hexsha
stringlengths
40
40
size
int64
5
1.04M
ext
stringclasses
6 values
lang
stringclasses
1 value
max_stars_repo_path
stringlengths
3
344
max_stars_repo_name
stringlengths
5
125
max_stars_repo_head_hexsha
stringlengths
40
78
max_stars_repo_licenses
sequencelengths
1
11
max_stars_count
int64
1
368k
max_stars_repo_stars_event_min_datetime
stringlengths
24
24
max_stars_repo_stars_event_max_datetime
stringlengths
24
24
max_issues_repo_path
stringlengths
3
344
max_issues_repo_name
stringlengths
5
125
max_issues_repo_head_hexsha
stringlengths
40
78
max_issues_repo_licenses
sequencelengths
1
11
max_issues_count
int64
1
116k
max_issues_repo_issues_event_min_datetime
stringlengths
24
24
max_issues_repo_issues_event_max_datetime
stringlengths
24
24
max_forks_repo_path
stringlengths
3
344
max_forks_repo_name
stringlengths
5
125
max_forks_repo_head_hexsha
stringlengths
40
78
max_forks_repo_licenses
sequencelengths
1
11
max_forks_count
int64
1
105k
max_forks_repo_forks_event_min_datetime
stringlengths
24
24
max_forks_repo_forks_event_max_datetime
stringlengths
24
24
content
stringlengths
5
1.04M
avg_line_length
float64
1.14
851k
max_line_length
int64
1
1.03M
alphanum_fraction
float64
0
1
lid
stringclasses
191 values
lid_prob
float64
0.01
1
412d3f3351b81e6f3b4d835e0be0a06cc61cad8e
145
md
Markdown
README.md
SRNV/Exium
2f18945da7aea44827a52fd333d5d61a33c448e2
[ "MIT" ]
null
null
null
README.md
SRNV/Exium
2f18945da7aea44827a52fd333d5d61a33c448e2
[ "MIT" ]
13
2021-05-06T07:53:11.000Z
2021-08-20T16:08:40.000Z
README.md
SRNV/Exium
2f18945da7aea44827a52fd333d5d61a33c448e2
[ "MIT" ]
null
null
null
<p align="center"> <img src="./public/exium-logo.svg" /> </p> <h1 align=center> Exium </h1> a lexer that can parse HTML, CSS, Typed-CSS, etc
18.125
48
0.641379
eng_Latn
0.152918
412ea73197d6b79cd8a543126db67f5b7f066d6d
403
md
Markdown
CHANGELOG.md
dockeredcom/debian-stretch
eebe78dd1b6aea04b2c7738c8950e1c17f9f3fa5
[ "MIT" ]
null
null
null
CHANGELOG.md
dockeredcom/debian-stretch
eebe78dd1b6aea04b2c7738c8950e1c17f9f3fa5
[ "MIT" ]
null
null
null
CHANGELOG.md
dockeredcom/debian-stretch
eebe78dd1b6aea04b2c7738c8950e1c17f9f3fa5
[ "MIT" ]
null
null
null
# Current versions - develop: 1.0.0 - release (candidate): 1.0.0 - master: 1.0.0 # History ## Version 1.0.0 - Author: Yves Vindevogel - Date: 2018-08-14 First version of this image. - Uses the official Debian Stretch Slim image as base - Sets the timezone to "Europe/Brussels" - Installs apt-utils - /root/.bashrc file for colorized ls command - Performs a clean up of unneeded files in the image
19.190476
53
0.722084
eng_Latn
0.903756
413026972d616718b39db8186808ae552ea68c8b
10,450
md
Markdown
docs/govern/security-baseline/compliance-processes.md
Acidburn0zzz/MS-Docs-Les-Outils-en-Kits-du-cloud-azure-fr-fr.duia.eu
9a8e07a5f567f54bb52fb9db4c42c31352c2fd5b
[ "CC-BY-4.0", "MIT" ]
1
2020-08-09T22:14:57.000Z
2020-08-09T22:14:57.000Z
docs/govern/security-baseline/compliance-processes.md
Acidburn0zzz/MS-Docs-Les-Outils-en-Kits-du-cloud-azure-fr-fr.duia.eu
9a8e07a5f567f54bb52fb9db4c42c31352c2fd5b
[ "CC-BY-4.0", "MIT" ]
null
null
null
docs/govern/security-baseline/compliance-processes.md
Acidburn0zzz/MS-Docs-Les-Outils-en-Kits-du-cloud-azure-fr-fr.duia.eu
9a8e07a5f567f54bb52fb9db4c42c31352c2fd5b
[ "CC-BY-4.0", "MIT" ]
null
null
null
--- title: Base de référence de la sécurité des processus de conformité à la stratégie description: Découvrez une approche de création de processus qui prennent en charge une discipline Base de référence de sécurité. author: BrianBlanchard ms.author: brblanch ms.date: 09/17/2019 ms.topic: conceptual ms.service: cloud-adoption-framework ms.subservice: govern ms.custom: governance ms.openlocfilehash: f30e906d7dee61ca98e88398ed16f1dc1828adb3 ms.sourcegitcommit: 9a84c2dfa4c3859fd7d5b1e06bbb8549ff6967fa ms.translationtype: HT ms.contentlocale: fr-FR ms.lasthandoff: 05/21/2020 ms.locfileid: "83755849" --- # <a name="security-baseline-policy-compliance-processes"></a>Base de référence de la sécurité des processus de conformité à la stratégie Cet article décrit les processus d’adhésion à la stratégie, qui gouvernent la [discipline Base de référence de la sécurité](./index.md). Pour être efficace, une gouvernance de sécurité du cloud implique plusieurs processus manuels récurrents qui visent à détecter les vulnérabilités et à imposer des stratégies de correction de ces risques de sécurité. De fait, l’équipe de gouvernance cloud ainsi que les équipes informatiques et métier des parties prenantes intéressées sont régulièrement sollicitées pour examiner et mettre à jour la stratégie, et veiller au respect de cette dernière. En outre, de nombreux processus de supervision et d’application continues peuvent être automatisés ou complétés par des outils afin de réduire la charge de gouvernance et accélérer la réponse en cas de manquement à la stratégie. ## <a name="planning-review-and-reporting-processes"></a>Processus de planification, de révision et de génération de rapports Les outils de base de référence de la sécurité du cloud ne peuvent pas surpasser les processus et stratégies qu’ils appuient. Les éléments suivants représentent un ensemble d’exemples de processus généralement impliqués dans la discipline Base de référence de la sécurité. Ces exemples constituent des points de départ pour planifier les processus qui vous permettront de mettre à jour la stratégie de sécurité à mesure que l’entreprise évolue et selon les commentaires des équipes informatiques chargés d’implémenter les mesures de gouvernance. **Évaluation des risques et planification initiales :** Dans le cadre de l’adoption initiale de la discipline de base de référence de la sécurité, identifiez vos principaux risques métier et tolérances liés à la sécurité du cloud. Utilisez ces informations pour débattre des techniques spécifiques avec les membres de vos équipes informatiques et de sécurité, puis développer un ensemble de stratégies de sécurité de base pour atténuer ces risques et ainsi établir votre stratégie de gouvernance initiale. **Planification du déploiement :** Avant de déployer n’importe quelle charge de travail ou ressource, effectuez une révision de la sécurité afin d’identifier tout nouveau risque et de vous assurer que toutes les exigences de la stratégie d’accès et de sécurité des données sont respectées. **Test de déploiement :** Dans le cadre du processus de déploiement de n’importe quelle charge de travail ou ressource, l’équipe de gouvernance cloud, en collaboration avec les équipes de sécurité de votre entreprise, sera responsable du passage en revue du déploiement pour valider la conformité à la stratégie de sécurité. **Planification annuelle :** Tous les ans, effectuez une révision de haut niveau de la stratégie de base de référence de la sécurité des ressources. Étudiez les priorités de l’entreprise pour l’avenir et les stratégies d’adoption du cloud mises à jour afin d’identifier l’augmentation des risques potentiels ou d’autres besoins en sécurité émergents. Utilisez ce temps de révision annuelle pour examiner les dernières meilleures pratiques liées aux bases de référence de la sécurité et intégrez-les dans vos stratégies et processus de révision. **Planification et révision trimestrielles :** Tous les trimestres, effectuez une révision des données d’audit de sécurité et des rapports d’incident afin d’identifier les modifications requises dans la stratégie de sécurité. Dans le cadre de ce processus, passez en revue les ressources de cybersécurité afin d’anticiper de manière proactive les nouvelles menaces et mettre à jour la stratégie, le cas échéant. Une fois l’examen terminé, assurez-vous de la conformité des mesures de conception à la stratégie mise à jour. Ce processus de planification constitue également un moment idéal pour évaluer les lacunes des membres de votre équipe de gouvernance cloud en lien avec les risques, nouveaux ou changeants, associés à la sécurité. Invitez le personnel informatique concerné à participer aux révisions et à la planification en tant que conseillers techniques temporaires ou membres permanents de votre équipe. **Apprentissage et formation :** Deux fois par mois, offrez des sessions de formation pour vous assurer que le personnel informatique et les développeurs connaissent les dernières exigences en matière de sécurité. Dans le cadre de ce processus, relisez et mettez à jour toute la documentation, les guides et les autres ressources de formation pour vous assurer qu’ils correspondent aux dernières instructions stratégiques de l’entreprise. **Révisions d’audit et création de rapports mensuelles :** Tous les mois, effectuez un audit sur tous les déploiements cloud afin de garantir leur alignement continu sur la stratégie de sécurité. Examinez les activités de sécurité avec le personnel informatique, puis identifiez les problèmes de conformité qui n’ont pas encore été pris en charge par le processus d’application et de supervision continues. Cet examen produit un rapport pour l’équipe de la stratégie cloud et chaque équipe d’adoption du cloud afin de communiquer sur l’adhésion générale des parties prenantes à la stratégie. Le rapport est également conservé à des fins d’audit et juridiques. ## <a name="processes-for-ongoing-monitoring"></a>Processus de surveillance continue Une stratégie ligne de base de sécurité réussit si l’état actuel et passé de votre infrastructure cloud est clairement identifiable. Si vous ne pouvez pas analyser les mesures et données pertinentes au sujet de l’intégrité et de l’activité de vos ressources cloud, vous ne pourrez pas identifier les changements de risques ni détecter les violations de vos tolérances aux risques. Les processus de gouvernance continus décrits ci-dessus exigent que vous fournissiez des données de qualité afin d’être capable de modifier la stratégie pour protéger votre infrastructure au mieux face à l’évolution des menaces et des exigences en matière de sécurité. Assurez-vous que vos équipes de sécurité et informatiques ont mis en place des systèmes de supervision automatisés pour votre infrastructure cloud recueillant les données de journaux d’activité pertinentes dont vous avez besoin pour évaluer les risques. Soyez proactif dans le cadre de la surveillance de ces systèmes afin d’assurer la détection et l’atténuation rapides des violations potentielles des stratégies, et assurez-vous que votre stratégie de supervision est conforme aux besoins en matière de sécurité. ## <a name="violation-triggers-and-enforcement-actions"></a>Déclencheurs relatifs aux violations et actions de mise en conformité Comme le non-respect des règles de sécurité peut entraîner des erreurs critiques et une divulgation de données ainsi que des risques d’interruption de service, l’équipe de gouvernance cloud doit disposer d’une visibilité totale sur les violations graves des stratégies. Veillez à ce que le personnel informatique dispose de chemins d’escalade clairs pour signaler les problèmes de sécurité aux membres de l’équipe de gouvernance les mieux placés pour identifier et vérifier que les problèmes de stratégie sont atténués. Lorsque des violations sont détectées, vous devez prendre des actions conformes à la stratégie dès que possible. Votre équipe informatique peut automatiser la plupart des déclencheurs relatifs aux violations à l’aide des outils présentés dans la [chaîne d’outils Base de référence de la sécurité pour Azure](./toolchain.md). Les déclencheurs et mesures d’application ci-après fournissent des exemples auxquels vous pouvez vous référer lorsque vous planifiez d’utiliser les données de supervision pour résoudre les violations des stratégies : - **Augmentation du nombre d’attaques détectées.** Si une ressource subit une augmentation de 25 % du nombre d’attaques par force brute ou DDoS, discutez avec le personnel du service de sécurité informatique et le propriétaire de la charge de travail pour déterminer les solutions. Suivez la résolution des problèmes et actualisez votre assistance si une révision de la stratégie est nécessaire pour prévenir d’autres incidents. - **Données non classifiées détectées.** L’accès externe sera refusé à n’importe quelle source de données dont l’impact sur la confidentialité, la sécurité ou les activités n’aura pas été correctement classifié. Cet accès sera rétabli lorsque le propriétaire des données aura appliqué la classification et le niveau de protection des données appropriés. - **Problème d’intégrité de la sécurité détecté.** Désactivez l’accès à toutes les machines virtuelles vulnérables, ou auxquelles des logiciels malveillants ont pu accéder, jusqu’à ce que des correctifs ou logiciels de sécurité appropriés soient installés. Mettez à jour les conseils stratégiques à prendre en compte pour chaque nouvelle menace détectée. - **Vulnérabilité du réseau détectée.** L’accès à toute ressource non explicitement autorisée par les stratégies d’accès au réseau doit alerter le personnel informatique et de sécurité, ainsi que le propriétaire de la charge de travail concernée. Suivez la résolution des problèmes et actualisez votre assistance si une révision de la stratégie est nécessaire pour réduire les risques d’autres incidents. ## <a name="next-steps"></a>Étapes suivantes Utilisez le [modèle de discipline Base de référence de sécurité](./template.md) pour documenter les processus et les déclencheurs qui correspondent au plan d’adoption du cloud actuel. Pour obtenir des conseils sur l’exécution des stratégies de gestion cloud en harmonie avec les plans d’adoption, consultez l’article sur l’amélioration de la discipline. > [!div class="nextstepaction"] > [Amélioration de la discipline Base de référence de la sécurité](./discipline-improvement.md)
151.449275
817
0.821914
fra_Latn
0.994286
413039bef82c4844c572843c5c594e4a91f63356
305
md
Markdown
_portfolio/2019-09-01-wins_esm_agent.md
pine939/pine939.github.io
6a0538c2679d7158d5b97a03537c066db2f64927
[ "MIT" ]
null
null
null
_portfolio/2019-09-01-wins_esm_agent.md
pine939/pine939.github.io
6a0538c2679d7158d5b97a03537c066db2f64927
[ "MIT" ]
3
2021-06-21T11:35:25.000Z
2021-08-21T07:07:50.000Z
_portfolio/2019-09-01-wins_esm_agent.md
pine939/pine939.github.io
6a0538c2679d7158d5b97a03537c066db2f64927
[ "MIT" ]
null
null
null
--- layout: single time: "2019.09 ~ 2021.06" title: "ESM Agent" skills: [C, Python, Shell] company: "Wins" categories: [project] author_profile: true sidebar: nav: "docs" --- ## 기술 * C * Python ## 역할 * 보안 시스템 통합 제어 모듈 재설계 및 개선 * 사용자 설정 편리성 향상 * 제어 메시지 함수 구조 개선 * 보안 시스템 트래픽 및 장애 이벤트 수집 모듈 성능 개선
12.708333
33
0.622951
kor_Hang
0.999998
4130e4b6afefcb664a5ef2c6dd472085edea6da3
85
md
Markdown
README.md
Rudy02/CSE405_Server_Programming
1e4dc3dd9364a45367349ae6608c20ed8e649d2f
[ "MIT" ]
null
null
null
README.md
Rudy02/CSE405_Server_Programming
1e4dc3dd9364a45367349ae6608c20ed8e649d2f
[ "MIT" ]
null
null
null
README.md
Rudy02/CSE405_Server_Programming
1e4dc3dd9364a45367349ae6608c20ed8e649d2f
[ "MIT" ]
null
null
null
# CSE405_Server_Programming Work I did for my Server Programming Course: Winter 2017
28.333333
56
0.835294
eng_Latn
0.589133
4132ebae07a4aa7a2ea6ee2343dd930e1da44293
4,341
markdown
Markdown
_posts/2015-02-17-the-right-html-element-for-icons.markdown
praveenpuglia/praveenpuglia.github.io
ba778d02b9d7029830df4fc0db4bac3a6e6ce8a0
[ "MIT" ]
3
2015-11-20T07:33:10.000Z
2019-08-26T11:13:30.000Z
_posts/2015-02-17-the-right-html-element-for-icons.markdown
praveenpuglia/praveenpuglia.github.io
ba778d02b9d7029830df4fc0db4bac3a6e6ce8a0
[ "MIT" ]
null
null
null
_posts/2015-02-17-the-right-html-element-for-icons.markdown
praveenpuglia/praveenpuglia.github.io
ba778d02b9d7029830df4fc0db4bac3a6e6ce8a0
[ "MIT" ]
1
2018-02-10T18:58:40.000Z
2018-02-10T18:58:40.000Z
--- layout: post title: The Right HTML Element For Icons --- [![ VS ](/assets/images/2015/02/span_vs_i.png)](/assets/images/2015/02/span_vs_i.png) Do you use `<span>` or `<i>` for icons? Whatever your answer is, keep that at the back of your mind. I am sure you have reasons! Let me tell you what I use. It's `<i>`. In my conversations with people about html & semantics, over time, this topic has come up too often! For all we know, there isn't a right choice. Not at least from what we have got from the [HTML Spec](http://www.w3.org/TR/html5/text-level-semantics.html). So how do we go about choosing an element to deal with icons? I'll say choose as a human would; by being stupid and finding a fit. Religious folks... angry? People use spans stating it's more appropriate "_semantically"_. [Here's what W3C says...](http://www.w3.org/TR/html5/text-level-semantics.html#the-span-element) > The span element **doesn't mean anything** on its own, but can be useful when used together with the global attributes, e.g. class, lang, or dir. Wait... what? That's right. It's the "_meaningless_" element. This allows you to use it for virtually anything and everything at text level but it's meaningless nonetheless. [The i element is a little different](http://www.w3.org/TR/html5/text-level-semantics.html#the-i-element) > The i element represents a span of text **in an alternate voice or mood**, or otherwise offset from the normal prose in a manner indicating a different quality of text, such as a taxonomic designation, a technical term, an idiomatic phrase from another language, transliteration, **a thought**, or a ship name in Western texts. This makes more sense to me. Think about it, an icon is essentially a way to depict a piece of text otherwise. Graphically to be precise. It is a thought, a _metaphor_. This specification in fact forces us to be more creative and thoughtful about what "graphical metaphor" we should use. In an ideal world, we would be using an `<img>`  element to do this but even that has it's own problems; [an empty src makes a server request.](http://www.nczonline.net/blog/2009/11/30/empty-image-src-can-destroy-your-site/) On the brighter side, both **icon** and `<i>`  have "**i**" to start with. To a human, "it fits the data" instinctively. Also, an `<i>`  element requires less characters. How do I leave that luxury? Saving bytes matter. I know there's compression, but... ```html <span> <!-- 13 characters --> <i></i> <!-- 7 characters --> ``` Talking about screen readers( read _accessibility_ ), neither a `span`  nor an `i`  helps. Almost always, the icons come in the form of CSS `background` . With some mumbo jumbo of `background-position` , we get the stuff done. Some would argue that today's screen readers are habituated to find information like that using span. Don't trust them. [Focus on ARIA](https://developer.mozilla.org/en-US/docs/Web/Accessibility/ARIA) instead to get rock-solid accessibility. Here's an example - ```html <i class="icon icon-settings" aria-label="Settings"></i> ``` Talking more on HTML standards, how it moves and what role do we play as developers and designers, [this answer](http://stackoverflow.com/questions/11135261/should-i-use-i-tag-for-icons-instead-of-span#answer-14555422) by [Holly @ StackOverflow](http://stackoverflow.com/users/650537/holly) sums it up. > Common usage tends to dictate language rules more than the other way around. If you're old enough, do you remember that "Web site" was the official spelling when the word was new? Dictionaries insisted there must be a space and Web must be capitalized. There were semantic reasons for that. But common usage said, "Whatever, that's stupid. I'm using 'website' because it's more concise and looks better." And before long, dictionaries officially acknowledged that spelling as correct. Big names in the industry have used `<i>`  for icons.  Bootstrap had earlier used it.(...they now use span though ) Facebook, Twitter -did it. Font Awesome examples utilize the `<i>`  element. [Material Design Light](https://getmdl.io) too uses it in examples. Why can't we? Politically, `<span>`  seems to be correct not by the reason it was built for but by the meaningless nature. For me, my intuition weigh in more. Using `<i>`  feels more familiar to me. I am gonna use it anyway.
96.466667
512
0.748906
eng_Latn
0.995027
41335f63cc5dc38d34aa1f955258bb2555c91a00
515
md
Markdown
README.md
digbang/exercise-fraud-service
0d7c7b7dae1c79725e4e8dc09848c4d4ddc7a6be
[ "MIT" ]
null
null
null
README.md
digbang/exercise-fraud-service
0d7c7b7dae1c79725e4e8dc09848c4d4ddc7a6be
[ "MIT" ]
null
null
null
README.md
digbang/exercise-fraud-service
0d7c7b7dae1c79725e4e8dc09848c4d4ddc7a6be
[ "MIT" ]
null
null
null
# Components ### Channel * `OFFLINE`: Movements made with client presence. * `ONLINE`: Movements made by electronic/digital means. ### Data * `clientUniqueIdentificationCode`: Client fiscal identification. * `movementAmount`: In cents. Positive if client is gaining that amount, negative if client is losing it. * `date`: date and time of movement. * `channel`: see Channel. # Usage ```php $data = new Data('123', 32145, new \DateTime(), Channel::offline()); $sender = new Sender(); $sender->send($data); ```
23.409091
105
0.704854
eng_Latn
0.869628
41342ec54be1fd5b634feb2aad7b1f3a092650fa
6,753
md
Markdown
_posts/2019-02-02-Download-higgs-hunters-guide.md
Luanna-Lynde/28
1649d0fcde5c5a34b3079f46e73d5983a1bfce8c
[ "MIT" ]
null
null
null
_posts/2019-02-02-Download-higgs-hunters-guide.md
Luanna-Lynde/28
1649d0fcde5c5a34b3079f46e73d5983a1bfce8c
[ "MIT" ]
null
null
null
_posts/2019-02-02-Download-higgs-hunters-guide.md
Luanna-Lynde/28
1649d0fcde5c5a34b3079f46e73d5983a1bfce8c
[ "MIT" ]
null
null
null
--- layout: post comments: true categories: Other --- ## Download Higgs hunters guide book " daffy pie-baking neighbors, from the limb of a tree above them to a vine creeping on the ground! He can't be sure. No bringing back across the wall! Had to stop, not gracefully tapered like a standard obelisk? The affair abode concealed till there befell despite between Abbaseh and one of her slave-girls, he became an accomplished meditator. molested. " "It's my house. Should it be sent to your hotel?" have been of great extent. Now you go out there and do the right As the tattooed serpent's grin grew wider on the beefy hand, searching for the unique dives with ease. Then a huge elephant came up to the tree and winding his trunk about it, head next to the door, what she had stubbornly refused to learn from she didn't seem in danger of being permanently traumatized? [Then they returned and sat down. Whereas her father had used open-hand slaps and hard fists to teach his twin sons the lessons of God, by taking off then boots at "You certainly sounded proud of it, maybe?" "I hope so," he said. Nilss. " river higgs hunters guide open in 1879. The westbound lanes are blocked by police vehicles that form a gate, starting to limp in a quick "Jesus?" "Put your feet up to the fire," she said abruptly, when you're not able higgs hunters guide remember them-don't you think, most of which were either wildly exaggerated or entirely imaginary. This was an anaconda smile, but was c, higgs hunters guide would not have been By the addition of other genetic-engineering techniques, "and this is Amos, got a firm grip on one of the cans in the topmost of the four rows. Indeed, the murrain's very bad, Dulse knew no transformation that was irrevocable. A bitter taste arose in her mouth, the two cowboys start image, O such an one. Higgs hunters guide, Junior was thrilled to hear the name Bartholomew, as the case may be, pup. [214] But while in Europe only some not to impetuosity, pineapple cheesecake. 2020LeGuin20-20Tales20From20Earthsea. than it was the prelude to a statement of faith. " The sailor leaned his chin on his mop handle awhile, in which I travelled up the Yenisej in gallery and could be higgs hunters guide certain that he had located the lair of "And how do you know it didn't?" 7, 'Take the price of this dish [of meat] and add thereto of fowls and chickens and what not else is in your market of meats and sweetmeats and bread and arrange it in dishes, I'm still totally confused by "Who're you here with?" shrubs. But thanks to anabiosis. would evidently be sufficient to unite the two worlds with each He rolled his head back and forth on the pillow. The egg will have to be implanted into a foreign womb and that, "the second question is easy to answer, and forgot they were ever one. Well, before we were ten. She left the pie untouched! As a reward As proof of what Constance Tavenall had just said, where a small monastery was then standing at Extraterrestrial worldmakers. From the sea off the To higgs hunters guide a rising tide of higgs hunters guide, the Hackachaks persisted, O Harith? She and Ayo chatted with him about his phone or an in-car computer to report that the fugitive pair higgs hunters guide only minutes censer. Halson possible. When she came to herself, expedition is founded on the confused information obtained during Q Someone named Bartholomew had adopted Seraphim's son and higgs hunters guide the boy after himself Junior applied the patience learned through meditation to the task at hand, one-twelfth, during the time we remained in their neighbourhood, drinking coffee and nibbling at They'll be highly trained in search-and-secure procedures, until she sorted out two clubs. " And he answered, often without trace of a nest, but she eluded him. The nearby motel-casino surely had pay phones, as higgs hunters guide the essential the following communication:-- packed cartons of canned and dry goods. If we let it drop from memory, and that they gave rise to many a "I'm scared, in that drunken slow motion, Captain Edward Johannesen came into the neighbourhood of higgs hunters guide don't know, he said, anyhow. " It is probable that towards the close of the sixteenth century the responsibility for lifting this curse. 179 file:D|Documents20and20Settingsharry. " Leilani, ii, a dark outline; they disappeared, p. Mathematics. " "She spoke with the other breath," Azver said. Junior would never again use it to store leftover soup? countless. 498 to regions where higgs hunters guide ice is everywhere crossed by narrow pounds, lent grace higgs hunters guide warmth to the space: Bouncing on the bed. Mueller complains a pen, one of the cleanest and best kept "Amazing," the robot replied in a neutral voice. " ABOUT THE AUTHOR Junior phoned a twenty-four-hour-a-day higgs hunters guide and paid premium post The Drama 13 "Thank you for these and the shoes," he said, in the European theater, drinking beer and talking, they still and further weakness among us, don't react. It took a while, which this year was also visited by long. "I keep em close in. Physical higgs hunters guide doesn't shake his equanimity. More than thirty major universities offered degrees in Regardless of its object, that he thought he had spoken them in the True door, rye and oats, Lechat had pointed out. the Beatles (infuriatingly). "What gumshoe?" coincidences. He also wrote a were hideous. stand up, but took all higgs hunters guide good and bade put them all to death! Without a word I stepped Nothing brought a sense of order and normality to a disordered and distressing each other company. Thou sufferest not Tuhfeh to pay heed unto us. He professed to Worrying is what higgs hunters guide do best. " The second and third rooms proved to be deserted, picking up the more serious tone, that's something, Awareness of Others. I took two uncertain steps, "This is the juice of grapes and the water of honey, "Nothing I can do about it," I went on, [and it was that one told me the following story]? Saxifraga higgs hunters guide L. Verily, and that their numbers were slowly growing, not now. shoving them out of his way when he can't dodge them. More than thirty major universities offered degrees in Regardless of its object, and a large collection of crayons into a higgs hunters guide The higgs hunters guide of the North-east Passage from 1556 to 1878-- curb across the street, I'd rather be me in one of the other places BILLINGS, maybe. 416,422 Startled, head 136. So we rushed into the water-wheel and seizing the keeper, but a murmur that she couldn't ignore. raised a heap of whales' bones. The attempt to penetrate eastwards from higgs hunters guide river was resumed at Better move. He P.
750.333333
6,660
0.787798
eng_Latn
0.999904
413501d6a95d06aa0e6328c1c9ed8091ff4b5068
10,584
md
Markdown
Readme.md
jasonterando/SimpleImageFileGallery
6236c4f44f0f2814c83f2e97fb84a95c4eb09de4
[ "MIT" ]
null
null
null
Readme.md
jasonterando/SimpleImageFileGallery
6236c4f44f0f2814c83f2e97fb84a95c4eb09de4
[ "MIT" ]
null
null
null
Readme.md
jasonterando/SimpleImageFileGallery
6236c4f44f0f2814c83f2e97fb84a95c4eb09de4
[ "MIT" ]
null
null
null
# Simple Image File Gallery ## Overview This is a rudimentary utility to display thumbnails of images stored in an album directory. Mostly, I wanted an easy eay to browse through image files on a website without having to mess with databases, frameworks, etc. "Features" include: * No database required ("copy to deploy") * Automatic thumbnail generation, including handling of nested subdirectories * AJAX enabled gallery pages come up quickly, and with thumbnails appearing once they are generated * Clean segretation of back-end services and front-end rendering (easy skinning) * Navigation supporting hash-tag URLs (for folder-specific linking) * Minimal framework usage in client, none in services (should be easy to integrate into something else) * Platform independence (Docker used for development and optionally for deployment, Python for helper scripts) ## Requirements ### Runtime * PHP 5.6, 7.0 or greater * PHP Imagick extension ### Development Environment If you want to develop webservices or run the Simple Image File Gallery in a container locally, you'll need: * Python 2.7 or greater * Docker (Linux, Mac or Windows) ## Installation ### Runtime Copy all files in the "gallery* directory to a directory on your website. Store any images you want to view in the gallery/albums directory. You can browse to that directory, and you should see thumbnails of your files once they are generated ## Operation Currently, there is only one viewer ("basic") which uses template files to render the current document locaiton When you access the album, the basic viewer client calls the webservice "info" which scans the album directory and renders a tile for each directory and file located therein. When a file is accessed, the "thumbnails" folder is checked to see if there is a corresponding thumbnail (base file name, followed by "-thumbnail.jpg"). If the thumbnail exists, it is renderd. If the thumbnail does not exist, a placeholder "spinner" is displayed and a separate webservice call is made to generate the thumbnail. Once the thumbnail is generated, it will be displayed. ![Files Screenshot](docimages/files_screenshot_1.jpg) Clicking on a thumbnail will display a "full-screen" preview of the image. You can download the full file by clicking on the file name in the tile or in the download icon in the full-screen view. ![Full-screen Screenshot](docimages/full_screenshot_1.jpg) Similarly, when a folder is accessed, the "thumbnails" folder is checked to see if there is a thumbnail called "directory.jpg". If the thumbnail exists, it is rendered. If the thumbnail does not exist, then then like a new file, a placeholder "spinner" is displayed and a separate webservice call is made to generate the thumbnail. In the case of a directory, its contents are checked to see if a thumbnail is available or can be generated. Once the thumbnail is generated, it will be displayed. Clicking anywhere on a folder tile will display the folder. ![Directory Screenshot](docimages/directory_screenshot_1.jpg) ## Configuration and Customization ### Services By default, image files are accessed in the "gallery/albums" directory,and accesss by the "albums" URL segment. Thumbnails are maximum 200 pixels wide and high, with aspect ratio preserved. You can configure the services by editing the ``` gallery/webservice/config.json ``` file. You'll need to edit this if you want to store albums in a different directory, or have a virtual directory you want to use to access that directory that is not named "albums". You can also set the thumbnail size in this file. * imageUrl: the URL segment used to access images relative to the page used to display the gallery * imagePath: the directory used to retrieve images from the file system relative to the "webservice" directory * thumbnailMaxWidth: the maximum width of generated thumbnails * thumbnailMaxHeight: the maximum height of generated thumbnails ### Client The client viewer is rendered via the "/gallery/index.html", which basically just loads JQuery, Mustache and Font Awesome, the external dependencies for the default (and currently only) basic viewer, and then the base viewer itself. The basic viewer has four templates used to render an album. * template_panel.html - renders the breadcrumb header and the panel that displays items (folders and thumbnails) * template_folder.html - renders a folder tile * template_file.html - renders a file tile and links to the full page viewer * template_viewer - renders the full page viewer All of the styles can be tweaked in basic/css/style.css ## Troubleshooting If stuff doesn't work... * If you don't get "anything" make sure you have PHP on your server and that your files are deployed where you think they are deployed * If you see a title but no images, make sure that your images are in the "albums" directory (or, if in a different location, that you have properly configured webservice/config.json) * In your browser, hit F12 and check the response from the "info" call. PHP may be inserting warnings or errors that are pre-empting the data being returned * If you do not get thumbnails, make sure you have the Imagick PHP on your server (set up a phpinfo page to check) ## Development ### Project Organization * Root folder - contains Docker definition, Python helper (run.py) and index.php (phpinfo) * gallery folder - contains albums folder (image file), viewers folder (rendering), webservice (webservice, duh) and index.html (thin wrapper for rendering) * docimages - where the images you see in this document are stored * logs - where container logs are stored for Apache, apt-get, etc. ### Development Container A Dockerfile is included to build a container that will run the gallery (renderer and webservice). It can optionally be built with PHPUnit, XDEBUG and NPM. It's based on the PHP 7 base image, but also can be switched to PHP 5.6 (check the commented FROM at the top of Dokerfile.gallery). ### Getting started ### Development environment You'll need Python and Docker. By default, the container uses port 8080. Once the container is running, if you browse to http://localhost:8080 you should get a phpinfo page. If you browse to http://localhost:8080/gallery, you should be viewing your album (if you have copied images in gallery/albums, you should get thumbnails). To get the development environment up and going, you will need to do the following: * ```run.py build``` - this builds the Docker container and includes XDEBUG and other development tools * ```run.py install-basic-viewer``` - run this once to install and organize the client support libraries like JQuery that the gallery needs to run * ```run.py start``` - launches the container, at this point, you should be able to run "http://localhost:8080/gallery" and see a blank page (you can copy image and image folders in the "gallery/albums" folder) * ```run.py shell``` - if stuff goes wrong and you need to troubleshoot, this command will open a shell in to the running container * ```run.py webservice-test``` - this runs the PHPUnit unit tests for the webservice code and displays the results in the web browser * ```run.py stop``` - this stops the container ### Webservice Overview There are two supported webservice calls, "/info/_directory-or-file_" and "/thumbnail/_directory-or-file_". The _directory-or-file_ parameter is a relative directory or file name with the "gallery/albums" directory. Calls like ```/info/Hawaii%20Trip/beach_1.jpg``` are okay (nested directories are supported). #### /info Webesrvice Call This accepts an optional parameter for a specific directory or file (if not provided the contents of gallery/albums are assumed). The payload for a directory includes: * name - the name to display (directory name), unless the directory contains a file called "directory.txt", and its contents will override what is shown in this property * type - "directory" for dirctories * parent - if this directory is a child directory of "gallery/albums", this will contain the parent directory * dataUrl - the webservice URL to call to get information about the directory * modified - timestamp for when the directory was created or last modified * thumbnailUrl - the thumbnail for the directory, which is generated based upon the first child folder or file contained in the directory * children - a list of directories and files contained in the directory Note that "children" is only included for the requested directory, it will not be included for the parent or children directories The payload for a file includes: * name - the name to display (file name without the extension) * filename - the name of the file (including extension) * type - "file" for files * imageUrl - the relative URL to the location of the image file * thumbnailUrl - the relative URL to the lcoation of the thumbnail image (if available) * modified - timestamp for when the file was created or last modified #### index.php (Entry Point) This loads the configuration and creates instances Router and AlbumProcessor clasess. It then passes the command provided in the query string variable ```?cmd``` (which gets populated by .htaccess) to the router. ### Router Class This class forwards "/info" and "/thumbnail" requests to the AlbumProcessor, returning back status 200 and data for successful calls, and status 400 for errors (exception messages get populated in the return payload's ErrorMessage property). All other calls return 404 (not found). ### Configuration Classs Loads the configuration, parses, and provides an accessor for individual configuraiton items. ### AlbumProcessor Class This is the workhorse that is responsible for parsing directories, creating thumbnails, and returning their contents. If you are going to change existing functionality in the webservice, this is probably where you will do it. Care has been taken to keep this class cross-platform and to work with symlinks. Unit test coverage is currently 100% (you can do ``run.py webservice-test``` to run webservice tests). ### Client Rendering The provided client rederer uses a relatively minimal set of libraries (by today's standards) - JQuery (mostly for Ajax handling) and Mustache (for template substitution). In ```index.html``` the Javsscript libraries are loaded, and a div with the ID of "gallery" is where the gallery will show up. If you want to create a viewer using AngularJS, React, etc., refer to Webservices documentation above for information about the "/info" and "/thumbnail" webservice calls.
63.759036
560
0.778156
eng_Latn
0.999211
41353602f46ee3d182bdc32e1cf0b864d5bc8bc8
30,817
md
Markdown
articles/active-directory/authentication/howto-password-ban-bad-on-premises-faq.md
fuadi-star/azure-docs.nl-nl
0c9bc5ec8a5704aa0c14dfa99346e8b7817dadcd
[ "CC-BY-4.0", "MIT" ]
16
2017-08-28T07:45:43.000Z
2021-04-20T21:12:50.000Z
articles/active-directory/authentication/howto-password-ban-bad-on-premises-faq.md
fuadi-star/azure-docs.nl-nl
0c9bc5ec8a5704aa0c14dfa99346e8b7817dadcd
[ "CC-BY-4.0", "MIT" ]
575
2017-08-30T07:14:53.000Z
2022-03-04T05:36:23.000Z
articles/active-directory/authentication/howto-password-ban-bad-on-premises-faq.md
fuadi-star/azure-docs.nl-nl
0c9bc5ec8a5704aa0c14dfa99346e8b7817dadcd
[ "CC-BY-4.0", "MIT" ]
58
2017-07-06T11:58:36.000Z
2021-11-04T12:34:58.000Z
--- title: Veelgestelde vragen over on-premises Azure AD-wachtwoord beveiliging description: Veelgestelde vragen over Azure AD-wachtwoord beveiliging in een on-premises Active Directory Domain Services omgeving bekijken services: active-directory ms.service: active-directory ms.subservice: authentication ms.topic: how-to ms.date: 11/21/2019 ms.author: justinha author: justinha manager: daveba ms.reviewer: jsimmons ms.collection: M365-identity-device-management ms.openlocfilehash: f80990854fd0c584d8e6582fdf35108e67d9202b ms.sourcegitcommit: f28ebb95ae9aaaff3f87d8388a09b41e0b3445b5 ms.translationtype: MT ms.contentlocale: nl-NL ms.lasthandoff: 03/29/2021 ms.locfileid: "99625124" --- # <a name="azure-ad-password-protection-on-premises-frequently-asked-questions"></a>Veelgestelde vragen over Azure AD-wachtwoord beveiliging In deze sectie vindt u antwoorden op veel Veelgestelde vragen over Azure AD-wachtwoord beveiliging. ## <a name="general-questions"></a>Algemene vragen **V: welke richt lijnen moeten gebruikers worden gegeven om een veilig wacht woord te selecteren?** De huidige richt lijnen voor dit onderwerp van micro soft zijn te vinden op de volgende koppeling: [Richt lijnen voor micro soft-wacht woorden](https://www.microsoft.com/research/publication/password-guidance) **V: is on-premises Azure AD-wachtwoord beveiliging ondersteund in niet-open bare Clouds?** On-premises Azure AD-wachtwoord beveiliging wordt ondersteund in de open bare Cloud en de Arlington-Cloud. Er is geen datum aangekondigd voor Beschik baarheid in andere Clouds. Met de Azure AD-Portal kunt u de configuratie van on-premises specifieke ' wachtwoord beveiliging voor Windows Server Active Directory ' wijzigen, zelfs bij niet-ondersteunde Clouds. dergelijke wijzigingen blijven behouden, maar worden anders nooit van kracht. Registratie van on-premises proxy agenten of-forests wordt niet ondersteund in niet-ondersteunde Clouds en dergelijke registratie pogingen zullen altijd mislukken. **V: hoe kan ik de voor delen van Azure AD-wachtwoord beveiliging Toep assen op een subset van mijn on-premises gebruikers?** Wordt niet ondersteund. Als Azure AD-wachtwoord beveiliging eenmaal is geïmplementeerd en ingeschakeld, krijgen alle gebruikers dezelfde beveiligings voordelen. **V: wat is het verschil tussen een wachtwoord wijziging en een wachtwoordset (of opnieuw instellen)?** Een wijziging van het wacht woord is wanneer een gebruiker een nieuw wacht woord kiest nadat ze kennis hebben van het oude wacht woord. Een wachtwoord wijziging is bijvoorbeeld wat er gebeurt wanneer een gebruiker zich aanmeldt bij Windows en vervolgens wordt gevraagd om een nieuw wacht woord te kiezen. Een wachtwoordset (ook wel wacht woord opnieuw instellen genoemd) is wanneer een beheerder het wacht woord voor een account vervangt door een nieuw wacht woord, bijvoorbeeld met behulp van het beheer programma Active Directory gebruikers en computers. Voor deze bewerking is een hoog bevoegdheids niveau (meestal domein beheerder) vereist. de persoon die de bewerking uitvoert, heeft doorgaans geen kennis van het oude wacht woord. Help Desk-scenario's voeren vaak wachtwoord sets in, bijvoorbeeld bij het helpen van een gebruiker die het wacht woord is verg eten. U ziet ook wachtwoord sets wanneer er voor de eerste keer een nieuwe gebruikers account wordt gemaakt met een wacht woord. Het wachtwoord validatie beleid gedraagt zich hetzelfde, ongeacht of er een wacht woord is gewijzigd of ingesteld. De Azure AD-Agent service voor wachtwoord beveiliging registreert verschillende gebeurtenissen om u te informeren of een wacht woord is gewijzigd of een set-bewerking is uitgevoerd. Zie [Azure AD-controle programma voor wachtwoord beveiliging en logboek registratie](./howto-password-ban-bad-on-premises-monitor.md). **V: Azure AD-wachtwoord beveiliging valideert bestaande wacht woorden na installatie?** Nee: Azure AD-wachtwoord beveiliging kan alleen wachtwoord beleid afdwingen op Lees bare wacht woorden tijdens het wijzigen van een wacht woord of het instellen van een bewerking. Zodra een wacht woord is geaccepteerd door Active Directory, worden alleen verificatie-specifieke hashes van het wacht woord bewaard. Het wacht woord voor de Lees bare tekst wordt nooit bewaard, waardoor de wachtwoord beveiliging van Azure AD bestaande wacht woorden niet kan valideren. Na de eerste implementatie van Azure AD-wachtwoord beveiliging, beginnen alle gebruikers en accounts uiteindelijk met een wacht woord voor Azure AD-wachtwoord beveiliging, waarna hun bestaande wacht woorden normaal gesp roken na verloop van tijd worden verlopen. Dit proces kan, indien gewenst, worden versneld met een eenmalig hand matige verloop tijd van wacht woorden van gebruikers accounts. Accounts die zijn geconfigureerd met ' wacht woord nooit verloopt ' worden nooit zodanig gewijzigd dat ze hun wacht woord wijzigen, tenzij hand matige verval datum is voltooid. **V: Waarom worden duplicaat gebeurtenissen voor het afkeuren van wacht woorden vastgelegd bij het instellen van een zwak wacht woord met behulp van de Active Directory-module gebruikers en computers beheren?** De Active Directory-module gebruikers en computers wordt eerst geprobeerd het nieuwe wacht woord in te stellen met behulp van het Kerberos-protocol. Als de module is mislukt, wordt een tweede poging gedaan om het wacht woord in te stellen met behulp van een verouderd (SAM RPC)-protocol (de gebruikte specifieke protocollen zijn niet belang rijk). Als het nieuwe wacht woord wordt beschouwd als ongemerkt door Azure AD-wachtwoord beveiliging, worden in dit geval twee sets uitzonderings gebeurtenissen voor wachtwoord herstel vastgelegd. **V: Waarom worden wachtwoord validatie gebeurtenissen van Azure AD-wacht woord met een lege gebruikers naam vastgelegd?** Active Directory ondersteunt de mogelijkheid om een wacht woord te testen om te zien of de huidige wachtwoord complexiteits vereisten van het domein worden door gegeven, bijvoorbeeld met behulp van de [NetValidatePasswordPolicy](/windows/win32/api/lmaccess/nf-lmaccess-netvalidatepasswordpolicy) -API. Wanneer een wacht woord op deze manier wordt gevalideerd, omvat het testen ook de validatie van op wacht woord-filter-dll gebaseerde producten, zoals Azure AD-wachtwoord beveiliging, maar de gebruikers namen die zijn door gegeven aan een opgegeven wachtwoord filter-dll zijn leeg. In dit scenario zal Azure AD-wachtwoord beveiliging het wacht woord nog steeds valideren met behulp van het wachtwoord beleid dat momenteel wordt gebruikt en wordt er een gebeurtenis logboek bericht weer gegeven om het resultaat vast te leggen, maar het gebeurtenis logboek bericht bevat lege velden voor gebruikers namen. **V: wordt it ondersteund voor het installeren van Azure AD-wachtwoord beveiliging naast elkaar met andere op wacht woorden gebaseerde producten?** Ja. Ondersteuning voor meerdere geregistreerde wachtwoord filter-dll's is een kern functie van Windows en is niet specifiek voor Azure AD-wachtwoord beveiliging. Alle geregistreerde wachtwoord filter-dll's moeten overeenkomen voordat een wacht woord wordt geaccepteerd. **V: hoe kan ik Azure AD-wachtwoord beveiliging in mijn Active Directory omgeving implementeren en configureren zonder Azure te gebruiken?** Wordt niet ondersteund. Azure AD-wachtwoord beveiliging is een Azure-functie die ondersteuning biedt voor uitgebreid in een on-premises Active Directory omgeving. **V: hoe kan ik de inhoud van het beleid op het Active Directory niveau wijzigen?** Wordt niet ondersteund. Het beleid kan alleen worden beheerd via de Azure AD-Portal. Zie ook de vorige vraag. **V: Waarom is DFSR vereist voor SYSVOL-replicatie?** FRS (de voorafgaande technologie naar DFSR) heeft veel bekende problemen en wordt volledig niet ondersteund in nieuwere versies van Windows Server Active Directory. Het testen van Azure AD-wachtwoord beveiliging op nul wordt uitgevoerd op met FRS geconfigureerde domeinen. Raadpleeg de volgende artikelen voor meer informatie: [Het geval voor de migratie van SYSVOL-replicatie naar DFSR](/archive/blogs/askds/the-case-for-migrating-sysvol-to-dfsr) [Het einde is nigh voor FRS](https://blogs.technet.microsoft.com/filecab/2014/06/25/the-end-is-nigh-for-frs) Als het domein niet al gebruikmaakt van DFSR, moet u het migreren naar DFSR voordat u Azure AD-wachtwoord beveiliging installeert. Zie de volgende koppeling voor meer informatie: [Migratie handleiding voor SYSVOL-replicatie: FRS naar DSF-replicatie](/previous-versions/windows/it-pro/windows-server-2008-R2-and-2008/dd640019(v=ws.10)) > [!WARNING] > De Azure AD-agent software voor wachtwoord beveiliging wordt momenteel geïnstalleerd op domein controllers in domeinen die nog steeds gebruikmaken van FRS voor SYSVOL-replicatie, maar de software zal niet goed werken in deze omgeving. Bijkomende negatieve neven effecten omvatten afzonderlijke bestanden die niet worden gerepliceerd, en SYSVOL-herstel procedures die worden uitgevoerd, maar die niet op de achtergrond worden gerepliceerd. U moet uw domein zo snel mogelijk migreren naar het gebruik van DFSR en de implementatie van Azure AD-wachtwoord beveiliging blok keren. Toekomstige versies van de software worden automatisch uitgeschakeld wanneer ze worden uitgevoerd in een domein dat nog steeds FRS gebruikt. **V: hoeveel schijf ruimte heeft de functie nodig op de SYSVOL-share van het domein?** De nauw keurigheid van de ruimte is afhankelijk van factoren zoals het aantal en de lengte van de verboden tokens in de lijst met algemene micro soft-gebruikers namen en de aangepaste lijst per Tenant, plus de overhead voor versleuteling. De inhoud van deze lijsten is waarschijnlijk in de toekomst groeien. Met het oog op een redelijke verwachting is dat de functie ten minste vijf (5) MB aan ruimte op de SYSVOL-share van het domein nodig heeft. **V: Waarom moet het systeem opnieuw worden opgestart om de software van de DC-agent te installeren of bij te werken?** Deze vereiste wordt veroorzaakt door het kern gedrag van Windows. **V: is er een manier om een DC-agent te configureren voor het gebruik van een specifieke proxy server?** Nee. Omdat de proxy server stateless is, is het niet belang rijk welke specifieke proxy server wordt gebruikt. **V: is het een goed hulp middel om de Azure AD-proxy service voor wachtwoord beveiliging te implementeren naast andere services, zoals Azure AD Connect?** Ja. De Azure AD-proxy service voor wachtwoord beveiliging en Azure AD Connect mogen nooit direct met elkaar conflicteren. Helaas is er een incompatibiliteit gevonden tussen de versie van de Microsoft Azure AD connect agent Updater-service die is geïnstalleerd door de Azure AD-proxy software voor wachtwoord beveiliging en de versie van de service die door de [Azure Active Directory-toepassingsproxy](../manage-apps/application-proxy.md) -software is geïnstalleerd. Deze incompatibiliteit kan ertoe leiden dat de agent Updater-service geen verbinding kan maken met Azure voor software-updates. Het wordt niet aanbevolen om Azure AD-wachtwoord beveiligings proxy en Azure Active Directory-toepassingsproxy op dezelfde computer te installeren. **V: in welke volg orde moeten de DC-agents en-proxy's worden geïnstalleerd en geregistreerd?** Elke volg orde van de installatie van de proxy-agent, de installatie van de DC-agent, de registratie van het forest en de proxy registratie wordt ondersteund. **V: moet ik zorgen dat de prestaties van mijn domein controllers worden gedistribueerd om deze functie te implementeren?** De Azure AD-Agent service voor wachtwoord beveiliging heeft geen grote invloed op de prestaties van de domein controller in een bestaande gezonde Active Directory-implementatie. Voor de meeste Active Directory implementaties is het wijzigen van wacht woorden een klein deel van de totale werk belasting op elke wille keurige domein controller. Stel dat een Active Directory domein met 10000-gebruikers accounts en een MaxPasswordAge-beleid is ingesteld op 30 dagen. Gemiddeld bevat dit domein 10000/30 = ~ 333-wachtwoord wijzigings bewerkingen elke dag, wat een klein aantal bewerkingen voor zelfs een enkele domein controller is. Houd rekening met een mogelijk slechtste scenario: Stel dat deze ~ 333-wachtwoord wijzigingen voor één enkele enkele uur zijn uitgevoerd. Dit scenario kan bijvoorbeeld optreden wanneer een groot aantal mede werkers op maandag morgen aan het werk zijn. Zelfs in dat geval kijken we eens naar ~ 333/60 minuten = zes wachtwoord wijzigingen per minuut. Dit is niet een aanzienlijke belasting. Als uw huidige domein controllers echter al worden uitgevoerd op prestatie-beperkende niveaus (bijvoorbeeld benut uit het oogpunt van CPU, schijf ruimte, schijf-I/O, etc.), is het raadzaam extra domein controllers toe te voegen of beschik bare schijf ruimte uit te breiden voordat u deze functie implementeert. Zie ook bovenstaande vraag over het gebruik van SYSVOL-schijf ruimte hierboven. **V: Ik wil Azure AD-wachtwoord beveiliging op slechts enkele Dc's in mijn domein testen. Is het mogelijk om wijzigingen in het gebruikers wachtwoord af te dwingen om deze specifieke Dc's te gebruiken?** Nee. Het besturings systeem Windows-client bepaalt welke domein controller wordt gebruikt wanneer een gebruiker het wacht woord wijzigt. De domein controller wordt geselecteerd op basis van factoren zoals Active Directory site-en subnet toewijzingen, omgevings specifieke netwerk configuratie, enzovoort. Azure AD-wachtwoord beveiliging heeft geen invloed op deze factoren en kan niet bepalen welke domein controller is geselecteerd voor het wijzigen van het wacht woord van een gebruiker. Een manier om dit doel gedeeltelijk te bereiken, is het implementeren van Azure AD-wachtwoord beveiliging op alle domein controllers in een bepaalde Active Directory-site. Deze benadering biedt een redelijke dekking voor de Windows-clients die aan die site zijn toegewezen, en daarom ook voor gebruikers die zich aanmelden bij deze clients en hun wacht woord wijzigen. **V: als ik de DC-Agent service van Azure AD-wachtwoord beveiliging op alleen de primaire domein controller (PDC) Installeer, worden alle andere domein controllers in het domein ook beschermd?** Nee. Wanneer het wacht woord van een gebruiker op een bepaalde niet-PDC-domein controller wordt gewijzigd, wordt het wacht woord voor lees bare tekst nooit verzonden naar de PDC (dit is een veelvoorkomende mis-bewerking). Zodra een nieuw wacht woord op een bepaalde domein controller wordt geaccepteerd, gebruikt die domein controller dat wacht woord om de verschillende verificatie-protocolspecifieke hashes van dat wacht woord te maken. vervolgens worden deze hashes in de Directory bewaard. Het wacht woord voor de Lees bare tekst wordt niet bewaard. De bijgewerkte hashes worden vervolgens gerepliceerd naar de PDC. Gebruikers wachtwoorden kunnen in sommige gevallen rechtstreeks worden gewijzigd op de primaire domein controller, afhankelijk van verschillende factoren, zoals netwerk topologie en Active Directory site ontwerp. (Zie de vorige vraag.) In samen vatting is de implementatie van de Azure AD-Agent service voor wachtwoord beveiliging op de PDC vereist om een beveiligings dekking van 100% voor het hele domein te bereiken. Het implementeren van de functie op de primaire domein controller biedt geen Azure AD-beveiligings voordelen voor wachtwoord beveiliging voor andere domein controllers in het domein. **V: Waarom werkt aangepaste slimme vergren deling niet, zelfs niet nadat de agents zijn geïnstalleerd in mijn on-premises Active Directory omgeving?** Aangepaste slimme vergren deling wordt alleen ondersteund in azure AD. Wijzigingen in de aangepaste instellingen voor slim vergren delen in de Azure AD-Portal hebben geen invloed op de on-premises Active Directory omgeving, zelfs niet als de agents zijn geïnstalleerd. **V: is er een System Center Operations Manager management pack beschikbaar voor Azure AD-wachtwoord beveiliging?** Nee. **V: Waarom wordt er nog steeds zwakke wacht woorden door Azure AD afgewezen, zelfs als ik het beleid in de controle modus heb geconfigureerd?** De controle modus wordt alleen ondersteund in de on-premises Active Directory omgeving. Azure AD wordt impliciet altijd in de modus ' afdwingen ' wanneer wacht woorden worden geëvalueerd. **V: mijn gebruikers zien het traditionele Windows-fout bericht wanneer een wacht woord wordt geweigerd door Azure AD-wachtwoord beveiliging. Is het mogelijk om dit fout bericht aan te passen zodat gebruikers weten wat er echt is gebeurd?** Nee. Het fout bericht dat door gebruikers wordt weer gegeven wanneer een wacht woord wordt geweigerd door een domein controller, wordt beheerd door de client computer, niet door de domein controller. Dit gedrag treedt op of een wacht woord wordt geweigerd door de standaard Active Directory wachtwoord beleid of door een oplossing op basis van een wacht woord filter, zoals Azure AD-wachtwoord beveiliging. ## <a name="password-testing-procedures"></a>Test procedures voor wacht woorden Mogelijk wilt u een aantal basis tests uitvoeren op verschillende wacht woorden om de juiste werking van de software te valideren en om een beter inzicht te krijgen in de [wachtwoord evaluatie algoritme](concept-password-ban-bad.md#how-are-passwords-evaluated). Deze sectie bevat een overzicht van een methode voor dergelijke tests die zijn ontworpen voor het produceren van Herhaal bare resultaten. Waarom moet u deze stappen volgen? Er zijn verschillende factoren waardoor het moeilijk is om beheerde, herhaal bare testen van wacht woorden in de on-premises Active Directory omgeving uit te voeren: * Het wachtwoord beleid is geconfigureerd en persistent gemaakt in azure, en kopieën van het beleid worden periodiek gesynchroniseerd door de on-premises DC-agent (s) met behulp van een Polling-mechanisme. De latentie inherent aan deze polling-cyclus kan leiden tot Verwar ring. Als u bijvoorbeeld het beleid configureert in azure, maar vergeet het niet te synchroniseren met de DC-agent, levert de tests mogelijk niet de verwachte resultaten op. Het polling-interval is momenteel een hardcoded keer per uur, maar wacht een uur tussen beleids wijzigingen is niet ideaal voor een interactief test scenario. * Zodra een nieuw wachtwoord beleid is gesynchroniseerd naar een domein controller, treedt er meer latentie op wanneer het wordt gerepliceerd naar andere domein controllers. Deze vertragingen kunnen leiden tot onverwachte resultaten als u een wachtwoord wijziging test op een domein controller die de meest recente versie van het beleid nog niet heeft ontvangen. * Door wachtwoord wijzigingen te testen via een gebruikers interface is het moeilijk om vertrouwen in uw resultaten te hebben. Het is bijvoorbeeld eenvoudig om een ongeldig wacht woord te typen in een gebruikers interface, met name omdat de meeste gebruikers interfaces van het wacht woord gebruikers invoer verbergen (bijvoorbeeld de Windows CTRL-ALT-DELETE-> gebruikers interface voor wacht woord wijzigen). * Het is niet mogelijk om strikt te bepalen welke domein controller wordt gebruikt bij het testen van wachtwoord wijzigingen van clients die lid zijn van een domein. Het Windows-client besturingssysteem selecteert een domein controller op basis van factoren zoals Active Directory site-en subnet toewijzingen, omgevings specifieke netwerk configuratie, enzovoort. Als u deze problemen wilt voor komen, kunt u de volgende stappen uitvoeren op basis van de opdracht regel tests voor het opnieuw instellen van wacht woorden terwijl u bent aangemeld bij een domein controller. > [!WARNING] > Deze procedures moeten alleen worden gebruikt in een test omgeving, omdat alle binnenkomende wachtwoord wijzigingen en opnieuw instellen worden geaccepteerd zonder validatie wanneer de DC-Agent service wordt gestopt, en om te voor komen dat de toegenomen Risico's inherent zijn aan het aanmelden bij een domein controller. Bij de volgende stappen wordt ervan uitgegaan dat u de DC-agent hebt geïnstalleerd op ten minste één domein controller, ten minste één proxy hebt geïnstalleerd en de proxy en het forest hebben geregistreerd. 1. Meld u aan bij een domein controller met behulp van de referenties voor de domein beheerder (of andere referenties die voldoende bevoegdheden hebben om test gebruikers accounts te maken en wacht woorden opnieuw in te stellen), waarbij de software van de DC-agent is geïnstalleerd en opnieuw is opgestart. 1. Open Logboeken en navigeer naar het [gebeurtenis logboek van de DC-agent beheerder](howto-password-ban-bad-on-premises-monitor.md#dc-agent-admin-event-log). 1. Open een opdracht prompt venster met verhoogde bevoegdheden. 1. Een test account maken voor het testen van wacht woorden Er zijn veel manieren om een gebruikers account te maken, maar een opdracht regel optie is hier een manier om deze eenvoudig te maken tijdens herhaalde test cycli: ```text net.exe user <testuseraccountname> /add <password> ``` Stel dat we een test account hebben gemaakt met de naam ' ContosoUser ', bijvoorbeeld: ```text net.exe user ContosoUser /add <password> ``` 1. Open een webbrowser (mogelijk moet u een afzonderlijk apparaat in plaats van uw domein controller gebruiken), Meld u aan bij de [Azure Portal](https://portal.azure.com)en blader naar Azure Active Directory > beveiligings > verificatie methoden > wachtwoord beveiliging. 1. Wijzig de Azure AD-beleids regels voor wachtwoord beveiliging als dat nodig is voor de tests die u wilt uitvoeren. U kunt er bijvoorbeeld voor kiezen om de afgedwongen of controle modus te configureren, of u kunt besluiten om de lijst met verboden voor waarden in uw lijst met verboden wacht woorden te wijzigen. 1. Synchroniseer het nieuwe beleid door de DC-Agent service te stoppen en opnieuw te starten. Deze stap kan op verschillende manieren worden uitgevoerd. U kunt ook de beheer console van Service Management gebruiken door met de rechter muisknop op de Azure AD-service voor wachtwoord beveiliging DC-agent te klikken en ' opnieuw opstarten ' te kiezen. Een andere manier kan worden uitgevoerd vanuit het opdracht prompt venster, zoals in de volgende gevallen: ```text net stop AzureADPasswordProtectionDCAgent && net start AzureADPasswordProtectionDCAgent ``` 1. Controleer de Logboeken om te controleren of een nieuw beleid is gedownload. Telkens wanneer de DC-Agent service wordt gestopt en gestart, ziet u dat er na elkaar 2 30006 gebeurtenissen worden uitgegeven. De eerste 30006-gebeurtenis weerspiegelt het beleid dat in de cache is opgeslagen in de SYSVOL-share. De tweede gebeurtenis van 30006 (indien aanwezig) moet een bijgewerkte Tenant beleids datum hebben en zo ja, dan wordt het beleid weer gegeven dat is gedownload van Azure. De datum waarde van het Tenant beleid is momenteel gecodeerd om de tijds tempel bij benadering weer te geven dat het beleid is gedownload van Azure. Als de tweede gebeurtenis 30006 niet wordt weer gegeven, moet u het probleem oplossen voordat u doorgaat. De 30006-gebeurtenissen zien er ongeveer uit als in dit voor beeld: ```text The service is now enforcing the following Azure password policy. Enabled: 1 AuditOnly: 0 Global policy date: ‎2018‎-‎05‎-‎15T00:00:00.000000000Z Tenant policy date: ‎2018‎-‎06‎-‎10T20:15:24.432457600Z Enforce tenant policy: 1 ``` Als u bijvoorbeeld tussen afgedwongen en controle modus wijzigt, wordt de vlag AuditOnly gewijzigd (het bovenstaande beleid met AuditOnly = 0 is in afgedwongen modus). wijzigingen in de lijst met aangepaste verboden wacht woorden worden niet direct weer gegeven in de bovenstaande gebeurtenis 30006 (en worden niet op een wille keurige manier geregistreerd om veiligheids redenen). Het beleid van Azure is gedownload nadat deze wijziging ook de aangepaste lijst met geblokkeerde wacht woorden bevat. 1. Voer een test uit door te proberen een nieuw wacht woord opnieuw in te stellen voor het test gebruikers account. Deze stap kan worden uitgevoerd in het opdracht prompt venster, bijvoorbeeld: ```text net.exe user ContosoUser <password> ``` Nadat u de opdracht hebt uitgevoerd, kunt u meer informatie over het resultaat van de opdracht krijgen door te kijken in de logboeken. Resultaten van de validatie van het wacht woord worden beschreven in het onderwerp [gebeurtenis logboek van DC-agent beheerder](howto-password-ban-bad-on-premises-monitor.md#dc-agent-admin-event-log) . u gebruikt dergelijke gebeurtenissen om de resultaten van uw test te valideren naast de interactieve uitvoer van de net.exe-opdrachten. We gaan een voor beeld proberen: er wordt geprobeerd een wacht woord in te stellen dat is verboden door de globale lijst van micro soft (deze lijst is [niet gedocumenteerd](concept-password-ban-bad.md#global-banned-password-list) , maar we kunnen hier testen met een bekende verboden periode). In dit voor beeld wordt ervan uitgegaan dat u het beleid in afgedwongen modus hebt geconfigureerd en dat er nul voor waarden zijn toegevoegd aan de lijst met geblokkeerde wacht woorden. ```text net.exe user ContosoUser PassWord The password does not meet the password policy requirements. Check the minimum password length, password complexity and password history requirements. More help is available by typing NET HELPMSG 2245. ``` Omdat bij de test een wachtwoord herstel bewerking is uitgevoerd, moet u een 10017-en een 30005-gebeurtenis voor de ContosoUser-gebruiker zien. De 10017-gebeurtenis moet er als volgt uitzien: ```text The reset password for the specified user was rejected because it did not comply with the current Azure password policy. Please see the correlated event log message for more details. UserName: ContosoUser FullName: ``` De 30005-gebeurtenis moet er als volgt uitzien: ```text The reset password for the specified user was rejected because it matched at least one of the tokens present in the Microsoft global banned password list of the current Azure password policy. UserName: ContosoUser FullName: ``` Dat is leuk: we proberen nog een voor beeld. Deze keer proberen we een wacht woord in te stellen dat verboden is door de lijst met aangepaste verboden wanneer het beleid zich in de controle modus bevindt. In dit voor beeld wordt ervan uitgegaan dat u de volgende stappen hebt uitgevoerd: het beleid is geconfigureerd in de controle modus, de term ' lachrymose ' toegevoegd aan de lijst met aangepaste geblokkeerde wacht woorden en het resulterende nieuwe beleid is gesynchroniseerd met de domein controller door de DC-Agent service te activeren zoals hierboven wordt beschreven. Stel een variant in van het wacht woord verboden: ```text net.exe user ContosoUser LaChRymoSE!1 The command completed successfully. ``` Houd er rekening mee dat deze tijd is geslaagd omdat het beleid zich in de controle modus bevindt. U ziet een gebeurtenis van 10025 en een 30007 voor de ContosoUser-gebruiker. De 10025-gebeurtenis moet er als volgt uitzien: ```text The reset password for the specified user would normally have been rejected because it did not comply with the current Azure password policy. The current Azure password policy is configured for audit-only mode so the password was accepted. Please see the correlated event log message for more details. UserName: ContosoUser FullName: ``` De 30007-gebeurtenis moet er als volgt uitzien: ```text The reset password for the specified user would normally have been rejected because it matches at least one of the tokens present in the per-tenant banned password list of the current Azure password policy. The current Azure password policy is configured for audit-only mode so the password was accepted. UserName: ContosoUser FullName: ``` 1. Ga door met het testen van verschillende wacht woorden en het controleren van de resultaten in de logboeken met behulp van de procedures beschreven in de vorige stappen. Als u het beleid in de Azure Portal wilt wijzigen, vergeet dan niet om het nieuwe beleid te synchroniseren met de DC-agent zoals eerder beschreven. We hebben procedures behandeld waarmee u het gedrag van wachtwoord validatie van Azure AD-wachtwoord beveiliging kunt testen. Het opnieuw instellen van gebruikers wachtwoorden vanaf de opdracht regel op een domein controller lijkt een oneven aantal handelingen te doen, maar zoals eerder beschreven, is het ontworpen voor het produceren van Herhaal bare resultaten. Houd bij het testen van verschillende wacht woorden rekening met de [wachtwoord evaluatie algoritme](concept-password-ban-bad.md#how-are-passwords-evaluated) , omdat deze mogelijk kan leiden tot een uitleg van de resultaten die u niet verwacht. > [!WARNING] > Wanneer alle tests zijn voltooid, moet u niet verg eten alle gebruikers accounts te verwijderen die zijn gemaakt voor test doeleinden. ## <a name="additional-content"></a>Aanvullende inhoud De volgende koppelingen maken geen deel uit van de Azure AD-documentatie voor wachtwoord beveiliging, maar kunnen een nuttige bron zijn van aanvullende informatie over de functie. [Azure AD-wachtwoord beveiliging is nu algemeen beschikbaar.](https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Azure-AD-Password-Protection-is-now-generally-available/ba-p/377487) [Hand leiding e-mail phishing Protection – deel 15: implementeer de Microsoft Azure AD-wachtwoord beveiligings service (voor on-premises)](http://kmartins.com/2018/10/14/email-phishing-protection-guide-part-15-implement-the-microsoft-azure-ad-password-protection-service-for-on-premises-too/) [Azure AD-wachtwoord beveiliging en slimme vergren delingen zijn nu beschikbaar als open bare preview.](https://techcommunity.microsoft.com/t5/Azure-Active-Directory-Identity/Azure-AD-Password-Protection-and-Smart-Lockout-are-now-in-Public/ba-p/245423#M529) ## <a name="microsoft-premierunified-support-training-available"></a>Micro soft Premier\Unified-ondersteunings training beschikbaar Als u meer wilt weten over het beveiligen van Azure AD-wacht woorden en het implementeren ervan in uw omgeving, kunt u profiteren van een micro soft proactieve service die beschikbaar is voor klanten met een Premier-of Unified-ondersteunings contract. De service heet Azure Active Directory: wachtwoord beveiliging. Neem contact op met uw Technical Account Manager voor meer informatie. ## <a name="next-steps"></a>Volgende stappen Als u een on-premises Azure AD-vraag voor wachtwoord beveiliging hebt die hier niet wordt beantwoord, kunt u hieronder een feedback-item verzenden. [Wachtwoordbeveiliging in Azure AD implementeren](howto-password-ban-bad-on-premises-deploy.md)
98.772436
905
0.812246
nld_Latn
0.999925
4135618793835a339020621c8c34f9e049fd947c
132
md
Markdown
shu-ju-ku-he-eloquent/pei-zhi/README.md
liseen315/Laravel-Up-and-Running-
b11b654f7ca83b6793743fab69633b242531310a
[ "MIT" ]
6
2019-08-09T08:16:15.000Z
2021-01-13T13:44:36.000Z
shu-ju-ku-he-eloquent/pei-zhi/README.md
liseen315/Laravel-Up-and-Running
b11b654f7ca83b6793743fab69633b242531310a
[ "MIT" ]
null
null
null
shu-ju-ku-he-eloquent/pei-zhi/README.md
liseen315/Laravel-Up-and-Running
b11b654f7ca83b6793743fab69633b242531310a
[ "MIT" ]
null
null
null
# 配置 在我们了解如何使用Laravel的数据库工具前,我们先讨论一下如何配置数据库以及连接 数据库访问配置在config/database.php和.env中.就像Laravel的许多其他配置一样,你可以定义多个"链接",然后决定默认使用哪个配置.
14.666667
78
0.848485
zho_Hans
0.727166
41357d2fb749efad375713e7ddc3e161e70d2b49
1,664
md
Markdown
02-create.md
PBarmby/git-novice
b21eeeadb041e5c1f6e9b63dd3046dd8bf429251
[ "CC-BY-4.0", "MIT" ]
null
null
null
02-create.md
PBarmby/git-novice
b21eeeadb041e5c1f6e9b63dd3046dd8bf429251
[ "CC-BY-4.0", "MIT" ]
null
null
null
02-create.md
PBarmby/git-novice
b21eeeadb041e5c1f6e9b63dd3046dd8bf429251
[ "CC-BY-4.0", "MIT" ]
null
null
null
--- layout: page title: Version Control with Git subtitle: Creating a Repository minutes: 10 --- > ## Learning Objectives {.objectives} > > * Explain how to create a Git repository locally. Once Git is configured, we can start using it. Let's create a directory for our work: ~~~ {.bash} $ mkdir planets $ cd planets ~~~ and tell Git to make it a [repository](reference.html#repository)&mdash;a place where Git can store old versions of our files: ~~~ {.bash} $ git init ~~~ If we use `ls` to show the directory's contents, it appears that nothing has changed: ~~~ {.bash} $ ls ~~~ But if we add the `-a` flag to show everything, we can see that Git has created a hidden directory called `.git`: ~~~ {.bash} $ ls -a ~~~ ~~~ {.output} . .. .git ~~~ Git stores information about the project in this special sub-directory. If we ever delete it, we will lose the project's history. We can check that everything is set up correctly by asking Git to tell us the status of our project: ~~~ {.bash} $ git status ~~~ ~~~ {.output} # On branch master # # Initial commit # nothing to commit (create/copy files and use "git add" to track) ~~~ > ## Places to Create Git Repositories {.challenge} > > The following sequence of commands creates one Git repository inside another: > > ~~~ {.bash} > cd # return to home directory > mkdir alpha # make a new directory alpha > cd alpha # go into alpha > git init # make the alpha directory a Git repository > mkdir beta # make a sub-directory alpha/beta > cd beta # go into alpha/beta > git init # make the beta sub-directory a Git repository > ~~~ > > Why is it a bad idea to do this?
21.61039
85
0.683894
eng_Latn
0.995303
413743938916ea4f61ec2dad3866953fbf612164
5,800
md
Markdown
_posts/2015-05-18-hbase-create-table-by-master-anlyze.md
grokcoder/grokcoder.github.io
b18413c3882f5afb4a8a12219021099f82923fae
[ "MIT" ]
null
null
null
_posts/2015-05-18-hbase-create-table-by-master-anlyze.md
grokcoder/grokcoder.github.io
b18413c3882f5afb4a8a12219021099f82923fae
[ "MIT" ]
null
null
null
_posts/2015-05-18-hbase-create-table-by-master-anlyze.md
grokcoder/grokcoder.github.io
b18413c3882f5afb4a8a12219021099f82923fae
[ "MIT" ]
null
null
null
--- layout: post title: HBase 表创建的服务器端实现分析 date: 2015-05-18 15:20:13 author: bitking categories: ['HBase'] tags: [源码分析, HBase] feature-img: "assets/img/pexels/retro-school.jpeg" --- HBase的所有请求调用都是通过RPC的机制进行的,RPCServer监听到请求之后会解析请求内容,然后根据解析的方法以及参数调用服务器端实际的方法,这也是远程代理模式的经典做法,createTable的请求最终实现是在HMaster中的,但是实际的表的建立过程是在CreateTableHandler类中的,接下来主要就HBase中表的建立过程进行详细分析。 ## 1. HMaster的createTable实现 如下代码所示,是HMaster中的createTable的流程代码: ```java public void createTable(HTableDescriptor hTableDescriptor, byte[][] splitKeys) throws IOException { if (isStopped()) { throw new MasterNotRunningException(); } String namespace = hTableDescriptor.getTableName().getNamespaceAsString(); ensureNamespaceExists(namespace); HRegionInfo[] newRegions = getHRegionInfos(hTableDescriptor, splitKeys); checkInitialized(); sanityCheckTableDescriptor(hTableDescriptor); if (cpHost != null) { cpHost.preCreateTable(hTableDescriptor, newRegions); } LOG.info(getClientIdAuditPrefix() + " create " + hTableDescriptor); this.service.submit(new CreateTableHandler(this, this.fileSystemManager, hTableDescriptor, conf, newRegions, this).prepare()); if (cpHost != null) { cpHost.postCreateTable(hTableDescriptor, newRegions); } } ``` 在正式创建表之前做的几件事情: 1.检查Master是否正常运行 2.检查索要创建的表的`namespace`是否存在 3.`HRegionInfo`类包含了HRegion的相关信息getHRegionInfos(),函数按照splitKeys和表描述信息,获取该表对应的HRegion的信息。 >这里有必要解释一下`HRegion`,`HRegion`存储了table的数据信息,它包含了每一个row的所有columns,一个table包含1到多个hregion,每一个hregion包含多个`HStores`,每个HStores包含一部分的Rows和对应部分的Columns。 每个HRegion包含了一个[startKey, endKey),用来标识其保存的row的范围,英雌HRegion可以由`TableName`和`key range`唯一确定 4.检查Master是否完成初始化 5.检查表信息是否符合规定 6.建表,建表又分为三个过程: 1. cpHost.preCreateTable(hTableDescriptor, newRegions); 2. submit(new CreateTableHandler(this, this.fileSystemManager, hTableDescriptor, conf, newRegions, this) 3.cpHost.postCreateTable(hTableDescriptor, newRegions); 其中步骤1和3都是为了协处理器预留的钩子函数,方便应用开发人员动态添加新的功能。 接下来主要分析一下步骤2中的建表所做的操作 ## 2. CreateTableHandler 中的建表实现 其实在代码`this.service.submit(new CreateTableHandler(this, this.fileSystemManager, hTableDescriptor, conf, newRegions, this).prepare());`中调用的过程分为两个部分,一个是prepare,然后才是submit,先来看一下prepare()的工作 ###2.1 建表之前的准备工作prepare()分析 ```java public CreateTableHandler prepare() throws NotAllMetaRegionsOnlineException, TableExistsException, IOException { // Need hbase:meta availability to create a table try { if (server.getMetaTableLocator().waitMetaRegionLocation( server.getZooKeeper(), timeout) == null) { throw new NotAllMetaRegionsOnlineException(); } // If we are creating the table in service to an RPC request, record the // active user for later, so proper permissions will be applied to the // new table by the AccessController if it is active if (RequestContext.isInRequestContext()) { this.activeUser = RequestContext.getRequestUser(); } else { this.activeUser = UserProvider.instantiate(conf).getCurrent(); } } //acquire the table write lock, blocking. Make sure that it is released. this.tableLock.acquire(); boolean success = false; try { TableName tableName = this.hTableDescriptor.getTableName(); if (MetaTableAccessor.tableExists(this.server.getConnection(), tableName)) { throw new TableExistsException(tableName); } checkAndSetEnablingTable(assignmentManager, tableName); success = true; } finally { if (!success) { releaseTableLock(); } } return this; } ``` 这里的主要工作如下: 1. 获取hbase:meta 信息,meta是hbase的一个特殊表,其存数了HBase上面的RegionServer的信息以及其分布情况。 2. 检查创建表的用户的权限并记录。 3. 获取table write锁 4. 检查表是否存在,已存在则抛出异常 5. 为了防止多个线程发起建同一个表的情况,可以在建表未成功之前可以先设置该table enable,这样其他线程就不能再建表。 建表之前的准备工作到此结束,一下分析具体建表流程 ### 2.2 建表具体实现handleCreateTable过程分析 handleCreateTable,其实主要做了三件事,1.在磁盘上建表,2.meta表,3.为新建的表分配对应的regionserver。详细代码如下: 这块的代码是分为八个小步骤,我们一一分析, 1.创建表描述符 ``` java // 1. Create Table Descriptor Path tempTableDir = FSUtils.getTableDir(tempdir, tableName); new FSTableDescriptors(this.conf).createTableDescriptorForTableDirectory( tempTableDir, this.hTableDescriptor, false); Path tableDir = FSUtils.getTableDir(fileSystemManager.getRootDir(), tableName); ``` 首先创建一个临时的文件夹,然后创建对应的文件表描述符,最后创建该表在文件系统中的路径, >HBase的表的数据对应在文件系统中的一个文件夹下,该文件夹也就是表名 2.创建Regions ```java // 2. Create Regions List<HRegionInfo> regionInfos = handleCreateHdfsRegions(tempdir, tableName); ``` 为table 创建in-disk数据结构,内部具体创建了存储table数据的HRegion,并返回hregioninfo的信息 3.将步骤1中的临时文件夹移到HBase的根目录下,如果hregions创建成功的话,继续一下几个步骤: ``` java if (regionInfos != null && regionInfos.size() > 0) { // 4. Add regions to META addRegionsToMeta(regionInfos); // 5. Add replicas if needed regionInfos = addReplicas(hTableDescriptor, regionInfos); // 6. Trigger immediate assignment of the regions in round-robin fashion ModifyRegionUtils.assignRegions(assignmentManager, regionInfos); } ``` 4. 将新建的hregion信息注册到hbase的meta表中; 5. 有必要的话创建这些hregion的副本 6. 为新建的hregions分配对应的regionserver 7. 在zookeeper中将新建的table设置为enable状态: ```java // 7. Set table enabled flag up in zk. try { assignmentManager.getTableStateManager().setTableState(tableName, ZooKeeperProtos.Table.State.ENABLED); } catch (CoordinatedStateException e) { throw new IOException("Unable to ensure that " + tableName + " will be" + " enabled because of a ZooKeeper issue", e); } ``` 8.跟新tabledescripter cache ```java // 8. Update the tabledescriptor cache. ((HMaster) this.server).getTableDescriptors().get(tableName); ``` 至此服务器端数据库表的建立过程源码分析结束
31.521739
180
0.736379
yue_Hant
0.608146
4137609c377c7c478fe053bae6517fea93620ff3
244
md
Markdown
content/post/comic-2/index.md
captv89/fast-comics
8da96fd81871916d8f53e970af39b3fdc9b9628d
[ "MIT" ]
1
2021-07-09T13:07:31.000Z
2021-07-09T13:07:31.000Z
content/post/comic-2/index.md
captv89/fast-comics
8da96fd81871916d8f53e970af39b3fdc9b9628d
[ "MIT" ]
null
null
null
content/post/comic-2/index.md
captv89/fast-comics
8da96fd81871916d8f53e970af39b3fdc9b9628d
[ "MIT" ]
null
null
null
+++ author = "CaptV89" title = "Captain America" date = "2021-06-20" description = "Legend of Captain America" tags = [ "capt", "america", "legend", ] categories = [ "Marvel", "Action", ] +++ {{< gallery match="img/*" >}}
12.842105
41
0.553279
eng_Latn
0.255232
413795306afc5374237779553cac7f0d42949816
1,607
md
Markdown
content/authors/Erasmo_Tani/_index.md
lorecchia/starter-hugo-academic
6a26e5458a599e3b11c0b8c0a3c7673e6aa63ebc
[ "MIT" ]
null
null
null
content/authors/Erasmo_Tani/_index.md
lorecchia/starter-hugo-academic
6a26e5458a599e3b11c0b8c0a3c7673e6aa63ebc
[ "MIT" ]
1
2022-01-21T17:34:11.000Z
2022-01-21T17:34:11.000Z
content/authors/Erasmo_Tani/_index.md
lorecchia/starter-hugo-academic
6a26e5458a599e3b11c0b8c0a3c7673e6aa63ebc
[ "MIT" ]
null
null
null
--- # Display name title: Erasmo Tani # Is this the primary user of the site? superuser: false # Role/position role: Graduate Student # Organizations/Affiliations organizations: - name: University of Chicago # url: "https://computerscience.uchicago.edu/people/profile/lorenzo-orecchia/" # Short bio (displayed in user profile at end of posts) bio: Erasmo joined the University of Chicago in September 2019. Prior to that, he obtained a Master's degree in Computer Science from Boston University. He also graduated at the top of his class with a Master's of Engineering in Mathematics and Computer Science from the University of Bristol, UK, in 2017. interests: - Vertex separators - spectral graph theory - Applications of the Burer-Monteiro framework to solving semidefinite programs # Social/Academic Networking social: - icon: link icon_pack: fas link: "https://people.cs.uchicago.edu/~etani/" - icon: envelope icon_pack: fas link: "mailto:[email protected]" # Enter email to display Gravatar (if Gravatar enabled in Config) email: "" # Highlight the author in author lists? (true/false) highlight_name: false # Organizational groups that you belong to (for People widget) # Set this to `[]` or comment out if you are not using People widget. user_groups: - Graduate Students --- Erasmo joined the University of Chicago in September 2019. Prior to that, he obtained a Master's degree in Computer Science from Boston University. He also graduated at the top of his class with a Master's of Engineering in Mathematics and Computer Science from the University of Bristol, UK, in 2017.
34.934783
306
0.773491
eng_Latn
0.988309
4137a63b523b391abb562049a70b953c3b0af0ac
81
md
Markdown
.github/CHANGELOG.md
mvcds/ubi
eecb1152af212a340f236606d8aa1997a5746bcb
[ "MIT" ]
15
2018-04-10T12:43:46.000Z
2022-02-08T00:20:31.000Z
.github/CHANGELOG.md
mvcds/ubi
eecb1152af212a340f236606d8aa1997a5746bcb
[ "MIT" ]
52
2018-04-14T12:49:16.000Z
2022-01-22T04:13:20.000Z
.github/CHANGELOG.md
mvcds/ubi
eecb1152af212a340f236606d8aa1997a5746bcb
[ "MIT" ]
null
null
null
# Changelog Check out (https://github.com/mvcds/hubi/releases) for our changes.
20.25
67
0.753086
eng_Latn
0.494137
413846952aa2ce0f81551c27f6d10fd219126a9e
1,882
md
Markdown
README.md
danividanivi/qscoreboard
af9c97a5fe8c2302840e7bef30666a1a1066fd79
[ "MIT" ]
null
null
null
README.md
danividanivi/qscoreboard
af9c97a5fe8c2302840e7bef30666a1a1066fd79
[ "MIT" ]
null
null
null
README.md
danividanivi/qscoreboard
af9c97a5fe8c2302840e7bef30666a1a1066fd79
[ "MIT" ]
null
null
null
# Qscoreboard Qscoreboard is a software that can turn your computer into a scoreboard. Do you organize a match, league, or cup? You don't need to buy a scoreboard, just download Qscoreboard and make use of your computer screens. Scoreboard application was originally created for waterpolo (and its 2019 rules) but can also be used for many other sports. ## Installation Download [latest release .7z file](https://github.com/danividanivi/Qscoreboard/releases) and extract it in desired folder. Make sure all the screens you are planning to use are connected to your computer. ### For Windows Run Qscoreboard.exe and test everything is working as expected. ## User Guide Main screen is displayed when you run Qscoreboard. You can interact with all controls by using touchpad, mouse, or touchscreen. Use a keyboard or screen keyboard to enter numbers. If you have a secondary screen to show game status to viewers, activate it pressing **Add Screen** If you have more screens to show timeoff, activate them pressing **Add Screen 30** After adding any screen, make sure focus is still on Main Screen by clicking in it, otherwhise keyboard shorcuts won't work. ![Alt text](./keyboard_layout.svg) <img src="./img/keyboard_layout.svg"> ## Developer Guide Qscoreboard is developed in C++ using Qt Framework 5.12. It has been compiled and tested in several Windows 10 x64 computers. You may be able to compile it and use it in a different platform and Operating System, if you do so please let me know it. ## Contact For support or questions about Qscoreboard, contact @danividanivi. This is a non-commercial project, if you like it please consider donating to [Club Waterpolo Lugo as we need the money to contract a coach, buy balls and repair our goals](https://www.paypal.me/waterpololugo) Are you using Qsoreboard? Please send us your feedback to keep improving it.
40.042553
208
0.781615
eng_Latn
0.999137
4138702f8c5c4d2f1eaa5708272f54b5bc84af4c
33
md
Markdown
README.md
Nazarik86/InternetStore
6ffcb16459d269d55be77bfe7bf691afad9ca083
[ "MIT" ]
null
null
null
README.md
Nazarik86/InternetStore
6ffcb16459d269d55be77bfe7bf691afad9ca083
[ "MIT" ]
null
null
null
README.md
Nazarik86/InternetStore
6ffcb16459d269d55be77bfe7bf691afad9ca083
[ "MIT" ]
null
null
null
# InternetStore Интернет-магазин
11
16
0.848485
rus_Cyrl
0.14951
4139a21e6d038c1cf84c6c7017f6ef2eacb53167
491
md
Markdown
README.md
HauruX/rctui-demo
591b446bb57e2a6b1d9de4b27e44eeb38d38bb69
[ "MIT" ]
null
null
null
README.md
HauruX/rctui-demo
591b446bb57e2a6b1d9de4b27e44eeb38d38bb69
[ "MIT" ]
null
null
null
README.md
HauruX/rctui-demo
591b446bb57e2a6b1d9de4b27e44eeb38d38bb69
[ "MIT" ]
null
null
null
# rctui-demo 使用[react-webpack-babel](https://github.com/alicoding/react-webpack-babel)作为基础框架结构,简单制作一个[react-ui](https://github.com/Lobos/react-ui) demo. react-ui为基于bootstrap 4.0封装的react组件库,在npm中发布为rctui,文档参见[React UI文档](http://lobos.github.io/react-ui/0.7/)。 由于该rctui发布内容为未编译的源码,故使用`npm install rctui`安装后无法做到开箱即用,需要安装相关的依赖包并对其内容做编译。而官方文档中并未给出具体操作,故制作该简易demo,共参考使用。demo对`rctui`中的富文本编辑器`Editor`进行的简单的使用。 ## 使用方式 ```shell npm install npm run dev ``` 打开浏览器,访问`http://127.0.0.1:8888/`即可看到效果
30.6875
142
0.784114
yue_Hant
0.255787
4139d09392b2de2e616f06f8abb54a123c308348
1,046
md
Markdown
README.md
VladimirBlagojevic/React-To-do-App
c6a6989551ee08b2a3b85f5eb95d75f66be24980
[ "Info-ZIP" ]
null
null
null
README.md
VladimirBlagojevic/React-To-do-App
c6a6989551ee08b2a3b85f5eb95d75f66be24980
[ "Info-ZIP" ]
null
null
null
README.md
VladimirBlagojevic/React-To-do-App
c6a6989551ee08b2a3b85f5eb95d75f66be24980
[ "Info-ZIP" ]
null
null
null
# React Todo ![Project Image](./React-ToDo.png) --- ### Table of Contents - [Description](#description) - [How To Use](#how-to-use) - [References](#references) - [License](#license) - [Author Info](#author-info) --- ## Description Project that i made to practice React.A simple Todo App that use Local Storage to save your todos..U can add,delete,check and uncheck todos. #### Technologies - React - Sass (SCSS) [Back To The Top](#read-me-template) --- ## How To Use #### Installation - npm install #### To run local dev-server - npm run dev-server [Back To The Top](#read-me-template) --- ## References - Design credits go to Adrien on [Dribbble](https://dribbble.com/adriengervaix) [Back To The Top](#read-me-template) --- ## License MIT License Copyright (c) [2018] [Vladimir Blagojevic] [Back To The Top](#read-me-template) --- ## Author Info - Twitter - [@Vladimir B.](https://twitter.com/Kvout90) - Website - [Vladimir B.](https://github.com/VladimirBlagojevic) [Back To The Top](#read-me-template)
14.135135
141
0.66826
kor_Hang
0.459276
413a4c84314228d1ac147889420ea9cf91f7584b
179
md
Markdown
content/blog/vscode-js.md
nenjamin2405/dev-blog
99521e98040bd36ba09712197fbbc93bbaba1787
[ "MIT" ]
null
null
null
content/blog/vscode-js.md
nenjamin2405/dev-blog
99521e98040bd36ba09712197fbbc93bbaba1787
[ "MIT" ]
null
null
null
content/blog/vscode-js.md
nenjamin2405/dev-blog
99521e98040bd36ba09712197fbbc93bbaba1787
[ "MIT" ]
null
null
null
--- path: vscode-js date: 2019-11-14T04:53:18.533Z title: Vscode JS description: It appears vscode syntax highlighting --- ```js const func = () => { console.log("Hello") } ```
14.916667
50
0.659218
eng_Latn
0.430129
413a70cdf1db05c79ff03e4bb9b1749ec1ed5137
1,597
md
Markdown
nuggets/loading-arbitrary-scripts-sharepoint-framework-components.md
SympraxisConsulting/sp-dev-gov
9ee5983dee4cd5ce023da9bd20941238e28c789a
[ "MIT" ]
1
2018-04-04T18:19:07.000Z
2018-04-04T18:19:07.000Z
nuggets/loading-arbitrary-scripts-sharepoint-framework-components.md
SympraxisConsulting/sp-dev-gov
9ee5983dee4cd5ce023da9bd20941238e28c789a
[ "MIT" ]
null
null
null
nuggets/loading-arbitrary-scripts-sharepoint-framework-components.md
SympraxisConsulting/sp-dev-gov
9ee5983dee4cd5ce023da9bd20941238e28c789a
[ "MIT" ]
null
null
null
--- title: Loading arbitrary scripts in SharePoint Framework components audience: Developer, Administrator, Architect product-major: SharePoint product-minor: NA glossary-links: SPFx, No-script site --- # Loading arbitrary scripts in SharePoint Framework components ## Summary If your SharePoint Framework component allows users to specify an additional piece of script to load on the page, set the `requiresCustomScript` property in the component's property to `true`. ## Main Content If a SharePoint Framework component allows users to configure an additional piece of script to load on the page, that component should have in its manifest the `requiresCustomScript` property set to `true`. In older versions of the SharePoint Framework, this property was named `safeWithCustomScriptDisabled` and developers would set it to `false` in case they allowed loading arbitrary scripts. Setting the `requiresCustomScript` property to `true` in the manifest indicates that there might be an additional risk using that particular component. Such component would not work on a site where using custom scripts is disabled (also referred to as a 'no-script site'). Using this property allows organizations to enforce the governance of customizations in their tenants and is a recommended good practice to follow. **Important:** It is up to the developers to use the `requiresCustomScript` property to indicate that a component allows loading custom scripts. If their solution allows loading custom scripts but the `requiresCustomScript` property is set to `false`, the solution will work just fine.
66.541667
395
0.809643
eng_Latn
0.998604
413b75a3e80b550108b35925ee706421700a3d30
1,814
md
Markdown
README.md
AndreFilho43/COVID-19_aroundtheworld
23746acdddce427deadd9b18afe2ce9dec8a9fc1
[ "Apache-2.0" ]
1
2021-06-07T10:26:04.000Z
2021-06-07T10:26:04.000Z
README.md
AndreFilho43/COVID-19_aroundtheworld
23746acdddce427deadd9b18afe2ce9dec8a9fc1
[ "Apache-2.0" ]
null
null
null
README.md
AndreFilho43/COVID-19_aroundtheworld
23746acdddce427deadd9b18afe2ce9dec8a9fc1
[ "Apache-2.0" ]
null
null
null
# COVID-19: Around the World ## Dados reais de pessoas reais sobre a atual situação mundial do coronavírus. ### Descrição do projeto e sua organização O objetivo desse projeto é apresentar para o público os dados mais relevantes sobre o COVID-19, assim como o progresso da vacinação e diminuição dos casos. A necessidade de elaborar o projeto surgiu a partir da insegurança das pessoas em relação aos dados divulgados por grandes emissoras brasileiras. Com os dashboards disponibilizados nesse projeto, todos poderão verificar a fonte de dados e analisar sem viéis (bias). <p>A proposta desse código é ser educacional, logo vou comentando os passos que estou fazendo em cada célula do Jupyter's notebook.</p> <p>As fontes dos datasets utilizados nesse projeto você encontrará no final desse notebook.</p> **Ordem dos arquivos criados para acompanhar:** 1. COVID_cleaning.ipynb (Arquivo do Jupyter's Notebook com o passo-a-passo) 2. main.py (contém o código principal da transformação dos dados) **Dados que vou utilizar nas visualizações:** - Total de pessoas vacinadas x Pessoas não vacinadas - Pessoas em estado de emergência x Pessoas com sintomas leves - Pessoas falecidas x Pessoas infectadas x População total **Colabore com o projeto efetuando a primeira etapa de pesquisa: https://forms.gle/gh8VyAWkKaskn7iV9 <br /> Leva apenas 70 segundos e ajudará a coletar uma amostra de dados com qualidade. <br /> O prazo para preenchimento do formulário é até 11/06/2021.** <p> **Novos Updates no dia 12/06/2021 às 19:00h** ### Origem dos datasets e suas estruturas **COVID-19 Overview:** ```\\datasets\\owid-covid-data_kaggler.csv``` (original) <br /> ```\\datasets\\COVID-19_overview.csv``` (processado) <br /> **Link do Dataset:** https://www.kaggle.com/aditeloo/the-world-dataset-of-covid19?rvi=1
54.969697
421
0.772326
por_Latn
0.999832
413bab3826d996a76e84e9c8fe8c3f25a239524e
1,237
md
Markdown
_posts/2016-08-09-Jolene-Cocktail-Prom-Style-DY59W410.md
hyperdressyou/hyperdressyou.github.io
9849173bcaac57aa413f9b885975103e554300f1
[ "MIT" ]
null
null
null
_posts/2016-08-09-Jolene-Cocktail-Prom-Style-DY59W410.md
hyperdressyou/hyperdressyou.github.io
9849173bcaac57aa413f9b885975103e554300f1
[ "MIT" ]
null
null
null
_posts/2016-08-09-Jolene-Cocktail-Prom-Style-DY59W410.md
hyperdressyou/hyperdressyou.github.io
9849173bcaac57aa413f9b885975103e554300f1
[ "MIT" ]
null
null
null
--- layout: post date: 2016-08-09 title: "Jolene Cocktail Prom Style DY59W410" category: Jolene Cocktail tags: [Jolene Cocktail] --- ### Jolene Cocktail Prom Style DY59W410 Just **$289.00** ### <table><tr><td>BRANDS</td><td>Jolene Cocktail</td></tr></table> <a href="https://www.readybrides.com/en/jolene-cocktail/89924-jolene-cocktail-prom-style-dy59w410.html"><img src="//img.readybrides.com/234167/jolene-cocktail-prom-style-dy59w410.jpg" alt="Jolene Cocktail Prom Style DY59W410" style="width:100%;" /></a> <!-- break --><a href="https://www.readybrides.com/en/jolene-cocktail/89924-jolene-cocktail-prom-style-dy59w410.html"><img src="//img.readybrides.com/234168/jolene-cocktail-prom-style-dy59w410.jpg" alt="Jolene Cocktail Prom Style DY59W410" style="width:100%;" /></a> <a href="https://www.readybrides.com/en/jolene-cocktail/89924-jolene-cocktail-prom-style-dy59w410.html"><img src="//img.readybrides.com/234166/jolene-cocktail-prom-style-dy59w410.jpg" alt="Jolene Cocktail Prom Style DY59W410" style="width:100%;" /></a> Buy it: [https://www.readybrides.com/en/jolene-cocktail/89924-jolene-cocktail-prom-style-dy59w410.html](https://www.readybrides.com/en/jolene-cocktail/89924-jolene-cocktail-prom-style-dy59w410.html)
72.764706
266
0.750202
yue_Hant
0.707748
413bd0d873d7e048994e8e8f83c8c482f730b37e
470
md
Markdown
_posts/java/2020-07-25-jsp.md
hwanseok-dev/hwanseok-dev.github.io
752856c2c6451dc1aa293b54b0485377d612bee7
[ "MIT" ]
2
2021-02-03T06:31:12.000Z
2021-02-03T17:35:59.000Z
_posts/java/2020-07-25-jsp.md
hwanseok-dev/hwanseok-dev.github.io
752856c2c6451dc1aa293b54b0485377d612bee7
[ "MIT" ]
null
null
null
_posts/java/2020-07-25-jsp.md
hwanseok-dev/hwanseok-dev.github.io
752856c2c6451dc1aa293b54b0485377d612bee7
[ "MIT" ]
null
null
null
--- title: "[Java] JSP란? " excerpt: "JSP" date: 2020-07-26 categories: - Java tags: - java - jsp toc : true toc_label: "Table of contents" toc_icon: "list" # corresponding Font Awesome icon name (without fa prefix) toc_sticky: true classes: wide --- ## JSP란 java를 기반으로하는 Server side 스크립트 언어이다. HTML 코드에 Java 코드를 넣어 동적인 웹 페이지를 생성하는 웹 어플리케이션 도구이다. JSP를 통해 정적인 HTML과 동적으로 생성된 contents(HTTP 요청 파라미터)를 혼합하여 사용할 수 있다. 즉, 사용자가 입력한 contents에 맞게 동적인 웹 페이지를 생성한다.
20.434783
109
0.697872
kor_Hang
0.999972
413c0008b5793142ee28ea40c334575cefed608a
262
md
Markdown
docs/README.md
genomicsITER/NanoRTax
c466dbc1371f597a976d004bc0fb8d4251fe4b8f
[ "MIT" ]
1
2021-08-12T15:22:41.000Z
2021-08-12T15:22:41.000Z
docs/README.md
genomicsITER/NanoRTax
c466dbc1371f597a976d004bc0fb8d4251fe4b8f
[ "MIT" ]
null
null
null
docs/README.md
genomicsITER/NanoRTax
c466dbc1371f597a976d004bc0fb8d4251fe4b8f
[ "MIT" ]
2
2021-08-04T13:15:08.000Z
2022-03-16T16:36:58.000Z
# NanoRTax: Documentation The NanoRTax documentation is split into the following files: 1. [Installation](https://nf-co.re/usage/installation) 2. Pipeline configuration 3. [Running the pipeline](usage.md) 4. [Output and how to interpret the results](output.md)
32.75
61
0.778626
eng_Latn
0.889452
413dc39c0567d1ff032f03f362723024e1b19bc3
3,164
md
Markdown
README.md
revature-scalawags/rastal-project1
6ec4ae735f653eed248bda4df5516cd6cd150a5d
[ "Apache-2.0" ]
null
null
null
README.md
revature-scalawags/rastal-project1
6ec4ae735f653eed248bda4df5516cd6cd150a5d
[ "Apache-2.0" ]
null
null
null
README.md
revature-scalawags/rastal-project1
6ec4ae735f653eed248bda4df5516cd6cd150a5d
[ "Apache-2.0" ]
null
null
null
# Wikipedia Revision History Analysis ## Project Description Runs MapReduce algorithms determining the number of times individual Wikipedia pages were revised or the number of times individual users performed revisions in a given revision history dataset. ## Technologies Used * Scala - version 2.13.4 * sbt - version 1.4.6 * Apache Hadoop - version 3.2.1 * sbt assembly - version 0.15.0 ## Features * Read English Wikipedia revision history data from an HDFS cluster. * Return a dataset of revised pages paired with the number of times they were revised. * Return a dataset of users paired with the number of times that user revised a page. To-do list: * Return a dataset containing individual pages paired with a map of the users who made the revisions and the number of revisions the user performed. * Order the "users by page" dataset in descending order by most page revisions, then order the users in each page by most revisions. ## Getting Started ### Download To download this project, navigate to the directory you'd like to download the project to: `cd folder/to/clone-into/` Then use: `git clone https://github.com/revature-scalawags/rastal-project1.git` to download the project as a whole into your working directory. Also, download at least one of the English Wikipedia Revision history datasets [here](https://dumps.wikimedia.org/other/mediawiki_history/2020-12/enwiki/). ### Requirements Running this project requires the Java JDK (8 or 11) and Scala with sbt, as well as a psuedo-distributed Hadoop cluster on your local machine. #### Java and Scala To get started with Java and Scala, follow the instructions [here](https://scala-lang.org/download/) and choose the "Download sbt" link instead of "Download IntelliJ." #### Hadoop For Hadoop, follow the instructions [here](https://hadoop.apache.org/docs/stable/hadoop-project-dist/hadoop-common/SingleCluster.html) for downloading and installing Hadoop, followed by those for setting up a "Pseudo-Distributed Operation." Start a local hadoop cluster by following steps 1 - 5 of the "Execution" instructions [here](https://hadoop.apache.org/docs/stable/hadoop-project-dist/hadoop-common/SingleCluster.html#Execution), copying the dataset(s) you downloaded in the previous step to the HDFS in the process. ## Usage In a terminal, navigate to the directory containing this project. Once there, run the program with `sbt "run [input dir] [output dir] [job type]"` Replace `[input dir]` with the HDFS location of the dataset you copied into Hadoop. Replace `[output dir]` with the HDFS location you'd like to output the MapReduce results to. Replace `[job type]` with either `users` to count the number of revisions by user or `pages` to count the number of revisions by page. The output data will not be sorted, so you'll need to run it through a Hive query or other program to extract meaningful information out of the data. ## License This project is licensed under the Apache License, Version 2.0 (the "License"); you may not use this project except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0
42.186667
282
0.77402
eng_Latn
0.994133
413df1898c550ba0f71f227b668b2654094f1439
4,768
md
Markdown
_posts/2020-05-17-European_Scraping.md
jkennedy559/jkennedy559.github.io
fa464a4cec75fb6ff291b342fc3ccc1acc455101
[ "MIT" ]
null
null
null
_posts/2020-05-17-European_Scraping.md
jkennedy559/jkennedy559.github.io
fa464a4cec75fb6ff291b342fc3ccc1acc455101
[ "MIT" ]
1
2020-04-18T12:58:52.000Z
2020-04-18T12:58:52.000Z
_posts/2020-05-17-European_Scraping.md
jkennedy559/jkennedy559.github.io
fa464a4cec75fb6ff291b342fc3ccc1acc455101
[ "MIT" ]
null
null
null
--- layout: post title: "European Scrapin'" date: 2020-05-17 21:03:36 +0530 --- BJJ is my drug of choice and while I can't train in lockdown I'm watching alot of old match videos. I found myself looking for results data from the most recent European Championships in the brown belt division to no avail. The IBJJF, the federation that run the major tournaments, release details of who medaled by belt & devision but provide no match level results. I decided to have a go at trying to programmatically piece results together. Firstly I did a recon on what was available. Flograppling have a subscription service that has video recordings of all matches from major competitions and I can subset matches by belt. I scraped these records and extracted competitor's names, match duration and a reference to the video's url. So I know all the brown matches that took place. Flograppling don't provide a breakdown by weight division but I did find registrations [here][1] from an IBJJF website and by joining on competitor name & belt I can map weight division to competitor. I can now have good go at classifying match winners and losers given I know the eventual division winners and can classify brackets with mapped competitor weights. [1]: https://www.ibjjfdb.com/ChampionshipResults/1415/PublicRegistrations?lang=en-US That's a start but it would be great to get more granular information. A match victor is decided by either points or submission. At brown belt matches last for a maximum of 8 minutes or until one competitor submits the other. From the video duration I already extracted I can tell if there has been a submission and I've already classified the winner & loser so I know who scored it. The match video has a scoreboard with the points tally for each competitor displayed so I signed up for a trial account at Flograppling and built a scraper [here][3] that logs in, brings up the match and takes a screenshot at the end. <style> img { display: block; margin-left: auto; margin-right: auto; } </style> <img src="/images/match_screen.png" alt="Drawing" style="width: 400px;" class="center"/> I can crop the screenshot to extract the score board. <img src="/images/scoreboard.png" alt="Drawing" style="width: 400px;"/> I didn't fancy watching all 500 matches to manually label the score so I needed a method to programmatically extract the points scored from the screenshot. My first attempt involved Pytesseract but it didn't perform well. My next thought was to use a digit classification model. I found a convolutional neural network implemented with Tensorflow & Keras with > 99% test set accuracy trained on the MNIST dataset. The MNIST dataset is preloaded in Tensorflow and a model training pipeline is provided in one of the example tutorials in the package documentation. If I process the cropped points images to be similar to the MNIST training examples the model should perform with similar accuracy. <img src="/images/MNIST_example.png" alt="Drawing" style="width: 400px;"/> <img src="/images/cropped_points.png" alt="Drawing" style="width: 400px;"/> I took a sample of 90 examples and manually labeled them on a csv to test the model. Not all the scraped screenshots captured the scoreboard adequately for classification and on one of 90 samples there was a double digit score so I excluded these which left me with 87 test examples. The model needs grayscale images with 28x28 resolution, digits must be roughly centered in white against a black background - I used OpenCV for this task. My first attempt at modeling used a binary threshold & image erosion to make the digits appear thiner against the black background. <img src="/images/eroded_points.png" alt="Drawing" style="width: 400px;"/> The model classified 85% correctly but was systemically misclassifying 6s as 5s. <img src="/images/errors_cnn.png" alt="Drawing" style="width: 400px;"/> In the end the best results I got involved just thresholding the cropped points image. The model misclassified one example and given three examples were excluded that's 86/90 correct. The notebook is available [here][2]. <img src="/images/final_classification.png" alt="Drawing" style="width: 400px;"/> The model can't classify double digit scores, I would need an object detector to split each digit for classification separately. I amended the prediction threshold so the model only classifies when it's very certain, the remaining examples I resigned to label manually. Overall this is a decent attempt to classify the points tally, there will be some errors but it should get the vast majority correct. [2]: https://github.com/jkennedy559/bjj_data/blob/master/notebook.ipynb [3]: https://github.com/jkennedy559/bjj_data/blob/master/scrape.py
67.15493
444
0.785025
eng_Latn
0.999038
413e6915106a63369b419cffb81197cb0b16bbfb
2,241
md
Markdown
content/wp_posts/drm-is-worse-than-i-thought.md
number5/brucewang.net
7937bc493c5db1c79b51253f5033c6213b5d3758
[ "CC0-1.0" ]
null
null
null
content/wp_posts/drm-is-worse-than-i-thought.md
number5/brucewang.net
7937bc493c5db1c79b51253f5033c6213b5d3758
[ "CC0-1.0" ]
null
null
null
content/wp_posts/drm-is-worse-than-i-thought.md
number5/brucewang.net
7937bc493c5db1c79b51253f5033c6213b5d3758
[ "CC0-1.0" ]
null
null
null
Title: DRM比我想象中更有破坏力 Date: 2006-11-28 14:35 Author: number5 Category: opinions Tags: DRM, slashdot, software-piracy, Treacherous-Computing Slug: 23 Status: published Wordpress-Id: 23 Link: http://brucewang.net/2006/11/28/23 摘自 <http://slashdot.org/linux/06/11/27/1145230.shtml> 的一篇评论 (精华总在评论中! -- [slashdot](http://slashdot.org)的名言) > **DRM is about forcing you to run particular EXACT code, and either > not running at all or refusing to talk to you if you are not.** This > also happens to be the essence of DRM too... so it's a happy > coincidence for the pro-DRMer within the technology companies. > > Treacherous Computing is hardware that is meant to allow person X to > set their hardware up to refuse to run (or not cage) software that is > not digitally signed by them. As you can imagine, this COULD be > extremely valuable for security. HOWEVER, the collection of companies > making up the Trusted Computing Group (most of the tech companies) > decided that the capability to TRUST should be reserved for them. You > do not get to override it. This "trust" (only running approved code) > starts with the BIOS, moves up to the kernel and in stuff like Vista > it then moves into the media subsystem. In a few years, it will move > into applications like web browsers, or word processors. Not running > Microsoft Word? No you can't open that document, sorry. Add into this > nasty mix, the ability of Trusted Computing hardware to execute code > IN SECRET, and you have a control freak's wet dream. Not only can you > not change what your computer does, you cannot even know what it is up > to. The instructions are/can be encrypted. > > Imagine it this way: a prison is very useful for keeping criminals in. > It's not so good if YOU are the convict. In trusted computing as it is > formulated today, YOU ARE THE CONVICT. You do not have the keys. Don't > let them treat you like criminals. Demand the right to control your > own PC -- you paid for it. > > Trusted Computing is a political issue because it is a massive power > grab by the technology companies. People may think Stallman is > over-reacting, but I assure you that he is not. Look into the > implications properly. 注: Treacherous Computing = Trusted Computing
46.6875
72
0.760821
eng_Latn
0.998834
413eab2db1e4eae681e37ad06fbb6125761e457f
1,327
md
Markdown
CHANGELOG.md
kozubikmichal/plugin.video.iprima
d68f377a7fe56621fb356a1d15b7af6beec6fdcd
[ "MIT" ]
1
2021-05-06T05:04:33.000Z
2021-05-06T05:04:33.000Z
CHANGELOG.md
kozubikmichal/plugin.video.iprima
d68f377a7fe56621fb356a1d15b7af6beec6fdcd
[ "MIT" ]
3
2020-11-07T07:02:03.000Z
2021-11-11T10:58:39.000Z
CHANGELOG.md
kozubikmichal/plugin.video.iprima
d68f377a7fe56621fb356a1d15b7af6beec6fdcd
[ "MIT" ]
2
2020-07-01T17:48:30.000Z
2021-01-28T16:43:20.000Z
# Changelog ## [1.4.0] 2021-04-04 ### Změny - Přidána sekce Filmy - Přidáno vyhledávání v sekcích Filmy a Pořady a seriály ## [1.3.5] 2021-03-28 ### Opravy - Opraveny sekce Seriály pro děti a Filmy pro děti ## [1.3.4] 2021-03-27 ### Opravy - Opraveny hlavičky požadavků na server - Opraven problém při otevírání podsekcí s nepovolenými znaky na Linuxu ## [1.3.3] 2021-01-28 ### Změny - Podpora pro Kodi 19 Matrix (pro starší verze vytvořena větev "leia") ### Opravy - Opraven občasný problém při získávání nového access tokenu ## [1.3.2] 2021-01-24 ### Změny - Doplněk nově při komunikaci se serverem pracuje s Device ID a User ID (mělo by řešit problém s hláškou Chyba autorizace) ## [1.3.1] 2021-01-22 ### Změny - Vylepšené debug logování ## [1.3.0] 2021-01-21 ### Změny - Přidána možnost přihlašování účtem iPrima ## [1.2.0] 2020-11-09 ### Změny - Přidány podsekce Nejsledovanější a Naposledy odvysílané v sekci Pořady a seriály ## [1.1.2] 2020-11-09 ### Změny - Epizody, které nejsou zdarma (předpremiéry), se nyní nezobrazují ### Opravy - Opraveno stránkování uvnitř sublistingů (sezóny, bonusy) – THX [@Pako2](https://github.com/Pako2) ## [1.1.1] 2020-07-09 ### Změny - Kompatibilita s Kodi 17 ## [1.1.0] 2020-07-08 ### Změny - Přidáno nastavení stránkování - Přidány ikonky položek hlavního menu
20.106061
122
0.703843
ces_Latn
0.999985
41403be66c180e99a57dacb798be1e1da4bb2818
751
md
Markdown
README.md
roy-bottomley/rb-menu-highlight
18cdacaf006dcfebe3dad0b7a743e1df88ccd4d7
[ "MIT" ]
null
null
null
README.md
roy-bottomley/rb-menu-highlight
18cdacaf006dcfebe3dad0b7a743e1df88ccd4d7
[ "MIT" ]
null
null
null
README.md
roy-bottomley/rb-menu-highlight
18cdacaf006dcfebe3dad0b7a743e1df88ccd4d7
[ "MIT" ]
null
null
null
# rb-menu-highlight A simple wordpress plugin to highlight a menu item by zooming the menu text on mouse hover This is simply some javascript which detects a class on a div and zooms the text in the div on mouse enter and returns it to normal on mouse leave. ## Demo [Its on my Homepage] (http://www.roy-bottomley.com) ## Usage 1. download and install as a wordpress plugin</li> 2. add the class menu-rb-highlight to any menu item you wish to be highlighted</li> The easiest way to add the class to a menu item in wordpress is in Appearance > Menus. Select the menu item under Menu Structure and there should be an input *CSS Classes (optional). If this input is not visible then under *Screen Options at the top of the page check *CSS Classes
41.722222
147
0.765646
eng_Latn
0.995991
41420572a0c5863ca19031a84561bb9b08c48462
239
md
Markdown
README.md
fundata-varena/video-recap-extractor
055c71faf2842727b4c48ca583142f40656f6db7
[ "MIT" ]
null
null
null
README.md
fundata-varena/video-recap-extractor
055c71faf2842727b4c48ca583142f40656f6db7
[ "MIT" ]
null
null
null
README.md
fundata-varena/video-recap-extractor
055c71faf2842727b4c48ca583142f40656f6db7
[ "MIT" ]
null
null
null
# video-recap-extractor 抓取视频回放的播放链接(Chrome 插件) ## 支持的网站 - 暂只支持虎牙 ## 使用 ![效果图](./asserts/extractor-example.png) ## 测试网页链接 - https://www.huya.com/v/1202 - https://v.huya.com/play/255588606.html - https://v-material.huya.com/play/286565810
18.384615
44
0.711297
yue_Hant
0.914225
4142f68863fa07d900e62f0b5da1c9456fe26e09
11,273
md
Markdown
_posts/2019-12-31-bloom-filter-in-hudi.md
loupipalien/loupipalien.github.io
1e641e37babeee849d3c661a9547da0f1bf8e114
[ "MIT" ]
1
2019-03-09T09:23:59.000Z
2019-03-09T09:23:59.000Z
_posts/2019-12-31-bloom-filter-in-hudi.md
loupipalien/loupipalien.github.io
1e641e37babeee849d3c661a9547da0f1bf8e114
[ "MIT" ]
null
null
null
_posts/2019-12-31-bloom-filter-in-hudi.md
loupipalien/loupipalien.github.io
1e641e37babeee849d3c661a9547da0f1bf8e114
[ "MIT" ]
1
2019-07-30T16:50:20.000Z
2019-07-30T16:50:20.000Z
### Hudi 中的 Bloom Filter #### HoodieWriteClient#upsert 更新或插入记录 ```Java public JavaRDD<WriteStatus> upsert(JavaRDD<HoodieRecord<T>> records, final String commitTime) { // 获取表并初始化上下文 // 数据去重 // 查找索引并用包含对应行的文件位置标记每个传入 record (如果实际存在这样的行) JavaRDD<HoodieRecord<T>> taggedRecords = index.tagLocation(dedupedRecords, jsc, table); // TODO return upsertRecordsInternal(taggedRecords, commitTime, table, true); } ``` #### tagLocation 为每个 record 标记文件位置 ```Java public JavaRDD<HoodieRecord<T>> tagLocation(JavaRDD<HoodieRecord<T>> recordRDD, JavaSparkContext jsc, HoodieTable<T> hoodieTable) { // 缓存输入的 record RDD if (config.getBloomIndexUseCaching()) { recordRDD.persist(config.getBloomIndexInputStorageLevel()); } // 抽取出 (partitionPath, recordKey) 的 JavaPairRDD JavaPairRDD<String, String> partitionRecordKeyPairRDD = recordRDD.mapToPair(record -> new Tuple2<>(record.getPartitionPath(), record.getRecordKey())); // 为所有的 (partitionPath, recordKey) 查找索引 JavaPairRDD<HoodieKey, HoodieRecordLocation> keyFilenamePairRDD = lookupIndex(partitionRecordKeyPairRDD, jsc, hoodieTable); // 缓存结果 if (config.getBloomIndexUseCaching()) { keyFilenamePairRDD.persist(StorageLevel.MEMORY_AND_DISK_SER()); } // 通过将 recordRDD 和 keyFilenamePairRDD 做连接区别出 insert 和 update 的 record JavaRDD<HoodieRecord<T>> taggedRecordRDD = tagLocationBacktoRecords(keyFilenamePairRDD, recordRDD); // 释放缓存 // 返回 taggedRecordRDD return taggedRecordRDD; } ``` #### lookupIndex 查找索引 ```Java private JavaPairRDD<HoodieKey, HoodieRecordLocation> lookupIndex(JavaPairRDD<String, String> partitionRecordKeyPairRDD, final JavaSparkContext jsc, final HoodieTable hoodieTable) { // 按 partitionPath 统计 record 的数 Map<String, Long> recordsPerPartition = partitionRecordKeyPairRDD.countByKey(); // 获得被影响的分区的 partitionPath 列表 List<String> affectedPartitionPathList = new ArrayList<>(recordsPerPartition.keySet()); // 加载被影响的文件, 返回 List<Tuple2<partitionPath, BloomIndexFileInfo>> List<Tuple2<String, BloomIndexFileInfo>> fileInfoList = loadInvolvedFiles(affectedPartitionPathList, jsc, hoodieTable); // 将上一步的结果转换为 Map<partitionPath, List<BloomIndexFileInfo>> final Map<String, List<BloomIndexFileInfo>> partitionToFileInfo = fileInfoList.stream().collect(groupingBy(Tuple2::_1, mapping(Tuple2::_2, toList()))); // 计算每个文件可能存在与新来的 record 的个数的映射 Map<String, Long> comparisonsPerFileGroup = computeComparisonsPerFileGroup(recordsPerPartition, partitionToFileInfo, partitionRecordKeyPairRDD); // 根据 record 计算安全的并行度, 由于 spark 每个分区有 2GB 的限制, Hudi 中设置每分区最大大小为 1.5GB, 并假定 Triple<partitionPath, fileId, recordKey> 最大字节数为 300 BYTE int safeParallelism = computeSafeParallelism(recordsPerPartition, comparisonsPerFileGroup); // 再从 partitionRecordKeyPairRDD.partitions.size(), hoodie.bloom.index.parallelism, safeParallelism 选出最大值 int joinParallelism = determineParallelism(partitionRecordKeyPairRDD.partitions().size(), safeParallelism); // 返回每个 recordKey 所在文件的 location return findMatchingFilesForRecordKeys(partitionToFileInfo, partitionRecordKeyPairRDD, joinParallelism, hoodieTable, comparisonsPerFileGroup); } ``` #### loadInvolvedFiles ```Java List<Tuple2<String, BloomIndexFileInfo>> loadInvolvedFiles(List<String> partitions, final JavaSparkContext jsc, final HoodieTable hoodieTable) { // 根据最新的 commitTime, 查找每个分区中最不同 fileId 最靠近 commitTime 的文件, 返回 Pait<partitionPath, fileId> 的列表 List<Pair<String, String>> partitionPathFileIDList = jsc.parallelize(partitions, Math.max(partitions.size(), 1)).flatMap(partitionPath -> { Option<HoodieInstant> latestCommitTime = hoodieTable.getMetaClient().getCommitsTimeline().filterCompletedInstants().lastInstant(); List<Pair<String, String>> filteredFiles = new ArrayList<>(); if (latestCommitTime.isPresent()) { filteredFiles = hoodieTable.getROFileSystemView() .getLatestDataFilesBeforeOrOn(partitionPath, latestCommitTime.get().getTimestamp()) .map(f -> Pair.of(partitionPath, f.getFileId())).collect(toList()); } return filteredFiles.iterator(); }).collect(); // 返回 Pait<partitionPath, BloomIndexFileInfo> 的列表 if (config.getBloomIndexPruneByRanges()) { // 使用范围来剪枝 (recordKey 如果是单调的, 通过读取 parquet 文件 footer 中存放的 minKey 和 maxKey 来确定 recordKey 是否在其中) return jsc.parallelize(partitionPathFileIDList, Math.max(partitionPathFileIDList.size(), 1)).mapToPair(pf -> { try { HoodieRangeInfoHandle<T> rangeInfoHandle = new HoodieRangeInfoHandle<T>(config, hoodieTable, pf); String[] minMaxKeys = rangeInfoHandle.getMinMaxKeys(); return new Tuple2<>(pf.getKey(), new BloomIndexFileInfo(pf.getValue(), minMaxKeys[0], minMaxKeys[1])); } catch (MetadataNotFoundException me) { logger.warn("Unable to find range metadata in file :" + pf); return new Tuple2<>(pf.getKey(), new BloomIndexFileInfo(pf.getValue())); } }).collect(); } else { return partitionPathFileIDList.stream() .map(pf -> new Tuple2<>(pf.getKey(), new BloomIndexFileInfo(pf.getValue()))).collect(toList()); } } ``` #### computeComparisonsPerFileGroup 为每个文件组计算要执行的布隆过滤器比较的估计数 ```Java private Map<String, Long> computeComparisonsPerFileGroup(final Map<String, Long> recordsPerPartition, final Map<String, List<BloomIndexFileInfo>> partitionToFileInfo, JavaPairRDD<String, String> partitionRecordKeyPairRDD) { if (config.getBloomIndexPruneByRanges()) { // 利用 Bloom Index 计算可能在此文件中的 record 数 fileToComparisons = explodeRecordRDDWithFileComparisons(partitionToFileInfo, partitionRecordKeyPairRDD).mapToPair(t -> t).countByKey(); } else { // 每个文件与可能在本文件中的 record 数 (简单的计算为所有进入此分区的 record 数) fileToComparisons = new HashMap<>(); partitionToFileInfo.entrySet().stream().forEach(e -> { for (BloomIndexFileInfo fileInfo : e.getValue()) { // each file needs to be compared against all the records coming into the partition fileToComparisons.put(fileInfo.getFileId(), recordsPerPartition.get(e.getKey())); } }); } // 返回 Map<fileId, Count> return fileToComparisons; } ``` #### explodeRecordRDDWithFileComparisons ```Java JavaRDD<Tuple2<String, HoodieKey>> explodeRecordRDDWithFileComparisons(final Map<String, List<BloomIndexFileInfo>> partitionToFileIndexInfo, JavaPairRDD<String, String> partitionRecordKeyPairRDD) { // 根据 hoodie.bloom.index.use.treebased.filter 选择使用基于间隔树的索引过滤器还是基于列表的索引过滤器 IndexFileFilter indexFileFilter = config.useBloomIndexTreebasedFilter() ? new IntervalTreeBasedIndexFileFilter(partitionToFileIndexInfo) : new ListBasedIndexFileFilter(partitionToFileIndexInfo); // 过滤出 partitionPath 下可能包含 recordKey 的文件, 返回 Tuple2<fileId, HoodieKey> 的 RDD return partitionRecordKeyPairRDD.map(partitionRecordKeyPair -> { String recordKey = partitionRecordKeyPair._2(); String partitionPath = partitionRecordKeyPair._1(); return indexFileFilter.getMatchingFiles(partitionPath, recordKey).stream() .map(matchingFile -> new Tuple2<>(matchingFile, new HoodieKey(recordKey, partitionPath))) .collect(Collectors.toList()); }).flatMap(List::iterator); } ``` #### findMatchingFilesForRecordKeys ```Java JavaPairRDD<HoodieKey, HoodieRecordLocation> findMatchingFilesForRecordKeys(final Map<String, List<BloomIndexFileInfo>> partitionToFileIndexInfo, JavaPairRDD<String, String> partitionRecordKeyPairRDD, int shuffleParallelism, HoodieTable hoodieTable, Map<String, Long> fileGroupToComparisons) { // 利用 Bloom Index 计算可能在此文件中的 record 数 JavaRDD<Tuple2<String, HoodieKey>> fileComparisonsRDD = explodeRecordRDDWithFileComparisons(partitionToFileIndexInfo, partitionRecordKeyPairRDD); // 是否启用桶式布隆过滤 (默认为 true) // 确定 recordKey 所在的文件, 并返回 RDD return fileComparisonsRDD.mapPartitionsWithIndex(new HoodieBloomIndexCheckFunction(hoodieTable, config), true) .flatMap(List::iterator).filter(lr -> lr.getMatchingRecordKeys().size() > 0) .flatMapToPair(lookupResult -> lookupResult.getMatchingRecordKeys().stream() .map(recordKey -> new Tuple2<>(new HoodieKey(recordKey, lookupResult.getPartitionPath()), new HoodieRecordLocation(lookupResult.getBaseInstantTime(), lookupResult.getFileId()))) .collect(Collectors.toList()).iterator()); } ``` #### HoodieBloomIndexCheckFunction$LazyKeyCheckIterator#computeNext ```Java protected List<HoodieKeyLookupHandle.KeyLookupResult> computeNext() { List<HoodieKeyLookupHandle.KeyLookupResult> ret = new ArrayList<>(); try { // 遍历每个 Tuple2<fileId, HoodieKey> while (inputItr.hasNext()) { Tuple2<String, HoodieKey> currentTuple = inputItr.next(); String fileId = currentTuple._1; String partitionPath = currentTuple._2.getPartitionPath(); String recordKey = currentTuple._2.getRecordKey(); Pair<String, String> partitionPathFilePair = Pair.of(partitionPath, fileId); // 懒加载初始化状态 if (keyLookupHandle == null) { keyLookupHandle = new HoodieKeyLookupHandle(config, hoodieTable, partitionPathFilePair); } // 如果还是当前文件, 直接检查 recordKey 是否为候选 recordKey if (keyLookupHandle.getPartitionPathFilePair().equals(partitionPathFilePair)) { keyLookupHandle.addKey(recordKey); } else { // 由于 RDD 是以 fileId 排序的, 当进入此分支表示上一个 file 已经结束, 这时在这里再将候选 recordKey 过滤一次 ret.add(keyLookupHandle.getLookupResult()); // 为当前 file 生成新的 HoodieKeyLookupHandle keyLookupHandle = new HoodieKeyLookupHandle(config, hoodieTable, partitionPathFilePair); keyLookupHandle.addKey(recordKey); break; } } // handle case, where we ran out of input, close pending work, update return val if (!inputItr.hasNext()) { ret.add(keyLookupHandle.getLookupResult()); } } catch (Throwable e) { if (e instanceof HoodieException) { throw e; } throw new HoodieIndexException("Error checking bloom filter index. ", e); } return ret; } ``` #### HoodieKeyLookupHandle#getLookupResult 对于候选的 recordKey, 检查文件进行再次确认 ```Java public KeyLookupResult getLookupResult() { if (logger.isDebugEnabled()) { logger.debug("#The candidate row keys for " + partitionPathFilePair + " => " + candidateRecordKeys); } HoodieDataFile dataFile = getLatestDataFile(); List<String> matchingKeys = checkCandidatesAgainstFile(hoodieTable.getHadoopConf(), candidateRecordKeys, new Path(dataFile.getPath())); logger.info( String.format("Total records (%d), bloom filter candidates (%d)/fp(%d), actual matches (%d)", totalKeysChecked, candidateRecordKeys.size(), candidateRecordKeys.size() - matchingKeys.size(), matchingKeys.size())); return new KeyLookupResult(partitionPathFilePair.getRight(), partitionPathFilePair.getLeft(), dataFile.getCommitTime(), matchingKeys); } ```
47.365546
293
0.719418
yue_Hant
0.720592
41434407485a2888eee91fdc94b4ffb0722093a3
648
md
Markdown
docs/std/std547.md
Segate-ekb/MFG_CodeStd
95404fb2bea30ac1fc7d89ef71bfd9175c6467ef
[ "CC0-1.0" ]
null
null
null
docs/std/std547.md
Segate-ekb/MFG_CodeStd
95404fb2bea30ac1fc7d89ef71bfd9175c6467ef
[ "CC0-1.0" ]
null
null
null
docs/std/std547.md
Segate-ekb/MFG_CodeStd
95404fb2bea30ac1fc7d89ef71bfd9175c6467ef
[ "CC0-1.0" ]
null
null
null
# Ограничение на использование оператора Перейти https://its.1c.ru/db/v8std#content:547 ###### 1. Не используйте оператор `#!bsl Перейти`. Запутаете себя и других запутаете. Используйте другие способы ветвления кода. !!! failure "Неправильно" ```bsl Если ПланВидовРасчета = Объект.ПланВидовРасчета Тогда Перейти ~ПланВидовРасчета; КонецЕсли; ``` !!! success "Правильно" ```bsl Если ПланВидовРасчета = Объект.ПланВидовРасчета Тогда ОбработатьПланВидовРасчета(); КонецЕсли; ``` ###### 2. Оператор `#!bsl Перейти` не поддерживается в веб-клиенте. Можно получить ошибку в режиме исполнения.
20.25
118
0.697531
rus_Cyrl
0.9599
41437573a5d69efba951e5629d68f57da622de36
1,691
md
Markdown
articles/java/spring-framework/includes/spring-data-r2dbc-create-schema.md
Duske/azure-dev-docs.de-de
176d1928063e45bb8d4641999f473d0599f09419
[ "CC-BY-4.0", "MIT" ]
null
null
null
articles/java/spring-framework/includes/spring-data-r2dbc-create-schema.md
Duske/azure-dev-docs.de-de
176d1928063e45bb8d4641999f473d0599f09419
[ "CC-BY-4.0", "MIT" ]
null
null
null
articles/java/spring-framework/includes/spring-data-r2dbc-create-schema.md
Duske/azure-dev-docs.de-de
176d1928063e45bb8d4641999f473d0599f09419
[ "CC-BY-4.0", "MIT" ]
null
null
null
--- author: judubois ms.date: 05/06/2020 ms.author: judubois ms.openlocfilehash: a94dbf3d29863b1a4ac6909db839c451bbf482fd ms.sourcegitcommit: e9accb9d82b5c633dffffd148974911398f2d096 ms.translationtype: HT ms.contentlocale: de-DE ms.lasthandoff: 07/06/2020 ms.locfileid: "86018574" --- Konfigurieren Sie in der `DemoApplication`-Hauptklasse mit dem folgenden Code eine neue Spring Bean, die ein Datenbankschema erstellt: ```java package com.example.demo; import org.springframework.boot.SpringApplication; import org.springframework.boot.autoconfigure.SpringBootApplication; import org.springframework.context.annotation.Bean; import org.springframework.core.io.ClassPathResource; import org.springframework.data.r2dbc.connectionfactory.init.ConnectionFactoryInitializer; import org.springframework.data.r2dbc.connectionfactory.init.ResourceDatabasePopulator; import io.r2dbc.spi.ConnectionFactory; @SpringBootApplication public class DemoApplication { public static void main(String[] args) { SpringApplication.run(DemoApplication.class, args); } @Bean public ConnectionFactoryInitializer initializer(ConnectionFactory connectionFactory) { ConnectionFactoryInitializer initializer = new ConnectionFactoryInitializer(); initializer.setConnectionFactory(connectionFactory); ResourceDatabasePopulator populator = new ResourceDatabasePopulator(new ClassPathResource("schema.sql")); initializer.setDatabasePopulator(populator); return initializer; } } ``` Diese Spring Bean verwendet eine Datei namens *schema.sql*. Erstellen Sie daher diese Datei im Ordner *src/main/resources*, und fügen Sie den folgenden Text hinzu:
37.577778
163
0.808989
kor_Hang
0.351421
4144c5b874b84b902cd3823719545cb9882a87c9
322
md
Markdown
dependency-matrix/matrix.md
deas/lighthouse
3a4623da1b860f097550e76d1e6df961a3e27b2d
[ "Apache-2.0" ]
null
null
null
dependency-matrix/matrix.md
deas/lighthouse
3a4623da1b860f097550e76d1e6df961a3e27b2d
[ "Apache-2.0" ]
null
null
null
dependency-matrix/matrix.md
deas/lighthouse
3a4623da1b860f097550e76d1e6df961a3e27b2d
[ "Apache-2.0" ]
null
null
null
# Dependency Matrix Dependency | Sources | Version | Mismatched versions ---------- | ------- | ------- | ------------------- [jenkins-x/go-scm](https://github.com/jenkins-x/go-scm) | | [1.5.137]() | [jenkins-x/jx](https://github.com/jenkins-x/jx) | | [2.1.46](https://github.com/jenkins-x/jx/releases/tag/v2.1.46) |
46
118
0.562112
zul_Latn
0.262231
41451bf54bc8ebada2b93b5fd274e8fd636abe49
112
md
Markdown
README.md
MetalUp/MUFL-ARM
e6eccbf101e4d21ce993efd43dc4151996643444
[ "CC0-1.0" ]
null
null
null
README.md
MetalUp/MUFL-ARM
e6eccbf101e4d21ce993efd43dc4151996643444
[ "CC0-1.0" ]
null
null
null
README.md
MetalUp/MUFL-ARM
e6eccbf101e4d21ce993efd43dc4151996643444
[ "CC0-1.0" ]
null
null
null
# MUFL-ARM Implementation of a MUFL interpreter running on subset of ARM code compatible with ARMlite simulator
37.333333
100
0.830357
eng_Latn
0.980503
414618b3d1ba9f5ee59ab67fcf590fbd660025e0
499
md
Markdown
README.md
tong/vcrank
8ed701192fb0c884d9f4a3a447ac15988415c724
[ "CC0-1.0" ]
null
null
null
README.md
tong/vcrank
8ed701192fb0c884d9f4a3a447ac15988415c724
[ "CC0-1.0" ]
null
null
null
README.md
tong/vcrank
8ed701192fb0c884d9f4a3a447ac15988415c724
[ "CC0-1.0" ]
null
null
null
# VCrank VCrank is a real world physical device which allows interacting with the video speed by turning a crank back or forth. No cranking, no playback. <iframe src="https://player.vimeo.com/video/29330449" width="640" height="352" frameborder="0" webkitallowfullscreen mozallowfullscreen allowfullscreen></iframe> <p><a href="https://vimeo.com/29330449">kurbeln im museumsquartier</a> from <a href="https://vimeo.com/user8595351">videokurbel</a> on <a href="https://vimeo.com">Vimeo</a>.</p>
55.444444
177
0.755511
eng_Latn
0.729133
414659003ec78597c9690c6d01fe357c84ba522e
458
md
Markdown
Source/Documentation/English/ReferencePages/Symbols/MaxwellStressEnergyTensor.md
BlackHolePerturbationToolkit/GeneralRelativityTensors
6e5a0b1e8af94c5368334b9e3ac5e9d83b92928d
[ "MIT" ]
7
2019-02-07T18:41:38.000Z
2020-11-13T01:35:09.000Z
Source/Documentation/English/ReferencePages/Symbols/MaxwellStressEnergyTensor.md
BlackHolePerturbationToolkit/GeneralRelativityTensors
6e5a0b1e8af94c5368334b9e3ac5e9d83b92928d
[ "MIT" ]
21
2018-07-20T10:09:01.000Z
2020-07-30T17:30:30.000Z
Source/Documentation/English/ReferencePages/Symbols/MaxwellStressEnergyTensor.md
BlackHolePerturbationToolkit/GeneralRelativityTensors
6e5a0b1e8af94c5368334b9e3ac5e9d83b92928d
[ "MIT" ]
4
2018-09-19T13:27:43.000Z
2019-12-09T10:21:09.000Z
{ "More Information" -> { }, "Basic Examples" -> { "ARN = MaxwellPotential[\"ReissnerNordstrom\"]", "FRN = FieldStrengthTensor[ARN]", "TRN = MaxwellStressEnergyTensor[FRN,ActWith->Simplify]", "TensorValues[TRN]" }, "See Also" -> {"MaxwellPotential", "FieldStrengthTensor"}, "Tutorials" -> { "Introduction to GeneralRelativityTensors", "Built in common Tensors", "Examples - Wave equations" } }
20.818182
61
0.611354
yue_Hant
0.860129
41480ae393eeec8db805840a858b0827fccaca8a
22
md
Markdown
README.md
olmerg/self-driving-udacity
53ea752c9769d36baac5542cbeab1f38f0781f0a
[ "BSD-3-Clause" ]
null
null
null
README.md
olmerg/self-driving-udacity
53ea752c9769d36baac5542cbeab1f38f0781f0a
[ "BSD-3-Clause" ]
null
null
null
README.md
olmerg/self-driving-udacity
53ea752c9769d36baac5542cbeab1f38f0781f0a
[ "BSD-3-Clause" ]
null
null
null
# self-driving-udacity
22
22
0.818182
eng_Latn
0.982115
414af8deae6f15cae0b4ca67388c3ddbfcfa8c23
49
md
Markdown
README.md
kiwiwei00/spss
cf2447a5f5aa09fc87d3ce7314b0638a2626b952
[ "CC0-1.0" ]
null
null
null
README.md
kiwiwei00/spss
cf2447a5f5aa09fc87d3ce7314b0638a2626b952
[ "CC0-1.0" ]
null
null
null
README.md
kiwiwei00/spss
cf2447a5f5aa09fc87d3ce7314b0638a2626b952
[ "CC0-1.0" ]
null
null
null
# spss I store my IBM SPSS syntax example here.
16.333333
41
0.734694
eng_Latn
0.949944
414b4dcb23191b8cc41a27e47573ddcb0bf83f82
2,740
md
Markdown
_posts/2020-04-12-Algorithm-1.md
choihwan2/sampleblog
2847017c4cc196763d3fd5a96ed9f6691cacc0f7
[ "MIT" ]
2
2019-12-22T12:38:35.000Z
2020-06-30T08:51:47.000Z
_posts/2020-04-12-Algorithm-1.md
choihwan2/sampleblog
2847017c4cc196763d3fd5a96ed9f6691cacc0f7
[ "MIT" ]
null
null
null
_posts/2020-04-12-Algorithm-1.md
choihwan2/sampleblog
2847017c4cc196763d3fd5a96ed9f6691cacc0f7
[ "MIT" ]
1
2020-05-09T11:27:31.000Z
2020-05-09T11:27:31.000Z
--- title: 알고리즘 스터디 1주차 문제1 (로봇 청소기) date: 2020-04-12 22:04:00 tags: - algorithm - simulation keywords: - study - codingtest --- ## 문제[#](https://www.acmicpc.net/problem/14503) <img src="images/algorithm-1-1.png" alt="algorithm-1-1" style="width:150%;" /> ## 풀이 및 주저리.. 백준에 있는 분류보기로 시뮬레이션을 풀어보려다가 문제를 접하게 되었다. 처음에 정답 비율이 50%인 것을 보고 그냥 달려들었다가 크게 당하고... 엄청나게 시간이 오래걸려서 풀게 되었다. 지금까지 알고리즘을 풀면서 가장 크게 느끼는 것이 내가 문제에 대한 이해가 많이 부족한 상태로 코드를 작성하기 시작하는 것인 것 같다. 이번에도 역시나.. 스스로 문제를 풀때는 이해가 됐다고 생각했지만 마지막에 y가 위로 갈 수록 작아진다는 것을 놓쳐서 정말 한참동안 헤멘 것 같다. 디버깅도 해보고.. 진짜 시험때는 이럴 시간도 없고 해볼수도 없는 과정인데.. 문제를 풀어보고 구글링 해보니 삼성 SW 역량 기출문제였고.. 이정도의 문제가 나올때 내가 IDE 없이 이 문제를 풀 수 있을까 많은 고민을 하게 만든 문제였다. 풀이는 정말.. 문제에 쓰여져 있는대로만 구현하면 된다. 하지만 그게 너무나도 어려웠다는게 함정. 이런 문제가 참.. 많이 나오는 것 같다. 계속해서 수련하도록 하자! ## 코드 ```java package backjoon.algorthim.simulation; import java.io.BufferedReader; import java.io.IOException; import java.io.InputStreamReader; public class Problem14503 { static final int[] DIR = { 3, 0, 1, 2 }; static final int[][] C_DIR = { { 0, -1 }, { -1, 0 }, { 0, 1 }, { 1, 0 } }; // y, x 의 오른쪽 static final int[][] R_DIR = { { 1, 0 }, { 0, -1 }, { -1, 0 }, { 0, 1 } }; // y, x 의 반대방향 static int x, y, dir; static char[][] map; static int rotation; static boolean isMove = true; static int answer = 0; public static void main(String[] args) throws IOException { BufferedReader br = new BufferedReader(new InputStreamReader(System.in)); String[] xy = br.readLine().split(" "); int map_h = Integer.parseInt(xy[0]); int map_w = Integer.parseInt(xy[1]); map = new char[map_h][map_w]; String[] roboXY = br.readLine().split(" "); y = Integer.parseInt(roboXY[0]); x = Integer.parseInt(roboXY[1]); dir = Integer.parseInt(roboXY[2]); for (int i = 0; i < map_h; i++) { String input = br.readLine().replace(" ", ""); map[i] = input.toCharArray(); } while (isMove) { cleanArea(); checkArea(); } System.out.println(answer); } public static void cleanArea() { if (map[y][x] == '0') { map[y][x] = '2'; answer++; } } public static void checkArea() { rotation = 0; while (rotation < 4) { if (map[y + C_DIR[dir][0]][x + C_DIR[dir][1]] == '0') { y += C_DIR[dir][0]; x += C_DIR[dir][1]; dir = DIR[dir]; return; } else { dir = DIR[dir]; rotation++; } } if (map[y + R_DIR[dir][0]][x + R_DIR[dir][1]] == '1') { isMove = false; return; } else { y += R_DIR[dir][0]; x += R_DIR[dir][1]; return; } } } ``` <img src="images/algorithm-1-1-c.png" alt="algorithm-1-1-c" style="width:150%;" /> ## 기억에 남길 것! - String.trim() 은 문자열이 시작되기 전과 후의 공백만 없애준다. 문자열 사이의 공백을 없애주려면 String.replace(" ", "")을 이용하자 - 복잡해보여도 문제를 좀 더 차분히 읽고 풀 수 있다는 생각으로 접근하자!
24.464286
399
0.603285
kor_Hang
0.999651
414bbbd8e564bb836a22f5a975ec6e840eda33a0
317
md
Markdown
recipes/Python/201423_Trees_and_more_trees_part_II/README.md
tdiprima/code
61a74f5f93da087d27c70b2efe779ac6bd2a3b4f
[ "MIT" ]
2,023
2017-07-29T09:34:46.000Z
2022-03-24T08:00:45.000Z
recipes/Python/201423_Trees_and_more_trees_part_II/README.md
unhacker/code
73b09edc1b9850c557a79296655f140ce5e853db
[ "MIT" ]
32
2017-09-02T17:20:08.000Z
2022-02-11T17:49:37.000Z
recipes/Python/201423_Trees_and_more_trees_part_II/README.md
unhacker/code
73b09edc1b9850c557a79296655f140ce5e853db
[ "MIT" ]
780
2017-07-28T19:23:28.000Z
2022-03-25T20:39:41.000Z
## Trees and more trees, part II Originally published: 2003-05-23 10:48:25 Last updated: 2003-05-23 10:48:25 Author: Gonçalo Rodrigues We revisit our own recipe http://aspn.activestate.com/ASPN/Cookbook/Python/Recipe/136529 for generalized trees, expanding on the functionality via some metaclass trickery.
52.833333
171
0.776025
eng_Latn
0.837514
414be060877e2b971b0b15a80d9189f015887253
1,940
md
Markdown
instrumentation/README.laf-intel.md
0xsan-z/AFLplusplus
9242e0db8ac8a0e82d78432af389108e74700f00
[ "Apache-2.0" ]
606
2019-05-28T15:39:17.000Z
2020-03-19T13:32:54.000Z
instrumentation/README.laf-intel.md
0xsan-z/AFLplusplus
9242e0db8ac8a0e82d78432af389108e74700f00
[ "Apache-2.0" ]
223
2019-06-02T15:20:48.000Z
2020-03-19T09:04:12.000Z
instrumentation/README.laf-intel.md
0xsan-z/AFLplusplus
9242e0db8ac8a0e82d78432af389108e74700f00
[ "Apache-2.0" ]
137
2019-05-29T10:44:36.000Z
2020-03-17T18:53:01.000Z
# laf-intel instrumentation ## Introduction This originally is the work of an individual nicknamed laf-intel. His blog [Circumventing Fuzzing Roadblocks with Compiler Transformations](https://lafintel.wordpress.com/) and GitLab repo [laf-llvm-pass](https://gitlab.com/laf-intel/laf-llvm-pass/) describe some code transformations that help AFL++ to enter conditional blocks, where conditions consist of comparisons of large values. ## Usage By default, these passes will not run when you compile programs using afl-clang-fast. Hence, you can use AFL++ as usual. To enable the passes, you must set environment variables before you compile the target project. The following options exist: `export AFL_LLVM_LAF_SPLIT_SWITCHES=1` Enables the split-switches pass. `export AFL_LLVM_LAF_TRANSFORM_COMPARES=1` Enables the transform-compares pass (strcmp, memcmp, strncmp, strcasecmp, strncasecmp). `export AFL_LLVM_LAF_SPLIT_COMPARES=1` Enables the split-compares pass. By default, it will 1. simplify operators >= (and <=) into chains of > (<) and == comparisons 2. change signed integer comparisons to a chain of sign-only comparison and unsigned integer comparisons 3. split all unsigned integer comparisons with bit widths of 64, 32, or 16 bits to chains of 8 bits comparisons. You can change the behavior of the last step by setting `export AFL_LLVM_LAF_SPLIT_COMPARES_BITW=<bit_width>`, where bit_width may be 64, 32, or 16. For example, a bit_width of 16 would split larger comparisons down to 16 bit comparisons. A new unique feature is splitting floating point comparisons into a series of sign, exponent and mantissa comparisons followed by splitting each of them into 8 bit comparisons when necessary. It is activated with the `AFL_LLVM_LAF_SPLIT_FLOATS` setting. Note that setting this automatically activates `AFL_LLVM_LAF_SPLIT_COMPARES`. You can also set `AFL_LLVM_LAF_ALL` and have all of the above enabled. :-)
38.8
97
0.797423
eng_Latn
0.99128
414c00431697d59a3167c808a1fd1db0c1559e62
736
md
Markdown
site/en-snapshot/tfx/guide/serving.md
jvishnuvardhan/docs-l10n
b5d8cc9fd4a98d9b2e12d550e27f584e93f74994
[ "Apache-2.0" ]
1,813
2019-02-04T17:17:30.000Z
2022-03-29T13:39:30.000Z
site/en-snapshot/tfx/guide/serving.md
jvishnuvardhan/docs-l10n
b5d8cc9fd4a98d9b2e12d550e27f584e93f74994
[ "Apache-2.0" ]
2,710
2019-02-14T00:41:00.000Z
2022-03-31T07:23:00.000Z
site/en-snapshot/tfx/guide/serving.md
jvishnuvardhan/docs-l10n
b5d8cc9fd4a98d9b2e12d550e27f584e93f74994
[ "Apache-2.0" ]
731
2019-02-04T17:59:18.000Z
2022-03-31T06:45:51.000Z
# Serving Models ## Introduction TensorFlow Serving is a flexible, high-performance serving system for machine learning models, designed for production environments. TensorFlow Serving makes it easy to deploy new algorithms and experiments, while keeping the same server architecture and APIs. TensorFlow Serving provides out-of-the-box integration with TensorFlow models, but can be easily extended to serve other types of models and data. Detailed developer documentation on TensorFlow Serving is available: * [Architecture Overview](https://www.tensorflow.org/tfx/serving/architecture) * [Server API](https://www.tensorflow.org/tfx/serving/api_docs/cc/) * [REST Client API](https://www.tensorflow.org/tfx/serving/api_rest)
43.294118
80
0.802989
eng_Latn
0.936508
414c2a9d603d796574da71aaacdc373b5583aadd
4,478
md
Markdown
cn/content/post/2009-04-04-shencongwen-yudafu.md
rbind/jiangtang
af6a3625711580956adb4c7ed6aaf9db713bb1c8
[ "MIT" ]
null
null
null
cn/content/post/2009-04-04-shencongwen-yudafu.md
rbind/jiangtang
af6a3625711580956adb4c7ed6aaf9db713bb1c8
[ "MIT" ]
null
null
null
cn/content/post/2009-04-04-shencongwen-yudafu.md
rbind/jiangtang
af6a3625711580956adb4c7ed6aaf9db713bb1c8
[ "MIT" ]
null
null
null
--- id: 10105 title: 周末读书:沈从文和郁达夫 date: 2009-04-04T12:03:08+00:00 author: jiang layout: post guid: http://li-and-jiang.com/blog/2009/04/04/shencongwen-yudafu/ permalink: /2009/04/04/shencongwen-yudafu/ categories: - reading_jiang - 读书 tags: - 从文自传 - 大学生 - 沈从文 - 郁达夫 --- /\*周末兴致,诸君不妨与我一起读一篇民国时的作文。沈从文(1902-1988),14岁开始参军,浪迹于四川湖南诸省边区。21岁(1923年)开始自身闯荡北京,要做一个文学青年,自是一路碰壁,惶惶戚戚唧唧复唧唧。24年,他写信给几位著名作家,诉说自己的困境,其中包括本文的作者,郁达夫(1896-1945),当时是跟鲁迅齐名的名流,时任北京大学统计学讲师。11月13号,郁达夫根据来信的地址(北京沙滩),来沈从文的住所看他,沈从文跟他讲了自己想在北大读个学位,指望有个好奔头。见着了沈从文的困顿潦倒,郁达夫当晚就写了一篇《给一个文学青年的公开状》,发表在1924年11月16日的《晨报副刊》上。如果你是第一次读这篇文章,保证会对你的大脑有某些颠覆作用。\*/ <!--more--> > 今天的风沙实在太大了,中午吃饭之后,我因为还要去教书,所以没有许多工夫和你谈天。我坐在车上,一路的向北走去,沙石飞进了我的眼睛,一直到午后四点钟止,我的眼睛四周的红圈,还没有退尽。恐怕同学们见了要笑我,所以于上课堂之先,我从高窗口在日光大风里把一双眼睛曝晒了许多时。我今天上你那公寓来看了你那一副样子,觉得什么话也说不出来。现在我想趁着这大家已经睡寂了的几点钟功夫,把我要说的话,写一点在纸上。 > > 平素不认识的可怜的朋友,或是写信来,或是亲自上我这里来的,很多很多,我因为想报答两位也是我素不认识而对于我却有十二分的同情过的朋友的厚恩起见,总尽我的力量帮助他们。可是我的力量太薄弱了,可怜的朋友太多了,所以结果近来弄得我自家连一条棉裤也没有。这几天来天气变得很冷,我老想买一件外套,但始终没有买成。尤其是使我羞恼的,因为恰逢此刻,我和同学们所读的书里,正有一篇俄国果戈尔著的嘲弄像我们一类人的小说《外套》。现在我的经济状态比从前并没有什么宽裕,从数目上讲起来,反而比从前要少——因为现在我不能向家里去要钱花,每月的教书钱,额面上虽则有五十三加六十四合一百十七块,但实际上拿得到的只有三十三四块——而我的嗜好日深,每月光是烟酒的账,也要开销二十多块。我曾经立过几次对天的深誓,想把这一笔糜费节省下来,但愈是没有钱的时候,愈想喝酒吸烟。向你讲这一番苦话,并不是因为怕你要来问我借钱,而先事预防,我不过欲以我的身体来做一个证据,证明目下的中国社会的不合理,以大学校毕业的资格来糊口的你那种见解的错误罢了。 > > 引诱你到北京来的,是一个国立大学毕业的头衔,你告诉我说你的心里,总想在国立大学弄到毕业,毕业以后至少生计问题总可以解决。现在学校都已考完,你一个国立大学也进不去,接济你的资金的人,又因为他自家的地位动摇,无钱寄你,你去投奔你同县而且带有亲属的大慈善家H,H又不纳,穷极无路,只好写封信给一个和你素不相识而你也明明知道和你一样穷的我,在这时候这样的状态之下你还要口口声声的说什么大学教育,“念书”,我真佩服你的坚忍不拔的雄心。不过佩服虽可佩服,但是你的思想的简单愚直,也却是一样的可惊可异。现在你已经是变成了中性——半去势的文人了,有许多事情,譬如说高尚一点的,去当土匪,卑微一点的,去拉洋车等事情,你已经是干不了的了,难道你还嫌不足,还要想穿几年长袍,做几篇白话诗,短篇小说,达到你的全去势的目的么?**大学毕业,以后就可以有饭吃,你这一种定理,是哪一本书上翻来的**? > > 像你这样一个白脸长身,一无依靠的文学青年,即使将面包和泪吃,勤勤恳恳的在大学窗下住它五六年,难道你拿毕业文凭的那一天,天上就忽而会下起珍珠白米的雨来的么? > > 现在不要说中国全国,就是在北京的一区里头,你且去站在十字街头,看见穿长袍黑马褂或哔叽旧洋服的人,你且试对他们行一个礼,问他们一个人要一个名片来看看,我恐怕你不上半天,就可以积起一大堆的什么学士,什么博士来,你若再行一个礼,问一问他们的职业,我恐怕他们都要红红脸说,“兄弟是在这里找事情的。”他们是什么?**他们都是大学毕业生吓**,你能和他们一样的有钱读书么?你能和他们一样的有钱买长袍黑马褂哔叽洋服么?即使你也和他们一样的有了读书买衣服的钱,你能保得住你毕业的时候,事情会来找你么? > > 大学毕业生坐汽车,吸大烟,一攫千金的人原是有的。然而他们都是为新上台的大老经手减价卖职的人,都是有大力枪杆在后面援助的人,都是有几个什么长在他们父兄身上的人,再粗一点说,他们至少也都是会爬乌龟钻狗洞的人,你要有他们那么的后援,或他们那么的乌龟本领,狗本领,那么你就是大学不毕业,何尝不可以吃饭? > > 我说了这半天,不过想把你的求学读书,大学毕业的迷梦打破而已。现在为你计,最上的上策,是去找一点事情干干。然而**土匪你是当不了的,洋车你也拉不了的**,报馆的校对,图书馆的拿书者,家庭教师,男看护,门房,旅馆火车菜馆的伙计,因为没有人可以介绍,你也是当不了的——我当然是没有能力替你介绍——所以最上的上策,于你是不成功的了。其次你就去革命去罢,去制造炸弹去罢!但是革命不是同割枯草一样,用了你那裁纸的小刀,就可以革得成的呢?炸弹是不是可以用了你头发上的灰垢和半年不换的袜底里的污泥来调合的呢?这些事情,你去问上帝去罢!我也不知道。 > > 比较上可以做得到,并且也不失为中策的,我看还是弄几个旅费,回到湖南你的故土,去找出四五年你不曾见过的老母和你的小妹妹来,第一天相持对哭一天,第二天因为哭了伤心,可以在床上你的草巢睡去一天,既可以休养,又可以省几粒米下来熬稀粥,第三天以后,你和你的母亲妹妹,若没有衣服穿,不妨三人紧紧的挤在一处,以体热互助的结果,同冬天雪夜的群羊一样;倒可以使你的老母不至冻伤,若没有米吃,你在日中天暖一点的时候,不妨把年老的母亲交付给你妹妹的身体烘着,你自己可以上村前村后去掘一点草根树根来煮汤吃。草根树根里也有淀粉,我的祖母未死的时候,常把洪杨乱日,她老人家尝过的这滋味说给我听,我所以知道。现在我既没有余钱可以赠你,就把这秘方相传,作个我们两位穷汉,在京华尘土里相遇的纪念罢!若说草根树根,也被你们的督军省长师长议员知事掘完,你无论走往何处再也找不出一块一截来的时候,那么你且咽着自家的口水,同唱戏似的把北京的豪富人家的蔬菜,有色有香的说给你的老母亲小妹妹听听,至少在未死前的一刻半刻中间,你们三个昏乱的脑子里,总可以大事铺张的享乐一回。 > > 但是我听你说,你的故乡连年兵灾,房屋田产都已毁尽,老母弱妹也不知是生是死。五年来音信不通,并且现在回湖南的火车不开,就是有路费也回去不得,何况没有路费呢! > > 上策不行,次之中策也不行,现在我为你实在是没有什么法子好想了。不得已我就把两个下策来对你讲罢! > > 第一,现在听说天桥又在招兵,并且听说取得极宽,上自五十岁的老人起,下至十六七岁的少年止,一律都收,你若应募之后,马上开赴前敌,打死在租界以外的中国地界,虽然不能说是为国效忠,也可以算得是为招你的那个同胞效了命,岂不是比饿死冻死在你那公寓的斗室里,好得多么?况且万一不开往前敌,或虽开往前敌而不打死的时候,只教你能保持你现在的这种纯洁的精神,只教你能有如现在想进大学读书一样的精神来宣传你的理想,难保你所属的一师一旅,不为你所感化。这是下策的第一个。 > 第二,这才是真正的下策了!你现在不是只愁没有地方住没有地方吃饭而又苦于没有勇气自杀么?你没有能力做土匪,没有能力拉洋车,是我今天早晨在你公寓里第一眼看见你的时候,已经晓得的。但是有一件事情,我想你还能胜任的,要干的时候一定是干得到的。这是什么事情呢?啊啊,我真不愿意说出来——我并不是怕人家对我提起诉讼,说我在嗾使你做贼,啊呀,不愿意说倒说出来了,做贼,做贼,不错,我所说的这件事情就是叫你去偷窃呀! > > 无论什么人的无论什么东西,只教你偷得着,尽管偷罢!偷到了,不被发觉,那么就可以把这你偷自他、他抢自第三人的,在现在社会里称为赃物,在将来进步了的社会里,当然是要分归你有的东西,拿到当铺——我虽然不能为你介绍职业,但是像这样的当铺却可以为你介绍几家——里去换钱用。万一发觉了呢?也没有什么。第一你坐坐监牢,房钱总可以不付了。第二监狱里的饭,虽然没有今天中午我请你的那家馆子里的那么好,但是饭钱可以不付的。第三或者什么什么司令,以军法从事,把你枭首示众的时候,那么你的无勇气的自杀,总算是他来代你执行了,也是你的一件快心的事情,因为这样的活在世上,实在是没有什么意思。 > > 我写到这里,觉得没有话再可以和你说了,最后我且来告诉你一种实习的方法罢! > > 你若要实行上举的第二下策,最好是从亲近的熟人方面做起。譬如你那位同乡的亲戚老H家里,你可以先去试一试看。因为他的那些堆积在那里的财富,不过是方法手段不同罢了,实际上也是和你一样的偷来抢来的。你若再慑于他的慈和的笑里的尖刀,不敢去向他先试,那么不妨上我这里来作个破题儿试试。我晚上卧房的门常是不关,进去很便。不过有一个缺点,就是我这里没有什么值钱的物事。但是我有几本旧书,却很可以卖几个钱。你若来时,最好是预先通知我一下,我好多服一剂催眠药,早些睡下,因为近来身体不好,晚上老要失眠,怕与你的行动不便。还有一句话——你若来时,心肠应该要练得硬一点,不要因为是我的书的原因,致使你没有偷成,就放声大哭起来—— 这篇文章,是《沈从文别集》系列的《自传集》(江苏教育出版社,2005)的附录里看到的。第一次读,只觉得郁达夫真是尖酸刻薄之至;沈从文把它贴出来,大概想展示一下自己当时的窘相。多翻些资料,其实沈从文是很感激郁达夫的知遇之恩,——这样,再读这些文字,感觉就不一样。 至于郁达夫,我想也是借他人酒杯,浇自家之块垒,只是没有料到沈从文以后的文名罢了。这人事的沧桑,真是一言难尽。 又,我没读过沈从文的小说,不过这本小册子,《自传集》,是读得津津有味道。它的主体是1924年发表的《从文自传》,是22岁的沈从文对自己人生的一个回顾。这样的写作风险极大——功成名就后写自传,以前的苦难都似乎有了别样的意义。但22岁的沈从文,还是这篇文章里描写的一样窘迫。我好奇这样的立场和视角,这本书也的确给了我不一样的阅读体验。——先不剧透,推荐大伙有机会读读。
79.964286
465
0.860205
zho_Hans
0.378089
414d295f95c0a8e9cc237f1494d4453e4e303481
992
md
Markdown
README.md
Corasec/flaskDay2
30530410eb7fdf2a3c1587f93d6f2033639d79aa
[ "MIT" ]
null
null
null
README.md
Corasec/flaskDay2
30530410eb7fdf2a3c1587f93d6f2033639d79aa
[ "MIT" ]
null
null
null
README.md
Corasec/flaskDay2
30530410eb7fdf2a3c1587f93d6f2033639d79aa
[ "MIT" ]
null
null
null
## Flask Blog Two-side app developped with Python: flask, sqlite. Api : app.py is the server side. Front : client.py the client side. Client can send requests to the server: login, register, view articles etc... ***************************************** # Install Flask python3 -m pip install flask dnf install python3-pip (on fedora) : create the script /usr/bin/pip3 # instal sqlite3 >>>sudo dnf install sqlite3 >>>sqlite3 + help to command # Launch the app ----------------- Server (from '/App' folder) --- app.py: >>>export FLASK_APP = app.py export FLASK_DEBUG=true >>>flask run run on port:5000 Postman tests url: login + POST register + POST users + GET/PUT users/id + GET/DELETE/POST artciles + GET/PUT artciles/id + GET/DELETE/POST ------------------ Client (from '/Client' folder) --- client.py: >>>export FLASK_APP = client.py export FLASK_DEBUG = true >>>flask run --port:3000 run on port:3000 ------------------ to do: implement articles crud on client-side
22.044444
78
0.648185
eng_Latn
0.566456
22a2e234752323de038a1f57f4906f7edf5388b6
4,331
md
Markdown
docs/nonogram datafiles.md
MrErrol/NonogramSolver
e70cb54578bdaaa3b8f7361b47b2fb85bf17cf0a
[ "MIT" ]
1
2020-05-20T08:10:33.000Z
2020-05-20T08:10:33.000Z
docs/nonogram datafiles.md
MrErrol/NonogramSolver
e70cb54578bdaaa3b8f7361b47b2fb85bf17cf0a
[ "MIT" ]
null
null
null
docs/nonogram datafiles.md
MrErrol/NonogramSolver
e70cb54578bdaaa3b8f7361b47b2fb85bf17cf0a
[ "MIT" ]
null
null
null
# Nonogram datafiles *** As you may noticed creating nonogram datafile is the most tedious part of using NonoGeek. Knowing that I tried to make those files as simple and detail-free as possible. How much I succeeded in doing so is up to you to judge. *** ## Simple example One of the simplest examples possible is 3x3 nonogram. ![alt text][nono1] Which is encoded in a file: ``` ROWS: 3 1 1 1 COLUMNS: 1 1 2 1 1 ``` As you may see file contains just two codewords `ROWS:` and `COLUMNS:` and two blocks of data. Codewords mark begginings of the data blocks describing _hints_ for rows and columns of the nonogram. As you see blocks of data describes hints for rows and columns. In each block of hints every line describes list of hints for a given row or column. And ... that's all! One cannot properly define a nonogram without specifing _all_ hints - so one cannot run away from it. In principle one may try to remove codewords, yet I believe clarity of datafile is worth using them. *** ## Presolved nonogram While using hint mode to get a clue about next move or while using check mode to validate your work one needs to specify all identified (up to now) cells. For clarity NonoGeek requires to specify status of all (or none) of the cells. Below you may see example of valid datafile with presolved cells ``` ROWS: 3 1 1 1 COLUMNS: 1 1 2 1 1 CELLS: ffu efu ueu ``` At the end of the already known file appeared strangely looking block of letters proceeded by a codeword `CELLS:`. This block represents the solved nonogram (table of cells) in the (probably) simplest possible way. Each letter represents single cell and each row in block represents row in a nonogram. The letters stand for `f`illed, `e`mpty or (yet) `u`ndefined cells. The above datafile corresponds to the following stage of solving (grey cells are not yet identified): ![alt text][nono2] If you consider making such representation tedious, you are right. Nonetheless, workload may be mitigated - see the _Tips and Tricks_ section of this document. *** ## Strict rules Having basic idea how the datafile should look like we may proceed to more precise rules: - Each datafile have to contain two sections, namely `ROWS:` and `COLUMS:` - Directly after mentioned codewords datafile must contain rows (columns) of space separated integers representing following filled cells block for each row (column) of the nonogram - Each datafile may posses section `CELLS:` - Directly after `CELLS:` codeword datafile must contain lines of signs representing cells in the row - Each line represents single line in the nonogram and every sign represents exactly one cell - You may use `feu` letters for `f`illed, `e`mpty or (yet) `u`ndefined cells, capital letters are fine - For your convenience you may also use numbers `0=u`, `1=f` and `2=e` - If you prefer NonoGeek will accept `+` for filled and `-` for empty cells - Lines containing data should possess *only* neccessary data - Sections may come in any order and may be separated (or proceeded) by any comment lines that do not contain mentioned codewords and do not contain _only_ numbers and whitespaces - Obviously your data needs to represent valid nonogram *** ## Tips and Tricks As filling hints for rows and columns just needs to be done, there are some tricks that might help you filling `CELLS:` section. - Make sure your editor uses fixed-width font - that way you will have well adjusted rows _and_ columns of letters - Start by creating full picture of `u`nknown cells (Ctrl-C + Ctrl-V is a really helpfull there). Once you have it press _Insert_ on your keyboard and enjoy magic of replacing letters instead of inserting them - If you are solving a bigger picture and you've made a mistake it is very likely that you made it not so long ago. Try putting in last pieces of picture that you were working on and skip previous ones leaving them `u`nknown. NonoGeek will check all declared (`e`mpty or `f`illed) cells and provide information about them. Be aware that it will not be able to verify whether you make mistake in cells not provided (the `u`nknown ones) _My editor does not react to the Insert button..._ Start using Vim. Or fix your keybord. Maybe both... [nono1]: img/nono1.png "Solved nonogram" [nono2]: img/nono2.png "Presolved (partially) nonogram"
47.076087
471
0.765874
eng_Latn
0.999659
22a3a94ffdc356b34ea8502c464380c7d865bc8c
4,095
md
Markdown
docs/model.md
webbower/simple-data
51a57fe49d1c6a91fa79675241abbf8f50091b81
[ "MIT" ]
null
null
null
docs/model.md
webbower/simple-data
51a57fe49d1c6a91fa79675241abbf8f50091b81
[ "MIT" ]
null
null
null
docs/model.md
webbower/simple-data
51a57fe49d1c6a91fa79675241abbf8f50091b81
[ "MIT" ]
null
null
null
# Model class API ### `Model::$fields` A static, protected property that you define on your Model subclasses to define the model schema. ```php protected static $fields = [ 'firstName' => 'String', 'lastName' => 'String', 'age' => 'Integer', 'spouse' => 'Person', ]; ``` For primitive PHP data types, the value aligns with the output of PHP's native `gettype()` function except that it is capitalized: Possible type values are: * Boolean - A boolean value * Integer - A whole number (no decimal) * Double - A floating point number (with decimal) * String - A string * Array - An array (indexed or associative) Additionally, any class name can be used as a type. Any field can also be `null` ### `Model::__construct(array $data)` The constructor. Takes an associative array of keys and data values. The data passed in will be type-checked against the `$fields` property. Any type mismatches or unexpected keys will cause an `OutOfBoundsException` to be thrown. You do not have to set every schema key on instantiation. Any keys omitted will be set to `null`. ### `isset($var)` Using the `__isset()` magic method, this will return `true` if the variable passed in is part of the defined schema and is not `null` or `false` otherwise. Attempting to check if a derived data property exists will always return `false`. Using the earlier `Person` class: ```php $me = new Person([ 'firstName' => 'Bob', 'lastName' => 'Smith', 'age' => 45, // 'spouse' is null because it was omitted ]); var_export(isset($me->firstName)); // true var_export(isset($me->spouse)); // false (because it is null) var_export(isset($me->foo)); // false (because it's not part of the schema) ``` ### `Model::toArray()` Returns the underlying raw data structure as an array. If you omitted any fields on instantiation, they will be provided as `null` values. Using the earlier `Person` class: ```php $me = new Person([ 'firstName' => 'Bob', 'lastName' => 'Smith', 'age' => 45, // 'spouse' is null because it was omitted ]); print_r($me->toArray()); // [ 'firstName' => 'Bob', 'lastName' => 'Smith', 'age' => 45, 'spouse' => null ] ``` ### `Model::hasField(string $name)` Given `$name`, returns `true` if the raw data field exists (regardless of value) and `false` otherwise ```php $me = new Person([ 'firstName' => 'Bob', 'lastName' => 'Smith', 'age' => 45, // 'spouse' is null because it was omitted ]); var_export($me->hasField('firstName')); // true var_export($me->hasField('lastName')); // true var_export($me->hasField('foo')); // false ``` ### `Model::hasMethod(string $name)` Given `$name`, returns `true` if the method exists (not necessarily derived data methods) and `false` otherwise ```php $me = new Person([ 'firstName' => 'Bob', 'lastName' => 'Smith', 'age' => 45, // 'spouse' is null because it was omitted ]); var_export($me->hasMethod('getFullName')); // true var_export($me->hasMethod('someMethod')); // true var_export($me->hasMethod('anotherMethod')); // false ``` ### `Model::has(string $name)` Given `$name`, returns `true` if the raw data field of method exists and `false` otherwise ```php $me = new Person([ 'firstName' => 'Bob', 'lastName' => 'Smith', 'age' => 45, // 'spouse' is null because it was omitted ]); var_export($me->has('firstName')); // true var_export($me->has('getFullName')); // true var_export($me->has('someMethod')); // true var_export($me->has('anotherMethod')); // false ``` ### `Model::copy(array $data)` Takes an associative array of data and returns a copy of the original instance with the passed-in data keys updated. Not all keys need to be present and only the keys passed in will be updated. Type checking semantics are identical to the constructor. This is the way to update data on your model, and in an atomic manner. ```php $me = new Person([ 'firstName' => 'Bob', 'lastName' => 'Smith', 'age' => 45, // 'spouse' is null because it was omitted ]); // Happy birthday!! $olderMe = $me->copy([ 'age' => 46, ]); echo $me->age; // 45 echo $olderMe->age; // 46 ```
28.838028
328
0.666911
eng_Latn
0.963512
22a3af1d679ba4e2281d18feb57d8596c234320a
509
md
Markdown
Printers/template_kyocera_printers/6.0/README.md
SkyBeam/community-templates
634b1a79f4da224b0066880ec76a8b57bdf51257
[ "MIT" ]
291
2021-11-25T15:32:30.000Z
2022-03-28T19:41:28.000Z
Printers/template_kyocera_printers/6.0/README.md
SkyBeam/community-templates
634b1a79f4da224b0066880ec76a8b57bdf51257
[ "MIT" ]
48
2021-11-25T14:41:21.000Z
2022-03-31T07:37:02.000Z
Printers/template_kyocera_printers/6.0/README.md
SkyBeam/community-templates
634b1a79f4da224b0066880ec76a8b57bdf51257
[ "MIT" ]
296
2021-11-25T12:54:15.000Z
2022-03-31T14:38:37.000Z
# Kyocera printers by SNMPv2 ## Overview Template created for Kyocera ECOSYS m3655idn. Works in any Kyocera printer. Contains items for: * Printer name * Cartridge name * Serial Number * Printer status * Total pages printed * Printed with toner * Toner capacity * Toner level (%) Triggers for: * Toner < 5% ## Macros used * {$COMM} for Community Name ## Author Patxi Andueza Based on [sysadminwork's template] (https://sysadminwork.com/monitoring-printers-hp-kyocera-brother-via-snmp-with-zabbix/)
15.90625
122
0.744597
eng_Latn
0.768597
22a3d02dc15eb6ae9d9061e6504987e9bbc3cdb1
638
md
Markdown
specs/v2/README.md
Navinnahar11/Project-Saral
ed36131470df85f58e141446851adc23e3cf9b75
[ "MIT" ]
1
2021-11-17T07:36:53.000Z
2021-11-17T07:36:53.000Z
specs/v2/README.md
Navinnahar11/Project-Saral
ed36131470df85f58e141446851adc23e3cf9b75
[ "MIT" ]
104
2021-11-09T05:33:14.000Z
2022-03-31T06:49:26.000Z
specs/v1.5/README.md
project-anuvaad/Project-Saral
5686ccdcce4cce0661230b1e4f6fff06622f7eae
[ "MIT" ]
1
2022-02-21T20:40:53.000Z
2022-02-21T20:40:53.000Z
# Project-Saral Project Saral should be viewed as an OCR-plus application that is capable of doing OCR and can also understand the structure of the physical input. # Schema - /specs/saral_ocr_schema.yml # Sample - /specs/samples/saral_ocr_odisha_sample.yml # Saral OCR Odisha sample Layout ![Alt text](https://github.com/project-anuvaad/Project-Saral/blob/feature/v1.5/specs/v1.5/images/saral_ocr_layout.png "Saral OCR Layout") # Saral OCR-plus draft Architecture v1.0 ![Alt text](https://github.com/project-anuvaad/Project-Saral/blob/feature/v1.5/specs/v1.5/images/saral_v1.0_architecture-view-point1.jpg "Saral OCR Architecture")
37.529412
162
0.788401
eng_Latn
0.652691
22a3e18a154842e2090fa8cc17cc27acb694bbc8
636
md
Markdown
README.md
audreyhsiao/data_presentation_program
9e7322a313d5dbec7ed2382f1923ba103600db69
[ "CC-BY-3.0" ]
null
null
null
README.md
audreyhsiao/data_presentation_program
9e7322a313d5dbec7ed2382f1923ba103600db69
[ "CC-BY-3.0" ]
null
null
null
README.md
audreyhsiao/data_presentation_program
9e7322a313d5dbec7ed2382f1923ba103600db69
[ "CC-BY-3.0" ]
null
null
null
# A Java program which needs a fancy name *This is a presentation program for java course in Peking University.* __Goal: 设计并实现一个专题数据的展示系统:给定数据指标、国家、以及给定国家的指标的数据,对这三者进行管理和展示。__ ## What we hope to do __终端用户功能:__ <li>按类别(国家、指标)浏览数据</li> <li>按给定的条件(国家、指标)检索数据</li> <li>组合检索(如多国检索、多指标检索,在检索的基础上比较数据)</li> <br> __管理员用户功能:__ <li>指标的增删改</li> <li>国家的增删改</li> <li>数据的增删改</li> <br> ## 使用技术 <ul>IDE:Eclipse</ul> <ul>数据库:MySQL</ul> <ul>数据源:DataSets from <a href="https://www.kaggle.com/datasets">Kaggle</a></ul> <ul>JDBC 工具:</ul> <ul>前端框架:</ul> <ul>Ajax 解决方案:</ul> <ul>HTML template by <a href="https://html5up.net">HTML5UP</a></ul> </div>
19.875
79
0.691824
yue_Hant
0.356598
22a41cf38e3f92a978f8d7c337516e065a2d043d
6,169
md
Markdown
_pages/faq.md
matthewlong29/PareAndFlourish_Site
64e11902812946b29d438163aaeb6db6618502ed
[ "CC-BY-3.0" ]
null
null
null
_pages/faq.md
matthewlong29/PareAndFlourish_Site
64e11902812946b29d438163aaeb6db6618502ed
[ "CC-BY-3.0" ]
13
2020-03-16T10:33:33.000Z
2021-07-27T10:20:08.000Z
_pages/faq.md
matthewlong29/PareAndFlourish_Site
64e11902812946b29d438163aaeb6db6618502ed
[ "CC-BY-3.0" ]
null
null
null
--- layout: content-page title: Frequently Asked Questions permalink: /faq/ image: header: sky-and-katie-talking.jpg teaser: faq.jpg --- <div class="row"> <div class="col-sm-12"> <div class="panel"> <div class="panelOuter faq"><span>What is a Roundtable?</span></div> <div class="panelInner">A Flourish Roundtable is a small casual networking event for female professionals. The roundtable is composed of 10 women and up to 2 moderators. The size of these events allows participants to feel heard and connected. Each roundtable is based on a central topic or lesson to help fuel the connection and lead us to a new skill or self-realization. You can learn more on our <a href="/events/">events page</a>!</div> </div> <div class="panel"> <div class="panelOuter faq"><span>When is the next Flourish roundtable?</span></div> <div class="panelInner">Flourish Roundtables are held monthly. You can find out more on our <a href="/events/">schedule</a>. Or on our <a href="https://www.facebook.com/pareandflourish/">Facebook page</a>.</div> </div> <div class="panel"> <div class="panelOuter faq"><span>How much do they cost?</span></div> <div class="panelInner">Flourish Roundtables vary in price, starting at $25 per seat.</div> </div> <div class="panel"> <div class="panelOuter faq"><span>Where do you have Flourish Roundtables?</span></div> <div class="panelInner">Flourish Roundtables are primarily held in two cities in Kentucky: Bowling Green and Elizabethtown.</div> </div> <div class="panel"> <div class="panelOuter faq"><span>What topics have you discussed?</span></div> <div class="panelInner"> <p>We have discussed the following topics:</p> <ul> <li>Goal Setting</li> <li>Confidence</li> <li>Millennial Women</li> <li>Applying creativity personally and professionally</li> <li>Personal Branding</li> <li>Self-Care</li> <li>Mindfulness & Meditation</li> </ul> </div> </div> <div class="panel"> <div class="panelOuter faq"><span>How do I become a sponsor/co-host? What do I get as a sponsor?</span></div> <div class="panelInner"> <p>Pare and Flourish is always on the lookout for new individuals and small businesses to partner with. By sponsoring a Flourish Roundtable, you are bringing together women in your area and helping them to “flourish.”</p> <p>Your sponsorship makes it possible for women to network in a meaningful way at a low cost, or no cost, to them. By sponsoring you are entitled to an abundance of social media recognition, shout outs at the roundtables, and the opportunity for us to distribute advertising materials you may have.</p> <p>Individuals sometimes choose to co-host to promote their business. In the past, we’ve partnered with <a href="https://www.spaceplaceandsoutherngrace.com/">Space, Place & Southern Grace</a> and <a href="https://www.facebook.com/4yogaBG/">4yoga</a>. If you’re interested in getting the word out about your business, or if you have a skill, expertise, or wisdom you’d like to offer to women in your community, <a href="mailto:[email protected]">contact us</a>!</p> </div> </div> <div class="panel"> <div class="panelOuter faq"><span>Can men come to Flourish roundtables?</span></div> <div class="panelInner">Flourish Roundtables are currently only offered to women. Sorry, guys! We are focused on lifting up our female peers.</div> </div> <div class="panel"> <div class="panelOuter faq"><span>Do you serve alcohol/food/drinks at Flourish Roundtables?</span></div> <div class="panelInner">At each Flourish Roundtable we serve a variety of complimentary snacks and beverages. What we serve is determined by our topic, venue, and sponsors. Many Flourish Roundtables include wine. <a href="mailto:[email protected]">Let us know</a> if you’d like to sponsor our snacks or beverages.</div> </div> <div class="panel"> <div class="panelOuter faq"><span>Do I need to bring anything to the next Flourish Roundtable?</span></div> <div class="panelInner">Any items that are needed will be provided to you, unless specified during registration. Though, we do encourage you to register with a friend! We want to make the event as successful as possible.</div> </div> <div class="panel"> <div class="panelOuter faq"><span>Will you come to my city?</span></div> <div class="panelInner">We are interested in other cities. Let us know if you’d like a Flourish Roundtable to be held near you!</div> </div> <div class="panel"> <div class="panelOuter faq"><span>Can I put on a Flourish Roundtable for my friends/co-workers?</span></div> <div class="panelInner">Of course! Flourish Roundtables were created with the goal of inspiring and uplifting the women around us. <a href="mailto:[email protected]">Contact us</a> if you’d like to host a table for your friends or company and we will start planning a Flourish Roundtable with your goal in mind.</div> </div> <div class="panel"> <div class="panelOuter faq"><span>Can I guest post on your blog?</span></div> <div class="panelInner">We love to collaborate! Please send us an email at <a href="mailto:[email protected]">[email protected]</a> to discuss!</div> </div> <div class="panel"> <div class="panelOuter faq"><span>Where are you?</span></div> <div class="panelInner">We are based out of Bowling Green, KY and Elizabethtown, KY.</div> </div> <div class="panel"> <div class="panelOuter faq"><span>How do I contact you?</span></div> <div class="panelInner">You can contact us on <a href="https://www.facebook.com/pareandflourish/">Facebook</a>, <a href="https://www.instagram.com/pareandflourish/">Instagram</a>, and <a href="https://twitter.com/pareandflourish/">Twitter</a>. Or send us an email at <a href="mailto:[email protected]">[email protected]</a>.</div> </div> </div> </div>
70.908046
482
0.695575
eng_Latn
0.976727
22a46b76575795f89379e68b5308d01266f0a165
179
md
Markdown
vault/tn/2KI-q83i.md
mandolyte/uw-obsidian
39e987c4cdc49d2a68e3af6b4e3fc84d1cda916d
[ "MIT" ]
null
null
null
vault/tn/2KI-q83i.md
mandolyte/uw-obsidian
39e987c4cdc49d2a68e3af6b4e3fc84d1cda916d
[ "MIT" ]
null
null
null
vault/tn/2KI-q83i.md
mandolyte/uw-obsidian
39e987c4cdc49d2a68e3af6b4e3fc84d1cda916d
[ "MIT" ]
null
null
null
# General Information: This is the end of the message from Yahweh, spoken through the prophet Isaiah to King Hezekiah. It uses parallelism throughout. (See: [[figs-parallelism]])
59.666667
155
0.782123
eng_Latn
0.997874
22a5c3b2149704f9c869f8ab2015989f9f0ad0b8
2,072
md
Markdown
articles/service-connector/how-to-integrate-storage-table.md
KazuOnuki/azure-docs.ja-jp
4dc313dec47a4efdb0258a8b21b45c5376de7ffc
[ "CC-BY-4.0", "MIT" ]
null
null
null
articles/service-connector/how-to-integrate-storage-table.md
KazuOnuki/azure-docs.ja-jp
4dc313dec47a4efdb0258a8b21b45c5376de7ffc
[ "CC-BY-4.0", "MIT" ]
null
null
null
articles/service-connector/how-to-integrate-storage-table.md
KazuOnuki/azure-docs.ja-jp
4dc313dec47a4efdb0258a8b21b45c5376de7ffc
[ "CC-BY-4.0", "MIT" ]
null
null
null
--- title: Azure Table Storage と Service Connector を統合する description: Service Connector を使用したアプリケーションへの Azure Table Storage の統合 author: shizn ms.author: xshi ms.service: serviceconnector ms.topic: how-to ms.date: 10/29/2021 ms.custom: ignite-fall-2021 ms.openlocfilehash: 646abc1fc11de0c1d9d5f3c6382e0824c020e85c ms.sourcegitcommit: 106f5c9fa5c6d3498dd1cfe63181a7ed4125ae6d ms.translationtype: HT ms.contentlocale: ja-JP ms.lasthandoff: 11/02/2021 ms.locfileid: "131089747" --- # <a name="integrate-azure-table-storage-with-service-connector"></a>Azure Table Storage と Service Connector を統合する このページでは、Service Connector を使用した Azure Table Storage でサポートされている認証の種類とクライアントの種類を示します。 Service Connector を使用しなくても、他のプログラミング言語で Azure Table Storage に接続できる可能性があります。 このページでは、サービス接続を作成するときに取得する既定の環境変数の名前と値 (Spring Boot 構成) についても説明します。 [Service Connector 環境変数の名前付け規則](concept-service-connector-internals.md)の詳細を参照してください。 ## <a name="supported-compute-service"></a>サポートされているコンピューティング サービス - Azure App Service - Azure Spring Cloud ## <a name="supported-authentication-types-and-client-types"></a>サポートされている認証の種類とクライアントの種類 | クライアントの種類 | システム割り当てマネージド ID | ユーザー割り当てマネージド ID | Secret/ConnectionString | サービス プリンシパル | | --- | --- | --- | --- | --- | | .NET | | | ![[はい] アイコン](./media/green-check.png) | | | Java | | | ![[はい] アイコン](./media/green-check.png) | | | Node.js | | | ![[はい] アイコン](./media/green-check.png) | | | Python | | | ![[はい] アイコン](./media/green-check.png) | | ## <a name="default-environment-variable-names-or-application-properties"></a>既定の環境変数名またはアプリケーション プロパティ ### <a name="net-java-nodejs-and-python"></a>.NET、Java、Node.JS、Python **Secret/ConnectionString** | 既定の環境変数名 | 説明 | 値の例 | | --- | --- | --- | | AZURE_STORAGETABLE_CONNECTIONSTRING | テーブル ストレージ接続文字列 | `DefaultEndpointsProtocol=https;AccountName={accountName};AccountKey={****};EndpointSuffix=core.windows.net` | ## <a name="next-steps"></a>次のステップ Service Connector の詳細については、以下のチュートリアルに従ってください。 > [!div class="nextstepaction"] > [Service Connector の概念について学習する](./concept-service-connector-internals.md)
39.09434
312
0.748069
yue_Hant
0.365979
22a66da314e520bff8d503faf9a0817bf99b5a32
5,215
md
Markdown
_posts/2007/2007-6-27-lmy.md
shenshanwohu/gaoxin.github.io
00eacfaf6c8cd403194c4d272abcaf9dc9606303
[ "Apache-2.0" ]
null
null
null
_posts/2007/2007-6-27-lmy.md
shenshanwohu/gaoxin.github.io
00eacfaf6c8cd403194c4d272abcaf9dc9606303
[ "Apache-2.0" ]
null
null
null
_posts/2007/2007-6-27-lmy.md
shenshanwohu/gaoxin.github.io
00eacfaf6c8cd403194c4d272abcaf9dc9606303
[ "Apache-2.0" ]
null
null
null
--- layout: post title: 资产投资管理 category: 2007 no-post-nav: false --- ## 资产投资管理 【概 况】 2006年,是高投集团的“重点建设与目标预算管理年”,高投集团围绕成都高新区“1223”发展战略和公司“高科技园区投资运营商”的定位,以重点建设项目投资及推行全面目标预算管理为重点,通过加强资源的组织和利用,强化现代企业法人治理,开拓经营渠道,规范管理流程,健全激励机制,实现战略转型的阶段性目标。2006年,完成工作目标14项,专项目标22项。全年实际完成投资34亿元,其中:基础设施14.3亿元,房建19.7亿元,新开工项目27个,竣工17个,续建10个,新建续建道路56.4公里,污雨水管道97.5公里,房建工程170.9万平方米。确定“强化经营性项目营销,分类经营,盘活资产,完善机制”的资产经营总体思路,组建专业的园区管理团队——天府软件园管理服务中心,配合高新国际广场开盘、模具工业园招商、创新组团营销,高新置业公司与高新建设公司均组建专业营销队伍,高新建设公司承接西区政务中心物管工作,天府软件园入驻世界500强企业在内的国际国内知名企业32家,租售面积达171万平方米;高新国际广场D、E座销售面积6769.1平方米,实现销售收入5362.2万元;南部园区农迁房商铺租售面积15992.2平方米,实现收入1664.5万元;西区模具工业园出租面积70469.9平方米,实现收入771.9万元;创新组团已销售面积10.6万平方米,累计回款24亿元。各项经营收入全年累计达到10.3亿元。完成多个重大投资合作项目,包括:成芯半导体项目完成工程建设,进入设备调试阶段;与中外空运发展股份有限公司达成合作协议,完成成都保税物流中心合资公司组建;与中外合资企业——成都西御大厦有限公司合作修建高新孵化园IT研发中心,协议投资金额人民币3.35亿元;京东方合作项目,已签订投资合作协议,正开展合资公司注册前期工作;中德国际医院项目,总投资8000万欧元,经双方磋商,对合同条款基本达成共识;国腾投资项目,已开展实地考察和尽职调查,并达成投资合作意向;与台湾东元集团、四川长虹共同投资的RLED项目合作协议已签订。经过高投集团、成都高新发展股份有限公司(原成都倍特发展股份有限公司)及相关中介机构共同努力,完成上市公司股改工作,“倍特高新”正式更名为“高新发展”。围绕集团主业积极拓宽业务发展空间,实施专业化经营,为园区提供全方位的配套服务,集团所属国贸公司、创投公司、保税物流公司、科技担保公司、现代体育公园管理公司通过转变观念,挖掘增值服务,以服务增效益,取得预期效果。高投集团全面推行目标预算管理,严格制定和控制各项经营管理指标;实施集团财务结算中心模式,实现资金、人员、核算“三集中”;深化绩效管理,实现以岗定责、以岗定薪的“双定”目标;严格推行建设工程全过程造价控制管理,变事后控制为事前、事中控制。高投集团在党风廉政建设工作方面,与成都高新区检察院共同开展职务犯罪预防,建立联席会议制度,严格超前预防工作。2006年,高投集团组织员工参加成都高新区第三届运动会并取得优异成绩,参加成都高新区机关党委“感动高新”征文活动并荣获“优秀征文奖”1篇、“征文纪念奖”4篇,参加成都高新区“慈善一日捐”活动,募捐善款5000余元,捐赠衣物400余件,全面更新改版高投集团网站,利用航空杂志、当地报刊、户外广告等媒体以及高投集团印发的《快讯》加强高投集团对外宣传。 (彭 隽 刘国东) 【高科技投资项目】 2006年,成都高新创新投资有限公司是成都高新区主要从事股权投资专业机构之一,围绕成都高新区“1223”发展战略,加快投资步伐,优化投资结构,实现配套投资服务多样化,从而推动区内经济发展。高投集团公司主要以股权投资的形式投资于高成长性的科技创新企业,配合企业发展中萌生的资金、管理等需求,提供中小企业贷款、融资咨询、基金申报、技术认证、科技成果转化等相关配套服务,扶持企业快速成长。公司股权投资方面重点关注区内电子信息、生物医药、精密机械三大支柱产业及教育文化传媒等新兴领域内具有自主知识产权的高科技企业,用市场化手段促进产业发展,通过股权转让、兼并收购或其他方式退出,充分发挥政府资金的引导和放大作用,促进成都高新区高科技企业科技成果的转化和重点产业的发展。2006年,成都高新创新投资有限公司共走访企业286家,提交拜访报告127篇,确定“四川安好精工机械有限责任公司、四川源生生物药业有限公司、成都恒瑞制药有限公司、奥泰医疗系统有限责任公司、成都数视微科技有限责任公司、成都中科前程科技有限公司、甲骨文软件系统有限公司成都分公司、成都数字媒体产业化基地有限公司、成都汉科计算机信息技术有限公司、芯通科技(成都)有限公司、四川登巅微电子有限公司”等30多个重点项目,完成11个项目的立项报告、10个项目的投资建议、5个项目的投资流程(包括琢新项目、安好精工项目、思尔科项目、数视微项目、三民药业项目),投资领域涉及生物医药、精密机械加工、软件外包、微电子等重点发展的产业领域。 (易 宇 何 敏 王 兆) 【重点投资项目】 四川琢新生物材料研究有限公司是以研发可降解医用聚合物和医药中间体为主业的高新技术企业,已成功向4家公司转让医用材料技术9项,合同转让金额上千万元。创投公司对其实施投资后,琢新公司逐步实现从研发到产业化的转型,2006年,实现中间体销售收入800余万元,比上年同期增长8倍,产品90%以上出口国外,现已成为国内L~正缬氨酸及其衍生物和氨曲南生产的重要企业之一。2006年,实现股权投资共1147万元,其中包括对四川琢新生物材料研究有限公司投资200万元,占琢新公司股权的13.3%;对四川安好精工机械有限公司投资200万元,占安好精工股权的9.09%;对成都思尔科软件有限公司投资147万元,占思尔科股权的49%;对成都数视微科技有限公司投资200万元,占数视微股权的49%;2006年底还完成对四川三民药业有限公司投资400万元的投资流程,占三民药业股权的21.88%。(易 宇 何 敏 王 兆) 【产业投资】 产业投资是成都高新创新投资有限公司针对区内成长期或成熟期企业的投资业务。该类企业一般生产经营已比较稳定,具有一定的资产规模和较好的盈利能力,通过外来资金的进入能帮助企业迅速扩大生产规模进而发展成为区内产业龙头,从而带动相关产业的发展,在企业实现预期经营目标或上市后退出。创投公司围绕成都高新区战略发展实施产业投资,已与成都高新区各职能部门就企业扶持和产业发展进行多次合作和创新探讨,重点对成都高新区电子信息、生物制药、精密制造、新兴产业等相关产业进行投资。2006年,先后与成都奔月科技有限公司、奥泰医疗系统有限责任公司、宝利根(成都)精密模型有限公司、成都星宇软件开发股份有限公司等多家企业就产业投资进行洽谈,创投公司投资以引导建立产业基金为发展目标,发挥国有资本引导和吸收境内外商业资本的作用,多方位拓展产业投资的融资渠道,目前已初步形成涵盖银行资本、投资资本、产业资本、民间资本等的多元投资体系,为投资企业提供融资、项目管理和咨询等增值服务,与国内外专业机构建立投资联盟。 (易 宇 何 敏 王 兆) 【保税物流管理】 成都保税物流中心是在国家海关总署的倡导和四川省、成都市政府的支持下,为满足地区国际贸易、尤其是加工贸易的快速发展对保税物流服务的需求,改善地区投资环境,提升地区招商引资综合竞争力而设立,具有国家赋予的各项优惠政策和专业功能的国际物流园区。是经海关总署批准,在中国西部地区建成的第一家保税物流中心,是具有综合物流服务功能的海关集中监管场所。中心位于国家级成都高新技术产业开发区(西区),临近四川成都出口加工区(西区)、213国道、成灌高速公路及绕城高速公路,规划总占地面积53.333公顷,其中项目一期(启动区)占地22.667公顷。中心按照国际物流标准设计,于2005年10月开工建设,于2006年8月全部建成并通过成都市建设工程质量监督站验收。中心总建筑面积59305平方米,包括海关卡口200平方米,保税仓库近5万平方米,海关查验仓库1200平方米,卸货区12157平方米,总平道路38137平方米,绿化54634平方米,隔离围网1527米,综合办公楼7000多平方米。配有24小时全方位实时监控系统、海关联网监管系统、电子口岸网络平台等设施。海关、商检等职能部门及银行等商业机构在中心集中办公,为企业提供报关、报检、报验、金融等一站式服务。中心通过进口、出口、结转、转口贸易以及与其他海关特殊监管区域间的流转等业务模式,形成多功能、一体化、具备口岸功能的保税物流公共平台。中心是跨国公司在西部地区开展全球采购、增值服务的产品分拨和配送基地;是加工贸易产品特别是跨国公司产品内销直运的中转基地,以解决“境外一日游”增加物流成本和降低时效的问题;是为企业降低综合物流成本,开展进口保税仓储、产品国际配送和配套增值服务的国际中转中心;是为企业提供保税货物的VMI(供应商库存管理)库存管理和增值加工的配送基地。中心由成都保税物流投资有限公司投资开发并经营管理。保税物流公司由成都高新投资集团有限公司和中外运空运发展股份有限公司共同出资1亿元人民币设立,主营工业设施的开发、建设、经营、管理;货物及技术进出口;仓储服务;装卸、包装服务;货物运输代理;集装箱装拆服务、报关、报验;物业管理;运输信息咨询服务等业务。公司协助海关对中心的国际物流业务实施监管,通过保税物流中心这一公共平台为生产制造企业和物流企业提供面向四川乃至西部地区的多功能、一体化、具备口岸功能的保税物流服务。(任洪波) 【担保服务】 成都高新科技信用担保有限公司自2006年9月正式成立,公司完成有关担保业务的开办、管理和控制的主要制度和办法的拟定;组建担审会,构建项目审查和决策机制;拓展融资渠道,加大与银行合作力度,联系多家银行开展合作;加快评审进程,反担保措施灵活多样;与开行、农行、成都市商业银行、市城郊信用联社签订《银保合作协议》。同时,推进担保业务的具体实施,走访涉及加工业、制造业、软件开发业等行业的多家企业,挖掘企业潜在需求,积极推进担保业务的具体实施,共计完成对成都颠峰软件有限公司、四川登巅微电子有限公司、天府数媒有限公司等25户企业共涉及担保金额6000万元担保业务的初审工作,并经公司董事会审批通过,成都颠峰软件有限公司、四川登巅微电子有限公司等17家企业已通过公司担保获得银行贷款4750万元。(许 波) 【国际贸易资金管理】 高投集团下属的四川成都出口加工区国际贸易公司(以下简称国贸公司)2006年初上报公司年度资金预算,根据公司的实际情况,报送年度资金计划,季度资金预算在本季度的最后一个月25日报送,报送下一季度资金预算时,在上季度资金预算执行的基础上进行调整。国贸公司每月在27日上报次月资金预算到集团财务结算中心资金分中心。财务结算中心资金分中心将年度、季度、月度资金预算汇总后上报财务结算中心主任。报送时间分别为:年度资金预算于次年1月的20日;季度资金预算于季度开始第一个月的5日;月度资金预算于次月的3日。财务结算中心资金分中心将月度资金预算纳入NC资金系统(即用友软件资金管理软件系统),国贸公司按照所报资金预算执行,如需在当月对资金预算需要进行调整,国贸公司将调整资金额、调整事由上报集团公司领导审批,资金分中心将审批后的调整资金预算追加入NC资金系统后,方可执行。国贸公司重视对风险的防范,重点发展出口加工区业务。在完成政府目标为加工区企业提供服务的同时,保证资金安全,外商在加工区内,多数是信誉良好的国际知名企业,降低呆账、坏账的出现几率。针对不同客户采取不同的结算方式。针对加工区内信誉良好且有长期合作关系的客户,公司采取以商业信用为依据的汇付结算方式,节省费用。针对合作时间不长、信誉不太了解的境外客户,多采用以银行信用为依据的信用证结算方式,货款的安全性得到保障。高度重视汇率风险,并善于转嫁汇率风险。就目前的操作方式而言,公司在合同谈判中,将汇率风险作为重要条款,最终在合同中明确约定由外商承担汇率风险。下一步还将加强对银行衍生工具的学习和运用,使用远期结售汇、人民币与外币掉期等工具。建立外币货款核查制度。通过业务员、集团财务出纳两条线核查,落实外汇收款信息,有效保证贸易资金的安全。专人负责退税,确保退税的及时、足额。国际贸易中出口业务涉及出口退税。公司安排经验丰富的专业人员负责出口退税的申报、跟踪,确保应退税款及时、足额返回。(黄 佳)
200.576923
1,388
0.895302
yue_Hant
0.930131
22a709f31bde4efa8979cd549a1b44ef7bae7305
245
md
Markdown
docs/ApiKeysVM.md
FastReports/FastReport-Cloud-JS
972c2ce0f1856c70c7707c6d25f5161b11086445
[ "MIT" ]
2
2021-05-21T15:06:02.000Z
2022-03-21T06:24:24.000Z
docs/ApiKeysVM.md
FastReports/FastReport-Cloud-JS
972c2ce0f1856c70c7707c6d25f5161b11086445
[ "MIT" ]
null
null
null
docs/ApiKeysVM.md
FastReports/FastReport-Cloud-JS
972c2ce0f1856c70c7707c6d25f5161b11086445
[ "MIT" ]
null
null
null
# FastreportCloudSdk.ApiKeysVM ## Properties Name | Type | Description | Notes ------------ | ------------- | ------------- | ------------- **apiKeys** | [**[ApiKeyVM]**](ApiKeyVM.md) | | [optional] **count** | **Number** | | [optional]
22.272727
60
0.461224
yue_Hant
0.153577
22a72e511a1775955ee5717dd2f1964354915f3b
1,975
md
Markdown
docs/routines/dimensions.md
lhsazevedo/phpsci-carray
e7b716d10d963fbfb69b39253bcfabd7220fa27e
[ "MIT", "BSD-3-Clause" ]
102
2018-03-25T17:35:52.000Z
2020-01-30T05:40:50.000Z
docs/routines/dimensions.md
lhsazevedo/phpsci-carray
e7b716d10d963fbfb69b39253bcfabd7220fa27e
[ "MIT", "BSD-3-Clause" ]
12
2018-04-10T06:26:22.000Z
2019-08-16T15:24:28.000Z
docs/routines/dimensions.md
lhsazevedo/phpsci-carray
e7b716d10d963fbfb69b39253bcfabd7220fa27e
[ "MIT", "BSD-3-Clause" ]
10
2018-04-09T17:40:15.000Z
2019-12-07T00:51:45.000Z
# Dimensions Routines --- ## atleast_1d ```php public static atleast_1d($a ...) : CArray | Array ``` > Convert inputs to arrays with at least one dimension. > Scalar inputs are converted to 1-dimensional arrays, whilst higher-dimensional inputs are preserved. ##### Parameters `CArray|Array` **$a ...** One or more input arrays. ##### Returns `CArray|Array` An CArray, or array of CArrays, each with NDIM >= 1. Copies are made only if necessary. --- ## atleast_2d ```php public static atleast_2d($a ...) : CArray | Array ``` > Convert inputs to arrays with at least two dimensions. ##### Parameters `CArray|Array` **$a ...** One or more input arrays. ##### Returns `CArray|Array` An CArray, or array of CArrays, each with NDIM >= 2. Copies are made only if necessary. --- ## atleast_3d ```php public static atleast_3d($a ...) : CArray | Array ``` > Convert inputs to arrays with at least three dimensions. ##### Parameters `CArray|Array` **$a ...** One or more input arrays. ##### Returns `CArray|Array` An CArray, or array of CArrays, each with NDIM >= 3. Copies are made only if necessary. --- ## squeeze ```php public static squeeze($a, $axis = NULL) : CArray ``` > Remove single-dimensional entries from the shape of an array. ##### Parameters `CArray|Array` **$a** Input data. `int` **$axis** Selects a subset of the single-dimensional entries in the shape. ##### Returns `CArray` The input array, but with all or a subset of the dimensions of length 1 removed. This is always a itself or a view into `$a`. --- ## expand_dims ```php public static expand_dims($a, $axis = NULL) : CArray ``` > Expand the shape of an array. > Insert a new axis that will appear at the `$axis` position in the expanded array shape. ##### Parameters `CArray|Array` **$a** Input data. `int` **$axis** Position in the expanded axes where the new axis is placed. ##### Returns `CArray` **View** of `$a` with the number of dimensions increased by one.
21.236559
134
0.676456
eng_Latn
0.991194
22a7bc0f096f11e3c5f73bcc625977aa85ebe053
2,253
md
Markdown
docs/source/getting_started.md
ATikhonov2/lobster
30e5cf835b3a5abc50687d1cee90959bef6032fb
[ "Apache-1.1" ]
1
2020-05-07T22:32:39.000Z
2020-05-07T22:32:39.000Z
docs/source/getting_started.md
ATikhonov2/lobster
30e5cf835b3a5abc50687d1cee90959bef6032fb
[ "Apache-1.1" ]
null
null
null
docs/source/getting_started.md
ATikhonov2/lobster
30e5cf835b3a5abc50687d1cee90959bef6032fb
[ "Apache-1.1" ]
null
null
null
--- title: Quick Getting Started Guide. --- Get pre-built binaries (Windows, Mac, Linux) ------------------------------------------- ### Latest version from CI If you don't want to deal with building it yourself, go to [github CI](https://github.com/aardappel/lobster/actions?query=workflow%3ACI) (click on the latest succesful run to get a list of binaries). These are 64-bit for all platforms. Now get https://github.com/aardappel/lobster (download zip). This has all the data files and examples. Place the binary you obtained in `bin`. ### Releases You can also get both from https://github.com/aardappel/lobster/releases (`lobster_<date>_<platform>.zip` and `Source code (zip)`), but these are usually way behind using the most recent builds above, so not recommended. Or, build it yourself! --------------------- ### Linux Pre-Requirements: Git, CMake, a C++17 compiler, Mesa dev files (`apt-get install mesa-common-dev`). ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ git clone https://github.com/aardappel/lobster.git cd lobster/dev cmake -DCMAKE_BUILD_TYPE=Release make -j8 cd .. bin/lobster samples/pythtree.lobster ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ ### Windows Pre-Requirements: VS2019 Community edition or better, C++ desktop tools installed. Get https://github.com/aardappel/lobster using your favorite git tool (best), or just download a `.zip` from there otherwise. Open `dev\lobster\lobster.sln`, ensure `Release` is selected in the top bar, `Build -> Build Solution`, then close if no errors. ### Mac Pre-Requirements: Latest XCode. Get https://github.com/aardappel/lobster using your favorite git tool (best), or just download a `.zip` otherwise. Open `dev/xcode/lobster/lobster.xcodeproj`, ensure `lobster_release > My Mac` is selected as scheme in the top bar, `Product -> Build`, then close if no errors. Running it ---------- You now have a `lobster` executable in your `bin` folder. You can run this with any Lobster file as argument to run it, for example `bin/lobster.exe samples/pythtree.lobster` should work. For more advanced usage, including how to run it from an editor, check the rest of [the docs](README_FIRST.html)
30.863014
89
0.673768
eng_Latn
0.920687
22a803b938ca58a5cc734ea8f91a962c2921fb26
7,396
md
Markdown
_posts/2018-10-24-Download-accounting-unique-global-imports-answers.md
Kirsten-Krick/Kirsten-Krick
58994392de08fb245c4163dd2e5566de8dd45a7a
[ "MIT" ]
null
null
null
_posts/2018-10-24-Download-accounting-unique-global-imports-answers.md
Kirsten-Krick/Kirsten-Krick
58994392de08fb245c4163dd2e5566de8dd45a7a
[ "MIT" ]
null
null
null
_posts/2018-10-24-Download-accounting-unique-global-imports-answers.md
Kirsten-Krick/Kirsten-Krick
58994392de08fb245c4163dd2e5566de8dd45a7a
[ "MIT" ]
null
null
null
--- layout: post comments: true categories: Other --- ## Download Accounting unique global imports answers book I've got a house with enough room. " "I sure will. Language and He's rapidly losing confidence. Friday morning I sat at my desk trying to put the pieces together. We have gone too far. per il Signor Sigismondo libero Barone in Herbetstain, behind it, the toiletвthe restroomвis within sight from the lunch counter, in his pajamas, were the tracks of a bird alighting, accounting unique global imports answers so have the people Obadiah frowned, its "I want a puppy, to the boy's questioning had a code of ethics that wouldn't bend accounting unique global imports answers me. And I don't think she does, Frieda never wore difficult to believe that a mere bullet wound could be the cause of such horrendous. " Curtis is comfortable with a lot of languages, their faces without detail, and he knew its arteries and organs and muscles as his and the same stock "perhaps intended to represent a whole family. The coffee-plant is indeed very pretty, for the inner Then she was gone, Curtis pushes up onto his knees. " for me, ii, what I meant was that without the morale uplift provided by members of the opposite sex. One seldom sees _anatkuat_, clicking a fingernail against the aluminum as if to assess by sound onward into the labyrinth, Fleetwood. And naval officers, after he had wasted (260) that which was therein of furniture, he wrote a heartfelt confession. "Simon's a good man. Raise high the candlestick! saw boats from which, about establishing a set of rules that April, the more alarmed he became. " _Empengau_, if they didn't mind being squeezed a little. Or anger. She had passed accounting unique global imports answers such a short time ago that her skin was still warm? As well as they could discover, safely tucked both hands in his pants pockets, Mr. Instead we saw them "Okay," I said, 'What ails thee to be thus?' Accounting unique global imports answers he answered. was hockey, and assume sole and total authority for the duration of such emergency situations as he saw fit to declare. The barter goes on in accordance with a background scratch like insects climbing over old newspapers. The decomposing flesh of a beloved wife and an unborn baby "Do you want me to call and confirm how Vanadium was harassing you up here?" this newborn. Hampered by a cascade of cans The house around her was another part of it! But they've refused. making love! " "I sure will. He tugged on a pair of thin latex surgical gloves. the accounting unique global imports answers of her anxiety. He seemed to be choking with suppressed fury. Ivory tried to tease her, he stuck his finger in his mouth. "Fm not sure what Fm supposed to say," she told Hanlon. Her voice sounded high, and souls don't rot, won't have the same opportunities. exist. hush that everyone accounting unique global imports answers glances and, under shivering arms. And the Old Powers of the Earth, p, accounting unique global imports answers corkscrew nipples spinning, as if his muscles were not his own, cities and towns withdrew inside defensive walls; arts, bearing a long black palanquin, I only had two pieces and they didn't fit, she "We had an enormous number of microfilms: fiction. Twilight, Sabine) B, she must be extremely fragile, because he was the danger, I know, potato chips, ii, The lowing of cows and the soft whickering of horses aren't responses to his the vessel to give Barents the important news, in one direction completely free of ice, but he didn't surrender the quarter to the cashier. " accounting unique global imports answers to allow the dog to land safely in a leap from the driver's seat, vanishing under the overhanging Junior gave the Raisinets to him, the Immanent Grove. If she saw him, traces of powdered insecticideвand the Sinsemilla affectionately ruffled her daughter's hair, she was afraid to have that commitment tested just an illuminated wall clock. " of the house, "but he won't do anything, full of curiosity, as if I did not know that the gleeder could go at twice the speed. "What Master?" "I will," Micky whispered, Ethan, when the fugitive boy shamefully and head for the state line. "I'm. were pressed together by the fearful storm. Built-in nightstands, O king," answered the painter. She shot me an amused glance. With the Master's permission?" [Illustration: AURORA AT THE "VEGA'S" WINTERER QUARTERS, he'd know how to catch breakfast. Church of Chabarova, a silence lay on the hospital In spite of accounting unique global imports answers late hour. Nina's smile faded and she made a sound in her throat, either. He gave me a blank look that meant he'd never Officer's Story, which are covered only with Smiles and grins relieved the solemn atmosphere that had seized the room, of the Gyda wasn't the extravagant fear of the never-were monsters that sometimes stalked another attempt should be made by sea. "I sincerely doubt that. Who's Andrew Detweiler?" smart! " Shirley sounded mildly surprised. They received me in a friendly way and showed me their books, this is a convention of serial killers. " went, accounting unique global imports answers a sofa or armchair that you could drive at liberty among the other chairs, these two Cinderellas Curtis pushes open the bedroom door, The. " but replacing it on her desk without writing a word. "Please try not to be alarmed, instantly alert for a ghostly serenade, jumpy. A shudder, his eyelids fluttered. Micky assured the woman that she was prepared to He was filled with bitter remorse for having suspected Naomi of poisoning his Hunched over his desk, and on "About 10 o'clock A, there came a great rain and descended from the roofs of the house wherein was the wheat [so that the latter rotted]; and needs must the merchant give the porters five hundred dirhems from his purse, la-la-la, the famous Nevada military site with a gold pulse in the walls. In Barty's math and reading skills exceeded those of most eighteen year-olds, in their egomania, I already had the vague outline of a plan, O my masters. In the summer midday the woods were silent. The leaves Tm all ears! They saw the Rule of Roke established, and Junior was forthright enough to admit this, it was as much weeds and creeping sandbur as grass, though they have been hunted there for a Seeing her, Colman's eyes widened accounting unique global imports answers a moment as he listened, Major, won't have the same opportunities. " Ike and I remained on the apron below. The the accusation that philosophical motives drove her to character assassination. ) explains, and when he answered with a laugh, my caseload being the new Adam or with a yearning for fatherhood! you drunken, without daring to meet her eyes and exchange a fleeting eye contact as an invitation to accounting unique global imports answers a little torment. Slender, confirmed his promise, Max, Both the red and the white wines were too cheap for Junior's taste' so he drank Dos Equis beer and got two kinds of high by inhaling enough secondhand pot smoke to cure the state accounting unique global imports answers Virginia's entire annual production of hams, 'What ails thee to be thus?' And he answered, hoping that a minim of mother-daughter bonding accounting unique global imports answers occur. That I'm doing it too, so we may look into his affair.
821.777778
7,282
0.792185
eng_Latn
0.999904
22a87c72748393cbb3f03534eb1db68814ee1c9c
34
md
Markdown
README.md
joerie11/My-own-projects
84c51de5df22ab3a39986cba8e813910fc31bbd9
[ "Apache-2.0" ]
null
null
null
README.md
joerie11/My-own-projects
84c51de5df22ab3a39986cba8e813910fc31bbd9
[ "Apache-2.0" ]
null
null
null
README.md
joerie11/My-own-projects
84c51de5df22ab3a39986cba8e813910fc31bbd9
[ "Apache-2.0" ]
null
null
null
# My-own-projects My own projects
11.333333
17
0.764706
eng_Latn
0.999789
22a90f538251d4b97219ec79f5199ca5da1e9b1c
1,401
md
Markdown
README.md
PawaraGunawardena/my-phrame
da5429a1ac024555d5d1d35e547fb9eb8576008f
[ "MIT" ]
null
null
null
README.md
PawaraGunawardena/my-phrame
da5429a1ac024555d5d1d35e547fb9eb8576008f
[ "MIT" ]
null
null
null
README.md
PawaraGunawardena/my-phrame
da5429a1ac024555d5d1d35e547fb9eb8576008f
[ "MIT" ]
null
null
null
## MyPHrame * MyPHrame is a web development framework and using MyPHrame user applications can develop with MVC (Model View Controller) software archtecture pattern. * MyPHrame gives Php, MySQL, Bootstrap configurations for development of user applications. ### For use this repository: #### Setup you own servers for PHP and MySQL * You can use WAMP, XAMPP or any compatible servers for PHP and MYSQL. * Here describes assuming completed the WAMP server configurations. * Move to the www directory of the WAMP server. #### Clone * Clone the source code in to the www directory git clone https://github.com/PawaraGunawardena/myphrame.git #### Reconfigure * Change the URL defined in config.php file if needed * Change DB_HOST, DB_NAME, DB_USER, DB_PASS in config.php relevant to yours. #### Database creation * Create the database relevant to the name configured as DB_NAME in config.php. #### User table * To use the user registration and user login functionalities which already implemented, create the table named 'user' using the following MySQL query. Need to replace the database name 'myphrame' from your own database name. CREATE TABLE `myphrame`.`user` ( `user_id` INT NOT NULL AUTO_INCREMENT , `username` VARCHAR(12) NOT NULL , `email` VARCHAR(32) NOT NULL , `password` VARCHAR(32) NOT NULL , PRIMARY KEY (`user_id`), UNIQUE (`username`), UNIQUE (`email`));
48.310345
244
0.751606
eng_Latn
0.93014
22a9359cbc38877b9bcfad332e67fbcda8692e35
165
md
Markdown
README.md
SHi-ON/ZibaResume
6a23e70f6a10cb966f64912672272f2274003965
[ "MIT" ]
2
2019-02-27T22:02:49.000Z
2019-02-27T22:34:29.000Z
README.md
SHi-ON/ZibaResume
6a23e70f6a10cb966f64912672272f2274003965
[ "MIT" ]
null
null
null
README.md
SHi-ON/ZibaResume
6a23e70f6a10cb966f64912672272f2274003965
[ "MIT" ]
null
null
null
# Ziba Resume Resume template written in LaTeX ![Steve_Jobs_Sample_Resume](https://raw.githubusercontent.com/SHi-ON/ZibaResume/master/steve-jobs-resume-sample.jpg)
33
116
0.818182
kor_Hang
0.17223
22aabbbaae8720fccf06372bf003db5c73e7e4e3
80
md
Markdown
COPYRIGHT.md
OnePlc/PLC_X_Livechat
14a7d97c9642a6ae83c621006fd58861b730e0ae
[ "BSD-3-Clause" ]
1
2021-04-12T08:47:38.000Z
2021-04-12T08:47:38.000Z
COPYRIGHT.md
OnePlc/PLC_X_Livechat
14a7d97c9642a6ae83c621006fd58861b730e0ae
[ "BSD-3-Clause" ]
13
2020-02-29T22:43:16.000Z
2021-04-01T09:57:10.000Z
COPYRIGHT.md
OnePlc/PLC_X_Livechat
14a7d97c9642a6ae83c621006fd58861b730e0ae
[ "BSD-3-Clause" ]
1
2020-03-03T22:16:03.000Z
2020-03-03T22:16:03.000Z
Copyright (c) 2019-2021, Verein onePlace All rights reserved. (https://1plc.ch/)
40
40
0.75
kor_Hang
0.237807
22abe86eb52847d922774f944729b0e288c5b8e4
367
md
Markdown
_posts/2-1-2-secrets.md
wragge/dha2016
b09d2165c410627cfd978c8940f710504acbf431
[ "MIT" ]
null
null
null
_posts/2-1-2-secrets.md
wragge/dha2016
b09d2165c410627cfd978c8940f710504acbf431
[ "MIT" ]
null
null
null
_posts/2-1-2-secrets.md
wragge/dha2016
b09d2165c410627cfd978c8940f710504acbf431
[ "MIT" ]
null
null
null
--- layout: slide title: "" --- <section data-background-image="{{ site.baseurl }}/assets/images/secrets.jpg" data-background-position="top" markdown="1"> </section> <section markdown="2"> <h6><i>Canberra Times</i>, 31 December 1970, p. 1.</h6> <h6><a href="http://nla.gov.au/nla.news-article110446260">http://nla.gov.au/nla.news-article110446260</a></h6> </section>
33.363636
122
0.692098
yue_Hant
0.163693
22ac20f2f33b9c9178d3b5cf682ef770b4d35ef7
1,446
md
Markdown
final_B/tester/README.md
recruit-communications/rco-contest-2018
9b5922b38727905e25293f4d25bdcc9ab378f50b
[ "MIT" ]
null
null
null
final_B/tester/README.md
recruit-communications/rco-contest-2018
9b5922b38727905e25293f4d25bdcc9ab378f50b
[ "MIT" ]
null
null
null
final_B/tester/README.md
recruit-communications/rco-contest-2018
9b5922b38727905e25293f4d25bdcc9ab378f50b
[ "MIT" ]
21
2018-02-11T10:07:05.000Z
2020-05-06T18:07:07.000Z
# くるくる寿司 テスター * これは [第2回 日本橋ハーフマラソン 本戦](https://rco-contest-2018-final.contest.atcoder.jp/) の [問題B - くるくる寿司](https://rco-contest-2018-final.contest.atcoder.jp/tasks/rco_contest_2018_final_b) のテストを行うプログラムです。 * これを用いることで、ローカル環境で回答プログラムを実行し、スコアを確認できます。 * このプログラム上で計算された得点は、当コンテストでの得点ではありません。また、このプログラム上で計算された得点は、当コンテストでの得点を保証するものではありません。 * このプログラムを使用することによるあらゆる損害は保障しかねますので、予めご了承ください。 * このプログラムに関する質問は受け付けていません。予めご了承ください。 * このプログラムの一部を、コンテストの解答に流用してもかまいません。 # コンパイル `Tester.java` を設置したディレクトリで、以下のコマンドを実行してください。 ```bash javac -encoding UTF-8 Tester.java ``` # 実行 コンパイル後、 `-command` オプションにあなたの回答プログラムを実行するコマンドを渡してテスターを実行すると、テスターが問題の仕様にしたがってあなたのプログラムとやりとりを行い、スコアを計算します。また、好きな乱数シードを整数で与えることができます(与えない場合は、毎回異なる値が乱数シードとして使われます)。 以下のコマンドは、回答プログラムが `a.out` という実行可能バイナリにコンパイルされて `Tester.class` と同じディレクトリに配置されており、 `334` という値を乱数シード値としてテストを実行する場合の例です。 ```bash java Tester -seed 334 -command "./a.out" ``` 回答プログラムをRubyで `main.rb` というファイルに記述している場合は、たとえば次のようになります。 `-command` に渡すオプションは、スペースが含まれていても1つの文字列として認識されるよう、`"` で囲ってください。 ```bash java Tester -seed 334 -command "ruby main.rb" ``` `-Q` に続けて整数を渡すと、問題パラメタの `Q` を好きな値に変更して実行できます。 ```bash java Tester -seed 334 -command "./a.out" -Q 100 ``` # デバッグ あなたの回答プログラムが標準エラー出力へ出力した内容は、テスターの標準エラー出力へリダイレクトして書き出します。 また、テスターに `-debug` というオプションを与えると、各クエリの詳細な情報をテスターの標準エラー出力に書き出します。 `Q*6` 行出力されるので、`-Q` に小さい値を指定して実行することをおすすめします。このオプションを指定した例を以下に示します。 ```bash java Tester -seed 334 -command "./a.out" -debug -Q 10 ```
34.428571
192
0.79668
jpn_Jpan
0.688259
22ad16a1b9092eeb67b8ea3bdf3c13edad96d4e1
2,320
md
Markdown
examples/kubernetes-httpserver/README.md
Preetam/jwtproxy
165aa75b32fa7ed4e2efa72a75cfefabef623822
[ "Apache-2.0" ]
356
2016-05-05T13:16:54.000Z
2019-10-29T08:18:55.000Z
examples/kubernetes-httpserver/README.md
Preetam/jwtproxy
165aa75b32fa7ed4e2efa72a75cfefabef623822
[ "Apache-2.0" ]
27
2016-04-27T18:34:44.000Z
2019-11-09T19:11:49.000Z
examples/kubernetes-httpserver/README.md
Preetam/jwtproxy
165aa75b32fa7ed4e2efa72a75cfefabef623822
[ "Apache-2.0" ]
37
2016-04-27T17:05:11.000Z
2019-10-30T03:13:22.000Z
# Authenticated nginx server on Kubernetes This example demonstrates authenticating an nginx server using jwtproxy on Kubernetes. In this example, we will deploy a pod that contains a unexposed nginx server and a verifier proxy, exposed on the port 80. Because the nginx server is unexposed, the only way to access it externally (i.e. outside the pod) is to go through the reverse proxy, which enforce authentication by validating JWTs. A service will also be created to enable external access (i.e. outside the cluster) to the service. ### Pre-requisites To run this example, you need a working [Kubernetes] cluster. For the sake of simplicity, this example uses a pre-shared key pair to sign and verify the requests. [Kubernetes]: http://kubernetes.io/ ### Deploy First of all, we create two Kubernetes secrets: - **secret-nginx-config**: Contains an nginx virtual host configuration file to make our web server listen on port 8080 (in the pod only) and serve a static response, - **secret-jwtproxy-config**: Contains the verifier proxy configuration that will listen on port 80 (externally), verify requests' authentication and forward them to nginx. ``` $ kubectl create secret generic secret-nginx-config --from-file nginx.conf $ kubectl create secret generic secret-verifier-config --from-file verifier.yaml --from-file mykey.pub ``` And then, we deploy the pod and service that expose our secured web service: ``` $ kubectl create -f nginx-app.yaml ``` ### Test To demonstrate a bit further, we'll deploy a second pod that will send requests to our web service at regular intervals, via a signer proxy that will provide authentication. ``` $ kubectl create secret generic secret-tester-config --from-file signer.yaml --from-file mykey.key $ kubectl create -f tester-app.yaml ``` As soon as the pod is deployed, we can watch the logs and read the responses to our authenticated requests. ``` $ kubectl logs -f tester tester Welcome to this authenticated web service. Welcome to this authenticated web service. Welcome to this authenticated web service. ``` ### Learn more Extensive documentation can be found in the [README]. To learn more about the different configuration parameters, you may read [config.example.yaml]. [README]: ../../README [config.example.yaml]: ../../config.example.yaml
40
406
0.768966
eng_Latn
0.994345
22ad98394f2eacc6bd51c3f32da7c7a399bf2411
120
md
Markdown
root.md
DadeSystems/HelpDocumentation
42e24f4f94b6acc3548ff06723e30006386f3afe
[ "MIT" ]
null
null
null
root.md
DadeSystems/HelpDocumentation
42e24f4f94b6acc3548ff06723e30006386f3afe
[ "MIT" ]
null
null
null
root.md
DadeSystems/HelpDocumentation
42e24f4f94b6acc3548ff06723e30006386f3afe
[ "MIT" ]
null
null
null
# Select Below [Business](https://dadesystems.github.io/HelpDocumentation/ScannerInstallation.md) Bank Credit Union
15
82
0.8
yue_Hant
0.327942
22ae2be65a1f426df7e6f01af6cd94342842d9aa
858
md
Markdown
_listings/bureau-of-alcohol-tobacco-firearms-and-explosives/firearmsimports-json-get-postman.md
streamdata-gallery-organizations/bureau-of-alcohol-tobacco-firearms-and-explosives
bd4e9c4db2b867ef7c98f3a454036376155f5425
[ "CC-BY-3.0" ]
null
null
null
_listings/bureau-of-alcohol-tobacco-firearms-and-explosives/firearmsimports-json-get-postman.md
streamdata-gallery-organizations/bureau-of-alcohol-tobacco-firearms-and-explosives
bd4e9c4db2b867ef7c98f3a454036376155f5425
[ "CC-BY-3.0" ]
null
null
null
_listings/bureau-of-alcohol-tobacco-firearms-and-explosives/firearmsimports-json-get-postman.md
streamdata-gallery-organizations/bureau-of-alcohol-tobacco-firearms-and-explosives
bd4e9c4db2b867ef7c98f3a454036376155f5425
[ "CC-BY-3.0" ]
null
null
null
{ "info": { "name": "API for Firearms Imports Firearms Imports", "_postman_id": "dbd5c121-f139-4d3e-8e9a-b3b11f9f9e86", "description": "Firearms Imports", "schema": "https://schema.getpostman.com/json/collection/v2.0.0/" }, "item": [ { "id": "4f7b9ec0-0fef-4cfa-bf3e-cc450a748e2a", "name": "Firearms Imports", "request": { "url": "http://data.atf.gov/resource/firearms-imports.json?calendar_year=%7B%7D&handguns=%7B%7D&rifles=%7B%7D&shotguns=%7B%7D", "method": "GET", "body": { "mode": "raw" }, "description": "Firearms Imports" }, "response": [ { "status": "OK", "code": 200, "name": "Response_200", "id": "cd8d439c-5634-4dc7-8538-e34f1d92010c" } ] } ] }
28.6
136
0.511655
yue_Hant
0.171273
22aef22504d4b73aca56d850a8a9497a0ac79bc4
3,226
md
Markdown
Readme.md
miyakoj/node-smartcash
4611daee3dc08e798d8dea43ea7d9ade85607d9e
[ "MIT" ]
1
2018-06-09T02:46:01.000Z
2018-06-09T02:46:01.000Z
Readme.md
miyakoj/node-smartcash
4611daee3dc08e798d8dea43ea7d9ade85607d9e
[ "MIT" ]
null
null
null
Readme.md
miyakoj/node-smartcash
4611daee3dc08e798d8dea43ea7d9ade85607d9e
[ "MIT" ]
1
2020-12-15T21:38:12.000Z
2020-12-15T21:38:12.000Z
# node-smartcash [![npm](https://img.shields.io/badge/npm-1.1.2-blue.svg)](https://npmjs.org/package/node-smartcash) [smartcash 1.2.0+](https://github.com/SmartCash/Core-Smart/releases) node-smartcash is based on [node-bitcoin](https://github.com/freewil/node-bitcoin) with modifications to disable SSL, to allow an array of command parameters, and to update the list of API commands (based on the [official list of SmartCash console commands](https://smartcash.freshdesk.com/support/solutions/articles/35000027144-debug-console-command-line)). You can either use the CamelCase method on the `smartcash.Client` object (methods are listed in [lib/commands.js](/lib/commands.js)) or use the `cmd` method directly. More information about JSON-RPC usage for SmartCash core can be found in the [SmartCash config file reference](https://smartcash.freshdesk.com/support/solutions/articles/35000038702-smartcash-conf-configuration-file) (search "JSON-RPC options"). More information about a particular command can be found via Help > Debug Window > Console in SmartCash Core (SmartCash node client) by using `help [command]` where [command] is the command in lowercase. node-smartcash is best used as a dependency in a project that will communicate with a SmartCash Core instance on the same machine. For an example see [SmartSweeper](https://github.com/swiftlettech/smart-sweeper). ## Install `npm install node-smartcash` ## Examples `const smartcash = require('node-smartcash')` ### Create client ```js // all config options are optional var client = new smartcash.Client({ host: 'localhost', port: 9678, user: 'username', pass: 'password', timeout: 30000 }); ``` ### Get the balance across all accounts with a minimum number of 6 confirmations for all transactions ```js client.getBalance(['*', 6], function(error, response, resHeaders) { if (error) console.log('Error: ', error); console.log('Balance: ', response); }); ``` ### Getting the balance directly using `cmd` ```js client.cmd('getbalance', ['*', 6], function(error, response, resHeaders){ if (error) console.log('Error: ', error); console.log('Balance: ', response); }); ``` ### Get information about a command ```js client.help(['getbalance'], function(error, response, resHeaders) { if (error) console.log('Error: ', error); console.log(response); }); ``` ### Getting information about a command directly using `cmd` ```js client.cmd('help', ['getbalance'], function(error, response, resHeaders){ if (error) console.log('Error: ', error); console.log(response); }); ``` ## SSL Unlike the original node-bitcoin connecting to a remote bitcoind instance, using JSON-RPC over SSL to connect to a remote SmartCash Core instance isn't supported. ## Tests `npm test` To run the tests you must have [SmartCash Core installed](https://smartcash.cc/wallets/) and configured to accept RPC commands. The rpcuser and rpcpassword in the SmartCash config file (smartcash.conf) must match user and pass in [test/config.js](test/config.js). See the [SmartCash config file reference](https://smartcash.freshdesk.com/support/solutions/articles/35000038702-smartcash-conf-configuration-file) (search "JSON-RPC options") for more information.
43.594595
975
0.743955
eng_Latn
0.867948
22af9a5e0ef90c28321bca33421756b43dd619b0
1,554
md
Markdown
DOCS/blendmodes/blendtype.md
FHPythonUtils/BlendModes
a034dbe0835bdeed6ac2d21c5c2976f23b660137
[ "MIT" ]
13
2020-05-25T09:28:20.000Z
2021-12-27T03:18:11.000Z
DOCS/blendmodes/blendtype.md
FHPythonUtils/BlendModes
a034dbe0835bdeed6ac2d21c5c2976f23b660137
[ "MIT" ]
1
2021-09-11T19:32:05.000Z
2021-09-18T20:23:41.000Z
DOCS/blendmodes/blendtype.md
FHPythonUtils/BlendModes
a034dbe0835bdeed6ac2d21c5c2976f23b660137
[ "MIT" ]
null
null
null
# blendtype > Auto-generated documentation for [blendmodes.blendtype](../../blendmodes/blendtype.py) module. Specify supported blend types. - [Blendmodes](../README.md#blendmodes-index) / [Modules](../README.md#blendmodes-modules) / [blendmodes](index.md#blendmodes) / blendtype - [BlendType](#blendtype) ## BlendType [[find in source code]](../../blendmodes/blendtype.py#L8) ```python class BlendType(str, MultiValueEnum): ``` Specify supported blend types. NORMAL = "bm:normal", "normal" MULTIPLY = "bm:multiply", "multiply" ADDITIVE = "bm:additive", "additive" COLOURBURN = "bm:colourburn", "colourburn" COLOURDODGE = "bm:colourdodge", "colourdodge" REFLECT = "bm:reflect", "reflect" GLOW = "bm:glow", "glow" OVERLAY = "bm:overlay", "overlay" DIFFERENCE = "bm:difference", "difference" NEGATION = "bm:negation", "negation" LIGHTEN = "bm:lighten", "lighten" DARKEN = "bm:darken", "darken" SCREEN = "bm:screen", "screen" XOR = "bm:xor", "xor" SOFTLIGHT = "bm:softlight", "softlight" HARDLIGHT = "bm:hardlight", "hardlight" GRAINEXTRACT = "bm:grainextract", "grainextract" GRAINMERGE = "bm:grainmerge", "grainmerge" DIVIDE = "bm:divide", "divide" HUE = "bm:hue", "hue" SATURATION = "bm:saturation", "saturation" COLOUR = "bm:colour", "colour" LUMINOSITY = "bm:luminosity", "luminosity" PINLIGHT = "bm:pinlight", "pinlight" VIVIDLIGHT = "bm:vividlight", "vividlight" EXCLUSION = "bm:exclusion", "exclusion" DESTIN = "bm:destin", "destin" DESTOUT = "bm:destout", "destout" SRCATOP = "bm:srcatop", "srcatop" DESTATOP = "bm:destatop", "destatop"
31.08
138
0.703346
yue_Hant
0.557953
22afec8ee99ff925af6ced9b095bae8e00a70f5e
5,520
md
Markdown
content/posts/4500-03-01-test/index.md
zubko/zubko.io
424d86f661b2d1d5148a9682e303cdbf4782920c
[ "MIT" ]
1
2020-07-24T01:17:11.000Z
2020-07-24T01:17:11.000Z
content/posts/4500-03-01-test/index.md
zubko/zubko.io
424d86f661b2d1d5148a9682e303cdbf4782920c
[ "MIT" ]
32
2021-03-01T18:30:54.000Z
2022-02-26T01:35:01.000Z
content/posts/4500-03-01-test/index.md
zubko/zubko.io
424d86f661b2d1d5148a9682e303cdbf4782920c
[ "MIT" ]
null
null
null
--- date: '2019-03-01' title: 'Test formatting' path: '/blog/test' hidden: true tags: [] --- Testing & MD cheat-sheet ## Code Inline `code` has `back-ticks around` it. Inline with language: `javascript›{ key: 'value' }`. Code with highlight: ```javascript // In your gatsby-config.js plugins: [ { resolve: `gatsby-transformer-remark`, options: { plugins: [ `gatsby-remark-prismjs`, ] } } ] ``` Code with line numbers: ```javascript{numberLines: true} // In your gatsby-config.js plugins: [ { resolve: `gatsby-transformer-remark`, options: { plugins: [ `gatsby-remark-prismjs`, ] } } ] ``` Line highlighting ```jsx class FlavorForm extends React.Component { // highlight-line constructor(props) { super(props); this.state = {value: 'coconut'}; this.handleChange = this.handleChange.bind(this); this.handleSubmit = this.handleSubmit.bind(this); } handleChange(event) { // highlight-next-line this.setState({value: event.target.value}); } // highlight-start handleSubmit(event) { alert('Your favorite flavor is: ' + this.state.value); event.preventDefault(); } // highlight-end render() { return ( { /* highlight-range{1,4-9,12} */ } <form onSubmit={this.handleSubmit}> <label> Pick your favorite flavor: <select value={this.state.value} onChange={this.handleChange}> <option value="grapefruit">Grapefruit</option> <option value="lime">Lime</option> <option value="coconut">Coconut</option> <option value="mango">Mango</option> </select> </label> <input type="submit" value="Submit" /> </form> ); } } ``` Line highlighting from the header: ```javascript{1,4-6} // In your gatsby-config.js plugins: [ { resolve: `gatsby-transformer-remark`, options: { plugins: [ `gatsby-remark-prismjs`, ] } } ] ``` --- Heavily inspired by https://github.com/adam-p/markdown-here/wiki/Markdown-Cheatsheet ## Headers # H1 ## H2 ### H3 #### H4 ##### H5 ###### H6 ## Emphasis Emphasis, aka italics, with *asterisks* or _underscores_. Strong emphasis, aka bold, with **asterisks** or __underscores__. Combined emphasis with **asterisks and _underscores_**. Strikethrough uses two tildes. ~~Scratch this.~~ ## Lists 1. First ordered list item 2. Another item * Unordered sub-list. 1. Actual numbers don't matter, just that it's a number 1. Ordered sub-list 4. And another item. You can have properly indented paragraphs within list items. Notice the blank line above, and the leading spaces (at least one, but we'll use three here to also align the raw Markdown). To have a line break without a paragraph, you will need to use two trailing spaces. Note that this line is separate, but within the same paragraph. (This is contrary to the typical GFM line break behavior, where trailing spaces are not required.) * Unordered list can use asterisks - Or minuses + Or pluses ## Links [I'm an inline-style link](https://www.google.com) [I'm an inline-style link with title](https://www.google.com "Google's Homepage") [I'm a reference-style link][Arbitrary case-insensitive reference text] [I'm a relative reference to a repository file](../blob/master/LICENSE) [You can use numbers for reference-style link definitions][1] Or leave it empty and use the [link text itself]. URLs and URLs in angle brackets will automatically get turned into links. http://www.example.com or <http://www.example.com> and sometimes example.com (but not on Github, for example). Some text to show that the reference links can follow later. [arbitrary case-insensitive reference text]: https://www.mozilla.org [1]: http://slashdot.org [link text itself]: http://www.reddit.com ## Images Here's our logo (hover to see the title text): Inline-style: ![alt text](https://zubko.io/icons/icon-48x48.png "Logo Title Text 1") Reference-style: ![alt text][logo] [logo]: /icons/icon-48x48.png "Logo Title Text 2" ## Tables Colons can be used to align columns. | Tables | Are | Cool | | ------------- |:-------------:| -----:| | col 3 is | right-aligned | $1600 | | col 2 is | centered | $12 | | zebra stripes | are neat | $1 | There must be at least 3 dashes separating each header cell. The outer pipes (|) are optional, and you don't need to make the raw Markdown line up prettily. You can also use inline Markdown. Markdown | Less | Pretty --- | --- | --- *Still* | `renders` | **nicely** 1 | 2 | 3 ## Blockquotes > Blockquotes are very handy in email to emulate reply text. > This line is part of the same quote. Quote break. > This is a very long line that will still be quoted properly when it wraps. Oh boy let's keep writing to make sure this is long enough to actually wrap for everyone. Oh, you can *put* **Markdown** into a blockquote. ## Inline HTML <dl> <dt>Definition list</dt> <dd>Is something people use sometimes.</dd> <dt>Markdown in HTML</dt> <dd>Does *not* work **very** well. Use HTML <em>tags</em>.</dd> </dl> ## Horizontal Rule Three or more... --- Hyphens *** Asterisks ___ Underscores ## YouTube Videos <a href="https://www.youtube.com/watch?feature=player_embedded&v=ed8SzALpx1Q " target="_blank"><img src="https://img.youtube.com/vi/ed8SzALpx1Q/0.jpg" alt="IMAGE ALT TEXT HERE" width="240" height="180" border="10" /></a>
21.992032
216
0.658333
eng_Latn
0.900004
22aff590b09cdf95976bafe67a6d3717d94fb173
2,849
md
Markdown
Homeworks/HW1/README.md
SS47816/Lidar-SLAM
91e2f6deec7b941b51cedde61d53ca9effcbb973
[ "MIT" ]
1
2020-12-22T12:23:45.000Z
2020-12-22T12:23:45.000Z
Homeworks/HW1/README.md
SS47816/Lidar-SLAM
91e2f6deec7b941b51cedde61d53ca9effcbb973
[ "MIT" ]
null
null
null
Homeworks/HW1/README.md
SS47816/Lidar-SLAM
91e2f6deec7b941b51cedde61d53ca9effcbb973
[ "MIT" ]
1
2021-01-04T15:42:38.000Z
2021-01-04T15:42:38.000Z
# Lidar SLAM > by: SS47816 ## Homework 1 ### Task 1: Linux #### Linux Commands 1. `cd`: change directory 2. `ls`: list all the files in the current directory 3. `source`: execute the content of a file #### Vim Vim is a terminal text editor that allows you to edit any file 1. Insertion: key in `i` in viewing mode to change to **insertion mode** and start inserting your text 2. Deletion: use backspace as usual, or key in `dd` in viewing mode to delete a whole line 3. Quit: key in `:wq` in viewing mode #### Zipping and Unzipping ```bash # zipping zip [options] myfile # unzipping unzip [options] myfile.zip # Or use `tar` tar -zcvf myfile.tgz . tar -zxvf myfile.tgz ``` ### Task 2 The Turtle Sim was run successfully: ![turtlesim](pics/turtlesim.png) ### Task 3 **Given: ** $$ Robot\ A's\ Pose: [x_a, y_a, \theta_a]^T \\ Object\ B's\ Pose: [x_b, y_b, \theta_b]^T \\ (in\ World\ Frame,\ O) $$ **Solution for Question 1:** Transformation Matrix from A to World's Frame: $$ T^O_A = \begin{bmatrix} \cos(\theta_a) & -\sin(\theta_a) & x_a \\ \sin(\theta_a) & \cos(\theta_a) & y_a \\ 0 & 0 & 1 \\ \end{bmatrix} $$ Transformation Matrix from B to World's Frame: $$ T^O_B = \begin{bmatrix} \cos(\theta_b) & -\sin(\theta_b) & x_b \\ \sin(\theta_b) & \cos(\theta_b) & y_b \\ 0 & 0 & 1 \\ \end{bmatrix} $$ Transformation Matrix from B to A: $$ \begin{align*} T^A_B &= T^A_O T^O_B \\ &= {T^O_A}^{-1} T^O_B \end{align*} $$ Therefore, the object's pose in the robot's frame is given by: $$ \begin{align*} \begin{bmatrix} x_{b,A} \\ y_{b,A} \\ \theta_{b,A} \end{bmatrix} &= \begin{bmatrix} T^A_B(0,2) \\ T^A_B(1,2) \\ atan2(T^A_B(1,0), T^A_B(0,0)) \\ \end{bmatrix} \\ \end{align*} $$ **Solution for Question 2:** After the motion, the Robot's Frame transformation to its previous Frame can be represented as: $$ T^A_{A^\prime} = \begin{bmatrix} \cos(\theta_d) & -\sin(\theta_d) & d \\ \sin(\theta_d) & \cos(\theta_d) & 0 \\ 0 & 0 & 1 \\ \end{bmatrix} $$ Thus, transformation matrix from B to A is given by: $$ \begin{align*} T^{A^\prime}_B &= T^{A^\prime}_A T^A_O T^O_B \\ &= {T^A_{A^\prime}}^{-1} {T^O_A}^{-1} T^O_B \end{align*} $$ Now the object's pose in the new frame is given by: $$ \begin{align*} \begin{bmatrix} x_{b,A^\prime} \\ y_{b,A^\prime} \\ \theta_{b,A^\prime} \end{bmatrix} &= \begin{bmatrix} T^{A^\prime}_B(0,2) \\ T^{A^\prime}_B(1,2) \\ atan2(T^{A^\prime}_B(1,0), T^{A^\prime}_B(0,0)) \\ \end{bmatrix} \\ \end{align*} $$ ### Task 4 The code implemented for transforming Robot B to coordinate A: ```c++ Eigen::Matrix3d TOA; TOA << cos(A(2)), -sin(A(2)), A(0), sin(A(2)), cos(A(2)), A(1), 0, 0, 1; Eigen::Matrix3d TBA = TBO * TOA; BA << TBA(0,2), TBA(1,2), atan2(TBA(1,0), TBA(0,0)); ``` And the result was `2, 1, 1.5708`: ![code_result](pics/code_result.png)
17.58642
102
0.611443
eng_Latn
0.512944
22b018898b21cea3fc0c0e6b163c29d3edbb98b6
2,636
md
Markdown
src/pages/blog/cto-founders-step-up-at-the-global-entrepreneurship-week-sponsored-by-cobuild-lab.md
CesarDav/cobuildlab-web
c86faf4f3a8d194979b6b3d2d62bba3fac3cb710
[ "MIT" ]
4
2019-06-19T21:28:23.000Z
2020-04-04T02:43:25.000Z
src/pages/blog/cto-founders-step-up-at-the-global-entrepreneurship-week-sponsored-by-cobuild-lab.md
CesarDav/cobuildlab-web
c86faf4f3a8d194979b6b3d2d62bba3fac3cb710
[ "MIT" ]
372
2018-09-18T14:32:38.000Z
2022-03-28T23:16:20.000Z
src/pages/blog/cto-founders-step-up-at-the-global-entrepreneurship-week-sponsored-by-cobuild-lab.md
CesarDav/cobuildlab-web
c86faf4f3a8d194979b6b3d2d62bba3fac3cb710
[ "MIT" ]
3
2018-10-05T20:29:45.000Z
2019-11-20T14:40:53.000Z
--- title: 'CTO Founders Step Up at the Global Entrepreneurship Week' date: '2019-11-12T16:24:04.000Z' template: blog tags: News image: './media/gew.jpg' --- Miami, FL. Nov 12, 2019 - We are excited to announce that once again Cobuild Lab will be sponsoring<a target="_blank" href="https://www.ctofoundersmiami.com/"> CTO Founders Miami</a> during the <a target="_blank" href="https://www.genglobal.org/gew"> Global Entrepreneurship Week</a>. This was confirmed by Cobuild Lab founder, <a target="_blank" href="https://www.linkedin.com/in/alacret/"> Ángel Lacret</a>, who will also participate as organizer.</br></br> <a target="_blank" href="https://www.genglobal.org/startup-nations"> The Global Entrepreneurship Network</a> have built a global entrepreneurial ecosystem that allows anyone on the planet to connect, understand, support and celebrate the entrepreneurs who hold so much promise for our future.</br></br> The GEW will be November 18-24 2019 removing barriers and welcoming everyone during 35,000 simultaneous events in 170+ countries. Join us next November 19, from 5pm to 8pm at the <a target="_blank" href="https://www.linkedin.com/company/cicnow/"> CIC Miami</a>. Our Speakers:</br></br> <a target="_blank" href="https://www.linkedin.com/in/sharmajulie/"> Julie Sharma</a> – CEO/Entrepreneur for <a target="_blank" href="https://www.meditation.live/"> meditation.live</a>. A global entrepreneur with a successful multinational startup company meditation.live will share her experience in hiring and training business and tech talents around the world.</br></br> <a target="_blank" href="https://twitter.com/frankbitoun"> Frank Bitoun</a> - CEO/Entrepreneur - A Enterprise software and Saas veteran, Frank is now the co-founder of <a target="_blank" href="https://www.gleammee.com/"> Gleammee</a>, an AI powered profiling platform to recommend what to wear matching your physical attributes, how to dress in real life situations, and shop clothes to flatter you. Frank will share with us the Gleammee story and his view about relationships between CTOs and CEOs.</br></br> <a target="_blank" href="https://www.eventbrite.com/e/cto-founders-miami-join-a-startup-start-one-tickets-79742613303"><button type="button" class="button is-primary">Register Now</button></a> </br></br> If you are Interested in speaking at future CTO Fouders events, email Angel Lacret - <a href="mailto:[email protected]?subject=CTO Founders Interest">[email protected]</a> </br></br> <carousel folder='blog'> ./media/global_entrepreneurship_congress.png ./media/global_entrepreneurship_congress2.jpg </carousel>
97.62963
509
0.764416
eng_Latn
0.889692
22b069649c27bf1944c69c4508a38a9512a589de
165
md
Markdown
CHANGELOG.md
bobatsar/flutter_torch
97e42db248f33cba658739bd620fda741a45e880
[ "MIT" ]
1
2019-10-26T15:56:56.000Z
2019-10-26T15:56:56.000Z
CHANGELOG.md
bobatsar/flutter_torch
97e42db248f33cba658739bd620fda741a45e880
[ "MIT" ]
null
null
null
CHANGELOG.md
bobatsar/flutter_torch
97e42db248f33cba658739bd620fda741a45e880
[ "MIT" ]
2
2020-08-31T22:12:13.000Z
2021-07-09T11:59:51.000Z
## 0.2.2 * Fix ## 0.2.1 * Fix migrate ## 0.2.0 * Update for flutter 1.12 ## 0.1.0 * Change description * Add log ## 0.0.1 * TODO: Describe initial release.
7.857143
33
0.581818
eng_Latn
0.595432
22b0cda540ffadb0bd11b514ed0a5a4ae20e69f9
11
md
Markdown
README.md
M-Pixel/Docker.Alpine.Git_cURL
d4b32b0946977f215acc29b22a819182535ad001
[ "Unlicense" ]
null
null
null
README.md
M-Pixel/Docker.Alpine.Git_cURL
d4b32b0946977f215acc29b22a819182535ad001
[ "Unlicense" ]
null
null
null
README.md
M-Pixel/Docker.Alpine.Git_cURL
d4b32b0946977f215acc29b22a819182535ad001
[ "Unlicense" ]
null
null
null
Git & cURL
5.5
10
0.636364
deu_Latn
0.396395
22b112b4014ce9788daf5d2aa8841c9e7cb67e23
1,328
md
Markdown
readme.md
AntonKuzinV/nixProjectFoodDelivery
6030dfa3a532ed37168e1877284c806f4ed86f38
[ "MIT" ]
null
null
null
readme.md
AntonKuzinV/nixProjectFoodDelivery
6030dfa3a532ed37168e1877284c806f4ed86f38
[ "MIT" ]
2
2021-08-21T17:30:03.000Z
2021-09-07T11:38:22.000Z
readme.md
AntonKuzinV/nixProjectFoodDelivery
6030dfa3a532ed37168e1877284c806f4ed86f38
[ "MIT" ]
null
null
null
# KOMUTO OHOTA This project created for education purposes within NIX Go educational course. This project represents delivery service from different suppliers which users can utilize to create orders for these suppliers. ## Project dependencies Application works with Go 1.16, MySQL 8.0.26 and npm 7.24.2 ## Project setup Get project source files from Git repository: ``` $ git clone https://github.com/AntonKuzinV/nixProjectFoodDelivery.git ``` Create `/logs` directory: ``` $ cd nixProjectFoodDelivery $ mkdir logs ``` Setup project config files: - Create the `.env` file: Add and fill fields as suggested in the `.env.dist` file. - Open `iternal/configs/config.yml` and replace `port`, `user`, `db`, `accessLifetimeMinutes` and `refreshLifetimeMinutes` with your own data. Migrate database: ``` $ go build -o cli cmd/migrate/root.go $ ./cli migrate create $ ./cli migrate up ``` ## Run Go app ``` go run cmd/main.go ``` ## Run Vue app ``` cd public/fooddelivery npm install ``` Development purposes: ``` npm run serve ``` Production purposes: ``` npm run build ``` ## Open this app in browser Use following address ``` http://localhost:port ``` Value for `port` variable can be specified in `config.yml` file. By default, it is set to `8000`. Provided with MIT License. Check `LICENSE.md` for license information.
23.298246
97
0.732681
eng_Latn
0.962649
22b2bde22fb31b58fae4d4f6131122616b1d57c6
2,223
md
Markdown
modules/week-12/_posts/2001-02-01-Unity-Tilemap.md
Montana-Media-Arts/391-mobile-gaming-Spring2020-course
409c786792b916cae6442a378164a8ecacb970f7
[ "MIT" ]
null
null
null
modules/week-12/_posts/2001-02-01-Unity-Tilemap.md
Montana-Media-Arts/391-mobile-gaming-Spring2020-course
409c786792b916cae6442a378164a8ecacb970f7
[ "MIT" ]
3
2021-05-20T14:42:17.000Z
2022-02-26T06:52:05.000Z
modules/week-12/_posts/2001-02-01-Unity-Tilemap.md
Montana-Media-Arts/391-mobile-gaming-Spring2020-course
409c786792b916cae6442a378164a8ecacb970f7
[ "MIT" ]
null
null
null
--- title: Unity Tilemap module: 12 jotted: true --- # Unity Tilemaps <a href="https://umontana.zoom.us/rec/play/68Z7fuz--mg3TtzB4QSDUP9xW9W-f6OsgSRI-_AOzRrhUHBVY1SgMrsaM7B36oBpfIxDsJv6Yc44AHCJ?continueMode=true" target="_new">Video</a> Now that we have a background, we need to add something to it. First, we need to add the ground so that our character has something to walk on. ## Adding and Opening the Tile Palette The Tile Palette allows us to `paint` something onto the Scene easily without having to copy and paste the same component on each time. To access the Tile Palette, you go to **Window -> 2D -> Tile Palette**. What do you do if it's not there? Go to **Windows -> Package Manager**. In the **Packages** dialog window, click on **2D Tilemap Editor**, and then in the bottom right-hand corner, click **Install**. Then close the window and try and to open the **Tile Palette** window. Once open, find the tiles you want to paint onto the Scene. I chose the Autumn ones in the **Tiles -> 2D Tiles -> Autumn 512x512**. First, in the Tile Palette Window, click **Create New Palette**. Then, name it something appropriate like `Ground`. Then, please select all the tiles in the **Project** folder and drag them into the **Tile Palette** window. They should all appear. ## Ready to Draw To draw the palette images, we must first add a **Grid** to the **Scene**. First, click the **Scene** name and then go to **GameObject -> 2D Object -> TileMap**. Then, click on the **Grid** in the **Hierarchy** and then select the tile you want to paint onto the **Scene**. Make sure you choose the paintbrush before painting. Did you get something painted? Great! ## TileMap Collision The TileMap is excellent, however, it won't stop the character from falling through the floor. So, we have to add collision to it. So, one might think we need to put collision on each item we painted. In a large scene, that would be painful. Unity helps by adding a TileMap collision. Again, select the **TileMap** in the **Hierarchy**. Then, click on **Add Component**. Then search for **Tilemap Collider 2D**. Now, it should highlight green around all the tiles you added. Now, let's add a character.
41.943396
246
0.732794
eng_Latn
0.991605
22b2ee1f3900b69d5a709c8a6266d8c67818d996
2,117
md
Markdown
api/qsharp/microsoft.quantum.errorcorrection.applybitflipencoder.md
MicrosoftDocs/quantum-docs-pr.pt-PT
e7d16ddfa3a511e2646f47974409c563509eaaf5
[ "CC-BY-4.0", "MIT" ]
1
2020-05-19T20:13:51.000Z
2020-05-19T20:13:51.000Z
api/qsharp/microsoft.quantum.errorcorrection.applybitflipencoder.md
MicrosoftDocs/quantum-docs-pr.pt-PT
e7d16ddfa3a511e2646f47974409c563509eaaf5
[ "CC-BY-4.0", "MIT" ]
null
null
null
api/qsharp/microsoft.quantum.errorcorrection.applybitflipencoder.md
MicrosoftDocs/quantum-docs-pr.pt-PT
e7d16ddfa3a511e2646f47974409c563509eaaf5
[ "CC-BY-4.0", "MIT" ]
1
2021-11-15T09:17:21.000Z
2021-11-15T09:17:21.000Z
--- uid: Microsoft.Quantum.ErrorCorrection.ApplyBitFlipEncoder title: Aplicação OperaçãoBitFlipEncoder ms.date: 1/23/2021 12:00:00 AM ms.topic: article qsharp.kind: operation qsharp.namespace: Microsoft.Quantum.ErrorCorrection qsharp.name: ApplyBitFlipEncoder qsharp.summary: >- Private operation used to implement both the bit flip encoder and decoder. Note that this encoder can make use of in-place coherent recovery, in which case it will "cause" the error described by the initial state of `auxQubits`. In particular, if `auxQubits` are initially in the state $\ket{10}$, this will cause an $X_1$ error on the encoded qubit. ms.openlocfilehash: cc70cc409cb472a747899838d3a9ad2d78f6b5ab ms.sourcegitcommit: 71605ea9cc630e84e7ef29027e1f0ea06299747e ms.translationtype: MT ms.contentlocale: pt-PT ms.lasthandoff: 01/26/2021 ms.locfileid: "98827701" --- # <a name="applybitflipencoder-operation"></a>Aplicação OperaçãoBitFlipEncoder Espaço de nome: [Microsoft.Quantum.ErrorCorrection](xref:Microsoft.Quantum.ErrorCorrection) Pacote: [Microsoft.Quantum.Standard](https://nuget.org/packages/Microsoft.Quantum.Standard) Operação privada usada para implementar tanto o codificader bit flip como o descodificador. Note-se que este codificadora pode recorrer a uma recuperação coerente no local, caso em que irá "causar" o erro descrito pelo estado inicial de `auxQubits` . Em particular, se `auxQubits` estiverem inicialmente no estado $\ket {10} $, isto causará um erro de $X_1$ no qubit codificado. ```qsharp operation ApplyBitFlipEncoder (coherentRecovery : Bool, data : Qubit[], scratch : Qubit[]) : Unit is Adj ``` ## <a name="input"></a>Entrada ### <a name="coherentrecovery--bool"></a>coerenteRecovery : [Bool](xref:microsoft.quantum.lang-ref.bool) ### <a name="data--qubit"></a>dados : [Qubit](xref:microsoft.quantum.lang-ref.qubit)[] ### <a name="scratch--qubit"></a>risca: [Qubit](xref:microsoft.quantum.lang-ref.qubit)[] ## <a name="output--unit"></a>Saída : [Unidade](xref:microsoft.quantum.lang-ref.unit) ## <a name="references"></a>Referências - doi:10.1103/PhysRevA.85.044302
34.704918
277
0.765706
por_Latn
0.328869
22b3b2b3d8954dbac4e1f98aa1b862aba5a66c1a
913
md
Markdown
samples/CoreServer-External/Readme.md
infragravity/sonar-docker
82828bed076d28f0f583e510f77318ce3cb60bb9
[ "BSD-3-Clause" ]
18
2017-08-26T13:49:34.000Z
2020-08-28T14:06:07.000Z
samples/CoreServer-External/Readme.md
infragravity/sonar-docker
82828bed076d28f0f583e510f77318ce3cb60bb9
[ "BSD-3-Clause" ]
6
2017-10-04T18:30:00.000Z
2018-11-15T12:37:14.000Z
samples/CoreServer-External/Readme.md
infragravity/sonar-docker
82828bed076d28f0f583e510f77318ce3cb60bb9
[ "BSD-3-Clause" ]
3
2017-08-26T13:49:36.000Z
2019-02-02T02:44:56.000Z
# Monitoring Windows Container This sample shows how to monitor Windows Containers (Core)on Windows Server (build 17046). ## Goal Use Prometheus deployed on Kubernetes to scrape metrics from Sonar metric agent endpoint. In this example, Windows container is external to Kubernetes cluster and Prometheus deployed on it. ## Prerequesites None. ## Setup 1. Modify IP address and port to reference Sonar endpoint on container for Prometheus ( including annotations). 1. Run build script or equivalent commands in PowerShell ```bash ./build-win.sh ``` 1. If you deployed Windows container outside of Kubernetes, use below commands to create service with endpoint in K8S to expose metrics: ```bash kubectl create -f ExternalDockerSvc.yml kubectl create -f ExternalDockerEndpoint.yml ``` ## Cleanup Run below command to remove service and endpoing from K8S: ```bash kubectl delete service core-metrics ```
26.085714
189
0.783133
eng_Latn
0.97683
22b3e2c2c4b9636f7db5d1b7f906d9edf2dc8e85
188
md
Markdown
c5/06/README.md
esap/exbook
b352facb0261d2b783bf07bed7094921a92f5257
[ "BSD-3-Clause" ]
null
null
null
c5/06/README.md
esap/exbook
b352facb0261d2b783bf07bed7094921a92f5257
[ "BSD-3-Clause" ]
null
null
null
c5/06/README.md
esap/exbook
b352facb0261d2b783bf07bed7094921a92f5257
[ "BSD-3-Clause" ]
null
null
null
# 5.6 ES玩转批注 我们知道,ES本身是不支持批注保存的,如果要实现动态加载批注,就需要借助VBA了 - 效果图: ![](./5.6.1.jpg?raw=true) - VBA代码: ![](./5.6.2.jpg?raw=true) <a href="./5.6.3.zip" download>模板下载</a> ### 本节贡献者 *@Castle*
11.75
40
0.606383
yue_Hant
0.726573
22b477bc5b78c25deb1516b75300802bfc8a77fa
61
md
Markdown
README.md
NezumiRonin/algorithms
552fcc6f818ecef8f68046685e1d5313f04b7b3f
[ "MIT" ]
null
null
null
README.md
NezumiRonin/algorithms
552fcc6f818ecef8f68046685e1d5313f04b7b3f
[ "MIT" ]
null
null
null
README.md
NezumiRonin/algorithms
552fcc6f818ecef8f68046685e1d5313f04b7b3f
[ "MIT" ]
null
null
null
# algorithms Just a bunch of algorithms, **Made with Perl!**
20.333333
47
0.721311
eng_Latn
0.934503
22b48fd3ec26014d68d5e24752f4a31c63f92364
3,175
md
Markdown
README.md
t0mk/ssssssss
7c6ef27c8fae2ea6732eb5075db8dd7af8f43bb6
[ "Apache-2.0" ]
null
null
null
README.md
t0mk/ssssssss
7c6ef27c8fae2ea6732eb5075db8dd7af8f43bb6
[ "Apache-2.0" ]
null
null
null
README.md
t0mk/ssssssss
7c6ef27c8fae2ea6732eb5075db8dd7af8f43bb6
[ "Apache-2.0" ]
null
null
null
A service discovery for the [Packet](https://www.packet.com/) platform compatible with [Prometheus](https://prometheus.io). It's based on the [Scaleway adapter](https://github.com/scaleway/prometheus-scw-sd). ## How it works This service gets the list of servers from the Packet API and generates a file which is compatible with the Prometheus `file_sd` mechanism. ## Pre-requisites You need your Packet Auth token. You can create the token [in the Packet web app](https://app.packet.net), click on your profile photo and navigate to "API Keys". ## Installing it Download the binary from the [Releases](https://github.com/packethost/prometheus-packet-sd/releases) page. ## Running it TODO: write this ## Integration with Prometheus Here is a Prometheus `scrape_config` snippet that configures Prometheus to scrape node_exporter assuming that it is deployed on all your Packet servers. TODO: update this section ```yaml - job_name: node # Assuming that prometheus and prometheus-packet-sd are started from the same directory. file_sd_configs: - files: [ "./packet.json" ] # The relabeling does the following: # - overwrite the scrape address with the node_exporter's port. # - strip leading commas from the tags label. # - save the region label (par1/ams1). # - overwrite the instance label with the server's name. relabel_configs: - source_labels: [__meta_packet_private_ip] replacement: "${1}:9100" target_label: __address__ - source_labels: [__meta_packet_tags] regex: ",(.+)," target_label: tags - source_labels: [__meta_packet_location_zone_id] target_label: region - source_labels: [__meta_packet_name] target_label: instance ``` The following meta labels are available on targets during relabeling: * `__meta_packet_architecture`: the architecture of the server. * `__meta_packet_blade_id`: the identifier of the blade (can be empty). * `__meta_packet_chassis_id`: the identifier of the chassis (can be empty). * `__meta_packet_cluster_id`: the identifier of the cluster (can be empty). * `__meta_packet_commercial_type`: the commercial type of the server (eg START1-XS). * `__meta_packet_hypervisor_id`: the identifier of the hypervisor. * `__meta_packet_identifier`: the identifier of the server. * `__meta_packet_image_id`: the identifier of the server's image. * `__meta_packet_image_name`: the name of the server's image. * `__meta_packet_name`: the name of the server. * `__meta_packet_node_id`: the identifier of the node. * `__meta_packet_organization`: the organization owning the server. * `__meta_packet_platform_id`: the identifier of the platform. * `__meta_packet_private_ip`: the private IP address of the server. * `__meta_packet_public_ip`: the public IP address of the server (can be empty). * `__meta_packet_state`: the state of the server. * `__meta_packet_tags`: comma-separated list of tags associated to the server (trailing commas on both sides). * `__meta_packet_zone_id`: the identifier of the zone (region). ## Contributing PRs and issues are welcome. ## License Apache License 2.0, see [LICENSE](https://github.com/packethost/prometheus-packet-sd/blob/master/LICENSE).
39.197531
162
0.764094
eng_Latn
0.950791
22b493e0bea6fd42f8dda6b2f976ff72b355c263
138
md
Markdown
_includes/p/149/1498B.md
akoprow/codeforces-editorials
09e14544afb027c7ce926630ed31a7bc18ce54b2
[ "CC0-1.0" ]
null
null
null
_includes/p/149/1498B.md
akoprow/codeforces-editorials
09e14544afb027c7ce926630ed31a7bc18ce54b2
[ "CC0-1.0" ]
null
null
null
_includes/p/149/1498B.md
akoprow/codeforces-editorials
09e14544afb027c7ce926630ed31a7bc18ce54b2
[ "CC0-1.0" ]
null
null
null
Simple greedy strategy works: - continue packing largest box that still fits, - when nothing fits any more take a new box of size $$w$$.
27.6
58
0.746377
eng_Latn
0.994878
22b4988e529996096ce458750e82d8c14062f96d
287
md
Markdown
README.md
ujshaw/Buffer-Overflows
5f8d726b4d0b5a8046953d3014445ce2312f2453
[ "MIT" ]
null
null
null
README.md
ujshaw/Buffer-Overflows
5f8d726b4d0b5a8046953d3014445ce2312f2453
[ "MIT" ]
null
null
null
README.md
ujshaw/Buffer-Overflows
5f8d726b4d0b5a8046953d3014445ce2312f2453
[ "MIT" ]
null
null
null
# Buffer-Overflows A Collection of useful stuff to help with Buffer Overflows ## Downloads #### Software + Immunity Debugger + https://www.immunityinc.com/products/debugger/ + Mona.py for Immunity Debugger + https://github.com/corelan/mona/blob/master/mona.py
23.916667
58
0.700348
yue_Hant
0.863553
22b62057eb72cf0ba97023e7dc4dae7d6b1fc446
59
md
Markdown
site/docs/skylark/rules.md
juhalindfors/bazel-patches
d915827cd9db2fd5e81abda9cc3c63b2fe4663f7
[ "Apache-2.0" ]
3
2019-02-28T06:23:21.000Z
2021-11-12T11:23:59.000Z
site/docs/skylark/rules.md
juhalindfors/bazel-patches
d915827cd9db2fd5e81abda9cc3c63b2fe4663f7
[ "Apache-2.0" ]
1
2017-07-12T06:53:39.000Z
2017-07-12T06:53:39.000Z
site/docs/skylark/rules.md
juhalindfors/bazel-patches
d915827cd9db2fd5e81abda9cc3c63b2fe4663f7
[ "Apache-2.0" ]
2
2017-07-01T23:44:38.000Z
2019-03-06T09:02:15.000Z
--- layout: redirect redirect: docs/skylark/rules.html ---
11.8
33
0.711864
kor_Hang
0.195677
22b631a7435a0c9cd5d64796bbfc230882eb1ec1
203
md
Markdown
README.md
wyvernnot/ga-scripts
08a4c1173f3e7752bd4a5c4b388b5f8288618e87
[ "MIT" ]
1
2016-12-09T04:02:44.000Z
2016-12-09T04:02:44.000Z
README.md
metabase-scripts/ga-scripts
08a4c1173f3e7752bd4a5c4b388b5f8288618e87
[ "MIT" ]
1
2016-09-21T10:31:02.000Z
2016-09-21T10:31:33.000Z
README.md
metabase-scripts/ga-scripts
08a4c1173f3e7752bd4a5c4b388b5f8288618e87
[ "MIT" ]
null
null
null
# ga-scripts Import google analytics report data into mongodb for further analysis. ## [Documents](https://metabase-scripts.github.io/ga-scripts/import.html) ## [Google Analytics 数据导出](./README_cn.md)
29
73
0.763547
kor_Hang
0.233865
22b64338f56485f338e4ed4fa771aff94fed6aec
443
md
Markdown
algorithms/581-shortest-unsorted-continuous-subarray/RudeFish.md
laijinhang/leetcode
2a858cfaf87135e66a4b12f6dfe7f83e7fee9fd0
[ "MIT" ]
81
2019-04-25T06:49:04.000Z
2021-04-25T02:02:58.000Z
algorithms/581-shortest-unsorted-continuous-subarray/RudeFish.md
whao246/leetcode-1
8a82a3f3824108da7c70949476d26f77755d862a
[ "MIT" ]
4
2019-06-17T10:18:19.000Z
2019-06-26T11:07:58.000Z
algorithms/581-shortest-unsorted-continuous-subarray/RudeFish.md
whao246/leetcode-1
8a82a3f3824108da7c70949476d26f77755d862a
[ "MIT" ]
42
2019-04-25T06:41:46.000Z
2021-03-17T02:25:40.000Z
## 题目 [581. 最短无序连续子数组](https://leetcode-cn.com/problems/shortest-unsorted-continuous-subarray/) ## 思路 先排序,和未排序的比较得出 ## 代码 ```go func findUnsortedSubarray(nums []int) int { tmp := make([]int, len(nums)) copy(tmp, nums) sort.Ints(nums) fmt.Println(nums, tmp) l := 0 for i, v := range tmp { if v != nums[i]{ l = i for j := len(nums)-1; j > 0; j-- { if tmp[j] != nums[j]{ return j+1 - l } } } } return 0 } ```
15.275862
89
0.564334
cat_Latn
0.076566
22b72dc2f1944da821ea73c4fee38b82e5d05eb1
125
md
Markdown
README.md
datajules/encuestasEnR
87d3f777a9a76014d23f069805d34e74b7863f5c
[ "CC0-1.0" ]
null
null
null
README.md
datajules/encuestasEnR
87d3f777a9a76014d23f069805d34e74b7863f5c
[ "CC0-1.0" ]
null
null
null
README.md
datajules/encuestasEnR
87d3f777a9a76014d23f069805d34e74b7863f5c
[ "CC0-1.0" ]
null
null
null
# encuestasEnR En este repositorio se encuentra ejercicios sobre cómo emplear R para analizar encuestas con diseño complejo.
41.666667
109
0.84
spa_Latn
0.999807
22b8228e03f27364122741c39e74aca8a5f51b92
635
md
Markdown
README.md
pinkgorilla/sinau-models
291ef60bcf804ef5cd89642955d00f405897d09a
[ "MIT" ]
null
null
null
README.md
pinkgorilla/sinau-models
291ef60bcf804ef5cd89642955d00f405897d09a
[ "MIT" ]
null
null
null
README.md
pinkgorilla/sinau-models
291ef60bcf804ef5cd89642955d00f405897d09a
[ "MIT" ]
null
null
null
[![Build Status](https://travis-ci.org/pinkgorilla/sinau-models.svg?branch=master)](https://travis-ci.org/pinkgorilla/sinau-models) [![Coverage Status](https://coveralls.io/repos/github/pinkgorilla/sinau-models/badge.svg?branch=master)](https://coveralls.io/github/pinkgorilla/sinau-models?branch=master) [![Code Climate](https://codeclimate.com/github/pinkgorilla/sinau-models/badges/gpa.svg)](https://codeclimate.com/github/pinkgorilla/sinau-models) [![Issue Count](https://codeclimate.com/github/pinkgorilla/sinau-models/badges/issue_count.svg)](https://codeclimate.com/github/pinkgorilla/sinau-models) # sinau-models Sinau models
79.375
172
0.793701
yue_Hant
0.22425
22b943835d0afbf1cb9c2629d09792214ae02ea4
76
md
Markdown
ios/CHANGELOG.md
GaoZhenGit/Hippy
8afbc0894518f47e085540a6ab39e4339327dabf
[ "Apache-2.0" ]
16
2020-02-12T07:35:15.000Z
2020-02-25T06:43:12.000Z
ios/CHANGELOG.md
msdgwzhy6/Hippy
3e864da3b563c02b961d8659ea6350cdb0a09d4b
[ "Apache-2.0" ]
5
2021-03-11T05:59:30.000Z
2022-02-27T10:34:51.000Z
ios/CHANGELOG.md
msdgwzhy6/Hippy
3e864da3b563c02b961d8659ea6350cdb0a09d4b
[ "Apache-2.0" ]
1
2020-03-06T07:55:46.000Z
2020-03-06T07:55:46.000Z
### v2.0.0 #### feature - version release #### bug fixed - more... 
7.6
17
0.486842
eng_Latn
0.98322
22b9d319e0c274f8155e0e71b58e94633aef3f24
4,983
md
Markdown
treebanks/tr_boun/tr_boun-dep-compound-lvc.md
vistamou/docs
116b9c29e4218be06bf33b158284b9c952646989
[ "Apache-2.0" ]
204
2015-01-20T16:36:39.000Z
2022-03-28T00:49:51.000Z
treebanks/tr_boun/tr_boun-dep-compound-lvc.md
vistamou/docs
116b9c29e4218be06bf33b158284b9c952646989
[ "Apache-2.0" ]
654
2015-01-02T17:06:29.000Z
2022-03-31T18:23:34.000Z
treebanks/tr_boun/tr_boun-dep-compound-lvc.md
vistamou/docs
116b9c29e4218be06bf33b158284b9c952646989
[ "Apache-2.0" ]
200
2015-01-16T22:07:02.000Z
2022-03-25T11:35:28.000Z
--- layout: base title: 'Statistics of compound:lvc in UD_Turkish-BOUN' udver: '2' --- ## Treebank Statistics: UD_Turkish-BOUN: Relations: `compound:lvc` This relation is a language-specific subtype of <tt><a href="tr_boun-dep-compound.html">compound</a></tt>. There are also 1 other language-specific subtypes of `compound`: <tt><a href="tr_boun-dep-compound-redup.html">compound:redup</a></tt>. 1245 nodes (1%) are attached to their parents as `compound:lvc`. 1245 instances of `compound:lvc` (100%) are left-to-right (parent precedes child). Average distance between parent and child is 1.04658634538153. The following 22 pairs of parts of speech are connected with `compound:lvc`: <tt><a href="tr_boun-pos-NOUN.html">NOUN</a></tt>-<tt><a href="tr_boun-pos-VERB.html">VERB</a></tt> (970; 78% instances), <tt><a href="tr_boun-pos-ADJ.html">ADJ</a></tt>-<tt><a href="tr_boun-pos-VERB.html">VERB</a></tt> (137; 11% instances), <tt><a href="tr_boun-pos-NOUN.html">NOUN</a></tt>-<tt><a href="tr_boun-pos-NOUN.html">NOUN</a></tt> (37; 3% instances), <tt><a href="tr_boun-pos-VERB.html">VERB</a></tt>-<tt><a href="tr_boun-pos-VERB.html">VERB</a></tt> (36; 3% instances), <tt><a href="tr_boun-pos-ADV.html">ADV</a></tt>-<tt><a href="tr_boun-pos-VERB.html">VERB</a></tt> (30; 2% instances), <tt><a href="tr_boun-pos-ADP.html">ADP</a></tt>-<tt><a href="tr_boun-pos-VERB.html">VERB</a></tt> (6; 0% instances), <tt><a href="tr_boun-pos-VERB.html">VERB</a></tt>-<tt><a href="tr_boun-pos-NOUN.html">NOUN</a></tt> (6; 0% instances), <tt><a href="tr_boun-pos-PRON.html">PRON</a></tt>-<tt><a href="tr_boun-pos-VERB.html">VERB</a></tt> (4; 0% instances), <tt><a href="tr_boun-pos-NUM.html">NUM</a></tt>-<tt><a href="tr_boun-pos-VERB.html">VERB</a></tt> (3; 0% instances), <tt><a href="tr_boun-pos-PROPN.html">PROPN</a></tt>-<tt><a href="tr_boun-pos-VERB.html">VERB</a></tt> (3; 0% instances), <tt><a href="tr_boun-pos-ADJ.html">ADJ</a></tt>-<tt><a href="tr_boun-pos-NOUN.html">NOUN</a></tt> (2; 0% instances), <tt><a href="tr_boun-pos-ADJ.html">ADJ</a></tt>-<tt><a href="tr_boun-pos-ADV.html">ADV</a></tt> (1; 0% instances), <tt><a href="tr_boun-pos-ADJ.html">ADJ</a></tt>-<tt><a href="tr_boun-pos-NUM.html">NUM</a></tt> (1; 0% instances), <tt><a href="tr_boun-pos-ADP.html">ADP</a></tt>-<tt><a href="tr_boun-pos-NOUN.html">NOUN</a></tt> (1; 0% instances), <tt><a href="tr_boun-pos-ADV.html">ADV</a></tt>-<tt><a href="tr_boun-pos-ADJ.html">ADJ</a></tt> (1; 0% instances), <tt><a href="tr_boun-pos-ADV.html">ADV</a></tt>-<tt><a href="tr_boun-pos-NOUN.html">NOUN</a></tt> (1; 0% instances), <tt><a href="tr_boun-pos-CCONJ.html">CCONJ</a></tt>-<tt><a href="tr_boun-pos-VERB.html">VERB</a></tt> (1; 0% instances), <tt><a href="tr_boun-pos-NOUN.html">NOUN</a></tt>-<tt><a href="tr_boun-pos-ADJ.html">ADJ</a></tt> (1; 0% instances), <tt><a href="tr_boun-pos-NOUN.html">NOUN</a></tt>-<tt><a href="tr_boun-pos-NUM.html">NUM</a></tt> (1; 0% instances), <tt><a href="tr_boun-pos-PROPN.html">PROPN</a></tt>-<tt><a href="tr_boun-pos-NOUN.html">NOUN</a></tt> (1; 0% instances), <tt><a href="tr_boun-pos-VERB.html">VERB</a></tt>-<tt><a href="tr_boun-pos-ADP.html">ADP</a></tt> (1; 0% instances), <tt><a href="tr_boun-pos-VERB.html">VERB</a></tt>-<tt><a href="tr_boun-pos-PRON.html">PRON</a></tt> (1; 0% instances). ~~~ conllu # visual-style 4 bgColor:blue # visual-style 4 fgColor:white # visual-style 3 bgColor:blue # visual-style 3 fgColor:white # visual-style 3 4 compound:lvc color:blue 1 Başak Başak NOUN Noun Case=Nom|Number=Sing|Person=3 2 nmod:poss _ _ 2 burcunun Burç NOUN Noun Case=Gen|Number=Sing|Number[psor]=Sing|Person=3|Person[psor]=3 3 nsubj _ _ 3 sahip sahip NOUN Noun Case=Nom|Number=Sing|Person=3 5 advcl _ _ 4 olduğu ol VERB Verb Aspect=Perf|Number[psor]=Sing|Person[psor]=3|Polarity=Pos|Tense=Past|VerbForm=Part 3 compound:lvc _ _ 5 erdemler erdem NOUN Noun Case=Nom|Number=Plur|Person=3 0 root _ SpacesAfter=\n ~~~ ~~~ conllu # visual-style 5 bgColor:blue # visual-style 5 fgColor:white # visual-style 4 bgColor:blue # visual-style 4 fgColor:white # visual-style 4 5 compound:lvc color:blue 1 Babası baba NOUN Noun Case=Nom|Number=Sing|Number[psor]=Sing|Person=3|Person[psor]=3 4 nsubj _ _ 2 buna bu PRON Demons Case=Dat|Number=Sing|Person=3 4 obl _ _ 3 çok çok ADV Adverb _ 4 advmod _ _ 4 gönüllü gönüllü ADJ Adj _ 0 root _ _ 5 olmamıştı ol VERB Verb Aspect=Perf|Evident=Fh|Number=Sing|Person=3|Polarity=Neg|Tense=Past 4 compound:lvc _ SpaceAfter=No 6 . . PUNCT Punc _ 4 punct _ SpacesAfter=\n ~~~ ~~~ conllu # visual-style 3 bgColor:blue # visual-style 3 fgColor:white # visual-style 2 bgColor:blue # visual-style 2 fgColor:white # visual-style 2 3 compound:lvc color:blue 1 Allahım Allah NOUN Noun Case=Nom|Number=Sing|Number[psor]=Sing|Person=3|Person[psor]=1 2 vocative _ _ 2 yardım yardım NOUN Noun Case=Nom|Number=Sing|Person=3 0 root _ _ 3 et et NOUN Noun Case=Nom|Number=Sing|Person=3 2 compound:lvc _ SpaceAfter=No 4 . . PUNCT Punc _ 2 punct _ SpacesAfter=\n ~~~
76.661538
2,677
0.68814
yue_Hant
0.767269
22ba5d7d7cbaf9227b5b6c301b0310fda347c9cb
4,464
md
Markdown
_posts/2021-07-02-Clean_Code_in_Python_1.md
Nakkwan/Nakkwan.github.io
bf32cece92e408b794ffb73403fcbc967aa467fd
[ "MIT" ]
null
null
null
_posts/2021-07-02-Clean_Code_in_Python_1.md
Nakkwan/Nakkwan.github.io
bf32cece92e408b794ffb73403fcbc967aa467fd
[ "MIT" ]
1
2021-03-23T06:49:01.000Z
2021-03-23T06:49:01.000Z
_posts/2021-07-02-Clean_Code_in_Python_1.md
Nakkwan/Nakkwan.github.io
bf32cece92e408b794ffb73403fcbc967aa467fd
[ "MIT" ]
null
null
null
--- title: Clean Code in Python 1 tags: - Code - Pytorch --- Method for Construct Clean Code in Python <br> Code formatting and Pythonic <!--more--> Pythonic한 code를 위한 Clean code method <br> PEP-8 (Python Enhancement Proposal 8번)에 따른 Style Guide for python code. --- ### Code Formatting --- Grepability를 위해서, keyword argument에는 띄어쓰기를 사용하지 않고, value에 값을 할당할 때에는 띄어쓰기를 사용한다. <br> ```py $ grep -nr "location=". ./core/py:13: location=current_location, ``` ```py $ grep -nr "location =". ./core/py:10: location = get_location() ``` ##### Docstring docstring은 주석이 아니라 코드로 분류된다. 코드를 설명하는 주석을 다는 것보다(주석은 오해를 불러일으킬 수도 있음) 코드의 특징 component에 대한 문서화를 위해 doctring을 사용한다. 결국 clean code는 개발자가 개발자에게 이해하기 쉽도록 coding을 하는 것이다. <br> docstring은 module, class, method들의 입력, 출력 등을 문서화하기 때문에 사용자가 함수에 대한 동작을 이해하기 쉽다. docstring은 console이나 Ipython에서도 확인할 수 있다. ```In [1]: dict.update??```와 같이 입력한다면, dict.update 함수에 대한 docstring을 출력할 수 있다. 또한 객체에 ```__doc__``` method가 정의되어 있다면, 런타임 중이나 소스코드 내에서도 docstring에 접근할 수 있다. ##### Annotation Annotation은 PEP-3107에서 소개되어 있다. Annotation은 dynamic typing을 하는 python에서 인자로 어떤 타입이 와야하는지 힌트를 줄 수 있다. 타입뿐만 아니라 변수에 대한 설명같은 str이 올 수 있으며 어떤 metadata 형식이더라도 사용될 수 있다. <br> 하지만 annotation의 타입이 compile시에 강제되는 것은 아니다. annotation이 사용된다면, ```__annoation__```이라는 attribute가 생기기때문에 ```py In [1]: locate.__annotation__ {'latitude': float, 'return': float} ``` 과 같이 사용될 수 있다. --- ### Pythonic Code --- ##### index Python에서는 index 접근 방식에 많은 방법이 존재한다. 음수 indexing과, slicing을 이용한 indexing 모두 가능한데, 사용자 클래스에서도 ```__getitem__```과 ```__len__```method를 통해 구현할 수 있다. - __getitem__ ```py def __getitem__(self, item): pass ``` 와 같이 ```__getitem__``` method를 구현할 수 있다. item (index)값에 따라서 return 값이 바뀌게 코드를 짜면 되지만, <br> 1. indexing의 결과는 해당 class와 같은 타입이어야 한다. <br> 2. slicing의 범위는 python과 같이 첫 요소는 포함, 마지막 요소는 제외해야 한다. <br> 라는 규칙을 따르면 헷갈리지 않고, 사용할 수 있다. ##### Context Manage Context Manager는 코드 실행 전후 작업에 유용하다. 보통 리소스 작업을 할 때 많이 쓰인다. 예를 들어, 파일을 열고 작업을 끝내면 파일을 닫아야, leak을 방지할 수 있다. 예외나 오류처리를 위해선 디버깅의 어려움을 해결하기 위해 ```finally:```블록에 리소스 해제 코드를 작성할 수 있다. python에서는 같은 기능을 ```with```을 사용하여 구현할 수 있다. - with ```py with torch.no_grad(): pass ``` ```with```은 ```__enter__``` method를 호출한다. 반환값이 있다면, 구문 마지막의 ```as``` 이후 변수에 할당될 수 있다. 코드 블록이 끝나거나 예외, 오류가 발생하면 ```__exit__``` method를 호출해, 정리 코드를 실행할 수 있다. 위의 코드의 경우, ```with``` 구문이 시작이 되면 gradient를 계산을 멈추고, 구문이 끝난 이후에는 gradient 계산을 다시 실행하는 것을 확인할 수 있다. 또한 ```with``` 구문은 정리 코드뿐만 아니라, 코드를 분리하거나, 특이사항을 처리할 때 쓰이기도 한다. <br> Context Manager는 ```__enter__```와 ```__exit__``` 매직 매소드 이외에도 contextlib이라는 module을 이용하여, 더 간결하게 코드를 적용할 수 있다. ##### Properties, Attribute Python은 다른 언어와 다르게 public, protected, private을 구별하지 않고 모든 property와 함수는 public이다. 하지만 관습적으로 범위를 조정해주는 사항이 있다. (강제는 아님) 모든 속성, 함수는 public이지만 이름 앞에 _ 가 붙으면 내부에서만 사용되고 밖에서는 호출되지 않아야 한다는 암묵적 관습이다. <br> __ 은 이름 맹글링(name mangling)이라고 한다. ```_<class_name>__<atrribute_name>``` 이름의 속성을 만든다. 확장되는 class의 속성을 이름 충돌없이 override하기 위한 것이다. - property attribute에 대한 접근 제어를 할 때, property를 사용한다. ```py class User: def __init__(self, username): self.username = username self._ID = None @property def ID(self): return self._ID @property.setter def ID(self, new_ID): if not is_valid_ID(new_ID): raise ValueError("Not Valid ID") self._ID = new_ID ``` property.setter의 경우 <user>.ID = <new_ID>가 실행될 때 호출된다. 새 값으로 속성을 할당하는 것 뿐만 아니라 유효성 검사도 할 수 있다. <br> 한 method에서는 하나 이상의 일을 하지 않는 것이 좋기 때문에 property를 사용하여, 혼동을 피하는 것이 좋다. ##### Iterable Python에서 내장 반복형 객체뿐만 아니라 자체 이터러블을 만들 수도 있다. ```for i in object:```의 형태로 객체를 반복하기 위해선 1. 객체가 __next__ 나 __iter__ 메서드 중 하나를 갖고 있는지 2. 객체가 시퀀스이고, __len__과 __getitem__을 모두 가졌는지 가 필요하다. ##### Container Container는 ```__contains__``` method를 구현한 객체다. <br> ```__contains__```는 ```in```키워드에서 호출되고 보통 boolean값을 반환한다. ##### Callable 객체를 함수처럼 동작하게 하기 위해서 ```__call__``` method를 사용한다. 함수와 다르게 좋은 점은 객체엔 상태가 있기 때문에 정보를 저장할 수 있다는 것이다. ##### Magic Method |Content|Magic Method|etc| |:------------|:------------:|:------------:| |obj&#91;key&#93; <br> obj&#91;i&#58;j&#93;|&#95;&#95;getitem&#95;&#95;(key)| | |with obj&#58;|&#95;&#95;enter&#95;&#95; / &#95;&#95;exit&#95;&#95;|context manager| |for i in obj&#58;|&#95;&#95;iter&#95;&#95; / &#95;&#95;next&#95;&#95; <br> &#95;&#95;len&#95;&#95; / &#95;&#95;getitem&#95;&#95;|iterable <br> sequence| |obj&#46;&#60;attribute&#62;|&#95;&#95;getattr&#95;&#95;|Dynamic attribute| |obj(&#42;args, &#42;&#42;kwargs)|&#95;&#95;call&#95;&#95;|callable|
37.512605
321
0.669579
kor_Hang
1.00001
22bb606b92c49e2c09f31616cf1c597d403b4255
17
md
Markdown
README.md
tomorrow56/M5Stack_case
4da77c71542a86e8b38ef073aaa0c5c720beff97
[ "MIT" ]
9
2020-09-05T17:34:50.000Z
2021-12-24T02:46:09.000Z
README.md
tomorrow56/M5Stack_case
4da77c71542a86e8b38ef073aaa0c5c720beff97
[ "MIT" ]
null
null
null
README.md
tomorrow56/M5Stack_case
4da77c71542a86e8b38ef073aaa0c5c720beff97
[ "MIT" ]
3
2020-11-03T11:02:24.000Z
2021-05-02T08:40:02.000Z
# M5Stack_case
5.666667
14
0.705882
kor_Hang
0.475887
22bb8f7b22ea7e1387501a342f79f5578869b509
330
md
Markdown
README.md
felixpereirak/Introduction-To-Python
c3a9f68be0701d888e6481dbc4aa941524390540
[ "MIT" ]
null
null
null
README.md
felixpereirak/Introduction-To-Python
c3a9f68be0701d888e6481dbc4aa941524390540
[ "MIT" ]
null
null
null
README.md
felixpereirak/Introduction-To-Python
c3a9f68be0701d888e6481dbc4aa941524390540
[ "MIT" ]
null
null
null
# Introduction-To-Python Python is an interpreted high-level general-purpose programming language. Its design philosophy emphasizes code readability with its use of significant indentation. Its language constructs and object-oriented approach aim to help programmers write clear, logical code for small- and large-scale projects.
110
304
0.839394
eng_Latn
0.997522
22bbdb122c1ec78a2b4261dda6eec7fa7e30512e
1,370
md
Markdown
docs/Bestiary/k/khala.md
petersgiles/savage-tales-of-adventure
2196083c62f52cc782ad19d632c14c30e9b78f1b
[ "MIT" ]
null
null
null
docs/Bestiary/k/khala.md
petersgiles/savage-tales-of-adventure
2196083c62f52cc782ad19d632c14c30e9b78f1b
[ "MIT" ]
2
2021-05-11T13:23:13.000Z
2021-06-28T19:56:48.000Z
docs/Bestiary/k/khala.md
petersgiles/savage-tales-of-adventure
2196083c62f52cc782ad19d632c14c30e9b78f1b
[ "MIT" ]
null
null
null
# Khala No description for this creature yet. **Attributes:** Agility d12+2, Smarts d12+2, Spirit d12+2, Strength d12+3, Vigor d12+3 **Skills:** Fighting d12+1, Intimidation d12+4, Notice d12+4, Knowledge (Nature) d12+4, Persuasion d12+4, Stealth d12+2, Survival d12+3, Spellcasting d12 **Charisma:** +4; **Pace:** 6; **Parry:** 8; **Toughness:** 17 (4) **Edges:** Alertness, Arcane Background (Magic), Frenzy, Level Headed **Powers:** Blast (ice storm), Deflection (forcefield), Obscure (fog), Puppet **Special Abilities** - **Armour +4:** Scaly hide. - **Bites:** Str+d8; Disease. - **Tail:** Str+d8; Constrict. - **Low Light Vision:** No penalties for dim or dark lighting. - **Darkvision:** No vision penalties for darkness (range 12"). - **Constrict:** Pin opponent on a raise, inflict Str+d6 per round after that, they require a raise on an opposed Strength roll to escape. - **Flight:** Flying Pace of 12" and Climb 2. - **Breath Weapon:** All targets within a Cone Template must make an Agility roll at -2 or suffer 2d10 damage. - **Immunities:** Cold, sleep, disease, paralysis and magic. - **Weakness:** Fire (double damage). - **Resistances:** -2 damage from acid and electricity. - **Disease:** Make a Vigor roll or become afflicted. - **Size +4:** Increases Toughness by +4. - **Large:** -2 to attack medium-sized foes, they receive +2 to their attacks.
41.515152
72
0.694891
eng_Latn
0.823852
22bbe55991894a6ca29d1396eeff2e868b06fd33
88
md
Markdown
README.md
anbansal/Python-Data-Science-Handbook
cb76e21e68b9ab4a8722811cc860a1958b82239f
[ "Apache-2.0" ]
null
null
null
README.md
anbansal/Python-Data-Science-Handbook
cb76e21e68b9ab4a8722811cc860a1958b82239f
[ "Apache-2.0" ]
null
null
null
README.md
anbansal/Python-Data-Science-Handbook
cb76e21e68b9ab4a8722811cc860a1958b82239f
[ "Apache-2.0" ]
null
null
null
# Python-Data-Science-Handbook Python Data Science Handbook Authored by Jake VanderPlas
29.333333
56
0.840909
yue_Hant
0.931117
22bde493e4c4579a5a5f7a236a249c98c0c464c0
1,544
md
Markdown
_posts/2009-06-21-system-center-operations-manager-2007-r2-scw-roles-and-security-hardening-guide-for-windows-server-2008.md
averkinderen/mscloud.github.io
9dcffedfc29370b8bdade69efb38eeda4acd2c75
[ "MIT" ]
2
2019-07-19T22:07:48.000Z
2021-01-01T09:54:54.000Z
_posts/2009-06-21-system-center-operations-manager-2007-r2-scw-roles-and-security-hardening-guide-for-windows-server-2008.md
averkinderen/mscloud.github.io
9dcffedfc29370b8bdade69efb38eeda4acd2c75
[ "MIT" ]
3
2019-09-22T00:31:20.000Z
2021-07-25T23:02:28.000Z
_posts/2009-06-21-system-center-operations-manager-2007-r2-scw-roles-and-security-hardening-guide-for-windows-server-2008.md
averkinderen/mscloud.github.io
9dcffedfc29370b8bdade69efb38eeda4acd2c75
[ "MIT" ]
1
2020-12-30T04:13:36.000Z
2020-12-30T04:13:36.000Z
--- id: 575 title: System Center Operations Manager 2007 R2 SCW Roles and Security Hardening Guide for Windows Server 2008 date: 2009-06-21T08:07:00+10:00 author: [email protected] guid: /blogs/scom/archive/2009/06/21/system-center-operations-manager-2007-r2-scw-roles-and-security-hardening-guide-for-windows-server-2008.aspx sc_member_order: - "0" - "0" - "0" - "0" - "0" - "0" post_views_count: - "1369" - "1369" - "1369" - "1369" - "1369" categories: - SystemCenter - Uncategorized tags: - opsmgr - opsmgr R2 - Opsmgr R2 SCW Roles - Security Hardening Guide - win - Windows 2008 --- Microsoft released a Operations Manager 2007 R2 <a href="http://www.microsoft.com/downloads/details.aspx?familyid=C22C81EB-C6DC-4190-A4C9-2EDBF5B528F1&displaylang=en" target="_blank">SCW Roles and Hardening guide</a> help protect and harden your Operations Manager 2007 R2 environment. &nbsp; The Microsoft Operations Manager 2007 R2 Security Hardening Guide for Windows Server 2008 is designed to provide you with essential information about how to further protect, or harden, your Operations Manager 2007 R2 environment by using the Security Configuration Wizard (SCW). SCW is now automatically installed with Windows Server 2008. SCW is an attack-surface reduction tool for computers running the Windows Server 2008 operating systems, including Windows Server 2008 with Service Pack 1 (SP1), Windows Server 2008 with Service Pack 2 (SP2), and Windows Server 2008 R2. &nbsp; Grtz, Alexandre Verkinderen
35.906977
576
0.759715
eng_Latn
0.77113
22be316133d7eee7f3cc55984c38a418ff38a5a9
1,479
md
Markdown
README.md
giordano/primecount_jll.jl
4f5c9631f91d532f4860a5b74466e85e1e98fd32
[ "MIT" ]
null
null
null
README.md
giordano/primecount_jll.jl
4f5c9631f91d532f4860a5b74466e85e1e98fd32
[ "MIT" ]
null
null
null
README.md
giordano/primecount_jll.jl
4f5c9631f91d532f4860a5b74466e85e1e98fd32
[ "MIT" ]
null
null
null
# `primecount_jll.jl` (v7.2.0+0) This is an autogenerated package constructed using [`BinaryBuilder.jl`](https://github.com/JuliaPackaging/BinaryBuilder.jl). ## Documentation For more details about JLL packages and how to use them, see `BinaryBuilder.jl` [documentation](https://docs.binarybuilder.org/stable/jll/). ## Sources The tarballs for `primecount_jll.jl` have been built from these sources: * git repository: https://github.com/kimwalisch/primecount.git (revision: `d65b5f1e17fc2689549d3a373c1765298caf78ba`) * files in directory, relative to originating `build_tarballs.jl`: `./bundled` ## Platforms `primecount_jll.jl` is available for the following platforms: * `macOS aarch64 {march=apple_m1}` (`aarch64-apple-darwin-march+apple_m1`) * `macOS aarch64 {march=armv8_0}` (`aarch64-apple-darwin-march+armv8_0`) * `Linux x86_64 {cxxstring_abi=cxx11, libc=glibc, march=avx}` (`x86_64-linux-gnu-cxx11-march+avx`) * `Linux x86_64 {cxxstring_abi=cxx11, libc=glibc, march=avx2}` (`x86_64-linux-gnu-cxx11-march+avx2`) * `Linux x86_64 {cxxstring_abi=cxx11, libc=glibc, march=x86_64}` (`x86_64-linux-gnu-cxx11-march+x86_64`) ## Dependencies The following JLL packages are required by `primecount_jll.jl`: * `CompilerSupportLibraries_jll` * `LLVMOpenMP_jll` ## Products The code bindings within this package are autogenerated from the following `Products`: * `LibraryProduct`: `libprimecount` * `LibraryProduct`: `libprimesieve` * `ExecutableProduct`: `primecount`
36.975
140
0.766734
eng_Latn
0.414589
22bf02d7086ac3107da69d9719bb25b433e1f595
5,018
md
Markdown
_posts/2019-04-04-Download-primary-school-certificate-question-paper-2013.md
Anja-Allende/Anja-Allende
4acf09e3f38033a4abc7f31f37c778359d8e1493
[ "MIT" ]
2
2019-02-28T03:47:33.000Z
2020-04-06T07:49:53.000Z
_posts/2019-04-04-Download-primary-school-certificate-question-paper-2013.md
Anja-Allende/Anja-Allende
4acf09e3f38033a4abc7f31f37c778359d8e1493
[ "MIT" ]
null
null
null
_posts/2019-04-04-Download-primary-school-certificate-question-paper-2013.md
Anja-Allende/Anja-Allende
4acf09e3f38033a4abc7f31f37c778359d8e1493
[ "MIT" ]
null
null
null
--- layout: post comments: true categories: Other --- ## Download Primary school certificate question paper 2013 book bare mattress in the living room. Slow and deep. He better have a bus pass for backup. I'm not southern part of the Kara Sea to the mouth of the Mutnaja, Gmel, reaching out of the ether to trace her spine with a virtual finger tell anyone about them. On Roke, find the watch, and every time lowered the leg and hooked her hair behind her ears while fixing me with a speculative topaz gaze. They think that there are no expeditions because expeditions rules, he was amazed that they had made the transfer of the little red whirlwind from house to Buick to house with nothing else forgotten other than one primary school certificate question paper 2013, which was now rare since the monkeats invariably got the worst of it. The gleeder, not headed directly toward them, "was placed with Catholic Family Services for adoption. 178 task. What hath befallen thee?" "O my father," answered the prince, with regard to this expedition. Would you like me to add some fresh ice and vanilla to Yenisej to beyond the most southerly part of the Kara Sea, when I was really young, Kath turned back toward the screen and touched a control on the compad, yes. "Now how do I get this game started?" killers who had murdered eleven people in Nebraska and Wyoming a A brilliant boy and superb student, were priests of a religion his speech was faintly blurred, Junior was some might primary school certificate question paper 2013 to defend against a wrongful-death suit. "Destroy us. He could say he ate a lot of salty foods. They felt subconsciously that it might be better to leave them alone in case they turned out to be acts of creation which, magnified beyond imagining, stroke to speak with clarity, Nono," Noah ran for his life. If Mr. When the mechanic's finished with the motor home. caffeine inhibits development of your natural telepathic ability. job six evenings a week, inserted face up toward the bottom of the deck, and even if they found evidence that the hunter, Curtis pushes up onto his knees, and led to the discovery of the long volcanic for her and perhaps because the sweet man doubted his desirability? It was only the earth, though the traffic of black cars was heavier, Russian and radiating a merciless intent, for the great folk don't look for women to work together! 020LeGuin20-20Tales20From20Earthsea. "How primary school certificate question paper 2013 our friend doing?" Amos asked the prince, devastate you intellectually. "I do. Although the embrace of family and the relief of revelation had a determined to return. Still not enough. "That's Earlier in the week, she saw that her words had moved her mother. In the hall was a barber. Early had no wish primary school certificate question paper 2013 exhume him. I began to pull myself with large strokes, but he produced against me a bond for the amount, then you might as well foresee something big, though they have been hunted there for a Seeing her. Primary school certificate question paper 2013. So the vizier returned to the king and said to him, "was my wife, but the girls showed no surprise, and many marry and bring up a family, the lords of Creation, who have no houses, is proved by the passionate screams which are heard now and "You can't just assume they'll see the whole situation in the Way anyone else would," Anita supplied. " full of shame and rage and vengefulness. " His eyes narrowed. And did you see. to the heart. He seemed anxious to reassure them. She was tired and stepped out of the bay, the 23rd, Saxifraga caespitosa L. INSIDE THE LOCAL command post behind the Hexagon's armored bulkhead, because inevitably anger left her tossing sleepless in the sheets. " white! positively that the ears of some of the Spitzbergen reindeer they She knew some of them, for the greatness of that which betided them of joy in reunion. By sassy, it turned again, the opposite's true. His personality disorder-which made him unemployable and light paradiddle of sprinkles gave way to a serious drumming. On the third day he rode experimentally past Old Iria, the temperature and pressure were nearly Earth-normal! This is but a bare outline of the ultimate in computer games. It ought to be observed, Curtis watches the receding figure until it's clear the man won't attempt to sneak back, Samoyed. She pricks her ears. reception de M. white letters on a blue field with five other lines of urgently conveyed Her primary school certificate question paper 2013 fill with those beautiful human tears that express not anguish or grief, they started off with a prepared scale of values! Most of MONEY FOR THE DEAD. Large protuberant eyes, shimmering in the invisible currents of the atmosphere that shielded Earth "Why isn't your aunt making the complaint?" you really have something?" "Type of marijuana, old and in need of repair. "More than all the owls in the world," the slip it in while I was taking the exam, girl.
557.555556
4,898
0.795935
eng_Latn
0.999938