►
From YouTube: Crimson/Seastor OSD Meeting 2018-11-13
Description
No description was provided for this meeting.
If this is YOUR meeting, an easy way to fix this is to add a description to your video, wherever mtngs.io found it (probably YouTube).
A
B
Last
week,
I
was
attending
the
vasila.
Db
is
a
meet
and
I.
Think
I
was
asking
the
tilde
guys
regarding
to
how
they
are
profiling
and
debugging,
but
tell
their
answer
is
that
they
are
using
powerful
regarding
how
they
are
providing.
They
are
using
the
building
metric
and
twist
point
for
profiling,
the
proper
for
polling,
Center
DB
and
regarding
profiling.
B
We
are
thinking
as
if
we
are
your
model
waste,
for
example,
using
links
per
friend,
some
who
brought
to
us
and
also
using
pre
graph
for
sure.
But
when
it
comes
to
the
DB
or
T
star,
the
the
Keynesians
is
a
pasta
tool
to
reactor
and
it's
difficult
I
have
a
decent
factories.
We're
looking
at
when
you
are
you
at.
You
are
looking
at
the
profile,
so
they
don't
neither
thought
LD
be
either
some
some
some
toes
to
which
can
realize
such
a
kind
of
factories,
because
they're
the
continuation,
has
a
signature.
B
B
B
And
a
rocky
beach
Meetup,
it's
a
it's
a
once
per
year.
It
does
meet
her
happens.
It
held
everyone's
from
per
year
to
it's
a
good
opportunity
to
learn,
from,
from
other
other
guys,
walking
on
rocks
from
TB
and
interesting
things
that
but
a
company
is
working
on,
make
a
new
bring
rocks,
db2
luw
running
we
along
with
fiber
or
counting.
B
B
The
ultimate
goal
is
to
to
to
to
implement
fully
async
implementation
of
our
object,
storage,
but
but
I
didn't
know
that
Roxie
beads
is
based
on
projects.
Rather,
that's
who
that's
why
we,
we
are
Tao
our
shortened
plans
to
to
put
Pluto
and
rock
TB
into
a
into
a
into
the
alien
territory.
That's
our
short-term
plan,
but
one
night
when
I
learned
that
another
company
has
achieved
made
it
happen
that
the
rebuild
Arak
TV
with
we
think
the
fiber.
B
B
B
C
B
B
That's
basically
what
we
have
in
Opie,
Opie
tracker
right
and
regarding
metrics
that
that's
a
building
featuring
in
sista
metric
metric
group.
The
counterpart
is
I.
Guess
is
the
performance
for
encounter
in
in
in
safe
and
an
interesting
thing.
Aside
from
that,
an
interesting
thing
approach
is
that
they
are.
B
You
are
using
some
some
texting
like
sampler,
for
example,
they
have
a
very
temporary
show
right
if
the
same
ratio
is
like
5%
like
what
a
five
out
of
a
hundred
request
is,
is
sampled
and
the
five
five
five
out
of
a
hundred
the
request
will
be
stamped
with,
will
never
have
a
very
detailed
timestamp
in
their
life
cycle.
They.
B
B
B
B
So
with
which
we
we
can
tend
which
function
creates
quoted
this
this,
this
lambda
love
knot
closure
it's
better
than
nothing.
Okay,
even
we
don't
have
a
back
trace
because
you
know
it's
it's
a
continuation
posted
to
to
reactor
and
it's
driven,
not
a
lien
on
a
stag
creating
in
score
its
color.
We
don't
have
a
back
trace.
C
B
D
D
B
One
we
took
to
include
the
name
to
to
have
find
a
country
of
the
signature
name.
Yes,
I,
think
I.
Think
England's
approach
is
that
it's
it's
a
little
bit
there.
What
are
you
were
thinking
because
there,
because
both
boots
puts
v2g,
that
them
currently
did
refractory
over
messenger
refractory
and
the
engines
approach
is
that
is
it
to
rename
the
to
have
a
name
that
name
the
status
of
have
different
name
for
four
different
estate
of
messenger.
B
And-
and
it's
difficult
to
me
to
to
the
overhead
is
for
for
developer
is
already
hard
because
we
need
to
come
up
with
an
with
a
name
whenever
we
wanted
to
quit
a
chain
to
even
what
mother
traversing
we
need
to
create
a
name
just
for
for
for
the
profiling
but
predators
a
good.
It's
a
good
approach,
because
most
time
and
way
we
could
impact
quite
a
quite
a
function
for
poor,
for
which
will
return
with
no
future
for
profiling.
D
B
Yes,
yes
follows
for
low-level
for
for
some
trivial
things
week.
I
think
we
need
to
go
with
this
anonymous
lambda,
but
for
for
some
mid-level
high-level
functions,
probably
we
need
to
have
a
name.
The
functions
for
encapsulating
the
the
or
to
abstract
the
the
underlying
logic
post
for
for
maintenance
and
for
profiling.
I
think
the
girls
yeah
good.
B
B
Because,
whenever
you
it's
a,
it
could
be
used
up
for
work
perfect.
You
can
can
also
be
used
to
forty
party
and
I
think
in
future
I
I
guess
it
could
be
helped
helpful
for
our
bio
reporting
when
we
moved
to
over
two
O's
D,
because
it
were
the
fast
typer,
the
factories
where
only
only
high
was
encrypted
name
or
address,
but
another
human,
readable
and.
B
And
probably
we
need
to
do
to
to
ship
purchase,
to
learn
or
embedded
it
to
the
public
park.
Pal
reporting,
or
the
photo
crashing
report
will
be
less
our
code.
Even
we
don't
have.
The
exact
commit
for
the
binary
tool
for
about
40
bucks
in
Beaufort
for
running,
address
to
line
per
user
could
run
run
grunt
on
Bahamas.
Even
they
are
not
aware
of
that.
They
are
using
address
to
line,
but
that's
a
long
term.
Long
time
ago,
I.
D
D
B
A
A
B
B
I
think
I
think
that
have
at
this
moment
and
I
still
old
on
you
guys
the
driver,
the
mentor
cpp,
ahmad
mental,
it's
easier
for
for
for
the
OSD
prototype
prototyping
and
they
will
also.
Oh
sorry,
I
forgot
to
paste
the
URL
of
the
shortcut
invitation.
Sistar
translation
of
a
certain
implementation.
Part
paradox
by
redock,
crimson
I.
B
D
D
B
D
D
D
A
D
D
A
B
D
D
D
D
B
Do
P
is
a
pretty
long
but
I.
The
funny
thing
is
that
I
think
he
is
composed
of
lots
of
I
think
stages,
for
example
the
maybe
maybe
plucked
by
things
and
the
essences
loop
context.
Look
up.
I
look
ups
are
also
facing
because
yeah.
If
the
context,
though
BC
is
not
in
cash,
we
are
going
to
look
at
from
the
holidays.
A
D
A
D
B
I
think
probably
the
first
first
step
is
to
to
have
a
have
a
huge
to
up
to
profound
ocean
just
like
what
are
we
having
and
the
second
step
is
cutted
cutting
into
smaller,
more
channels,
so
each
of
them
can
be
fitting
to
probably
the
cold
cash
shoulders
about
decent
tip.
You
end
up
to
profile
it
to
to
see
if
we
can
have
have
have
them.
Have
the
Opie
operations
staged
in
patched
it
by
accusing
stages
for
for
better
performance,
but
I
think
the
next
step.
D
D
Big,
if,
if
I
PC
is
but
also
there,
where
we
have
stir
when,
where
we
don't
have
any
traffic
to
turned
up,
then
I
would.
D
D
D
D
B
D
D
A
D
D
B
B
B
D
B
D
B
B
B
C
Yes,
oh
and
the
client
one
there
is
connection
setup
and
the
OST
layer
found
that
the
PG
is
brown
sugar
cow
and
they
will
send
requester
to
the
core
and
the
car
need
send
the
message
to
the
replicator
replicated
OSD.
So
here
is
the
I
am
standard
to
the
replicated
OS
vo,
but
has
a
connection
with.
B
C
C
C
A
C
B
C
A
C
B
C
A
A
B
C
B
A
B
B
C
A
C
A
C
A
A
Yeah
I
think
was
way:
I
cracked,
because
it's
because
internally,
the
connection
to
always
send
messages
from
Co
n
and
the
connection.
One
always
send
messages
from
:
because
they
just
lived
there
and
quorum
will
have
the
connection
to
reference
when
they
went
want
to
send
a
message
and
the
in
in
C,
star
messenger.
It
will
internally
submit
to
its
original
call
of
the
connection.
C
A
C
B
C
So
can
we,
for
example,
the
messenger
listen
on
some
pot,
so
can
other
messengers
listen
on
the
same
pot
I.
A
C
A
B
A
messenger
supposed
to
to
listen
on
a
single
port
there.
There
is
no
program
poacher,
no
to
messenger
which
are
think
listening
on
that
on
a
same
thing,
port
I
think
what
you
meant
is
that
there's
a
messenger
shortened
messenger
this
in
the
home
of
course,
I'm,
a
single
port
did
that
order
me?
Yes,.
B
A
C
C
A
A
B
B
Another
request
is
still
referencing
post
map
to
and
the
later
arm.
Another
new
request
complaining.
It
is
also
targets
PG,
PG
2,
which
is
hosted
by
PI
OST
story
Charlotte
child
to
and
which
is
this
new
requester
requires
a
lady's,
the
whole
team
app
and
the
the
PGA
required
for
for
full
full
filing
of
full
force.
B
B
So,
to
put
it
another
way,
the
PG
is
not
necessary.
Holding
the
latest
servicing
map
it
depend
depends
on
what
I
dwell
on
its
history,
but
that
but
I
agree
that
whenever
a
new
ocean
map
from
from
from
for
its
purity
or
firm
on
Tereza
is,
is
he
decoded
that
very
core
is
responsible
for
for
for
updates?
The
co-chair
of
with
these
news
and
the
Cordero
is
a
responsible
for
for
poor,
inform
all
the
pieces
with
his
news.
C
A
B
C
B
C
B
That's
one
way
to
implement
it.
What
do
you
think
Jim
I
think
you
actually
the
same
question
before
yeah.
A
Yeah
at
first
I
think
well,
hello.
Kitty
would
remember
only
Cote
rule
but
as
as,
as
you
said,
if
the,
if
the
messenger
from
the
kawar
to
super,
so
we
should
wish
we
master
copied
mess.
We
must
copy
mess
mess
well
from
the
yeah.
We
must
copy
the
content
from
the
message
to
the
or
the
demand
so
that.
A
C
C
C
B
C
B
C
B
C
B
B
C
B
C
C
B
C
B
Again,
I
I
think
it's
an
otoscope
of
ulti
map
design,
but
it's
a
more
relate
to
how
how
ulti
or
4pg
supposed
to
advance
top
of
the
map
account
upon
a
power
committing
a
new
SOT
map.
The
OT
is
supposed
to
inform
all
the
poor
pg3
regarding
to
domestic
uganda
news.
There's
a
method
named
named
advance
topic
posting
map,
dingo
ste,
when
the
OT
commits
the
ultimate
to
disk.
B
B
B
A
B
D
B
A
B
B
I
will
I
will
try
to
understand
it
if
Ike,
if
even
my
I'm
posting
that
posting
you
re
on
your
chart,
I
will
try
to
try
to
understand.
If,
if
the
give
us
is
that
part
of
your,
your,
your
repast
makes
sense,
because
I'm
not
sure
if
we
can
continue
on
with
what
is
left
if,
if
I
requested,
is
blocked,
pipe
I,
for
example,
by
Riddick
unreadable
things
or
arm
I
scrub,
the
worst
case
into
we
need
to
put
into
cue
honor
to
other
all
turns
to
to
check
again,
but
the
best
case.
Yes,.