https://bugzilla.redhat.com/show_bug.cgi?id=2085377
Bug ID: 2085377
Summary: libzpc - IBM Z specific hardware exploitation library
Product: Fedora
Version: rawhide
Hardware: s390x
OS: Linux
Status: NEW
Component: Package Review
Assignee: nobody(a)fedoraproject.org
Reporter: jschmidb(a)de.ibm.com
QA Contact: extras-qa(a)fedoraproject.org
CC: package-review(a)lists.fedoraproject.org
Target Milestone: ---
Classification: Fedora
Description: The libzpc library provides a user space API for exploitation of
the
IBM Z protected key functionality, which is part of the IBM Z CPACF feature.
Fedora Account System Username: jschmidb
Version-Release number of selected component (if applicable): 1.0.0
--
You are receiving this mail because:
You are on the CC list for the bug.
You are always notified about changes to this product and component
https://bugzilla.redhat.com/show_bug.cgi?id=2085377
https://bugzilla.redhat.com/show_bug.cgi?id=1286006
Armstrong <cvv30693(a)cdfaq.com> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |cvv30693(a)cdfaq.com
--- Comment #6 from Armstrong <cvv30693(a)cdfaq.com> ---
The CompTIA CS0-002 practice questions present in CS0-002 pdf dumps,
Exactinside have mimicked the CS0-002 questions from the CompTIA CS0-002 real
exam. This will surely give you an idea about what to expect in the CompTIA
Cybersecurity Analyst CS0-002 certification exam. If you follow all these
CS0-002 actual questions by preparing for them without skipping any topic,
you'll have a high chance of getting good marks in the CS0-002 CompTIA
Cybersecurity Analyst (CySA+) Exam.
The CompTIA CS0-002 Dumps Questions available here are taken from the reliable
sources to prepare for the CS0-002 test. As a result, the CS0-002 exam students
will have an idea about how to tackle and answer these CompTIA Cybersecurity
Analyst CS0-002 exam questions. The CS0-002 test candidates just have to go
through these questions along with their answers in order to clear the CS0-002
CompTIA Cybersecurity Analyst (CySA+) Exam. These CompTIA CS0-002 dumps define
the difficulty of some topics and when you have prepared in line with the
advice of professionals, you can pass the CS0-002 CompTIA Cybersecurity Analyst
(CySA+) Exam without any hurdles.
Visit Page: https://www.exactinside.com/CS0-002-exactdumps.html
--
You are receiving this mail because:
You are on the CC list for the bug.
You are always notified about changes to this product and component
https://bugzilla.redhat.com/show_bug.cgi?id=1286006
https://bugzilla.redhat.com/show_bug.cgi?id=2129191
Bug ID: 2129191
Summary: Review Request: iir1 - DSP IIR Realtime C++ filter
library
Product: Fedora
Version: rawhide
Hardware: All
OS: Linux
Status: NEW
Component: Package Review
Severity: medium
Priority: medium
Assignee: nobody(a)fedoraproject.org
Reporter: otto.liljalaakso(a)iki.fi
QA Contact: extras-qa(a)fedoraproject.org
CC: package-review(a)lists.fedoraproject.org
Target Milestone: ---
Classification: Fedora
Spec URL: https://oturpe.kapsi.fi/fedora/rpms/iir1/1/iir1.spec
SRPM URL: https://oturpe.kapsi.fi/fedora/rpms/iir1/1/iir1-1.9.3-2.fc38.src.rpm
Description:
An infinite impulse response (IIR) filter library for Linux, Mac OSX and
Windows
which implements Butterworth, RBJ, Chebychev filters and can easily import
coefficients generated by Python (scipy).
The filter processes the data sample by sample for realtime processing.
It uses templates to allocate the required memory so that it can run without
any
malloc / new commands. Memory is allocated at compile time so that there is
never the risk of memory leaks.
All realtime filter code is in the header files which guarantees efficient
integration into the main program and the compiler can optimise both filter
code
and main program at the same time.
Fedora Account System Username: oturpe
I am packaging iir1, because dosbox-staging-0.79.0 has a dependency on it.
--
You are receiving this mail because:
You are on the CC list for the bug.
You are always notified about changes to this product and component
https://bugzilla.redhat.com/show_bug.cgi?id=2129191