In all of the new accusations made since then, one in particular struck him as familiar: Anthony Rapp charging that Kevin Spacey assaulted him when he was 14 - the same age Huang was at the time of his own assault. Still, he wasn't going to speak publicly about it until the fallout following the Harvey Weinstein scandal. He went on to tell four more people, and even discussed the memory with the friend he shared it with - who also recalled the incident and seemed uncomfortable about it. A friend asked if he'd ever felt that way before, and he shared his story. The first time he opened up was a year ago, after having a panic attack. Since the incident, 21 years have passed - and before writing this piece, he had only told five people, and all in the past year. 'Even if I told somebody, there was nothing they could give back to make me whole again.' 'I don't want people to say we're the abused gay kids he went after on a church ski trip,' he said. His friend looked 'flustered' too, but also didn't move.Įven if I told somebody, there was nothing they could give back to make me whole again Huang said he wanted to fight, but the man was three times his size. The panic turned to outrage and ultimately humiliation.' My chest started to tighten and I couldn't breathe, fearful for what would happen next. He took out a Bible and started to read scripture with his d*** hard. 'You're never ready for it and you never think it would happen to you, but it was happening and it kept going. But, 'after a few seconds of trying to look away, I realized he wasn't moving from the foot of my bed and that's when panic set in. 'I figured he was just some weirdo trying to show out and air dry like Cuba Gooding Jr. They continued to watch a basketball game on TV. The two boys tried to ignore it at first and act like nothing strange was going on. But after taking a long time bathing, the man walked out - without a towel and 'his d*** hanging out'. Not noticing any red flags just yet, they agreed. A chaperone, whom Huang describes as a 'tall, dark-for-a-white-man, Daniel Day-Lewis in Last of the Mohicans clone,' asked to come in and use their shower. The trip started off well, with a fun day on the slopes, some flirting with girls, and plans to party that night.īut while he and his friend were waiting in their room to go out, there was a knock at the door. Huang didn't belong, and wasn't all that religious, but decided to tag along. When Huang was 14, a friend invited him on a ski trip with his church. Shocking: The author, pictured at age six, didn't tell anyone about it for two decades but says he was inspired to speak out about it after the many recent allegations of sexual assault
0 Comments
Once the image has loaded, scroll down and move your cursor around to get the 360 view.Īs diners enter the servery, they will find a large section of international beverages and snacks that include microwavable options, grab-and-go alternatives and Kosher choices, along with five food stations. Here’s a brief “tour” of the building that’s been dubbed UB’s new “front door.” Be sure to click on the hyperlinks to get the full view. “It not only offers new food options, which the campus has been asking for, but it will serve as another attractive space for our community to come together.”Ĭonstruction is expected to be completed in late January, at which time Campus Dining & Shops will begin moving in furniture, testing out equipment and training. “I think people are going to love One World Café,” says Kelly Hayes McAlonie, director of campus planning. We would like to thank all the participants who will continue their activities at LEAN Lincoln for their interest.One World Café, the new three-story international eatery under construction on the academic spine, is scheduled to open in the spring.īut for those anxious to get a peek at the progress inside, project architects from CannonDesign have put together a series of artist renderings that offer curious onlookers a 360-degree view of what the interior of the new signature facility will look like. Also, many thanks to the Alive Church team for their technical support. LEAN will be offering free ESOL embedded training to support women to improve their IT skills – whether it is using e-mail, being more confident about making online applications to official institutions, or using FB and IG for their community groups and business.Ī huge thank you to our LEAN Community Connectors who made the event happen – and provided the food.īig thank you to University of Lincoln student for filming the IWD event.Ī big thank you to International Cafe and Mo. In addition, to help LEAN design sessions for digital inclusion a test consisting of basic questions was given to women and brief information was given about it. We also heard about women’s pregnancy and baby health from Sarah Akerman, Communication and Engagement Lead NHS The Better Birth Team, it was a good opportunity for women to focus on their health. Ghada, from the Muslim Sisters Lincoln talked about her experiences as an Egyptian woman, Galina spoke as a Bulgarian women from Bulgarian community, Sakia talked about life as a Bangladeshi woman living in the UK, Bahar spoke about Turkish Women from the perspective of a Turkish student, and we learnt about Nigerian women from our LEAN volunteers. We then had a series of wonderful and inspiring presentations from local women with different cultural and ethnic backgrounds. We had an overview of LEAN from Louise Humphries who also explained why it was so important to celebrate International Women’s day. We had so much food barely fitted on 3 large tables! Noodles and traditional soup from Hong Kong, desserts from Ukraine, Bulgarian wraps and boreks, samosa from Egypt, dishes from Bangladesh, Turkish delights, traditional snacks from Nigeria, Kurdish dolma and rice dishes and lots of other cultural delicacies to share.īahar Tomek, from LEAN opened the even, group discussions were facilitated at the tables so women chatted and got to know one another. Flags from all nations took their place, different beliefs and different cultures met around the same table. Together with LEAN volunteers and with the support of Mo, founder of International Cafe, and the Alive Church team, we decorated the tables with flowers and lights. Nearly 70 women joined our celebration event at The International Cafe in Bridge Church. LEAN celebrated International Women’s Day with Lincoln’s culturally diverse community. Visit our 3D printing page for more details. We accept 3D print requests from Northbrook Library card holders and from non-Northbrook card holders who have a valid library card registered in our library system. We do not accept appointment requests via voicemail or email. If you do not show within 30 minutes of your scheduled time and do not notify us that you will be late, your appointment will be canceled and made available to others. Thursdays, Fridays, and Saturdays are drop-in days.Īppointments begin and end on time. The cardholder must be present during the appointment.Īppointments are required on Tuesdays & Wednesdays for the Collaboratory, Digitization Room, and Digital Media Lab. Īnyone with a library card registered with us, in good standing, may make a Collaboratory, Digitization, or Digital Media Lab appointment. Questions about the Collaboratory's ham radio? Read all about it here. Thursdays-Saturdays are drop-in no appointment required.Ī library card is not required on drop-in days, except to purchase our materials. Note that "deleting" files or subfolders by moving them to the Trash may not be enough if that doesn't seem to help, make sure to also Empty your Trash.About The Collaboratory is the library's makerspace, located on the 2nd floor.Īppointments are required on Tuesdays & Wednesdays. Again, you can fix this problem by moving directly contained items into sub-folders. Accessing items in any folder containing many items can cause errors like OSError: Input/output error. The Library Collaboratory is a multidisciplinary and interdisciplinary research space equipped with 3D printers, laser cutter, prototyping tools and more. A similar problem can occur when reading from other folders after a successful drive.mount(). If you encounter this problem, try moving files and folders directly contained in "My Drive" into sub-folders. Repeated attempts may eventually succeed as failed attempts cache partial state locally before timing out. If thousands of items are directly contained in the top-level "My Drive" folder then mounting the drive will likely time out. Google Drive operations can time out when the number of files or subfolders in a folder grows too large. Why does drive.mount() sometimes fail saying "timed out", and why do I/O operations in drive.mount()-mounted folders sometimes fail? using multiple accounts to work around access or resource usage restrictionsĪdditional restrictions exist for paid users here.remote control such as SSH shells, remote desktops, remote UIs.downloading torrents or engaging in peer-to-peer file-sharing.file hosting, media serving, or other web service offerings not related to interactive compute with Colab. The following are disallowed from Colab runtimes: RCSB PDB () is the US data center for the global Protein Data Bank (PDB) archive of 3D structure data for large biological molecules (proteins, DNA, and RNA) essential for research and education in fundamental biology, health, energy, and biotechnology. We prohibit actions associated with bulk compute, actions that negatively impact others, as well as actions associated with bypassing our policies. Resources in Colab are prioritized for interactive use cases. Users who are interested in more reliable access to better resources may be interested in Colab Pro. This is necessary for Colab to be able to provide resources free of charge. What are the limitations?Ĭolab resources are not guaranteed and not unlimited, and the usage limits sometimes fluctuate. Here's a breakdown of them.Ġx003A (& 0x0034) value breakdown binary flags:Ġx003B (& 0x0035) value breakdown binary flags: Meaning, you break the hexadecimal numbers into binary and each binary bit controls something. (Also 0x0034, the flags for Power Up New Status)Ġx003A and 0x003B are two bytes that control 16 different variables. Notes on 0x003A, The Flags for Power Up Unlocks The checksum it uses is actually just a simple CRC32 hash, subtracted from FFFFFFFF (I'm guessing this was some vain attempt to obfuscate it? Wasn't exactly hard to figure out.)Īnyway, with that- ihaveamac was able to make this in a minute or two:Ġx0038 2 Possibly Flags for Enabled Power Ups? The first four bytes of the file (0x0 to 0x3) are a checksum of the rest of the file (which is 0x4 to 0x2BFF). The saves for Slingo Supreme are 11KB exactly, and they have 4 bytes at 0x8 to 0xB that say "SLNG". I'm not much for disassembly- so I decided to take a gander at the Save File in GodMode9- which didn't help much- so instead I put it off until today, where I dumped many saves and asked around on the DSi Homebrew Discord for some pointed me to his document on finding checksums, and I went ahead and started to figure it out.Įventually, I managed to figure it out completely, and then I asked if he'd be down to help me by making a little python script to automate the process of correcting the checksums in the files, which he did. I thought about it and decided to try my hand at fixing it, or at least working around it. When I had this issue originally, it was before 3DS hacking was even a thing. Rather unfortunate because that makes getting the highest scores quite a bit more difficult.įast forward to now, the other day I was at my grandma's house and she was playing the IOS port of Slingo, and I thought about it again. So, I guess it's a just bug- the patterns never unlock for some reason. The next day some woman on facebook posted something about it, saying they were having the same issue. So I posted about it on GameFAQs, which is a place I regularly visited at the time. So I eventually just rolled my eyes and went online, and to no great surprise, nobody else really has posted about the issue anywhere. I only was supposed to need 7 cleared easy patterns, I ended up clearing 712. Overall, I liked the game but after an hour or to mindlessly tapping away at numbers and pulling the lever with the TV playing in the background- I noticed that two of the important Pattern powerups wouldn't unlock, even though it plainly said that I had met the requirement, I continued on anyway, thinking maybe the numbers it said I had needed were just a typo, but hours later I'd unlocked nearly everything else in the game, I decided to google for help. So, I'd say about 6 years ago, shortly after I got my 3DS, I decided to buy the DSiWare port of this puzzle game on the 3DS eShop, I believe it is $6.99? Anywho, it was ported by a company called Magellan Interactive. Not for everyone but, I grew up playing a CD-ROM Slingo game on my mom's computer. That kind of casual time-wasting is perfectly fine when played for free in an Internet browser window, but I have a hard time recommending that anyone actually pay for such an experience - especially at the steep price of eight dollars.Slingo Supreme is a puzzle game by Funkitron, based in a long-standing series of Slingo games- the premise of which, is to combine slot machines, and bingo together. (Cue ominous music.) All of these tacked-on extras add some spice and variety, but ultimately you realize that you're pretty mindlessly just tapping away at the screen over and over again with a design that demands very little thought and strategy. The Supreme part comes in with some fancy power-ups and other bells and whistles that show up at random during those 20 spins - you might earn an extra spin for free, or get a point multiplier, or even have to step away from the slot machine for a moment to play a Rock/Paper/Scissors mini-game against The Devil himself. Making five matches to fill up a full row, column or diagonal line on the grid earns you extra points, and your goal is to try to score as many points as possible in just 20 spins. You then tap the numbers that match to start filling in the grid - so if you've got a "19" in the second column and another 19 appears after a spin, that's a match. You start with a grid of 25 spaces and you tap the touch screen to spin up a set of five digits for yourself. The game is largely luck-based, as slot machines are. Having 1-2 cans of non-dairy toppings in your fridge is a lifesaver, particularly for serving vegetarian dishes.For example, you can use Rich On Top Non-Dairy Dessert Topping. Frozen Non-Dairy Toppingsįrozen non-dairy topping is a simple substitute for whipping cream when you need to take a break from all the DIY in the kitchen or don’t have the time or ingredients for putting together whipping cream. In the next section, let’s check out frozen non-dairy toppings. Place the mixing bowl in the fridge and leave it to cool overnight (for 12 hours, at least).Pour 13 ounces of chilled evaporated milk into a mixing bowl.It works well for desserts and beverages. Chilled Evaporated MilkĬhilled evaporated milk is an excellent substitute for whipping cream if you don’t have enough milk cream in the pantry. In the next section, let’s check out chilled evaporated milk. If you still haven’t achieved your desired stiffness, mix some more.Mix with an electric mixer on medium speed for 5 minutes.Put 1 peeled banana and 1 egg white in a mixing bowl.It’s perfect for cakes and desserts and if you’re lactose-intolerant. Banana and Egg WhiteĬombining a banana with an egg white is an excellent way to create a non-dairy substitute for whipping cream. In the next section, let’s check out the banana and egg white combination. Once these ingredients are mixed well, add ⅓ cup of dry non-fat milk.Mix ⅓ cup of ice water, 1 ¼ tablespoon of lemon juice, and ½ tablespoon of vanilla with an electric mixer.Mixing dry milk, lemon juice, and vanilla is a great way to create a low-fat substitute for whipping cream. In the following section, let’s check out the dry milk, lemon juice, and vanilla combination. You can use the butter and milk combination for baking and cooking.Use an electric mixer to get a fluffy consistency.Mix ⅓ cup of softened butter with ¾ cup of milk to obtain a consistency similar to whipping cream.Here’s what you need to know about the butter and milk mixture: Butter and Milkīutter and milk are an excellent combination to use as a substitute for whipping cream. This section describes the best alternatives to whipping cream: butter with milk, dry milk with lemon juice and vanilla, bananas with egg whites, chilled evaporated milk, frozen non-dairy topping, milk with cornstarch and flour, coconut milk, or silken tofu pureed with soy milk. The Right Substitute for Whipping Cream: 8 Fantastic Choices You can learn all about them in the following section. We’ve compiled a list of 8 excellent substitutes for whipping cream, describing how to make and use each ingredient or combination of ingredients. But you might also be lactose-intolerant, a vegetarian, or on a low-fat diet. If you’re looking for a substitute for whipping cream, it’s probably because you ran out of this ingredient. Keep reading to discover the best alternatives! But if you don’t have any left when your recipe is almost ready, you might be interested in a substitute for whipping cream. Whipping cream is a must-have if you love toppings on your coffee, sundae, or favorite piece of pie. Kan said that "Japan should reduce and eventually eliminate its dependence on nuclear energy. In May, he ordered the aging Hamaoka Nuclear Power Plant be closed over earthquake and tsunami fears, and said he would freeze plans to build new reactors. Once a proponent of building more reactors, Prime Minister Naoto Kan took an increasingly anti-nuclear stance in the months following the Fukushima disaster. The accident is the second biggest nuclear accident after the Chernobyl disaster, but is more complicated as three reactors suffered at least partial meltdowns. The government came under fire for their handling of the emergency, including the slow release of data on areas which were likely to be exposed to the radioactive plume from the reactor, as well as the severity of the disaster. Japanese authorities admitted that lax standards and poor oversight contributed to the nuclear disaster. The latter groups were also urged to evacuate on 25 March. Later Prime Minister Naoto Kan issued instructions that people within a 20 km (12 mi) zone around the Fukushima Daiichi nuclear plant must leave, and urged that those living between 20 km and 30 km from the site to stay indoors. A nuclear emergency was declared by the government of Japan on 11 March. The Japanese reaction occurred after the Fukushima Daiichi nuclear disaster, following the 2011 Tōhoku earthquake and tsunami. Fukushima I and II Nuclear Accidents Overview Map showing evacuation and other zone progression and selected radiation levels With a subscription to Apple Music, you can listen to songs and podcasts on those devices supported by Apple Music. How to Play Apple Music on MP3 PlayerĪll the songs from Apple Music are streaming content which is only playable within the Apple Music app. But it is not compatible with Apple Music. If you are looking for a portable MP3 player to listen to music, SanDisk MP3 player could be a good option. As one the most popular clip MP3 players, SanDisk MP3 player is well known of its use an active MP3 player due to its robust hands-free design. SanDisk MP3 player is a lightweight and durable MP3 player for playing music. But Apple Music doesn't offer its streaming service to Sony Walkman now. Sony Walkman is perfect for listening on the go. With a simple drag and drop interface, it's easy to load up all your music. This lightweight MP3 player allows you to play music for up to 35 hours between charges. Sony Walkman is another option to enjoy music when you want to buy an MP3 player. If you are subscribing to Apple Music, you can directly log into Apple Music for playing your favorite songs. As it is designed by Apple Inc., iPod touch enables users to install the Apple Music app. Although Apple has discontinued to producing iPod touch, it is still the top picks in the best MP3 players. IPod touch is a portable device developed by Apple Inc. The following are MP3 players for Apple Music. But there are a few of MP3 players that can support playing Apple Music. On the internet, you can find various brands of MP3 player. Best MP3 Player for Apple MusicĪlthough MP3 players have become outdated, there are still lots of sport lovers and music lovers who prefer to listen to music with an MP3 player. How to Download iTunes Music to MP3 Player Part 1. How to Play Apple Music on MP3 Player Part 3. You do not pay a promoted listing fee when someone watches your item. Promoted listings cost the seller nothing unless the item is bought by someone who came to that item through a promoted listing. WHY PAY TO "PROMOTE" ITEMS THAT MAY OR MAY NOT BE WATCHED BY PEOPLE I use this platform because real buyers purchase my items and give me money. SO, WHAT ARE WE AS SELLER'S USING THIS PLATFORM AND SPENDING MONEY FOR? Watchers are real people who probably did not choose to buy your item (I say probably because there is nothing to stop someone from watching an item they have bought).ĪCCORDING TO A FEW PEOPLE, EBAY DOES HAVE BOTS THAT WATCH ITEMS, AND THAT "THEY" (WHOA MIB MAYBE) ARE AWARE OF IT AND IT HAS BEEN AROUND FOR A DECADE OR MORE.Īccording to a few people, the earth is flat. I UNDERSTAND THAT LEGIT BUYERS WHO ARE ACTUALLY WATCHING DON'T WANT TO BE BOMBARDED WITH OFFER JUNK MAIL, BUT SOMETHING HAS TO BE DONE ABOUT THIS, NOW THAT I AM EXTREMELY ANNOYED, IS A "BOT" GOING TO READ THIS MESSAGE?! SO, WHAT ARE WE AS SELLER'S USING THIS PLATFORM AND SPENDING MONEY FOR? WHY PAY TO "PROMOTE" ITEMS THAT MAY OR MAY NOT BE WATCHED BY PEOPLE, ONLY BY BOTS? ARE WE "PROMOTING TO BOTS?" I THINK EBAY SHOULD NOT CHARGE SELLERS ANYTHING TO PROMOTE UNLESS YOU FIX THIS BOT ISSUE. OUT OF 25 "WATCHERS" ONLY 9 OFFERS WERE SENT OUT. I HAVE 25 "PEOPLE" WHOM I ASSUME THAT ARE WATCHING ONE OF MY ITEMS, SO I SENT OUT 25 OFFERS, CLOSED THE SCREEN, WENT BACK INTO THE LISTING AND AT THE TOP WERE IT TELLS YOU HOW MANY YOU HAVE ALREADY SOLD, WILL ALSO BE HOW MANY OFFER'S YOU SENT OUT. SOME HAVE EVEN SUGGESTED TO END THE ITEM AND RELIST IT. THE IDEA IS THAT YOU SEND OFFER'S, LIKE GOING FISHING, SEE WHAT YOU "CATCH."Ĥ. BUYER'S CAN "BLOCK" SELLER'S FROM SENDING OFFERS." SO IF THAT'S TRUE, THEN IT COULD BE THAT SOMEONE IS WATCHING YOUR ITEM.ģ. ACCORDING TO A FEW PEOPLE, EBAY DOES HAVE BOTS THAT WATCH ITEMS, AND THAT "THEY" (WHOA MIB MAYBE) ARE AWARE OF IT AND IT HAS BEEN AROUND FOR A DECADE OR MORE.Ģ. I HAVE SOME ITEMS WITH A LOT OF "WATCHERS", SO I'M THINKING, WHY THE HELL AREN'T THEY BUYING? SO, I GOOGLED THE SAME, AND CAME UPON A STRING OF COMMENTS WITH AN INTERESTING WAY TO CHECK AND SEE IF THIS IS A MYTH OR A REAL PERSON OR AN EBAY BOT.ġ. The report does not currently include view-only attendees. The report does not include insights from deleted breakout rooms. The post-meeting report will contain the full list. In meetings with more than 120 participants, the attendance report that's available during the meeting will only include a partial list of attendees. To view the attendance reports for meetings created in channels, click More actions > View meeting details, and navigate to the Attendance tab. Note: For recurring meetings, you'll receive a unique attendance report after each occurrence. You can view the data directly in Teams.įor recurring meetings, select the report you want to view from the dropdown list. In Teams, go to Calendar, open the meeting, and select the Attendance tab. You'll find the attendance report in a few different places. Look for the file in your device's Downloads folder. Select More actions, then select Download attendance list to download the current attendance info as a CSV file that you can open in Excel. If the participants pane isn't open, select People in your meeting controls. Participants can decide whether they want their information shown in attendance reports by going to Settings > Privacy in Teams and turning the Identify me in attendance reports toggle on or off.įor more help managing your meeting attendance report settings, contact your IT admin. Turn the Allow attendance report toggle on or off. To turn attendance reports on or off before your meeting: So it's up to you to code and decode the TCP/IP headers or use an existing lib like mTCP that does that for you. This block contains raw network data received from the network card. Once you have a block you can process it. In the user space you use select/epoll/kqueue or polling if the waiting time is very small. When data arrives, it is directly written in place in a block of the memory mapped zone. I never used it so I don't know the details. Blocks have a fixed size big enough to hold the ~1500 IP blocks. This zone is organized as a pool of blocks managed with non blocking lists. The way it works, as I was explained, is that they use a shared memory mapped zone. The "zero copy" networking stacks avoids the data copy. Then your read operation copies that data in your user space. Normally, when the kernel recieves data from the network, it allocates a block in the kernel and copy the data into it. The core functionality required is a "zero copy" networking lib : dpdk, netmap. Under load, a naive application which resets events on a descriptor every time it processes that descriptor is pushing much more data through syscalls than select would. Nonetheless, if you use epoll without actually making use of and benefitting from persistent events (as some naive applications do, including a much-touted "high-performance" platform), select can even be faster than epoll under load. CPUs are fast enough that you'll rarely get more than a handful of pending events per call even with thousands of active connections, so the cost isn't amortized well. IME once you get past an FD_SETSIZE of 8192 the overhead of preparing 3KB of data on every single select call begins to show appreciable CPU load. That can cause problems when sharing fd_sets between different libraries, though, so isn't a good idea. The userspace libraries (including glibc) even often permit you to redefine FD_SETSIZE at compile time, which makes it even easier. Most unix-like kernels, including Linux, will accept a much larger fd_set. The limit is an artifact of the way the fd_set structure and macros are defined and implemented. Select doesn't have such an inherent limit. There's like a gazillion commits over its life that have fixed various networking bugs and quirks. And, if you want to do it for fun and experience, that's also cool. As you note, if you have a team dedicated to it, cool. Yes, most of the standards are well-written and well-defined, and you can spend a couple weeks really grokking Stevens' book (or whatever the modern equivalent is, I dunno, as I don't implement anything at that level anymore), but you're gonna spend years becoming bug-compatible with the rest of the Internet (or coming to realize your interpretation and the rest of the world's interpretation of the spec differ).Ģ million requests a second sounds amazing. I kinda feel like it's comparable to rolling your own encryption. The list of things that can go wrong is endless. If you respond incorrectly to ICMP messages, you're going to waste someone's day. If you don't deal with encapsulation right, you're going to waste someone's day. If you make an off-by-one mistake in your PMTU discovery code, you're gonna waste somebody's day. My first company sold proxy servers, and I can't count the number of times a buggy router stack or other embedded thing broke the web for some users some of the time. Also, it likely makes you and your company a bad Internet citizen to roll your own, for the reasons you've mentioned. But if you are a startup trying to get a product off the ground, this is Premature optimization. If you are Google, Facebook or another internet behemoth that is optimizing for efficiently at scale and can afford to dedicate a team to the problem, do it. We started making plans to eliminate the dependency, now much more complicated because we had to transition active deployments away. In both cases, after about a year, we found ourselves wishing we had not rewritten the network stack. Accommodating these cluttered that pretty code further. We wasted weeks chasing implementation bugs in other network stack that were defacto but undocumented parts of the internet's "real" spec. Our clean implementations started to get cluttered with nuances in the spec we didn't appreciate. We could rewrite core Internet protocol implementations and be better! "So much faster" and "wow, my code is a lot simpler than the kernel equivalent, I am smart!" We shipped versions that worked, with high confidence and enthusiasm. The projects were filled with lots of early confidence and successes. The justifications were different each time, though never perf. Twice in my career I have been on teams where we decided to rewrite IP or TCP stacks. Please don't rewrite your network stack unless you can afford to dedicate a team to support it full time. |