relevant quote
https://github.com/usnistgov/800-63-3/blob/nist-pages/sp800-63b/sec5_authenticators.md
Verifiers SHOULD NOT impose other composition rules (e.g., requiring mixtures of different character types or prohibiting consecutively repeated characters) for memorized secrets. Verifiers SHOULD NOT require memorized secrets to be changed arbitrarily (e.g., periodically).However, verifiers SHALL force a change if there is evidence of compromise of the authenticator.