url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://www.appannie.com/en/apps/google-play/app/net.difer.notiarch/
|
code
|
If you want to remember recent notifications. Read those that have already disappeared from your status bar. This
app remembers them for a bit longer.
The archive remembers notifications, grouped by application (including system applications). You can filter / ignore applications (longer press).
Was very good, but with their newest ads it's become functionally unusable (on top of it appearing to have stopped saving notifications arbitrarily)
Sep 12, 2021
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363420.81/warc/CC-MAIN-20211207232140-20211208022140-00493.warc.gz
|
CC-MAIN-2021-49
| 458 | 5 |
https://jobs.dou.ua/companies/serena-software/vacancies/8978/?from=widget_company
|
code
|
What we definitely expect:
• Three years or more experience developing commercial applications for the Java platform
• Good English language communication skills (Intermediate level and higher)
• Solid Computer Science fundamentals knowledge (algorithms, data structures, concurrency, etc.) — preferably a B.Sc. degree or equivalent in Computer Science, Mathematics, Physics or Engineering
• Strong knowledge of Java core
Important personal attributes:
• Logical thinker with exceptional problem solving skills
• An appreciation of modern user interface and software design
• Creative, innovative developer with a passion for making great software
• Ability to make and deliver on commitments
• Enjoys the challenge of rapidly coming up to speed on new and complex concepts
What we’d love you to have experience with:
• Spring, Spring Data JPA or Hibernate, and JAX-RS RESTful services
• Working in an Agile, iterative development environment
• Oracle or PostgreSQL or MS SQL Server
• Working in geographically-distributed teams is a helpful experience
Work at Micro Focus is fun:
• Possibility to work with highly qualified colleagues and possibility to work on interesting and challenging tasks and projects.
• Opportunity to work in company that has strong position on the market and contribute to development of highly competitive products using state-of-the-art technologies and methodologies.
• Comfortable working environment with the office located at the Kiev center
• Flexible working hours
• Sport area at the office
• Medical insurance
• Parking slot
What you’ll do:
• You will be involved in design and conceptual discussions with other team members
• You will participate in the full life-cycle from product inception, design, code and delivery
• You will bring to the role a can-do attitude with an innovative approach to problem solving
• You will work with the Support group to suggest and implement solutions to specific customer issues
• You will work with new technologies and frameworks and apply them in product development
Join the Micro Focus | SERENA Software team to work on the industry leading Application Lifecycle Management product, Dimensions CM www.microfocus.com/products/dimensions-cm, designing and developing state of the art software in a multi-platform environment.
SERENA Software (www.serena.com) is the global leader in Application Lifecycle Management for the Enterprise. Based on 30 years of steady growth and innovation, Serena provides solutions that enable Global 2000 IT organizations to manage their projects, coordinate and integrate the software development lifecycle, and synchronize their processes on a global scale. More than 15,000 organizations around the world, including 96 of the Fortune 100, depend on Serena solutions.
At Serena, our engineers continue to learn and grow by working with top professionals from around the world and recent graduates of top universities and by taking advantage of our extensive internal training. Serena has R&D offices in: Silicon Valley, USA; London, UK; Kiev, Ukraine.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027316150.53/warc/CC-MAIN-20190821174152-20190821200152-00383.warc.gz
|
CC-MAIN-2019-35
| 3,120 | 33 |
https://community.helpsystems.com/forums/intermapper/troubleshooting-procedures/158d81ce-fa83-e511-80d0-005056842064
|
code
|
The Support Team may ask you to send certain Layer 2 debugging information. This information is saved in the com.dartware.switches folder of the InterMapper Settings : Extensions folder. Here's how to collect the information:
- Open the Device List window, and then click the "Layer 2 View" button. You will see a window like this:
- Enter each of the following commands into Filter field (at the upper-left), then press Return after each one. These commands erase the current Layer2 database and then turn on additional logging information. There is only one space character for each command - after the word "#set"...
- Detailed Logging needs to be enabled for our next step. Help > Diagnostics > Detailed Logging > Select Network Events, SNMP OID Errors. Also include an IP address in the IP Address Filter: Field.
- Include an SNMPWALK on the IP Address from step 3.
- Scan the network again, by clicking the "circular arrow" button at the lower-right of the window.
- Send us a screenshot when the scan completes (or even if it doesn't complete after 15 minutes). To do this:
- Open the Device List and show the Layer 2 View.
- Choose Help -> Send Screenshot
- Fill in the information as shown in the image below.
- Be sure to include a screenshot. (This happens automatically if you chose Send Screenshot. Check the "Include screenshot" box otherwise)
- In the Summary tab, give a summary of what happened: (Did it complete? Is it still scanning? Are any devices connected or listed incorrectly?)
- In the Logs tab, check the boxes for all three of the Layer 2 files, plus today's DebugLogyyyyMMMdd0000.txt file.
- In the Files tab, if you can, export of one of the maps that isn't shown correctly. (optional)
- If you are not able to use the Send a Screenshot facility (perhaps a firewall is blocking it), collect the following data from the InterMapper Settings folder which can be located here per OS and then send it by e-mail to [email protected].
- Disable detailed logging using Help > Diagnostics > Detailed Logs and clearing the check boxes selected previously. This will prevent unreasonably large logs.
- The entire contents of the Extensions : com.dartware.switches folder as a zip archive
- The most recent InterMapper Logs : DebugLogyyyyMMMdd0000.txt file
- If possible, a screen shot showing the Device List with the Layer 2 View showing.
- If possible, include one of the affected maps from the Maps : 6.x : Enabled folder
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662539101.40/warc/CC-MAIN-20220521112022-20220521142022-00048.warc.gz
|
CC-MAIN-2022-21
| 2,446 | 20 |
http://www.meimei0.info/15-easy-short-curly-hairstyles/
|
code
|
15 Easy SHORT Curly Hairstyles
Credit to TheEditingBabe for her transitions
Heys guys! Its Hallel! Here are 15 Easy SHORT Curly Hairstyles for you guys. I hope you like it.
I used bobby pins, hair ties, olive oil moisturizing hair lotion, and a 3 days straight product.
If you have any questions ask down below.
Music by Valesco-Cloud 9
Thanks for watching and feel free to like and leave comments below. DONT FORGET TO SUBSCRIBE.
Stalk me on
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824068.35/warc/CC-MAIN-20171020101632-20171020121632-00733.warc.gz
|
CC-MAIN-2017-43
| 442 | 8 |
https://pcbcrew.com/blog/easyeda-and-alternatives
|
code
|
There are many PCB design software options available, some of the most popular include:
EasyEDA is a web-based PCB design software that offers a range of features for designing and simulating electronic circuits. Some of its key features include schematic capture, PCB layout, and integrated simulation tools. It also has a built-in library with a wide range of components and supports for importing and exporting designs in various formats. It also offers collaborative features, allowing multiple users to work on a design simultaneously.
EasyEDA is a good option for hobbyists and students as it offers a free version with limited capabilities and a paid version for professional use. It is also a good alternative for those who prefer web-based software and have limited resources for installing and running software locally.
EasyEDA offers two different versions of its software: Standard and Professional. The main difference between the two is the level of functionality and access to features.
The Standard version is a free version that provides basic functionality for schematic capture, PCB layout, and simulation. It has some limitations on the number of sheets, size and layers of the PCB and the number of components in the schematic.
The Professional version is a paid version that offers access to advanced features such as 3D visualization, design rule checking, and more. It also provides access to a larger component library, and removes the limitations on the number of sheets, size, layers and components.
In summary, the EasyEDA Professional version is designed for more experienced users and offers more advanced features, while the EasyEDA Standard version is intended for hobbyists and students and offers more basic features.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233509023.57/warc/CC-MAIN-20230925151539-20230925181539-00670.warc.gz
|
CC-MAIN-2023-40
| 1,751 | 7 |
https://www.nuclear-power.net/nuclear-engineering/radiation-detection/gaseous-ionization-detector/operating-regions-of-ionizing-detectors-detector-voltage/discharge-region-ionization-detector/
|
code
|
The relationship between the applied voltage and pulse height in a detector is very complex. Pulse height and the number of ion pairs collected are directly related. As was written, the voltages can vary widely depending upon the detector geometry and the gas type and pressure. The figure schematically indicates the different voltage regions for alpha, beta and gamma rays. There are six main practical operating regions, where three (ionization, proportional and Geiger-Mueller region) are useful to detect ionizing radiation. These reqions are shown below. The alpha curve is higher than the beta and gamma curve from recombination region to part of limited proportionality region due to the larger number of ion pairs produced by the initial reaction of the incident radiation.
Finally, at still higher voltages (above Geiger-Mueller region), the electric field generates a continuous discharge of the medium, with the chamber no longer being sensitive to any incident ionization. This region is not used for detection or measurement of ionizing radiation. If the Geiger tube voltage is increased above the end of the plateau the count rate begins to increase rapidly again, until the onset of continuous discharge where the tube cannot detect radiation, and may be damaged.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370496901.28/warc/CC-MAIN-20200330085157-20200330115157-00092.warc.gz
|
CC-MAIN-2020-16
| 1,279 | 2 |
https://service.ndoc.eu/main?menu=main_info
|
code
|
What is this?
Easy to use, secure, online, centralized, general data and document manager service
. Multiple users can access simultaneously the same or different data through a web interface.
The data is organized into simple, modifiable tables.
Most technologies are complex and tiresome and the changing demands of our environment often forces us to find easier and simpler ways to be more efficient in our workflow.
Simplicity brings more control and reliability. Advantages:
- data management and search becomes easy
- answers for good business decisions becomes available for everyone because of the reduced complexity and easy analysis
- easier to involve new people and provide them the company history
- easier to optimize workflows with the customizable data structure
- easier to react to changing demands of the environment with the modifiable business logic
Some examples for usage:
Who can utilize it?
- salesmen can track events of what happened and when to their customers
- out of state agents can give the management team daily reports of their work and their results
- construction companies can register what was done, how and when and take photos of the location before, after and upload it
- corporations can manage central address books of their customers with detailed contact infos
- firms can archive digital invoices and see their payment statuses
- engineers can follow up the modifications of their plans by storing the output files along with dates and reasons for modification
- social workers can make notes about their visits and observations
- lawyers can keep record of their clients' cases with dates, description of happenings and attached files
- individuals can keep a list of their health records describing what the problem was and also its solution, name of doctor and attaching report scans or photos
- budget management of how much was spent on what and when
- application management of who applied for what and when
- simple warehouse management with handling of orders
- general document management and filing
From individuals to huge organizations in many sectors can take advantage of this by not necessarily replacing any solutions in their infrastructures but by extending it as well.
How does it work?
- centralized, general purpose solution in production for several years
- you can decide what kind of data to store and how
- entirely web based, no installation required
- it can also be used as a web front end for data in other softwares
- any amount of users can access the same or different data any time
- super admin account for every customer from which further users can be defined
- data is stored in simple tables that you can create and modify
- non-admin users can create tables too and share them with a single click in a secure way (time limited and one-time share)
- table references to choose data from other tables
- automatic lists to choose data without table references
- every table has the same usage logic, so less complexity involved
- you can store date, text, number and file type of data by any columns
- OCR functionality to search data on photos and in pdf files too (optical character recognition. Support for english, hungarian, spanish and german languages). The uploaded files get converted transparently to plain texts so they can also be searched through by typing words in the column. Just like with any other text columns. (A couple of minutes might have to pass for the conversion before the file can be searched)
- optional detailed logging of every operation
- 3 main functions: storage, search and analysis
- store data by filling the row and clicking plus button
- search data by entering some characters and hitting enter (not accent or case sensitive)
- analyse data by 1 click with charts and summaries
- import and export of CSV files that can be zipped
- minimal design with no images at all, so the page content can be highly compressed with minimal network traffic at around 8 KB per clicks
- no huge amount of menus or toolbar icons to remember
- fast access times under 200 ms
- reliable, stable, cross platform design with standard, minimal, well proven practices in the HTML interface (no eye candy)
- search history for easy return to previous data
- global search in all tables
- highlight search results, entries for current day and entries from other users
- comment section under the tables on the right for printing reports
- generate special reports and circular letters from the data for printing with support of full HTML formatting capability
- chat and real-time data update possibility
- designed to be secure: salted hashes, defense for SQL injections, minimization of attack vectors and surface, possibility for 3 levels of encryption
- accessible through a secure connection from any device: desktop machine, notebook, tablet, phone
- fine grade access control for users by granting access to specific tables or even specific rows only
- possibility to set session timeout for users separately
- force user to login through a secure method where no password can be saved in the browser (or else no sense for session timeout)
- limit all data access for a specified time interval for the user. For example, a user may only be able to access data from only the last week, month or past couple years.
- time limited passwords as needed
- data is protected with industry technology, frequent code patches and auditions
- possibility to host it in-house on a private server without 3rd party involved or host the file server separately
As seen on the graphics below, the design is modular and flexible so the different parts of the system can be separated and hosted on different servers for scalability reasons and resource redeployment.
If you would like to host our solution yourself in-house at your company, feel free to contact us.
About the developer
- 20 years of experience in software development including:
- 15 years of system administration including:
- operating systems (Linux, FreeBSD, Windows)
- networking (wired, wireless, virtual)
- mail systems, firewalls, virtualization
- file servers with RAID mirrors
- web servers, logging systems, mail and web proxies
- databases (MS SQL, MySQL, PostgreSQL)
- security layers (SELinux, AppArmor, Tomoyo)
- extended security measures and software security
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171463.89/warc/CC-MAIN-20170219104611-00296-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 6,331 | 79 |
http://meta.outdoors.stackexchange.com/users/2264/ustroetz
|
code
|
GIS Developer at ally
Top Network Posts
- 36Upload images to GitHub from the browser
- 16How to convert projected coordinates to lat/lon using Python?
- 14scipy.misc module has no attribute imread?
- 13What is residual standard error?
- 11Append several variables to a list in Python
- 11Python - OGR: Transform coordinates from meter to decimal degrees
- 9How to find if two polygons Intersect in python?
- View more network posts →
Keeping a low profile.
This user hasn't posted... yet.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257826773.17/warc/CC-MAIN-20160723071026-00114-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 490 | 12 |
https://en.solidarity-foundation.org.il/post/why-is-marketing-strategy-so-important
|
code
|
Do you own a small business? An accurate marketing strategy might help it grow!
For more information, enter WeLeaRn - the knowledge environment of WeR1 app.
Get it on the App Store - https://apple.co/3rPMNh7
Get it on Google Play - https://bit.ly/3K9D4sk
Thanks to "Lotem" for the helping making the video.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949355.52/warc/CC-MAIN-20230330163823-20230330193823-00072.warc.gz
|
CC-MAIN-2023-14
| 306 | 5 |
https://forums.lenovo.com/t5/ThinkPad-T400-T500-and-newer-T/T410-won-t-recognize-external-monitor-on-KVM/m-p/290782
|
code
|
08-23-2010 08:03 AM
I have a ThinkPad T410 with Windows XP SP3. I've installed the latest Presentation Director (4.55) and the latest Intel HD drivers (184.108.40.20673). If I hook up my external LCD monitor (an HP L2045w) directly from the VGA port on the monitor to the VGA port on the laptop, I can extend my video display to this monitor. However, if I attach the monitor through a KVM switch (a Belkin Omniview E series), I can't. I don't have a dock for this laptop.
The weird thing is that if I set the BIOS so that the external display is the boot display, the external mointor shows the boot screens even when on the KVM switch. I can even get the external display to work on the KVM switch if I boot into Safe Mode. But when I boot into Normal mode while on the KVM switch, the external monitor goes dark as soon as Windows switches video modes, and after I log in I can't extend my display onto the external monitor.
08-24-2010 10:06 AM
I'm having exactly the same problem.. I'm thinking it might be a power issue (the power adapter for the omniview series was optional) - but I've never seen this before, and I'm seeing other external monitor issues crop up... let me know if you find a solution.
Oh, my keyboard and mouse work fine, just not the monitor.
08-31-2010 06:58 AM
Even more strange: I have found that when I have something else on the KVM switch (a Toshiba laptop) that is using the monitor, and I switch to the ThinkPad, the monitor briefly displays the background of the ThinkPad desktop before going dark. Very odd.
09-01-2010 01:07 PM
Add one ... I'm having the same problem. I'm using a Trendnet TK-407 KVM switch (4-port, VGA, USB, does not use an external power supply). Regardless of which ports I use, which order I boot the computers, and whether or not I use the docking station, I can't get the external monitor to work with the KVM switch. I'd sure appreciate some help.
09-02-2010 02:26 AM
I have exactly the same problem using an EDIMAX 4 port USB KVM with a Dell monitor. The switch and monitor work fine with my two other PC's but I just don't get any monitor output when I switch to the T410. (Keyboard and Mouse switch OK and work fine). If I connect the monitor direct to the T410 and then switch using F7 all is OK.
Any help will be appreciated.
09-30-2010 04:44 PM
Has anyone found a solution for this?
Same problem, second monitor works great on a direct connect, but attach it through a switch and no dice.
Has there been any solution posted?
T410, with or without docking station/port replicator ---> Belkin OmniCube --> 24" flat screen VGA input
The moment I introduce the switch, the whole thing reverts back to single screen.
Lenovo, when will this be fixed???? I've been using this switch with a T60 for 4 years!!!
09-30-2010 04:48 PM
btw -- I am an IBM employee, and this T410 is my new employee workstation.
This means there are 100,000+ of these T410s rolling out to IBM employees and we're gonna all want it fixed
Please take a look at this, it is repeatable 100%
12-01-2010 11:24 AM
my T410/2537/E41 recognizes the external monitor on my kvm, but drops my display intermittently, then comes back. It may do it once per 5 minutes, 3 times, one right after the other, and when it comes back, my icons are messed up. Sometimes I can go a whole day without it happening, but usually happens frequently. When it drops, it makes the sound like a device was removed, then connects. It happens all night long as well as it sometimes wakes me up at night. It's really ticking me off!!
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824357.3/warc/CC-MAIN-20171020211313-20171020231313-00051.warc.gz
|
CC-MAIN-2017-43
| 3,533 | 26 |
https://skaiyaandbloodline.boards.net/thread/263/server-connect
|
code
|
I'm not sure what's up with the "No server to connect to" thing. It happens to me as well- Sometimes I can connect, while other times, that happens. As for the missing file, is there any screenshot of the error?
Also, just so you know, we moved forums. Due to that, you're not as likely to get an answer on this forum as you are on the new forum. Here's the link: bloodlineit.boards.net/
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991772.66/warc/CC-MAIN-20210517115207-20210517145207-00529.warc.gz
|
CC-MAIN-2021-21
| 387 | 2 |
https://community.nodebb.org/topic/12964/confirmation-email-links-have-port-number
|
code
|
confirmation email links have port number?
my confirm links are failing as the port number is added to the link.
as soon as I manually remove the port number from the address, I can validate my account.
Is there a setting somewhere I need to change to send out the correct confirmation links?
I'm running NodeBB v1.10.2
thanks in advance
Change the url value in config.json to match exactly the address at which you visit your forum.
yup that worked!
super easy fix, many thanks
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711286.17/warc/CC-MAIN-20221208082315-20221208112315-00066.warc.gz
|
CC-MAIN-2022-49
| 478 | 9 |
https://www.daniweb.com/programming/software-development/threads/470582/where-can-i-learn-c-game-development-online-for-free
|
code
|
I'm 11 years old and I'm absouloutly LOVE programming. I'm learning C++, but I heard that C++ is used for creating games. Where can I learn game development online for free.
Here is some info.
I'm 11 years old
So you lied when you signed up?
From our Terms of Service:
In compliance with the U.S. Coppa Act, no one under the age of thirteen (13) is permitted to register on these forums. If someone under the age of 13 does register, it is understood that they are doing so against DaniWeb's policies and without DaniWeb's knowledge.
I heard that C++ is used for creating games.
That's certainly correct; a lot of game development out there is done in C++. Just keep in mind that it's not the only language you can use to develop games and in a decade or so when you're comfortable with developing games in C++ and get bored, you could try out game dev in other languages :)
learn directx for c++:http://www.youtube.com/watch?v=0kpSiitk4eI
but if you are using Visual Studio, you can learn XNA: http://www.youtube.com/watch?v=yi167gMOi-I
and you need learn Game Design Theory and Practice: http://www.amazon.com/Game-Design-Practice-Wordware-Developers/dp/1556229127
najiawad0: you answer in wrong place, but thanks for the vote ;)
you tell me that you love programming, in these case, the C++ and that you use mac. my question is: what IDE you use now?
Does anyone know if ubuntu is good for programming? Is it good for game development?
sorry, i can't find your answer.. sorry.
but, maybe, you just include the directx header files...
see these book: http://www.amazon.com/Beginning-Game-Programming-Jonathan-Harbour/dp/1435454278
and maybe you find some examples and then you see if you have the header files.
sorry if i don't help you much, but you a point to start
i never use ubuntu. so i let for another person ;)
Ubuntu, like most Linux distributions, is great for programming. Fundamentally, Linux is an OS by programmers, for programmers (even though it has gotten very user-friendly for anyone else too, now). I tend to prefer Kubuntu (the KDE version of Ubuntu), as it is a bit more development-oriented, and the nativeness of Qt on it makes it all that much easier.
Is it good for game development?
Sort of. It is a good platform for a few reasons. First, it is a great platform for programming in general (game or otherwise). Second, game programming relies on either DirectX or OpenGL, and in Linux, OpenGL is available and generally up-to-date (but DirectX is Windows-only). Third, third-party libraries are very easy to install and use in Ubuntu, which is crucial to speed up the development of your games. Fourth, Linux is a Unix-like environment similar to Mac OSX, meaning that porting your game to Mac platforms will be easy.
However, it isn't a good platform for a couple of reasons. First, game development can often involve using a game engine (a library of code that does a lot of the ground-work for you) which are most widely available in Windows, but still, the majority (about 60%, I would say) are available in Linux too. Second, if you want to distribute your game, Windows would probably be your target, not Linux, but still, you could develop the game mostly in Linux, and only port it to Windows once you have a complete product.
Does anyone know if ubuntu is good for programming?
It depends on what you're programming. For the most part, programming something in Linux is simpler than programming it in Windows, just because libraries are handled by a package manager rather than having to go through the tedious process of manually copy/pasting includes and libs directories.
That being said, if you're using a Windows-only library like DirectX, you may be SOL on Linux.
Is it good for game development?
If you don't want an audience to play your games, sure.
I'm really sorry, najiawad0, but I had to ban your account because you stated you are under 13. Legally, we cannot allow you to post.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670558.91/warc/CC-MAIN-20191120111249-20191120135249-00289.warc.gz
|
CC-MAIN-2019-47
| 3,930 | 30 |
https://www.getshipit.com/blog/tools_remote_product_management/
|
code
|
Photo by Jcob Nasyr
Product management in a remote setting can be challenging. Since managing products is inherently very cross-functional and requires frequent communication, a remote setting can add barriers. This applies to any remote scenario, including being part of a remote office, being a remote employee, or as part of a fully distributed company. Besides having the right processes in place (a separate post will cover these), having the right tools in place can make a big difference. They should primarily support asynchronous communication well. And for the cases where synchronous communication is required, they need to be reliable - nothing is worse than spending the first 10 minutes of a call trying to get things to work.
Here are 6 of our favorite tools:
When working on product design with your designers, Figma allows for easily giving feedback on designs in a remote setting thanks to it’s built-in commenting functionality and everything happening live in the cloud. Their clickable prototypes are great for synchronous presentations and asynchronous exploration of designs. Even real-time collaboration is easily possible. It’s truly a game-changer. Also have a look at Figma’s dedicated resources for remote design.
Product requirements and Specs: Confluence or Google Drive
When working distributed, especially across several timezones it’s important that anyone can find information such as product plans anytime. It’s also important that asynchronous collaboration can happen. Product requirements documents (PRDs) are particularly useful to get everyone aligned in an asynchronous setting and to be able to contribute and discuss product requirements in one place. Confluence is a powerful tool to allow all of this. Alternatively, Google Docs / Drive is a very good option. (Here’s a useful template for a PRD in Google Docs.)
Product roadmaps and prioritization: shipit
Yes, that’s us! The reason we believe shipit is essential for remote product management is that it really connects high-level product plans with all the details such as product requirement documents or Epics and user stories in Jira. It also allows for voting on roadmap initiatives by team members in an asynchronous way, and after votes have been collected product managers can use these to prioritize the roadmap.
User stories and tickets: Jira, Zenhub or Github
Of course, Jira is well-established as a tool to manage your user stories and engineering tickets. It is versatile and can be used for Scrum, Kanban, or other processes, supporting remote work seamlessly. If you are looking for alternatives that are a bit “closer” to engineering work: Github has over the last months improved it’s planning and ticket flows. Zenhub is a well-done tool that builds upon github and comes closer to Jira’s functionality.
No article on remote work would be complete without mentioning Zoom and Slack. We wish we had something more creative to offer here, but these tools have proven to be extremely useful and reliable, so they are rightfully popular.
Screen recording and video clips: Loom
When working asynchronously it can be incredibly useful to share a new idea or to give feedback on a new design prototype or new app version via a quick screen recording and video comment. That’s where Loom comes in - it makes the process super fast and easy.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710909.66/warc/CC-MAIN-20221202150823-20221202180823-00398.warc.gz
|
CC-MAIN-2022-49
| 3,372 | 13 |
http://www.ceser.in/ceserp/index.php/ijts/article/view/12
|
code
|
Subscription or Fee Access
A Novel Iris Recognition System Based on Central Force Optimization
Iris Recognition has emerged as a reliable biometric technique in the recent past. Huge amount of work has been carried out continuously to improve its performance and accuracy. This paper proposes an iris recognition system using FFBNN-CFO. CFO is a novel metaheuristic technique which works on the basis of physical kinematics, and can be used for optimization of Neural Network parameters. Initially the eye images are preprocessed using adaptive median filter to remove salt and pepper noise. Then, the statistical features are extracted from the iris and pupil region. These features are then used to train the FFBNN. During training, FFBNN parameters are optimized by CFO to improve the accuracy of the system. In the testing phase the performance of the proposed iris recognition system is tested with the help of sufficient number of eye images from 2 major databases MMU1 and UBIRIS. The performance of the proposed method is compared and contrasted with other methods such as Adaptive Acceleration Particle Swarm Optimization (AAPSO), Particle Swarm Optimization (PSO) and FFBNN. The comparison shows that, the proposed iris recognition system based on FFBNN-CFO, gives higher recognition accuracy as compared to FFBNN-AAPSO, FFBNN-PSO and FFBNN.
Feed Forward Back propagation Neural Network (FFBNN), Adaptive Median Filter, Feature Extraction, Iris Recognition, Central Force Optimization (CFO).
Disclaimer/Regarding indexing issue:
We have provided the online access of all issues and papers to the indexing agencies (as given on journal web site). It’s depend on indexing agencies when, how and what manner they can index or not. Hence, we like to inform that on the basis of earlier indexing, we can’t predict the today or future indexing policy of third party (i.e. indexing agencies) as they have right to discontinue any journal at any time without prior information to the journal. So, please neither sends any question nor expects any answer from us on the behalf of third party i.e. indexing agencies.Hence, we will not issue any certificate or letter for indexing issue. Our role is just to provide the online access to them. So we do properly this and one can visit indexing agencies website to get the authentic information. Also: DOI is paid service which provided by a third party. We never mentioned that we go for this for our any journal. However, journal have no objection if author go directly for this paid DOI service.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474669.36/warc/CC-MAIN-20240226225941-20240227015941-00461.warc.gz
|
CC-MAIN-2024-10
| 2,549 | 6 |
https://smallworldbigdata.com/2015/07/it-pros-get-a-handle-on-machine-learning-and-big-data/
|
code
|
IT pros get a handle on machine learning and big data
An IT industry analyst article published by SearchDataCenter.
Unfortunately, predictive modeling can be fraught with peril if you don’t have a firm grasp of the quality and veracity of the input data, the actual business goal and the real world limits of prediction (e.g., you can’t avoid black swans).
It’s also easy for machine learning and big data beginners to either make ineffectively complex models or “overtrain” on the given data (learning too many details of the specific training data that don’t apply generally). In fact, it’s quite hard to really know when you have achieved the smartest yet still “generalized” model to take into production.
Another challenge is that the metrics of success vary widely depending on the use case. There are dozens of metrics used to describe the quality and accuracy of the model output on test data. Even as an IT generalist, it pays to at least get comfortable with the matrix of machine learning outcomes, expressed with quadrants for the counts of true positives, true negatives, false positives (items falsely identified as positive) and false negatives (positives that were missed).
…(read the complete as-published article there)
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099281.67/warc/CC-MAIN-20231128083443-20231128113443-00534.warc.gz
|
CC-MAIN-2023-50
| 1,257 | 6 |
https://meta.stackoverflow.com/users/7060472/roman-filippov
|
code
|
Member for 6 years, 1 month
Last seen more than a month ago
Saint Petersburg, Russia
BadgesView all badges
This user doesn’t have any gold badges yet.
This user doesn’t have any bronze badges yet.
This user hasn’t posted yet.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710933.89/warc/CC-MAIN-20221203143925-20221203173925-00316.warc.gz
|
CC-MAIN-2022-49
| 231 | 7 |
https://releases.aspose.com/zh/pub/net/new-releases/aspose.pub-for-.net-22.5/
|
code
|
浏览我们的产品 Toggle navigation
If so you can download any of the below versions for testing. The product will function as normal except for an evaluation limitation. At the time of purchase we provide a license file via email that will allow the product to work in its full capacity. If you would also like an evaluation license to test without any restrictions for 30 days, please follow the directions provided here.
If you experience errors, when you try to download a file, make sure your network policies (enforced by your company or ISP) allow downloading ZIP and/or MSI files.
From this release onwards Aspose.PUB supports .NET Core 6.0 as well. This on-premise C# API is also in comliance with .NET 5.0, .NET Standard 2.1, and .NET Framework 4.0. 以下 C# 代码示例演示了将 Microsoft Publisher PUB 格式转换为生成的 Adobe Acrobat PDF 文件是多么容易。
/ For complete examples and data files, please go to https://github.com/aspose-pub/Aspose.PUB-for-.NET
// The path to the documents directory.
string dataDir = RunExamples.GetDataDir_Data();
string fileName = dataDir + "halloween-flyer.pub";
var parser = PubFactory.CreateParser(fileName);
var doc = parser.Parse();
Aspose.Pub.PubFactory.CreatePdfConverter().ConvertToPdf(doc, dataDir + "result_out.pdf");
有关此版本中已修复的功能、增强功能和错误的完整列表,请访问 Aspose.PUB for .NET 22.5 Release Notes。
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679101195.85/warc/CC-MAIN-20231210025335-20231210055335-00121.warc.gz
|
CC-MAIN-2023-50
| 1,426 | 12 |
https://developer.nordicsemi.com/nRF_Connect_SDK/doc/2.4.1/nrf/protocols/zigbee/qsg.html
|
code
|
Zigbee quick start guide
This guide demonstrates some of the basic concepts of the Zigbee network using the nRF Connect SDK and the nRF Connect for VS Code extension. It guides you through the installation of the required tools and programming of the required samples.
As part of this guide, we are going to program three Zigbee samples onto three different development kits in order to set up a basic Zigbee network composed of three devices, or nodes. A node is “a testable implementation of a Zigbee application on a single stack with a single network address, and on a single network”.
The figure shows the Zigbee network star topology we are going to set up. In this topology, the nodes have the following responsibilities:
Zigbee Coordinator initiates and maintains the devices on the network. It also chooses the key network parameters. The coordinator’s radio is continuously listening for frames.
Zigbee Router extends the range of the network. For this reason, the router has the radio enabled at all times. However, in the star topology it is not moving packets through the network.
Zigbee End Device receives messages from the parent device, in this case the coordinator.
Each of the samples we are going to use for forming the network is based on the single-chip, single-protocol architecture, uses the default configuration (that is without any additional sample extensions enabled) and has a clearly defined role:
Zigbee network coordinator demonstrates the Zigbee Coordinator role and supports only the network steering commissioning mechanism.
Zigbee light bulb demonstrates the Zigbee Router role and implements the Dimmable Light device specification, as defined in the Zigbee Home Automation public application profile.
Zigbee light switch demonstrates the Zigbee End Device role and implements the Dimmer Switch device specification, as defined in the Zigbee Home Automation public application profile. Once commissioned into the network, it looks for devices with the implemented Level Control and On/Off clusters and can control the one that answers first.
All these samples also implement the Basic and Identify clusters, which are the basic Zigbee clusters.
Depending on the available device types and their number, Zigbee supports the following network topologies:
Star topology - where the coordinator communicates directly with the end devices and no routers are actively present, meaning they are either not present or not routing packets within the network.
Tree topology - where routers are located beyond their mutual radio range and are not able to communicate with each other. However, unlike in the star topology, the routers continue to move packets through the network.
Mesh topology - which allows full peer-to-peer communication.
In every Zigbee topology, each router and end device that joins the Zigbee network after its creation by the coordinator needs a parent device. When a device wants to join the network, it sends a beacon request to scan for available devices. The devices that can route the packets respond with beacons. Based on different factors of responses, such as signal strength, the new device selects the parent.
For end devices, the parent device, either a coordinator or a router, can store information meant for them. This is required because the end devices do not receive packets directly from other devices. Each packet meant for an end device needs to go through its parent, and the end devices need to regularly request and respond to packets from the parents. For example, in the nRF Connect SDK the Zigbee light switch device requests packets from the parent every three seconds. The end device does not route packets. It can also disable its radio to reduce the power consumption between the regular packet requests if the Sleepy End Device behavior is enabled.
If you want to learn more about Zigbee topics and terminology mentioned in this guide, read the following pages:
Zigbee architectures page to learn more about the Zigbee architecture available in the nRF Connect SDK
Common ZCL terms and definitions section in the ZBOSS user guide
Zigbee topologies in section 1.1.4 of the Zigbee Specification
For this quick start guide, you need three development kits of the following types:
You can mix different development kits.
Make sure that you have three development kits before proceeding to the next steps.
For this quick start guide, we will install the following software:
Toolchain Manager - An application for installing the full nRF Connect SDK toolchain.
Microsoft’s Visual Studio Code - The recommended IDE for the nRF Connect SDK.
nRF Connect for VS Code extension - An add-on for Visual Studio Code that allows you to develop applications for the nRF Connect SDK.
nRF Command Line Tools - A set of mandatory tools for working with the nRF Connect SDK.
SEGGER J-Link - Tool for handling the serial connection.
The following steps are a simplified version of the nRF Connect SDK’s Installing automatically procedure.
To set up the required software, complete the following steps:
Install the Toolchain Manager app:
Download nRF Connect for Desktop for your operating system.
Install and run the tool on your machine.
In the APPS view, click Install next to Toolchain Manager.
The app is installed on your machine, and the Install button changes to Open.
Open the Toolchain Manager in nRF Connect for Desktop.
Click SETTINGS in the navigation bar to specify where you want to install the nRF Connect SDK. Then, in SDK Environments, click the Install button next to the nRF Connect SDK version that you want to install. The nRF Connect SDK version of your choice is installed on your machine.
Click the Open VS Code button. The installation wizard checks whether you have the following software installed:
Microsoft’s Visual Studio Code
nRF Connect for VS Code extension
nRF Command Line Tools (with SEGGER J-Link)
If any of these items is missing, you are taken to its installation page to complete the setup. At the end of the process, the Visual Studio Code main window opens.
To program the samples, complete the following steps:
Open Visual Studio Code.
If you installed the nRF Connect SDK using the Installing automatically, you can click the Open VS Code button next to the version you installed.
Complete the steps listed on the How to build an application page in the nRF Connect for VS Code extension documentation.
Program the application to the board:
Connect your development kit using the serial port.
In the Connected Devices View, click Refresh Connected Devices. Your development kit appears on the list.
In the Actions View, click Flash.
When the programming is done, the LED 3 on the development kit turns on to indicate that the Zigbee network is open. After some time, it turns off and the Zigbee network needs to be reopened (see below).
Add the light switch application. Repeat steps 3 to 9 for the Zigbee light switch sample. The path to the application files is
Add the light bulb application. Repeat steps 3 to 9 for the Zigbee light bulb sample. The path to the application files is
nrf/samples/zigbee/light_bulb. The LED 4 turns on when the application is started.
Press Button 1 on the development kit programmed with the network coordinator sample to reopen the Zigbee network. After some time, the devices join the Zigbee network. On the development kit programmed with the light bulb sample, LED 3 turns on when the light bulb joins the network. On the development kit programmed with the light switch sample, LED 3 turns on when the device joins the network and LED 4 turns on when the light switch finds a light bulb to control.
- Reopening the network
If you find that you are having issues with your devices joining the Zigbee network, it may be because the network needs to be reopened manually. If the network is open, then LED 3 on the development kit programmed with the network coordinator sample will be on. If LED 3 is not on, then the network is closed and needs to be reopened again.
To reopen the network, press Button 1 on the development kit that has been programmed as the network coordinator. The network remains open for 180 seconds by default at startup, and after Button 1 is pressed. After 180 seconds have passed, the network will close and need to be re-opened.
After forming the Zigbee network, test the interaction between the devices:
Press Button 2 once on the development kit programmed with the light switch sample to turn off the light bulb’s LED 4.
Press Button 1 once on the development kit programmed with the light switch sample to turn on the light bulb’s LED 4.
Press and hold Button 2 on the development kit programmed with the light switch sample to decrease the light bulb’s LED 4 brightness.
Press and hold Button 1 on the development kit programmed with the light switch sample to increase the light bulb’s LED 4 brightness.
After you complete this quick start guide, we recommend that you get familiar with the following topics:
If you want to start configuring samples:
If you want to test a multiprotocol solution, see Multiprotocol Bluetooth LE extension of the light switch sample.
If you want to start developing for co-processor designs:
If you want to learn more about ZBOSS:
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817081.52/warc/CC-MAIN-20240416093441-20240416123441-00093.warc.gz
|
CC-MAIN-2024-18
| 9,261 | 71 |
https://courses.cs.ut.ee/2019/cg/fall/Main/Project-ProceduralEarthbending
|
code
|
Juan Carlos Ramos Martinez, Mykhailo Nitsenko
This project is about mechanics of Earthbending from the anime Avatar. In the essence the Earthbending is a way to interact with the ground. Our goal is to design an algorithm and figure out controls of earthbending magic. In the most abstract blueprint the task consists of procedural mesh editing and VR technology integration.
The repository is hosted on GitHub and can be found here.
- Juan Carlos Javier Ramos Martinez is responsible for VR integration, controls and game logic implementation.
- Mykhailo Nitsenko is responsible for terrain editing algorithm.
Now we are going to explain the whole process of achieving the final result from the initial experiments and challenges that we encounter on the this journey.
The first idea that came was the game style. It had to be presented in a way that does not require a powerful machine to run complex geometries and fancy effects because we have the limitations of the Oculus Quest device. For this we came with the idea of low poly style. This implied to have meshes with minimum geometry complexity and straightforward texturing. Besides, low poly should allow us to design the level and make changes quicker. Also low poly looks great with proper shading as these examples.
The game mechanics played a huge role on the proyect. As initially said, we had the idea of providing the experience of playing with the earthbending effect. We thought that would be great to make it on a VR experience. Then, shaping it into a more game looking experience we designed a game map that compasses the levels, enemies and goals that a proper game should have. This is how the initial game map idea looked like
As it can be seen, is basically a platform game that requires to the user to climb level by level to reach the highest point and win. Each level is composed by one or many islands in which the enemies are spawned to interrupt and attack the player. Then after getting some great 3d assets from here and here the task was now to build the actual game map. After many hours of level design we got this.
We also needed to get or build actors in the game. For this purpose we got assets to make the game more playable.
We have enemies that have the role of blocking the path of the main player character. Each enemy has the same defined behavior: patrol the island, look for the player, attack and die. This is the list of complete enemy actors.
Main Game Player
The player is the main actor. It is spawned on the first level and hast the goal to reach the highest level. The player has defined interactions that will be described below. Worth to note that we were developing for two types of view player. As First Person Shooter and as VR Person. The first one mainly for developing purposes and the other for the real game interaction. This came with tradeofs to put more effort into one and to take the time to implement more logic into the other. As this is a lesson learned, it will be detailed later.
Oculus Quest was the VR headset of choice because it offers a standalone experience with no extra wires while you are playing. This comes with a cost - a running power. For that extent the natural way to proceed was first to test some applications and some demos testing out the complexity and capacity of the device because in every VR immersion we don't want to experience lag in the game. The first step was to choose of the right tool for developing the game. The obvious options that comes to one's mind is between Unity and Unreal Engine. The task was to explore which of them provides less friction in the integration of VR and the game. Both tools provide good documentation and plugins to work with VR right away but we ultimately pick Unreal Engine because of the ease of prototyping cases, the graphics, and the fact that it works with C++. Here is a basic integration in both softwares showing the mapping between the character's hand and the controls.
Then, the task was concerned to bring some interaction into the scene. At first, a quick placement of objects with integrated physics was made to be sure they act fluidly once deployed into the headset. It turned out that when the build process started it took quite a long time to get finally into the Quest (like 1hr) because it was required to compile the shaders, build the lights, build the scene, build everything in an android-like package and then it was ready to be tried out. Some time was spent trying to test corner-cases when potentially the physics could break but none were found. Next build and deployment time was faster. Adding more polygons and more complex objects seemed to be ok with this experiment.
The next steps were to make the graphics scene of the game, integrate the control buttons to interact with the polygons and area of the floor to have the Earthbending effect. After that the path was to make this more immersive with grain-defined interactions and gameplay. More of the code and blueprints are at the repository.
Each island can be navigable by the player and the enemy. For doing this, the user has to press and maintain the A button of the VR Control to point into the desired destination and release the button in order to teleport. This was modified to work only on the right hand.
To step up into the next level island the player has to climb the ladder that is located near the edge of the last island. The user has to reach the highest point and realease the grabbing and landing into the next level in which again should have to reach the next ladder. For making this feature possible, a complete understanding of the VR Motion Controller implementation was required (this was also useful later to implement the bending). The climbing was implemented to work on both hands by pressing the backside trigger of the control.
The enemy is an implemented NPC with basic AI rules. On each level has predefined points what will serve to go from one to another to mimic the behaviour of defending a zone. When the enemy is being distracted or it senses the Player within the defined area, it chases for him.
The player has te ability to attack by bending (defined bellow) and shooting (from FPS view). The enemy attacks by getting close to the player and hitting straight to to the player position. When the player gets far from the enemy, this has the predefined behaviour of following to chase and keeping attack if the player is still within the range.
The main player has te ability to attack by bending the terrain of the island in which is currently standing. It makes damage to the enemy when the enemy is in the area of attack.
"Three.js" environment were used as initial sandbox for terrain modification algorithm because of the ease of implementation that is perfect for large number of iterative experiments.
A plane geometry created from height map was used as a terrain to test on. Real-time height map modification was implemented and used successfully inside the "Three.js" environment.
We faced many challenges along this journey. We first had to get familiar with the engine and the blueprint terminology. Then the implementation was something that iterated a lot. First with the initial idea of terrain blending by modifying vertex on runtime was not a trivial task. Then we implemented using material behaviour and we got an appealing result. Also implementing for VR was challenging from the first moment. The controlls, the mechanics and optimizations were subjects to be concerned on each stage.
Game Demo Reels
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057424.99/warc/CC-MAIN-20210923135058-20210923165058-00556.warc.gz
|
CC-MAIN-2021-39
| 7,541 | 25 |
http://brainoff.com/weblog/2009/10/08/1495
|
code
|
MapAction has deployed to the Philippines to support the United Nations response to the Tropical Storm Ondoy disaster in the Philippines. They’re producing many map products, distributed through ReliefWeb and are using OpenStreetMap data collected by the incredible and resilient OpenStreetMap Philippines community.
I hope this makes a small difference to the work there, to help everyone there affected by the disaster.
This is a big result of several years work by the OpenStreetMap community to make open data comprehensive and usable enough for places where it’s needed most .. the places most vulnerable, and also least mapped. It’s taken a lot of effort to listen to the intense requirements of disaster response, and likewise, for forward thinking responders to understand the value of OSM. All “good news”, but of course the floods in Manila are just one of several sudden onset disasters the world face right now, and the unfortunate fact is that they will happen again. This positive step, to my mind, means that we’re just a little bit more prepared.
I really admire how MapAction works (and wish I had taken the chance to train with them when I lived in the UK). They quickly respond to disasters in the first crucial moments, collect data and create maps. They’re agile, but still understand well institutional needs. Mostly, their tools are ESRI oriented, but they have a desire to learn. I expect they used the Shapefile exports from Cloudmade.
This kind of use of OSM, roads for background contextual data in a PDF, is just a first step. OSM is figuring out how to make paper products, and integrate many web and mobile toolkits into deployable, off the grid, interactive applications. We’re developing techniques for authorities to approve revisions of OSM. We’re working closer with responders, in forums they’re familiar with, and soon enough the PDFs on ReliefWeb will contain the message “if you want to download or edit the data in this map, just open this url”. Disasters inevitably strike hardest on the poor, especially the improvised urban living of slums, and we’re working to map these invisible places. Check into Humanitarian OSM Team for more.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154310.16/warc/CC-MAIN-20210802075003-20210802105003-00241.warc.gz
|
CC-MAIN-2021-31
| 2,201 | 5 |
https://digitalusa.info/daily-tech-news-3-headlines-08-26-21-shorts-news/
|
code
|
#Shorts #News #TechNews
Don’t Click this Link: https://bit.ly/3g7SJeC
In this video, I’ve covered 7 Tech News Headlines for today. Watch this video till the end. Please do follow my channel. If you are really enjoyed this video, Please do hit a like. Share to your friends and family and let them too know about this project. Subscribe to this channel and so you will never miss any of my videos. Hit the bell icon near to the Subscribe Button so that you will receive a notification after I upload the videos. Encourage us to do more
For detailed News : https://youtu.be/DbGlL6ZDr7A
Our Channel’s Official Blog: https://bit.ly/3c3Hgvh
If you have any issues or any doubts regarding this video, feel free to reach me on my Instagram Page: https://bit.ly/3yLDIYh
Facebook Page: https://bit.ly/3c2uA7W
My Official Twitter link: https://bit.ly/3p1Jdxx
Tumblr Blog: https://bit.ly/3yGz5Pr
You can too comment below this video for asking doubts.
Hit a Like button if you too made this project and it was perfectly working
Thanks for Watching This Video Guys!!!!
See you all in the next video….
Music used in this video:
Music: Cutting Edge by Shane Ivers – https://www.silvermansound.com
Licensed under Creative Commons Attribution 4.0 International License
Music promoted by https://www.chosic.com/
All the videos, songs, images, and graphics used in the video belong to their respective owners and I or this channel does not claim any right over them.
Copyright Disclaimer under section 107 of the Copyright Act of 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, education and research. Fair use is a use permitted by copyright statute that might otherwise be infringing.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335424.32/warc/CC-MAIN-20220930020521-20220930050521-00163.warc.gz
|
CC-MAIN-2022-40
| 1,753 | 19 |
https://www.npr.org/sections/money/2011/03/17/134621461/other-peoples-money
|
code
|
At Modeled Behavior, economist Karl Smith writes:
I don't mean that my comments are morally defensible. ...
I am sure the emotion I am having right now leads many people on Wall Street to do not so nice things.
...you should leverage your house to the maximum the bank will allow. You should always leverage to the maximum your counterparty will allow.
If you don't get this then you don't get the concept of "Other People's Money" which is fundamentally superior to your own money, because it belongs to someone else. If you lose it , they are screwed. They could try to screw you in return but it is always harder to re-screw than to screw.
If there is screwing to be done you want to be the first one to screw, not the last. This is applicable in many contexts, but especially in finance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813109.8/warc/CC-MAIN-20180220224819-20180221004819-00521.warc.gz
|
CC-MAIN-2018-09
| 791 | 6 |
https://www.deviantart.com/salesworlds/art/Final-Fantasy-VIII-World-map-721008244
|
code
|
This is the map from the videogame Final Fantasy VIII. As it has no name, I named it "The World". I hope you like it.
Would you be interested in working with myself to make a board game map? Would be a hobby i have no money to pay you. I'll send you a summary of the game and the how the game functions if you are interested in reading that before making a decision.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590493.28/warc/CC-MAIN-20180719031742-20180719051742-00379.warc.gz
|
CC-MAIN-2018-30
| 366 | 2 |
https://github.com/viion
|
code
|
Prevent this user from interacting with your repositories and sending you notifications.
Learn more about blocking users.
You must be logged in to block users.
Contact GitHub support about this user’s behavior.
Learn more about reporting abuse.
Digital Asset Manager in electron, intended for Unreal Engine 4 bridging and referencing.
A simple vagrant stack I use.
Forked from robiso/wondercms
WonderCMS - fast and small flat file CMS (5 files)
Forked from xivapi/companion-php
A library for interacting with the FFXIV Companion App API
Seeing something unexpected? Take a look at the
GitHub profile guide.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573197.34/warc/CC-MAIN-20220818124424-20220818154424-00524.warc.gz
|
CC-MAIN-2022-33
| 608 | 13 |
http://dba.stackexchange.com/questions/tagged/star-schema+design-considerations
|
code
|
Database Administrators Meta
to customize your list.
more stack exchange communities
Start here for a quick overview of the site
Detailed answers to any questions you might have
Discuss the workings and policies of this site
Should I snowflake or duplicate it across my facts?
I'm building up a data warehouse to be used by SSAS to create cubes on, and I'm debating between two possible schemas. In my warehouse, I've got two different fact tables that tracking daily changes ...
Mar 26 '13 at 15:45
newest star-schema design-considerations questions feed
Hot Network Questions
The introduction for Context in Wagner's book is out of date?
Looking for a specific symbol used in set theory, can't find on detexify
Project Manager asks for complete 100% confidence everytime committing code
How are system commands like ls created?
Sort characters by darkness
Why should I use a pointer rather than the object itself?
Undefined Behavior Killed My Cat
Can a system be 100% Data Driven?
Examples of mathematical results discovered "late"
Why don't aeroplanes automatically put out engine fires?
I am considering leasing a new car for my ex-wife. What can go wrong?
Can humans eat grass?
Can be solved without L'Hopital?
Is there any media/video conversion software that will use the graphics card as well as the CPU?
What is exponentiation?
Declining offer and taking reimbursement for interview expenses?
Can my employer require me to work outside my established working hours?
How a half-life works
Problem, beamer, itemize
What do winglets do to increase aircraft performance?
Output an image of your source code (not-quite-a-Quine)
What's the meaning of "you take it, you fly it, and you have something going for it"?
a generalization of the mean value theorem?
more hot questions
Life / Arts
Culture / Recreation
TeX - LaTeX
Unix & Linux
Ask Different (Apple)
Geographic Information Systems
Science Fiction & Fantasy
Seasoned Advice (cooking)
Personal Finance & Money
English Language & Usage
Mi Yodeya (Judaism)
Cross Validated (stats)
Theoretical Computer Science
Meta Stack Overflow
Stack Overflow Careers
site design / logo © 2014 stack exchange inc; user contributions licensed under
cc by-sa 3.0
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999655215/warc/CC-MAIN-20140305060735-00019-ip-10-183-142-35.ec2.internal.warc.gz
|
CC-MAIN-2014-10
| 2,203 | 52 |
http://www.pearltrees.com/key123/key125/id1743184
|
code
|
Expression Blend 4 with Silverlight(ASP.NET 3.5 Silverlight 4.0) Foundation Expression Blend 4 with Silverlight takes you through your first steps in creating Rich Internet Applications (RIAs) using the latest release of Microsoft\'s technology. You\'ll explore features such as custom user controls that you can reuse throughout your projects and the media element that allows you to easily add sound and video to your applications. Download .Net 3.5 EBook - Beginning ASP .NET 3.5 in C# 2008 Second Edition - Free eBook Download .Net 3.5 EBook - Beginning ASP .NET 3.5 in C# 2008 Second Edition - Download ebook Download .Net 3.5 EBook - Beginning ASP .NET 3.5 in C# 2008 Second Edition
Yuku a social universe of communities united by people and their passions Join a Social Network on Yuku | Free forums, social networks, communities, chat rooms
How to: Download Files with FTP
English for Friendship Whatever you want to call it, there are lots of ways of contacting other people who wish to learn or improve their English or simply want to share their love of English. English for Friendship - Pen Pals - E-Friends for English learners
Your Favorite Music Was Invented By These Famous Piano Composers Since the inception of the pianoforte in 1709 , there have been many famous piano composers who have had a direct impact on the history and development of piano music over the past three centuries. At the dawn of the 18th century, the piano was still in its’ infancy having recently evolved from other musical instruments like the “Harpsichord” and the “Clavichord”. Therefore, keyboardists of that time, such as Johann Sebastian Bach , born in 1685 , composed keyboard works that were never actually intended for the piano.
Piano Lessons - Want To Learn The Piano?
Teach Yourself Piano - Piano Lessons For Beginners, Learn Now!
Piano Lessons for Beginners
Welcome to your first ten free beginner piano lessons! If you’ve ever wanted to get your hands on a piano and just start playing it, you’re in the right place! 10 Free Beginner Piano Lessons
ASP.NET MVC 2: Basics, Introduction by Scott Hanselman | Matthijs Hoekstra
C# 3.0 introduces a new feature called lambda expressions. While this is not a revolutionary thing, it opens up a plethora of new possibilities for .Net programming. This post aims to introduce lambda expressions by providing a backgrounder, looking into its syntax and providing examples along the way. Lambda Expressions in C# - jakelite
By Chris Peiris 15 Seconds : Creating a .NET Web Service
by Rick Strahl http://www.west-wind.com/ Last Updated: 03/7/2002 (updated for .NET Release) Part 2: Passing data over .NET Web Services: http://www.west-wind.com/presentations/dotnetwebservices/DotNetWebServicesData.asp Source code for this article: http://www.west-wind.com/presentations/dotnetwebservices/dotnetwebservices.zip Over the last few months I've spent a lot of time talking about XML and Web Services and how you can build and consume them. This time we'll look at the new features in Visual Studio.NET and ASP.NET that provide a very easy mechanism for creating Web Services and more importantly the easy mechanism used to consume those same Web Services using the .NET framework's built in support for Web Services. Web Services promise to bring information into your applications from the Internet in much the same way that browers have made information available to end users. Creating Web Services with .Net and Visual Studio
Abstract Web Service Definition Language (WSDL)
Home > Learn XML > XML Whitepapers > XML Schema White Papers > XML Schema Tutorial XML Schema Tutorial
XML Schema Tutorial: Home
Overview XML Schema Tutorial - Part 1/5 - Defining Elements and Attributes
XSD Tutorial, Part 1 of 5: Elements and Attributes XSD Tutorial: XML Schemas For Beginners - CodeGuru
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164937476/warc/CC-MAIN-20131204134857-00066-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 3,837 | 18 |
https://forum.yiiframework.com/t/chhtprequest-getservername-not-always-working/61032
|
code
|
Hello fellow Yii users
I would like to configure my application so that it automatically picks up my dev.php or prod.php configuration file depending on which environment it’s ruuning in.
In order to do that I’m using CHttpRequest::getServerName to know which machine is running the code, however this function doesn’t work when I use it as part of a Command that I’ve written and which I run using yiic.
After some investigation I found that when running yiic $_SERVER doesn’t contain the HTTP_HOST or SERVER_NAME variables, would anyone know why ?
Also more generally speaking is what I’m trying to achieve a bad practice ? If yes what good practice is there to handle this situation ?
Many thanks in advance for your help.
You can use gethostname(). It probably is bad practise; a better way might be to have two different yiic files and use one in dev and the other on the live server. I started with your solution and have since switched to separate files.
Also, when you run a console command, it’s not an HTTP request, so you wouldn’t expect HTTP specific variables to be defined.
Thanks very much Keith for your quick reply, I’ll try to use gethostname() as a temporary solution, but might like you said to move to 2 different types of installation, that sounds better.
I do what you want to do and[size=2] I have the following "alternatives":[/size]
[size=2] $host= gethostname();[/size]
The third one is used when in CLI. Of the first two, I only need the second one. The last one is used to switch according to a local url.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100016.39/warc/CC-MAIN-20231128214805-20231129004805-00031.warc.gz
|
CC-MAIN-2023-50
| 1,552 | 12 |
https://www.techspot.com/community/topics/world-of-warcraft-on-hp-pavilion-a1020n.49981/
|
code
|
So I searched around the forums to find if there's any topic created on such a thing, and I didn't come up with anything. Basically I'm running on this rig I bought from the shop link here . I haven't changed anything but I am planning on upgrading the ram when I have the money. I was curious what I could upgrade my video card to. I was reading up on the World of Warcraft and I just wanted to give it a go. Any help would be much appreciated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886397.2/warc/CC-MAIN-20180116090056-20180116110056-00108.warc.gz
|
CC-MAIN-2018-05
| 445 | 1 |
http://social.msdn.microsoft.com/Forums/sqlserver/en-US/4ae5869f-bf64-4eef-a952-9ac40c932cd4/can-i-cross-reference-columns-in-a-view-back-to-the-base-table-using-data-in-the-system-catalogs?forum=transactsql
|
code
|
I am trying to do some cross referencing of the columns in a view back to the table(s) and column(s) it is built over and I am having some difficulty. Take this example:
SET ANSI_PADDING ON
CREATE TABLE [dbo].[PeopleTable](
[PersonID] [smallint] IDENTITY(1,1) NOT NULL,
[LastName] [varchar](50) NOT NULL,
[FirstName] [varchar](50) NOT NULL,
CONSTRAINT [PK_PeopleTable] PRIMARY KEY CLUSTERED ([PersonID])
CREATE VIEW [dbo].[PeopleView] WITH schemabinding AS
FirstName AS First,
LastName AS Last,
FirstName + ' ' + LastName AS FullName,
CREATE UNIQUE CLUSTERED INDEX [IX_View_PersonID] ON [dbo].[PeopleView] ([PersonID])
SET ANSI_PADDING OFF
select * from sys.columns where object_id = object_id('PeopleTable')
select * from sys.columns where object_id = object_id('PeopleView')
select * from sys.sql_dependencies where object_id = object_id('PeopleView')
What I want to do is, using the system catalog tables, determine that column 1 of PeopleView is column 3 of PeopleTable, column 2 of PeopleView is column 2 of PeopleTable, column 3 of PeopleView is computed, and column 4 of PeopleView is column 1 of PeopleTable.
My ultimate goal is to correlate columns in PeopleView back to foreign key constraints (even though there are no foreign key constraints in this example) on PeopleTable, which should be trivial once I can figure out how to match the columns.
sys.columns and sys.sql_dependencies give me pieces of the puzzle, but nothing puts the puzzle together. sys.sql_dependencies is the closest, it has the columns the view references, but does not tell which view column references which table column. If only the column_id were filled in with the column_id from the view, that would complete it for me.
I've been through all the sys. & INFORMATION_SCHEMA. views and have not found anything usefull. I'm hoping that I don't have to take definition from sys.sql_modules and parse the text to cross reference. Doesn't the database engine need a quick way to link view columns back to the source columns?
It's almost like I need sys.view_columns or something like that...
As an interesting side question, shouldn't is_computed in sys.columns for FullName of PeopleView be 1, not 0?
Moved byTom PhillipsModeratorSaturday, February 06, 2010 4:35 AMTSQL Question (From:SQL Server Database Engine)
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663359.6/warc/CC-MAIN-20140930004103-00427-ip-10-234-18-248.ec2.internal.warc.gz
|
CC-MAIN-2014-41
| 2,296 | 23 |
https://www.rc-thoughts.com/2016/08/lua-momentary-switches-to-latching/
|
code
|
I was trying the voice command functions in DC-24 today and noticed that while it works as it should the voice-commanded switches are momentary. And since I was after a ON-OFF function I needed a way to make a function that on first activation would make things go ON and on the next activation would make things go OFF.
Perfect opportunity to learn some more LUA…
What does this LUA-script do?
A few things actually:
- Possibility to configure 5 switches
- Has a monitor screen for easy testing
- Activate momentary switch -> latching switch goes ON
- Activate momentary switch again -> latching switch goes OFF
- All switches created bu application are OFF on initialization of model
There is one important thing to remember, the momentary switch is allowed to be ON for max. 2 seconds. Any longer than that makes the latching switch return to its previous state. Leaving the momentary switch ON for a long period results in application switch jumping between states every two seconds.
Where to get it
Use of application
This is easy to use. Open from menu “Application” -> “Momentary to Latching” and from the applications “Momentary To Latching”-screen set switches as you would normally do:
To the left of your switch is the status display of corresponding latching function:
In the picture above we can see the latching switch 1 being active even when selected switch Sf is not. Activating Sf again will return the latching switch 1 to OFF.
This application is perfect for those voice command switches, after giving a voice command the voice switches are active only for a small moment, they are not latching. This gives you more possibilities to use them.
After setting the desired amount of momentary to latching switches up you can use them where ever you would use switches:
That was so easy!
If you use this I’d very much would like to hear it so post in the comments or drop me an email!
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476464.74/warc/CC-MAIN-20240304165127-20240304195127-00344.warc.gz
|
CC-MAIN-2024-10
| 1,915 | 19 |
http://www.verycomputer.com/420_81bedf2e67628eda_1.htm
|
code
|
Hi at all!
I have a problem (I think a virus) with Exchange Server 5.5. SP4.
I have the "priv.edb" file that is too big and I don't have any space on the
disk. So the "Microsof Internet Mail service" and "MTA service" don't start.
I deleted some files on the disk to have 10 Mb free and I started the
Exchanges services. But immediately I had a lot of strange messages in
"outbout" and the "priv.edb" increased faster.
Could you help me, please ?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703520883.15/warc/CC-MAIN-20210120120242-20210120150242-00109.warc.gz
|
CC-MAIN-2021-04
| 446 | 8 |
https://www.widelands.org/forum/topic/2906/?page=11
|
code
|
Where is it?
I'm waiting for the approval of Kaputtnik, he said he wouldn't have much time in the following days.
As for the ELO system, not sure it should be the top priority. I think the biggest problem is for both players to talk to each other about the hours they want to play at.
If you think so...
But why not?
The big discussion to have is on how to know who won each match? Upload replay? Both player must answer a questionnaire? If so, then when should it appear? What to do when a player lies?
Would it be too hard to automatize that? And if in online matches own headquarters would be destructible, surrendering would be technically possible (in most win conditions). The problem is just to decide what happens if the game crashes, if players leave and so on...
For example, a player could be considered as loosing if he leaves the match, but the players could maybe also agree on continuing the match later, so the match will not be ranked before finished... Or whatever...
Kaputtnik has a lot of experience with updating and deploying stuff on the website, so don't worry.
Oh yeah I'm not afraid of his work. I'm afraid of mine But with all your reviews I think indeed it will be fine
I will make a database backup first... so if really something strange happens, which i do not believe, we can go back. The reason why i want this to go in the real environment is: We can't make that many testing, e.g with different timezone settings, only with a few developers. If some things needs fixing we can do that also after deploying
It would be fine if WorldSavior would organize a small tournament for testing
Actually I don't have that much time for doing that. And isn't the module for more spontaneous matches?
Will try to deploy tomorrow.
Yeaaahhh thank you
Edit: Worldsavior, ready for a rematch when you want!
Yeah, why not Rematch after five months, lol...
Not that I expect to win but i m interested in the strategic test!
Strategic test of what? Let's find it out...
@discussion: What I saw when taking a look at the module: Even though my profile setting is CET, the module shows UTC...
"Welcome WorldSavior, Playtime Scheduler". I'm not the playtime scheduler
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027317130.77/warc/CC-MAIN-20190822130553-20190822152553-00392.warc.gz
|
CC-MAIN-2019-35
| 2,179 | 21 |
https://loftywriters.com/2023/02/practice-problem-short-run-macroeconomics/
|
code
|
Please complete some of the questions on page 23-27 of the document: questions 2,3,4,8,9,10,14,15.
Answer three questions briefly:
1) What were the most important 1-2 new things you learnt from the lecture and/or readings that you did not know before class? Describe one way in which what you learnt connects to either a different subject/topic you are interested in, or a personal experience.
(2) What were 1-2 points discussed in lecture/readings that you are still confused/unclear about and would like some further clarification on?
(3) How do you feel about your learning in this class overall?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100989.75/warc/CC-MAIN-20231209233632-20231210023632-00763.warc.gz
|
CC-MAIN-2023-50
| 599 | 5 |
https://www.chepicap.com/en/news/1513/iame-leaves-eth-for-qtum.html
|
code
|
IAME, a blockchain technology company has stated that picking the right blockchain to build on is no different than getting married, it's a long-term commitment based on trust (in the lead team), love (of the tech), and filled with hope (of having plenty of dApps together). As such, IAME has announced their decision to work QTUM instead of Ethereum.
It’s important to keep in mind that not all blockchain projects are built with the same objectives in mind. For IAME, their identity framework requires primarily smart contract capacities which are supported by both Ethereum and QTUM.
IAME have stated that QTUM is favourable over Ethereum because QTUM uses UTXO that can apply the simple payment verification (SPV) protocol, making it far more efficient.
Additionally, QTUM operates segwit with 2mb block size and a block time of around two minutes. This translates into 70 tx/s, which will be boosted to 20 000 tx/s through trustless off-chain channels, making smart contract operations on a massive scale feasible.
Considering IAME is a decentralised identification framework purpose built for the cryptocurrency ecosystem, IAME can resolve Know Your Client (KYC), Anti-Money Laundering (AML), and Counter-Terrorism Financing (CTF) problems to bridge QTUM into the regulated world.
Check out Medium.com for all the details.
After a thorough month of R&D, the IAME Identitied Transaction Framework is making a strategic move to $QTUM @QtumOfficial. You can read more on our switch here https://t.co/l9ApgG9eEV #IAMEIdentity #QTUM #UTXO #DApp pic.twitter.com/VIN8rBsU2b— IAME (@IAMEIdentity) June 20, 2018
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247482186.20/warc/CC-MAIN-20190217152248-20190217174248-00507.warc.gz
|
CC-MAIN-2019-09
| 1,612 | 7 |
https://coderanch.com/u/244131/Pankaj-Kumarkk
|
code
|
I have a query on a design question.
The requirement is as follows:
I have to develop a generic rule service. My application has list of possible rules as components (say Rule1, Rule2, Rule3, Rule4, Rule5, Rule6, Rule7 and so on). Based on user input I have to trigger one or more of these rules. e.g
If input=1 then trigger Rule1, Rule2, Rule3
If input=2 then trigger Rule1, Rule2, Rule4
If input=3 then trigger Rule1, Rule2
If input=4 then trigger Rule5, Rule6, Rule7
and so on.
I have designed all rules to be implementing same interface(say RuleInterface).
RuleInterface has a single method as follows - execute()
My design approach is as follows:
Develop a RuleProcessor
which will have a attribute - Collection<Rule> ruleCollection
and a method process(int input) which will iterate each rule from rules and execute it.
My query is how do I design the set-up of ruleCollection attribute.One design I could think of is to populate all rules combination in DB and then use it to populate the ruleCollection attribute. Thus given above requirement, we will have 4 entries in DB (one for each input value). Is there a better and simple design possible(I am sure there is). I am tending to look at a design solution which is java based (and not necessarily dependent on DB) but am open to all the suggestions. I am using spring framework so if spring provides something out of the box then I would prefer that.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655247.75/warc/CC-MAIN-20230609032325-20230609062325-00065.warc.gz
|
CC-MAIN-2023-23
| 1,411 | 15 |
https://answers.sap.com/questions/10052466/limits-in-su01-to-user-group-and-locks.html
|
code
|
I've created a user group TEST and TEST2, and a new role in PFCG with only SU01 and only the authorization object S_USER_GRP activated.
One user has been given the role and this is the users only role. However, when running SU01 the user can lock users that are added to TEST2 even though the class limits the user to group TEST.
Can you please help me figure out why this happens?
Also, is it correct that I have to add ALL users to a group to be able to limit editing of users inside one particular group?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945440.67/warc/CC-MAIN-20230326075911-20230326105911-00792.warc.gz
|
CC-MAIN-2023-14
| 507 | 4 |
http://www.gearslutz.com/board/electronic-music-instruments-electronic-music-production/748205-help-plz-mpc-60-not-loading-programs.html
|
code
|
Help plz! MPC 60 is not loading programs.
If anyone could offer any possible solutions I would be most appreciative.
While away on vacation I left a floppy disc in my MPC 60 (turned off of course). Upon my return I turned the MPC on with the disc still inserted.
Per usual, the disc automatically began to load once I turned it on - loading the program. Soon I got this error:
This file is internally corrupted and can't be loaded: it's internal type ID doesn't match its 3-letter name extension.
I ejected that disc and loaded another - just to see if the program would load. It did. I banged out a new sequence with that program. I then saved the sequence.
Today, I went back to load the second disc and I got the exact same error. I then went and loaded the first corrupted disc and it's program will not load either and displays the same message.
I then loaded another disc. It's program loaded fine. I banged out a simple sequence and saved just to test if the machine was corrupting disc. I then shut off the MPC and restarted it. This time the disc loaded all programs fine.
What is interesting is that the disc that give the corrupted messages will load sequences and will also load the individual samples?!?!?
If anyone can help figure out what is going on it would be very very very appreciated and I will send you some great gear karma in the cosmos. The song I originally was trying to load was basically done and just needed a proper mixdown/ recording. I'd be terribly upset to loose it.
Admin: I am thinking of also posting this in the hip hop section in hopes some people there may have insights. If this is against policy please let me know.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697552127/warc/CC-MAIN-20130516094552-00024-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 1,658 | 11 |
https://iotosphere.com/2019/08/19/carl-bugeja-is-back-with-a-new-pcb-robot-design/
|
code
|
If you’re only thinking inside the box, a PCB is just a way to connect your electronic components together neatly in a small space. But if you can think a bit more unconventionally, PCBs can be used for so much more. A great example of that is a badge, and badge makers do a fantastic job of making the PCB a work of art in its own right. Another is how Carl Bugeja has been working on using coils on flexible PCBs as actuators, and he is back with a new video on the latest iteration of his PCB robot design.
Bugeja has been working tirelessly over the past couple of years to design and experiment with PCB-based actuators. Almost all of his designs utilize coil traces on the PCB as electromagnets. By placing a permanent magnet nearby and precisely controlling the current going to those coils, movement can be produced. He has demonstrated that in various ways, including a PCB linear actuator. Recently, he has been working to use PCB actuators to give small robots locomotion. He’s now on the third version of his PCB robot design, and has learned a lot from the process.
In this most recent video, Bugeja explains his work. The current iteration of the PCB robot has two “legs” made up of electromagnetic coils on a flexible PCB. A 3D-printed frame above those coils holds two permanent magnets. By quickly oscillating power to the coils, they are pulled towards the magnets. The vibrating motion from the flexible PCB moving back and forth pushes the robot along. Controlling how it moves, however, has proven to be tricky. Just re-positioning the battery slightly causes the robot to move in a different direction — or not at all. But Bugeja is still making good progress, so be sure to subscribe to his YouTube channel to follow along with his experiments.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735882.86/warc/CC-MAIN-20200804191142-20200804221142-00054.warc.gz
|
CC-MAIN-2020-34
| 1,777 | 3 |
http://www.slideserve.com/mabli/source-hymnsandcarolsofchristmas-hymns-and-carols-deck-the-hall-htm
|
code
|
Source: http:// www.hymnsandcarolsofchristmas.com/Hymns_and_Carols/deck_the_hall.htm Deck the Halls with Boughs of Holly. This song’s music (but not its words ) was developed in Wales. It resembled songs by English Madrigals in the 1500’s.
Deck the Halls begins to distinguish between Holy Day and Holiday with its festive theme for a joyous New Year.
One London harpist, Edward Jones published an early version of the song in 1784 in his book: Musical and Poetical Relicks of the Welsh Bards.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607849.21/warc/CC-MAIN-20170524173007-20170524193007-00537.warc.gz
|
CC-MAIN-2017-22
| 497 | 3 |
http://www.woot.com/forums/viewpost.aspx?postid=5577121&pageindex=7&replycount=259
|
code
|
quality posts: 30
limebo wrote:Never mind, found it.
Booooo! My activation code doesn't work. Tried case sensitive... all lower... all upper... as typed... swapping every combination of 0's O's 1's and I's.
Guess I need to submit a support ticket... (hoped someone here had already had problem and solved it).
... does not own an inflatible Ben Wallace... yet
quality posts: 20
By far the worst product I've bought off Woot to date.
The setup instructions are written for a child or an adult mooooron.
The setup "wizard" never tells you it won't install with Firefox, I had to look up blogs and tech helps to learn it will only install with Safari or Google Chrome. I hate Chrome!
Anyway, I installed Chrome, inputted the activation code and it accepted it. That is where it ends.
THEY HAVE NO SUPPORT PHONE NUMBER! ANYWHERE! What Crap!
Their online support is basically non existent. All I got was "well, your account isn't activated."
Well YES IT IS!
I want to return this useless piece of carp.
Vizio 32” 720p LCD HDTV (2 of them), Seagate 750GB SATA/300 7200RPM Hard Drive, SiliconDust HDHomeRun Dual Digital HDTV Tuner, Kodak Theater HD Player, Acer Aspire One 10.1” Netbook, Philips Prestigo 8-Device Universal Remote, Asus Eee PC 900 Netbook with 1.6GHz Atom Processor, Philips Upconverting DVD Player with DivX and HDMI, Ashley Rock Axe Full Size Rockband and Guitar Hero Controller for PS2 and PS3, Philips Icon 5 Device Universal Remote, and a bunch of other carp.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345776833/warc/CC-MAIN-20131218054936-00013-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 1,478 | 15 |
https://github.com/mrmicjam?tab=repositories
|
code
|
Join the platform over 40 million developers
call home for hosting code, managing projects, and building their best
Hide content and notifications from this user.
Learn more about blocking users
Contact Support about this user’s behavior.
Learn more about reporting abuse
Main repository of the zim desktop wiki project
Orchestrating the Cloud with Kubernetes
A simple python extension to generate data to be used in cartograms
Convert between markdown and zim wiki syntax
A simple secret ideating app with AES256 encryption, written with Kivy and Flat UI themed
A python module that allows generating static maps from geodjango lines and polygons. Supports Bing and Google map tiles.
Promise based HTTP client for the browser and node.js
Stripe Python bindings
Django test runner using nose
coding challenge: Create an app that can interactively play the game and never lose.
Enables django to register and authenticate wordpress users
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145713.39/warc/CC-MAIN-20200222180557-20200222210557-00290.warc.gz
|
CC-MAIN-2020-10
| 938 | 17 |
http://www.acrpc.net/hp-xw9400-workstation/
|
code
|
Lost to the 2021 basement flood
- Dual, Dual Core Opteron (2216) 2.4Ghz CPUs
- 10GB ECC/Registered DDR2 RAM
- 1050Watt PSU
- 14 onboard SATA/SAS plus a 4-port IO Crest PCIe card (PNP in FreeNAS)
- 16x 500GB 2.5″ Drives (using 2.5″ hotswap bays plus the 4 internal bays)
- 2x 60GB Intel SSD’s for cache (helps with bulk transfers, I can max the NIC until the cache fills up, then data drives are the bottleneck).
- Dual 1Gbps NICs (1 dedicated to my PC, 1 to the rest of the network).
- 8GB USB Key on internal USB port for FreeNAS OS.
This was my daily driver PC until I replaced it with a Dell Precision T7400 Workstation,
now this PC is a dedicated FreeNAS server, it’s main purpose is running the Plex Media server plugins, and storing all of our media. With this machine’s 14 onboard SATA/SAS ports and ECC memory it’s ideal for a FreeNAS storage server, however it is a huge power hog, I’ve tried to mitigate the power usage some by removing its former 135watt Quadro GPU and installing a simple PCI video card for the console, also the 14x 2.5″ hard drives are not quite as power hungry as the 3.5″ drives.
This has been retired totally, it’s refusing to boot any disks, several capacitors have blown out on the motherboard,
I may fix it some day, but for now it’s retired. I will not attempt to repair this due to flood damage.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102637.84/warc/CC-MAIN-20231210190744-20231210220744-00739.warc.gz
|
CC-MAIN-2023-50
| 1,356 | 13 |
https://discuss.elastic.co/t/adding-node-configurations-to-elasticsearch-yml-file-doesnt-work/140257
|
code
|
Hello. I'm new to elasticsearch and I'm trying to change the configuration file.
So I uncommented cluster.name and node.name lines and renamed them, which work fine after waiting for a few seconds. However, I tried adding the following lines after node.name and it stops working (connection refused):
node.master: false node.data: true index.number_of_shards: 5 index.number_of_replicas: 1 network.host: 0.0.0.0 transport.tcp.port: 9301 transport.tcp.compress: true http.port: 9201 http.enabled: true discovery.zen.minimum_master_nodes: 1 discovery.zen.ping.timeout: 10s discovery.zen.ping.multicast.enabled: false discovery.zen.ping.unicast.hosts: ["127.0.0.1:9300"]
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376825123.5/warc/CC-MAIN-20181214001053-20181214022553-00347.warc.gz
|
CC-MAIN-2018-51
| 667 | 3 |
https://www.juniper.net/documentation/en_US/jsa7.3.2/jsa-high-availability-guide/topics/concept/concept-jsa-ha-event-and-flow-forwarding-from.html
|
code
|
Event and Flow Forwarding from a Primary Data Center to Another Data Center
To ensure that there is a redundant data store for events, flows, offenses, and that there is an identical architecture in two separate data centers, forward event and flow data from site 1 to site 2.
The following information is provided only for general guidance and is not intended or designed as a how-to guide.
This scenario is dependent upon site 1 remaining active. If site 1 fails, data is not transmitted to Site 2, but the data is current up to the time of failure. In the case of failure at site 1, you implement disaster recovery (DR), by manually changing IP addresses and use a backup and restore to fail over from site 1 to site 2, and to switch to site 2 for all JSA hosts.
The following list describes the setup for event and flow forwarding from the primary site to the secondary site:
There is an identical distributed architecture in two separate data centers, which includes a primary data center and a secondary data center.
The primary JSA console is active and collecting all events and flows from log sources and is generating correlated offenses.
You configure off-site targets on the primary JSA console to enable forwarding of event and flow data from the primary data center to the event and flow processors in another data center.
Use routing rules instead of off-site targets because the setup is easier.
Periodically, use the content management tool to update content from the primary JSA console to the secondary JSA console.
For more information about forwarding destinations and routing rules, see the Juniper Secure Analytics Administration Guide.
In the case of a failure at site 1, you can use a high-availability (HA) deployment to trigger an automatic failover to site 2. The secondary HA host on site 2 takes over the role of the primary HA host on site 1. Site 2 continues to collect, store, and process event and flow data. Secondary HA hosts that are in a standby state don't have services that are running but data is synchronized if disk replication is enabled. For more information about HA deployment planning, see HA Deployment Planning.
You can use a load balancer to divide events, and split flows such as NetFlow, J-Flow, and sFlow but you can't use a load balancer to split Flows. Use external technologies such as a regenerative tap to divide Flow and send to the backup site.
The following diagram shows how site 2 is used as a redundant data store for site 1. Event and flow data are forwarded from site 1 to site 2.
Event and Flow Forwarding Configuration
For data redundancy, configure JSA systems to forward data from one site to a backup site.
The target system that receives the data from JSA is known as a forwarding destination. JSA systems ensure that all forwarded data is unaltered. Newer versions of JSA systems can receive data from earlier versions of JSA systems. However, earlier versions cannot receive data from later versions. To avoid compatibility issues, upgrade all receivers before you upgrade JSA systems that send data. Follow these steps to set up forwarding:
Configure one or more forwarding destinations.
A forwarding destination is the target system that receives the event and flow data from the JSA primary console. You must add forwarding destinations before you can configure bulk or selective data forwarding. For more information about forwarding destinations, see the Juniper Secure Analytics Administration Guide.
Configure routing rules, custom rules, or both.
After you add one or more forwarding destinations for your event and flow data, you can create filter-based routing rules to forward large quantities of data. For more information about routing rules, see the Juniper Secure Analytics Administration Guide.
Configure data exports, imports, and updates.
You use the content management tool to move data from your primary JSA console to the JSA secondary console. Export security and configuration content from JSA into an external, portable format. For more information about using the content management tool to transfer data, see the Juniper Secure Analytics Administration Guide.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663011588.83/warc/CC-MAIN-20220528000300-20220528030300-00471.warc.gz
|
CC-MAIN-2022-21
| 4,161 | 23 |
https://web.gis.wspdigitalproduction.com/bhmip/?embed
|
code
|
This application can operate in full without Internet connectivity. The only requirement is to cache required data in the browser before offline use.
1. Application (including GIS vector data) This is cached automatically just by visiting this page. To obtain the latest updates, be sure to re-visit and refresh the page when online.
2. Basemap The basemap is too large to cache at full extent in all scales. While online, zoom and pan to all required areas and scale levels. Everything you see will be cached for offline use. You may also use our tool for this.
3. Test Test the application in offline mode before use.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585181.6/warc/CC-MAIN-20211017175237-20211017205237-00035.warc.gz
|
CC-MAIN-2021-43
| 619 | 4 |
https://juliapackages.com/p/spikenet
|
code
|
SpikeNet is a minimalist neural network simulator written in Julia. It is meant to run smallish networks of spiking or hybrid neurons with pretty good performance and a focus on experimentation with non-standard models.
SpikeNet does a lot less than other simulators. In fact it's hardly a simulator at all! There is no main loop, only a collection of tools that you can use to turn a set of model equations into a working simulation:
- elementwise kernels with a syntax inspired by Brian
- running kernels on populations
- running kernels on pathways
- recording state
SpikeNet supports both spikes and rates, but assumes that the network activity is sparse -- it is not optimised to run large networks of rate neurons, as it will not try to use efficient matrix operations.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474361.75/warc/CC-MAIN-20240223053503-20240223083503-00400.warc.gz
|
CC-MAIN-2024-10
| 775 | 7 |
https://www.sayonetech.com/blog/how-create-custom-layout-widgets-flutter/
|
code
|
Insights from Our Experts
How to Create Custom Layout Widgets in Flutter
This blog assumes that you have a beginner’s knowledge in Flutter. Otherwise, dive into to get the basics and come right back!
Now, how do we layout widgets in Flutter? Normally we use a stack, row or column. But what if our requirement is more than that? If we want to arrange some widgets horizontally, we use a Row Widget. If we want to arrange them vertically, we would wrap them in a Column and use Stack to arrange elements on top of another. But we can’t expect our UI to be so simple as that. For example, I was met with a requirement of a circular widget with five equally spaced buttons located on it (check out the image below!).
Don’t worry! We can do it with a CustomMultiChildLayout widget which takes only two arguments.
- delegate - of type MultiChildLayoutDelegate which is responsible for positioning the children.
- children - which is the array of widgets to be positioned. The children argument is similar to the one used in rows and columns, but one difference is that every item in that array should be marked with a Layout id for identifying that child.
Now, the important part is the delegate. The MultiChildLayoutDelegate is an abstract class. So, we have to extend it for our use. Override the method performLayout and we can write the code to position items in it.
- The performLayout method gives us the widget’s size from which we can calculate the center of the circle.
- Since we have to layout five widgets along the circle, use a for loop for it.
- Remember we have created every item with an id attached to it. So we are using the same id to check whether the item exists or not.
- Now, size of the button is retrieved using layoutChild method.
- The angle between the item and center axis is calculated using the function _calculateItemAngle.
- Finally, positionChild method is called with the id of the item and the offset. The offset is calculated using the mathematical equation,
A point at angle theta on the circle whose centre is (x0,y0) and whose radius is r is (x0 + r cos theta, y0 + r sin theta).
- The shouldRelayout method is called to compare the current layout and the old one and return true if a relayout is needed.
So, that’s how easy it is to create custom layouts in Flutter. If you want to read more about our Flutter experience, check out our recent blog. Flutter has always been our core areas of expertise. So, stay tuned for more similar updates and information exchange!
You can further learn about our Flutter contributions in GitHub.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540497022.38/warc/CC-MAIN-20191207082632-20191207110632-00195.warc.gz
|
CC-MAIN-2019-51
| 2,579 | 18 |
https://mps-imp.biologie.uni-mainz.de/news/
|
code
|
03.01.2022 We welcome our new team member Dagmar Weninger.
03.09.2021 The preprint of a joined project led by Runxuan Zhang & John Brown on a high resolution single molecule sequencing-based Arabidopsis transcriptome is online.
23.07.2021 Theresa Wießner-Kroh has successfully defended her PhD thesis. Congratulations, Theresa!
16.06.2021 The lab has moved to the new building (BioZ II).
07.04.2021 Jennifer Saile is the winner of the Agrisera antibody and Western blot quiz (link). Congratulations to Jenny!
04.07.2020 Our article on plant RNA mobility in Current Opinion in Plant Biology is now available online (Maizel et al.). Congratulations to all authors!
25.10.2019 Jennifer Saile was awarded the price for the best talk at the ZMBP's 4th Summer Academy. Congratulations to Jenny!
16.09.2019 Maren Reinhardt starts her Master thesis on structured RNAs in alternative splicing control.
10.07.2019 The group welcomes our new PhD student Jiwon Lee.
08.06.2019 Our article on species-specific feedback regulation of NMD in plants has been published in Plant & Cell Physiology (Kesarwani et al.). Congratulations to all authors!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945287.43/warc/CC-MAIN-20230324144746-20230324174746-00639.warc.gz
|
CC-MAIN-2023-14
| 1,132 | 10 |
https://final-blade.com/favicon-generator-for-perfect-icons-on-all-browsers-1666611901
|
code
|
Your favicon is transparent. This is usually a good thing,
but not for iOS Web Clips which are supposed to be opaque.
Look at the sample on the left, this is how a user would see your favicon as a Web Clip on his device.
What to do about this?
Your favicon is not transparent. This is a good thing for iOS Web Clips.
Yet, web clip corners are rounded. Depending of your favicon, it may disrupt its design. For example,
if your favicon features a square border, it will be cut at the corners. Look at the sample on the left
and check how your favicon will be rendered on iOS. What do you want to do?
Use the original favicon as is.
iOS will fill the transparent regions with black.
Add a solid, plain background to fill the transparent regions.
Add margins and a plain background.
Tip: You can pick a color directly from the preview.
Margin size (for a 57×57 icon)
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499966.43/warc/CC-MAIN-20230209112510-20230209142510-00470.warc.gz
|
CC-MAIN-2023-06
| 864 | 14 |
https://docs.microsoft.com/en-us/archive/blogs/ignitionshowcase/free-sql-server-training-webinars
|
code
|
FREE SQL Server Training Webinars
Here are some Free SQL Server training webinars from a Microsoft partner.
Pragmatic Works, SQL Server Central and Microsoft would like to invite you to a another month of Free SQL Server Training delivered by the people that write the books!
Speaker: Mike Davis
Date: January 18, 2011, 11:00 a.m. EDT
In this session, Mike explains how to decipher the package results and show you how to debug control flows and data flows.
Topic:0 to Dashboard in PerformancePointDate: January 20, 2011, 11:00a.m. EDT
Many of you have seen the coolness that is PerformancePoint in SharePoint 2010. Come get hands on with Adam as we go through the ins and outs of creating your first dashboard. See some of the cool visualizations you can use and how they work together to create a cool user experience.
Topic:Introduction to PowerPivot
Date:January 25, 2011 11:00 a.m. EDT
In this session, Brian explains how to use PowerPivot to create a culture of self-service BI, and how to use SharePoint to share that business intelligence with others.
Topic:Loading a fact table
Date:January 27, 2011 11:00 a.m. EDT
In this session, Joe will focus on the many details that should be considered and implemented in SSIS packages that load fact tables.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145910.53/warc/CC-MAIN-20200224071540-20200224101540-00438.warc.gz
|
CC-MAIN-2020-10
| 1,257 | 14 |
http://pauillac.inria.fr/~huet/60/levy.html
|
code
|
Colloquium in Honor of Gérard Huet, Paris 22-23 June 2007
In the (first-order) typed lambda calculus, finiteness
of redex families is equivalent to finiteness of reductions
(generalized finite development theorem). We will explore how
this notion resists to any term rewriting system or to
other finite calculi.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370491857.4/warc/CC-MAIN-20200328104722-20200328134722-00257.warc.gz
|
CC-MAIN-2020-16
| 312 | 6 |
https://www.freelancer.com/job-search/speech-to-text-demo/
|
code
|
Selected freelancer will given the responsibility of tagging entitities (Person, Location,Organization) and Parts of Speech on provided dataset. The required skills are good written knowledge Tamil language and its grammar.
Simple Android demo app - should have experience in webrtc
...would like to work with you on a project. The description is as such: Picture of a farmyard. There is mud on the ground. A pig, a duck, a cow, a sheep have mud on them. Draw a farmer’s wife with her hands on her hips looking at the animals. A speech bubble above her says ‘The animals are dirty.’ Draw the farmer next to her. There is a speech bubble ...
Hi, I am looking for a freelancer who will be able to complete a few projects in LA. These projects pay between $12-$20 an hour. Please bid and I will give you more information. There are specific dates that you must be available for between 8/20 and 8/30
gensis sub theme make it look like the demo. dont have teh manual have all the conetent etc make it look exaclty like the demo we have. no programing etc required just upload the content for the home page and a catogory make it look like the demo we have i
Hello, I'm looking for an independent Video/Graphics Editor, Who can edit and create cinematic video's to generate attract more number of users to donate for our cause. Also suggest us with what type of content you would require, like Photo's, Speech, Details, Videos. Let me know your sample's below Thank you!
...800-1000 words articles with relevant pictures. Research the web for similar content ideas. Respond to comments on your articles Write 3-5 articles daily on the topics provided by us. Skills Required: Excellent English punctuation, grammar and speech Basic social media use (Facebook, Twitter & Instagram) In-depth knowledge of On-Page SEO. Collaborative
A doctoral student must present a 20-minute speech in an important mathematics seminar. We are looking for a native British speaker that can listen to this speech (via Skype or another similar application) and correct possible pronunciation errors. English teachers and graduate students in mathematics will be taken into greater consideration. Please
I manage a medical project. I'm going to create a super video which will describe our project. The key persons of the company will tell about the company and the worldwide medical project. We'd love to help save lives. Between their speech, I want to add infographic elements and professional text to voice. U.S. voiceover pro and content managers...
...However the security of the GSM voice traffic is not guaranteed especially over the core network. It is highly desirable to have end-to-end secure communications over the GSM voice channel. In order to achieve end-to-end security, speech must be encrypted before it enters the GSM network . Project requirements: No JB, Do not install APP, No Internet
I'm looking for assistance for putting together a demo/prototype of simple API driven microservice that runs in a docker container and can perform simple operations. Am also looking for a simple Web UI to configure and call the API. Please contact me for additional details. For someone familiar with microservices/API and Docker and AWS, this should
I'm having trouble importing the demo content xml file into a wordpress site. I've tried the one click importer and the wp importer and it keeps showing failed imports. Need imported asap so I can see demo content on the site. If you need to do a fresh install that is fine. I can provide xml file.
...someone to write a sample workable code that calls $.ajax POST call from html to node.js server and this call must pass data from $.ajax to node.js and send sample response back to html. Your code must be able to run on my system and so you will send me your code to verify everything works. Below is an extract of my code which does not pass data to...
in title job description described.
...has the image background set to gray. So, would like to modify that section to transparent. There is a darker gray background on mouse hover, which I'd like to keep if possible. 2) Several assets on the page are bright red (menu buttons on hover, homepage speech bubble, footer border). Would like these assets modified to a darker maroon (hex #8E0...
Want to become a paid transcriber? Work as much as you want and whenever you want. Take our short test and start working from home. [login to view URL] With our speech recognition system you won't have to transcribe from scratch, you will be provided with an initial script. We are waiting for you! [login to view URL]
I need somebody who ...your head on top. I’d ask you to film 10 min video 360 of any situation from life, but the main thing is in this situation you need to have a dialog to at least one person. Please during filming don’t talk too fast. After filming video 360 you also would need to write down your dialog with a person. Both his and your speech.
Hello, I require a web app made of a demo of the future gaming platform my company plan to make, i've attached a photo to give you a basic idea of the theme and idea. The final product should be downloadable so that i can upload to directly to the website. More information and pictures will be given to potential choices.
...[login to view URL] you can enter text and hear the text you typed. Set the parameters: 1) ssml 2)Language is Deutsch (Deutschland), Voicetype is wavenet, voicename is "de-DE-Wavenet-A" I'm creating a file JSON . Here you can see how the file JSON looks like. I can create such files. I need the ability to send a request and hear
ok I ne...literally is a red neck. I have been asked days prior to the wedding to do a toast, story or something to welcome him to the family. I think the safest bet it to not tell any stories as I can't think of anything positive to say other then he can be funny, but yet inappropriate at the same time. so I'm open to to suggestion...
...a study on British intonation and speech patterns and how they vary according to regional accents. You speak 450 sentences (one by one) into the microphone of your phone, using the company’s app, and then submit them for quality evaluation (takes 1-2 days) if approved (very rarely not approved if you’re careful to make your recordings of good quality)
...for an intermediate windows desktop application developer to develop a Search App. The app will run like a service and user will be able to access the search capabilities by clicking on the search icon in the toolbar. Once the search keywords have been entered, the user will be redirected to one of the search engines configured in the app. Mockup designs
I need a simple demo built in Angular 6 CLI (NOT Angular JS) as multi step (2 is OK) that takes user input and subits to a service. It doest need to save to dB or anything. Just two field on first page and two fields on second [login to view URL] user submits "submit" button it posts the object to the service.
I require an application to convert audio files to text from .wav .mp3 formats as a minimum, to run on linux, the outgoing text must be in json format or plain text, the margin of error must be less than 10% in the conversion
Hi Phonpanom S., I noticed your profile and would like to offer you my project. We can discuss any details over chat. here is the requirements please evaluate if it can be done. https://www.freelancer.com/projects/python/chatbot-raspberry-using-bing-speech/#/details
I would like a UI design, that works with the visually impaired users, they should be able to zoom in the app and enlarge tabs and stuff, also inverting the colors for the color-blind people, etc. - As well as a standard version of the app. There will be: Chatrooms Libraries Social features (Blog, News) Live streaming through youtube A list of training
Hi Ankita T., I noticed your profile and would like to offer you my project. We can discuss any details over [login to view URL]://www.freelancer.com/projects/python/chatbot-raspberry-using-bing-speech/#/management/194135239
We are looking for UK- and US-based native speakers of English to proofread / review large volumes of materials in variety of subjects, such as medicine / pharma, technology and IT, law and business, as well as literature / fiction / non-fiction. We are particularly looking for technical writers for review of existing materials. Strong professional
・Please review the speech manuscript I speak at the presentation of the international conference. ・I have created a manuscript in English. ・That is English review. ・It is basically a request to correct English grammar and language. ・The content of the manuscript uses technical terms in presentation slides that attached with manuscript. ・The file
...for my future app which changes the user voice with a selected celebrity voice. The app simply records user's voice and get the text what user said and sends it to webservice. At that point the backend service will get the text and voice id which be converted and create a new voice. We will use some celebrities such as Obama , trump , elmo, gandalf etc
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221215404.70/warc/CC-MAIN-20180819224020-20180820004020-00536.warc.gz
|
CC-MAIN-2018-34
| 9,128 | 30 |
http://collectivehistory.tumblr.com/post/28521605720/over-london-by-rail-ca-1870-londons-chimney
|
code
|
If you want to see anything specific just shoot me a message, I don't mind fulfilling requests. Since some people have asked for it my skype name is "collective.history", feel free to add me.
Over London- By Rail ca. 1870
London’s chimney sky as portrayed by Gustave Doré
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702127714/warc/CC-MAIN-20130516110207-00089-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 274 | 3 |
https://community.ibm.com/community/user/power/blogs/poovannan-e1/2020/12/10/powervc-200-ui-a-glimpse-of-the-new-features?CommunityKey=6f9fc4cd-7614-41b1-98d8-2941c3497e37&tab=recentcommunityblogsdashboard
|
code
|
IBM® Power® Virtualization Center version 2.0.0
introduces all new user interface that is designed based on Carbon framework. Carbon
's open source design system for products and digital experiences. With the IBM
Design Language as its foundation, the system consists of working code, design tools and resources, human interface guidelines, and a vibrant community of contributors. In this blog, let's take a walk through of the new PowerVC UI elements and functionalities.
All new UI
By using the Carbon design system, we have achieved a sense of visual cohesiveness on our platform. PowerVC users can feel a sense of security as they move through the product and compare features with the other IBM cloud platforms and experience a cohesive look and feel through branding, visuals, and interactions and all these design principles fit with the parent IBM brand. We have used a light theme across the UI and followed the Carbon design principles. It also gives the UI a modern look and feel.
Earlier, PowerVC user interface was synchronous in nature i.e., when you perform any action, you would see show loading/progress icon blocking any other action till the action is completed. Now you never have to wait. PowerVC 2.0.0 user interface is designed to be responsive and asynchronous. you do not have to wait for one action to complete before you proceed to the other.
For example, you can initiate adding of HMC and start the next action of creating networks. All these asynchronous actions will be running in background and results of those actions can be seen/monitored in Alerts/Logs panel.
However, some corelated actions might need you to wait for successful completion of an operation. In such cases, please wait for previous action to finish. Results of the action are notified in Alerts panel and on the corresponding list pages.
Batch actions support
This is an advanced feature that is introduced in PowerVC 2.0.0.
Batch actions support allows you to perform an action on multiple items in one go.
Suppose you want to delete multiple items such as virtual machines, hosts, or host groups, then you can select those items and get through the action. Actually, this is a group of actions which is batched together and being called upon one after another. PowerVC internally takes care of dispatching the result altogether. Also, you can use it to ensure that the action is performed on selected items.
Please see the images below for your reference.
Batch update for resource updates
With PowerVC 2.0.0 user interface, edit or update of a resource is much easier. Multiple attributes of a resource can be updated and saved in one go in their respective details pages. For example, if you want to edit storage templates, you are allowed to edit all attributes in details tab, storage pools tab, ports groups tab in one go and click Save
. Please see the images below for your reference.
PowerVC 2.0.0 has made it even easier to view messages after you perform any kind of action. The alert panel helps you getting the current status on the last action performed and you can always check recent top 20 notifications here. The panel opens up when you click on the bell icon on top right corner of the GUI.
You get notified when an operation starts, when it succeeds or if something goes wrong during the action. By default, the notification or the alert panel is hidden. When a new notification arrives the bell icon turns red. You can click on it and keep the panel open if you want.
Here is an example of how you can check new notifications.
Context sensitive help
PowerVC 2.0.0 has made it easier for a user to understand the actions or functionalities on a page with context sensitive help. The help panel opens up when you click on the help icon (question mark) on the top right corner of the GUI. It will always provide help content relevant to the current page you are viewing. Click to view the context-sensitive help w.r.t. different pages of UI. You can find the help topics embedded in three areas of the UI.
- On the right pane
- In the pop-up level help
- As tooltip and messages
- Online help, YouTube, and API references
If you are a new user to PowerVC or did not understand about any action or terms on a particular page, you can open up help panel to get more details. It also includes online references to Knowledge Center and YouTube channel.
The right side help panel provides you detail about each action and its details. i.e., Create, Delete, Import and Export of Image, etc. If you navigate to a different page, the help panel gets automatically updated with help content relevant to the new page.
For example, Navigation to Consistency Groups provides help info about it.
Auto-refresh is not implemented as global functionality. Consequently it is implemented page by page. For PowerVC 2.0.0, it is not implemented at all pages.
It is implemented in selected pages like Logs list, Virtual Machines list, Collocation rules list, Compute templates list, Images list, Networks list, Hosts list, Host groups list, HMCs list, Storage providers list, Fabrics list, Boot volumes list and Data volumes list.
The edit page displays tabs based on the resource type such as VM, Host. The tab displays details of associated resources. For example, a compute host edit page has a tab for showing VMs that are running on the host. On the tab, you can Start or Stop a VM. However, as the tabs are part of edit page as a whole, for PowerVC 2.0.0, auto-refresh is not provided for the tabs. However, you can click on Refresh button to view updated information on the tab.
Host edit page with VMs tab example :
Host Edit page showing VMs tab
Pagination of VM list and log list pages are enabled in PowerVC 2.0.0 UI. Virtual machines and logs are usually large in number and users can now view and update the list per page at their convenience.
Breadcrumb is a type of secondary navigation scheme that allows user to establish where they are in a web application. PowerVC as a web application has lot of components and hierarchies. Breadcrumbs, enabled in 2.0.0, help users to understand from which page they navigated to current page as well as navigate to older page. It provides a hierarchical view to user on sequence of user navigation.
For example, here is an admin who navigated to Host list and to a particular host and to a VM on that host and to its corresponding boot volume.
Eye icon for password check
The eye icon on the PowerVC 2.0.0 UI login screen helps you to recheck if you have entered a correct password.
Download option for logs and environment checker
The logs and environment checker results in 2.0.0 can be downloaded to CSV format. This information can be used by admins to compare logs/events and environment statistics of past and current date. Please find below screenshots of Download menu and downloaded CSV file.
New graphs on Overview page
PowerVC 2.0.0 UI has two more graphs in Overview page to show host processor and memory allocation statistics. It gives Admin an idea about which host is loaded more or which host is free for deploy, etc.
PowerVC version 2.0.0 UI is AVT compliant with Google Chrome's ChromeVox extension.
That is it for a quick view on new features in PowerVC 2.0.0 User Interface. If you have any questions about these features, please comment below. You can also follow us on LinkedIn, Facebook, and YouTube.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662539049.32/warc/CC-MAIN-20220521080921-20220521110921-00693.warc.gz
|
CC-MAIN-2022-21
| 7,383 | 45 |
https://smallbusiness.chron.com/temperature-should-laptop-hard-drive-run-81401.html
|
code
|
What Temperature Should My Laptop Hard Drive Run?
Your laptop hard drive should run anywhere in the range between 5 and 60 degrees Celsius (40 to 140 Fahrenheit) without experiencing any major issues. Laptop hard drives may run hotter than the desktop counterparts, but this difference is not related to any functionality in the hard drive. Desktops and laptops can use the same hard drives: desktops often have expanded support for larger form-factor devices. Laptop hard drives may run a few degrees hotter than their desktop counterparts because a laptop hard drive dock has less cooling airflow than the desktop drive bays.
The Safe Operational Range
While a hard drive that runs between 5 and 60 degrees Celsius (40 to 140 Fahrenheit) is considered within safe operational range, hard dives that run between 35 and 45 degrees Celsius (95 to 113 Fahrenheit) have the lowest failure rates over prolonged exposure. Failure rates gradually increase relative to the middle of the optimal operation range; devices running under 25 degrees Celsius (77 Fahrenheit) or over 50 degrees Celsius (122 Fahrenheit) are more likely to fail, but have a less than 4 percent annual chance of failure.
Extreme Heat and Cold Issues
Laptops may actually improve hard drive life because of their structural airflow restrictions. According to the study "Failure Trends in a Large Disk Drive Population," hard drives that operate at extremely low temperatures are much more likely to fail than their overheating counterparts. Hard drives running under 20 degrees Celsius (68 Fahrenheit) are more than four times as likely to fail as those running at 50 degrees Celsius (122 Fahrenheit). If the hard drive is operating above the safe range there is likely a cooling problem within the laptop. It is unlikely that the hard drive will run in the low range under normal conditions because the ambient room temperature would have to be very low and the device produces its own heat. Additionally, older hard drives have a smaller operational range, capping out at 55 degrees Celsius (131 Fahrenheit).
Heat is a Secondary Cause of Failure
A 2007 Google study "Failure Trends in a Large Disk Drive Population" found that hard drive usage time is the major player in hard drive failure rates and not the operating temperature. If a laptop hard drive runs at the higher end of the optimal operation or safe temperature ranges, heat-related failure will not be an issue. However, a temperature difference of five degrees can make a difference in how long a hard drive lasts. Hard drives that run between 30 and 35 degrees Celsius (86 to 95 Fahrenheit) are the least likely to fail over a three year period.
Overheating Indicates a Larger Problem
If the hard drive is overheating, it's an indication that there are other cooling problems within the computer. The laptop's internal temperature has an impact on the hard drive's operational temperature: if the computer's CPU and GPU are producing massive amounts of heat that isn't being properly vented from the system, the hard drive temperature may rise. If the hard drive is operating near or above the maximum operational range, the laptop may be having an airflow problem.
Dan Stone started writing professionally in 2006, specializing in education, technology and music. He is a web developer for a communications company and previously worked in television. Stone received a Bachelor of Arts in journalism and a Master of Arts in communication studies from Northern Illinois University.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943483.86/warc/CC-MAIN-20230320114206-20230320144206-00587.warc.gz
|
CC-MAIN-2023-14
| 3,513 | 11 |
https://mail.python.org/pipermail/tutor/2015-August/106668.html
|
code
|
[Tutor] aws/cloud questions..
lac at openend.se
Sat Aug 29 02:37:29 CEST 2015
In a message of Fri, 28 Aug 2015 20:24:29 -0400, bruce writes:
>Hope wee'all doing well, having fun. yada yada..!!
>I'm considering taking a dive into the "cloud" with an app that would
>be comprised of distributed machines, running py apps, talking to db
>on different server(s), etc..
>So, I was wondering if anyone has good docs/tutorials/walk through(s)
>that you can provide, or even if someone is willing to play the role
>of online mentor/tutor!!
First you need to learn, more or less cold, how to build an app
that runs on one machine, talking to a db. Then from one machine
talking to another with a db there.
This is a lot of work. You should be very busy for about a month
if you more or less do nothing else. If you need to learn python
as well, as what this list is for, add another 6 months.
Then, when that is done, go ask this question again, not in
tutor but in python-list. Saying that you have learned how to
make a client server, etc .... with the things you will have
learned over the last 6 months.
This 'distributed machines and different servers' idea you have, well,
it makes your problem one not for beginners, indeed there are lots of
experts who aren't experts _about this_ who could not solve it, in the
same way that brilliant cellular-biogists don't do solid-state physics
all that well, and vice versa.
If this is what you want to create, we can definitely teach you enough
to do it, but it will take a lot of time. And you need to work on
something hugely simpler first.
still, it is a grand vision! :) I am all for that! :) dreams are great! :)
More information about the Tutor
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560628001089.83/warc/CC-MAIN-20190627095649-20190627121649-00500.warc.gz
|
CC-MAIN-2019-26
| 1,689 | 31 |
https://community.adobe.com/t5/indesign/migrating-plugin-from-indesign-15-to-16/m-p/11539774/highlight/true
|
code
|
We have developped an InDesign plugin using the plugin_sdk_18.104.22.168 for InDesign 15 (2020), using Visual Studio 2017.
This morning I installed InDesign 16 (2021) and the plugin_sdk_16.0.0.077. I was able to recompile our PLN, but I am unable to find the latest idrc files to place in my (* resources) folder, along with my PLN. Where can I find these latest files (the ones I have are from last June and are probably valid only for InDesign 15).
Very best regards,
Hi @Olivier Beltrami ,
idrc files are generated when your fr file is compiled. See if your fr is set to compile or not, also look for the merge_res command configuration. This should fix your issue i hope
Thank you very much for your prompt response.
The configuration of my .fr file had it to be excluded from the build.
But if I try to change that setting, what ITEM TYPE should I use ?
I tried a few of the ones that had resource in the name, but all failed.
What ITEM TYPE should I use in the .fr file info page ?
Very best regards,
Oliver, first of all, do note that not all the project .fr files are to be compiled. The basic setup is that there is a master fr file that includes all the other fr files and only this master fr file needs to be compiled. If more than one fr file is set for compilation then you will get errors.
Regarding how to set up the compilation of the master fr file? The easiest way for this would be to open up a sample SDK project, right click on the fr file included in the project, and see the command in the custom build step. Another option is to edit the project file using a text editor. This is a bit involved, I am pasting the relevant section of an SDK sample below. See the settings made for both the configuration, you will have to make corresponding thing for your fr file.
<ItemGroup> <CustomBuild Include="..\..\..\source\sdksamples\basicdialog\BscDlg.fr"> <Command Condition="'$(Configuration)|$(Platform)'=='Debug|x64'">odfrc $(ODFRC_ADDITIONAL_FLAGS) "%(FullPath)" -o "$(IntDir)%(Filename).fres" -d DEBUG -i ..\..\..\source\sdksamples\basicdialog @SDKODFRCOptions.rsp </Command> <AdditionalInputs Condition="'$(Configuration)|$(Platform)'=='Debug|x64'">$(IntDir)TriggerResourceDeps.obj;%(AdditionalInputs)</AdditionalInputs> <Outputs Condition="'$(Configuration)|$(Platform)'=='Debug|x64'">$(IntDir)%(Filename).fres;%(Outputs)</Outputs> <Command Condition="'$(Configuration)|$(Platform)'=='Release|x64'">odfrc $(ODFRC_ADDITIONAL_FLAGS) "%(FullPath)" -o "$(IntDir)%(Filename).fres" -i ..\..\..\source\sdksamples\basicdialog @SDKODFRCOptions.rsp </Command> <AdditionalInputs Condition="'$(Configuration)|$(Platform)'=='Release|x64'">$(IntDir)TriggerResourceDeps.obj;%(AdditionalInputs)</AdditionalInputs> <Outputs Condition="'$(Configuration)|$(Platform)'=='Release|x64'">$(IntDir)%(Filename).fres;%(Outputs)</Outputs> </CustomBuild> </ItemGroup>
I would suggest you make the setting using VS interface as editing the project file manually can cause file corruption if you are not experienced with it.
Manan, even with experience you can corrupt such a file … 😉
Dirk, yes, that happens quite a lot. But what experience has taught me is patience and the stomach to revert and try again. Editing the project file is the go-to solution for me in most cases. Clicking through numerous screens and making the same changes repeatedly is such a pain as against copying and pasting the stuff. With that said, I don't dare to edit the project files of XCode, never tried that, they look so scary that I remain with the IDE. What are your experiences?
I automate all related tasks using node.js - similar to your manual edits. When I start with a new SDK, I apply a ton of proven edits to example SDK projects - e.g. to make them relocatable but still refer into SDK sources. Edit the response or xcconfig files to remove dead header search paths, flatten recursive paths (big speed up of compile time), and add others that I found missing in stock rsp. / .xcconfig . Move stray "-d something" from commandline into appropriate .rsp or .props . And so forth.
Rename version specific files to version specific names - my largest Xcode project builds 20 plug-ins across versions CS5 thru current, other projects have fewer but still multiple plug-ins. Adobe apparently never works cross version so they need not care about such details.
Since I started at a time when you could still have independent .fr files rather than that single "umbrella" file where you collide with preprocessor macros, my build process also continues to support that approach. "merge_res" has its name for a reason … .
A recent project is a node.js program that has a full object model for both Xcode and VStudio projects, so that I can access and modify all features programmatically. There I'm right now adding a converter from Xcode project/target into the equivalent .sln/.vcxproj.
Your suggestion of opening up and imitating an existing SDK sample project has llowed me to compile the .fr file and generate the .idrc files. Thnak you very much for your help.
However, when launching ID16, I still get the message "Adobe InDesign does not recognize MyPlugin as a valid plug-in." which I thought was due to v.15 idrc files.
Is there an additional step needed to get my plugin to work under ID16, if it runs fine under ID15 ? I did install the v16 SDK. Do I need to get a special developer id for ID16 ? ID15 was the first plugin we ever worked on, so I'm not really cler on what happens when migrating to a new version.
Very best regards,
I would check if the merge_res and restore_res command lines are properly configured. Check the PrelinkEvent and PostBuildEvent configuration of the SDK sample plugin for reference. Another thing I would do is rename the 15 SDK on the computer to make sure nothing from that folder is being referenced.
Thank you very much for your help.
I now get the following, slightly different message: "The plug-in requires the debug version of InDesign.". I did read your response to an earlier post (First-time InDesign Plugin Developer - Some basic questions), and I have duly applied to join the Developer Pre-Release Program.
However, I still need to be able to ship my PLN to users who only have the normal version of InDesign. Under ID15, my release version contained a PLN and a PDB and that worked fine with the normal version of ID15. Your other post mentions "can always debug his code using the release version of InDesign (the version that is released for all to use). You just need to build your plugins with debug symbols generated", which seems to be the setup I have under ID15. So what is the difference with ID16 (yes, I did rename all my v15 folders to ensure no cross-folder effects) ?
Very best regards,
You should create two configurations in your project, one for debug and another for release. You shall see a dropdown in VS toolbar to switch between the two. If you don't have access to InDesign's Debug build, you will need to compile the release configuration of your plugin. The main difference in the project setting of a release and debug configuration are as follows.
Once you do all the above-mentioned steps, the plugin should load on the release version, i.e., the public version of InDesign, which is available to your clients. For debugging release builds, you need to generate debug symbols for release versions of the plugin, which are generally not generated for optimization and speed up purposes.
The removal of "-d debug" from the .fr custom build step did the trick 🙂
Thank you very much for all your help !
Very best regards,
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991648.10/warc/CC-MAIN-20210511153555-20210511183555-00091.warc.gz
|
CC-MAIN-2021-21
| 7,592 | 35 |
https://www.spellweb.com/how-do-you-spell/effortless
|
code
|
Spell check of effortless
Spellweb is your one-stop resource for definitions, synonyms and correct spelling for English words, such as effortless. On this page you can see how to spell effortless. Also, for some words, you can find their definitions, list of synonyms, as well as list of common misspellings.
Correct spelling: effortless
effertlessly, effortes, 4ffortless, effetely, efcortless, aftersales, effortrs, efflrtless, eftortless, effortsa, efgortless, efforteslly, egfortless, efortless, effortleslly, effotlessly, wffortless, eff9rtless, effprtless, efertlesly, rffortless, effotrs, effitless, efvortless, effortlessy, efortlessly, dffortless, erfortless, efdortless, edfortless, evfortless, efortlesly, effortlesly, effortessly, efrortless, effortles, effirtless, efforlsee, 3ffortless, effectless, effortly, sffortless, ecfortless, etfortless, effortlessley, efforless, eff0rtless, effkrtless, effortley, effotless.
A subject which we might grapple with and run down by a few hours of vigorous, absorbed attention in a library, gaining strength of mind by resolute encountering of difficulties, by personal effort, we sit around for a month or a season in a club, expecting somehow to take the information by effortless contiguity with it. The Complete Essays of C. D. Warner by Charles Dudley Warner
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540502120.37/warc/CC-MAIN-20191207210620-20191207234620-00326.warc.gz
|
CC-MAIN-2019-51
| 1,315 | 5 |
https://www.blackhatworld.com/seo/robots-noindex-question.419648/
|
code
|
I have a blogger blog. I want to add some internal links. Lets say that I am writing posts about types of radiation, and I want to give add the link of same domain page "radiation" to this post (i.e. 1 post has other post link), like most of the wiki-pages have. Will it hurt my SEO (multiple pages indexing etc)? If yes, then what code should I add to my robots.txt file??
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512434.71/warc/CC-MAIN-20181019191802-20181019213302-00234.warc.gz
|
CC-MAIN-2018-43
| 373 | 1 |
http://next-ventures.co.uk/jobs/oracle-swedish-speaking-application-expert-32522/
|
code
|
Oracle Swedish Speaking Application Expert
- Market rate
Oracle | Application Expert
***Must be Swedish speaking***
For our customer we are looking for an Oracle Application expert. You should be the main responsibility for the activities surrounding their American TAX solutions. You should take the responsibility to finalize the mainstreaming process of all routines, like operational handover, monthly updates and formal upgrades of the current platforms versioning. You should plan, execute and roll-out these routines and communicate them to the right people.
You will also work with Incident Management for other systems handled by the group, like bank and salary solutions.
Create Change requests for monthly updates
Technical Knowledge – Oracle – WEB Services
Experience of systems that support critical systems with information.
Additional / Other
Team player with good abilities to work individually
Excellent communication and documentation skills in English
Oracle | Application ExpertApply now
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886103579.21/warc/CC-MAIN-20170817151157-20170817171157-00070.warc.gz
|
CC-MAIN-2017-34
| 1,011 | 13 |
https://originaltrilogy.com/post/id/1116967
|
code
|
Alright, we’re all agreed. Mods please close thread.
I’m afraid you all missed the point. Of course I’m happy the saga’s continuing. I want to know how you feel about continuing it without Palpatine. I probably should’ve said in the title, but I didn’t realize that would be my one big point.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863830.1/warc/CC-MAIN-20180620163310-20180620183310-00339.warc.gz
|
CC-MAIN-2018-26
| 304 | 2 |
https://ilugc.in/contact/
|
code
|
Best way to contact the ILUGC Member is through the ILUGC Mailing List. If you are not an member of ILUGC mailing list, then you can contact the co-ordinator for specific help.
Many of our ILUGC members are willing to share their knowledge with students community in the form of Short Technical Tutorial, FOSS Awareness Seminar, GNU/Linux Workshop, (C, C++, PHP, Python,..) Programming Workshop, Technical Talk, Project Idea Presentation, etc, in the College/School/Conference.
If you are interested to arrange this kind of FOSS Event in your place, then follow the below steps:
- Talk to your department friends/students to know their interest.
- Talk to your department staff members to know their interest and support.
- Depending upon the interest, decide the topic/field.
- Decide 2 or 3 alternative dates for this event.
- Contact ILUGC:
- If you are an ILUGC mailing list member, then directly post the event details and request for the resource person in the list.
- If you are NOT an ILUGC mailing list member, then contact the Co-ordinator.
Resource Person (RP)
If you are planning to invite ILUGC RP for an events, then you should follow this general guidelines:
- For local event on working day, inform atleast 2 weeks ahead to RP.
- For local event, arrange pick-up and drop facility for RP
- For out-station event, inform atleast 3 weeks ahead, give the contact details (Email, Phone, Address), arrange pick-up, drop and decent place for boarding/refreshing.
- Give a brief idea about the audience level and their interest on the topic. If there is any specific requirement, please discuss with RP.
- Don’t give fancy gift articles (like clock, pen-stand, night-lamp). Most of our members like books, you can get the RP wish-list and buy a book from that list.
- Pay the Honorarium to RP.
- Pay the RP travel expenses (if it is not taken care by organizer).
- For more details, please discuss with the RP.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949506.62/warc/CC-MAIN-20230330225648-20230331015648-00553.warc.gz
|
CC-MAIN-2023-14
| 1,921 | 20 |
https://rpggeek.com/rpg/36471/last-transmission
|
code
|
From the introduction:
The crew of the Harmony, a spacecraft of the United Earth Expeditionary Mission, are on a mission to the Tarkovsky system for the purposes of research. On entering the system they made two discoveries in rapid succession. First, the star has rapidly destabilized and will go supernova very soon. Second, Tarkovsky 5 is inhabited and they have intercepted communications from the planet.
The intense solar activity is affecting the computer’s ability to provide accurate translations of the messages. There is an opportunity to communicate a limited number of questions in the allotted time for the purposes of evaluation. This will then determine the potential threats and benefits to human civilization and whether or not the crew should effect a rescue.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764501407.6/warc/CC-MAIN-20230209045525-20230209075525-00754.warc.gz
|
CC-MAIN-2023-06
| 780 | 3 |
http://www.dmoz.org/Computers/Programming/Languages/REBOL/FAQs%2C_Help%2C_and_Tutorials/Advanced/
|
code
|
FAQs, Help and tutorials about more technical or advanced aspects of the REBOL programming language. Specialist and esoteric topics can be found here. Technical papers are here also.
How to use 'bind and when ...
Enlightenment on the troublesome concept of 'bind.
Build Simple Asynchronous Pluggable Protocols for Windows
Last update:May 5, 2016 at 8:38:38 UTC
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171162.4/warc/CC-MAIN-20170219104611-00010-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 360 | 5 |
https://www.mobileread.com/forums/showpost.php?p=2200250&postcount=140
|
code
|
Originally Posted by guycruls
I have the calibre reader on two machines - one is vista, the other 7. preferences on vista give me a handy interface to format 'Colors and backgrounds', but preferences on 7, forces me to create a CSS?
that is just plain dumb.
Preferences on both machines should be the same. I've attached my Windows 7 Viewer preferences. There are four tabs across the top, choose General
. Then click on Colors and backgrounds
. Nothing could be simpler.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283689.98/warc/CC-MAIN-20170116095123-00577-ip-10-171-10-70.ec2.internal.warc.gz
|
CC-MAIN-2017-04
| 471 | 6 |
https://community.estimote.com/hc/en-us/articles/216881838-Proximity-Beacons-vs-Location-Beacons
|
code
|
Estimote Proximity Beacons and Estimote Location Beacons are two separate product lines. This split represents two different approaches, different types of use cases. Let’s dig into the difference a little, shall we?
The Proximity approach involves “tagging” certain areas (a hotel lobby, a restaurant table, an airport gate, etc.) with a “marker”—a beacon—recognizable by smartphones. Using Estimote Monitoring, your app can simply detect it in the proximity, figure out which marker it is, and act accordingly.
Estimote Proximity Beacons are designed to attach to fixed points in venues, to provide apps with location context. Mobile apps with beacon support can then detect the smartphone coming in and out of range of a beacon, and act on that information.
Estimote Proximity Beacons come with Estimote Monitoring enabled by default. This enables you to monitor for the unlimited number of beacons, use software to dynamically manage and group beacons, and get reliable enter/exit events in your app. Learn more here.
Integrate proximity detection to your app with our step-by-step tutorials:
Estimote Proximity beacons also support Estimote Connection, Estimote Telemetry, iBeacon and Eddystone protocols.
Indoor Location is about replicating the GPS technology, but indoors, where there’s no satellite coverage. It enables, your iOS and Android apps gain access to precise indoor (x,y) coordinates of the device.
Together with Estimote Indoor Location SDK, Location Beacons turn a smartphone into a sophisticated compass to position and navigate in any venue.
To integrate Indoor Location into your app, you can follow our tutorials:
Currently, there are two types of Location Beacons.
- Long-range Location Beacons
- Location Beacons with UWB
Location Beacons with UWB are the new generation of our core long-range Location beacons tailored especially for Indoor Location. Together with our Indoor Location app for iOS, they will automatically map out a location and create a floor plan—courtesy of the UWB radio they’re equipped with, and Estimote Automapping technology.
Long Range Location Beacons do the same work with manual mapping. Instead of using Estimote Automapping, Indoor Location app for iOS asks you to help measure the room during the mapping process.
Both Long-range Location Beacons and Location Beacons with UWB support multi-packet advertising, mesh networking, have built-in sensors, and a range of 200m. Location Beacons can broadcast multiple packets simultaneously. Besides Estimote Monitoring, iBeacon and Eddystone, there are other packets available:
- Estimote Connection
- Estimote Indoor Location
- Estimote Telemetry
To learn more about the packets, read: What is a beacon protocol?
Location Beacons also have additional sensors/features:
- Ambient light sensor
- Real-Time Clock
- GPIO port
What to pick?
Proximity is about apps detecting they’re near areas of interest or objects. If you need to know if the user is in the lobby or in the kitchen go for Proximity.
Indoor Location is about apps gaining access to precise indoor (x,y) coordinates of the device, positioning and navigating. If you need to know where in the lobby or kitchen user is exactly (at the reception or in the lounge zone, next to a coffee machine or close to a fridge) Indoor Location is the way to go.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257651007.67/warc/CC-MAIN-20180324210433-20180324230433-00143.warc.gz
|
CC-MAIN-2018-13
| 3,337 | 26 |
https://testsquadron.com/threads/video-montya-talks-about-the-mantis.16229/
|
code
|
First Australian to comment in the thread.
good video, the Mantis would work well with the mine-pooper and are the ships required for the new salt mining gameplay loop.
Damn, I missed that. LOLHOW IN THE HELL DID YOU MISSPELL YOUR OWN NAME, @Montoya !?
Thank you, Glorious Leader!No you [DEMONETIZED]! You must comment on the youtube channel, because then the algo will think Im popular or some [DEMONETIZED].
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875147154.70/warc/CC-MAIN-20200228104413-20200228134413-00017.warc.gz
|
CC-MAIN-2020-10
| 409 | 4 |
https://www.oreilly.com/library/view/gurus-guide-to/0201700476/0201700476_ch21lev1sec7.html
|
code
|
Snapshot replication is used for copying whole objects from a publisher to a subscriber. Although a snapshot can be filtered, snapshot replication has no facility for sending incremental changes to subscribers.
SQL Server implements snapshot replication via the Snapshot and Distribution Agents. The Snapshot Agent handles creating the snapshot, which consists of BCP data files and T-SQL scripts. The Distribution Agent takes the snapshot and applies it to subscribers. All along the way, both agents access and update replication system tables in the distribution database.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195524475.48/warc/CC-MAIN-20190716015213-20190716041213-00104.warc.gz
|
CC-MAIN-2019-30
| 575 | 2 |
http://certsrv.ru/exforefrontserver.en/html/2bfb1279-e190-4fac-b272-ab7ad193d49e.htm
|
code
|
You can perform filtering functions by using both Exchange Server and Forefront Protection 2010 for Exchange Server (FPE).
Many filtering options are available in Exchange. These options are automatically enabled on Edge Transport servers but must be enabled on Hub Transport servers by using the steps outlined in How to Enable Anti-Spam Functionality on a Hub Transport Server. For information about managing your Exchange filters, see Managing Anti-Spam and Antivirus Features and Managing Transport Rules.
Although the configuration steps are different for each product, Exchange provides filtering functions that are similar to those of FPE, with several notable differences.
Exchange offers the following functionality that FPE does not:
- Filtering on the To field, Cc field, or both
(FPE filters only on the To field).
- Setting levels of importance for each
- The ability so use a distribution list rather
than having to input each item (or example, an e-mail address) in a
FPE offers the following functionality that Exchange does not:
- Performing case-sensitive keyword
- Performing file filtering by file types.
- The ability to view all your filters in a
single view while sorting them as needed.
You can use a combination of Exchange and FPE filtering options to get the most complete filtering functionality. Filtering is performed first by Exchange and then by FPE, so Exchange filtering takes precedence. For example, if you set a delete action for a filter match in Exchange, the file is deleted before it is scanned by FPE.
|If both Exchange and FPE filtering are enabled, you will have to monitor quarantine for both Exchange and FPE.|
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506320.28/warc/CC-MAIN-20230922002008-20230922032008-00013.warc.gz
|
CC-MAIN-2023-40
| 1,656 | 16 |
http://androidforums.com/application-development/664248-using-other-maps-than-google-maps-api.html
|
code
|
December 18th, 2012, 07:50 AM
Thread Author (OP)
Join Date: Dec 2012
Carrier: Not Provided
Thanked 0 Times in 0 Posts
Using other maps than Google Maps API?
I'm about to try to develop a map app that displays my position on a map. The problem that I have is that the devices won't be online and the GPS-position data is delivered through an ordinary IP-stream over WiFi.
I also have specialized maps that I wan't to display sometimes. I am confident in programming but completly new to the Android platform, so I could use some nice pointers or references on following questions.
So my questions really are ..
* Is it possible to use other map sources than Google Maps API? Any pointers if so?
* Is it possible to extract the GPS-information received through ordinary network communication and feed it to the Location API?
* I've seen some information about Google Maps offline!? Is it possible?
Thanks in advance ...
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163037903/warc/CC-MAIN-20131204131717-00095-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 917 | 13 |
http://cplusplus-naturally.blogspot.com/2008/08/standard-template-library-stl.html
|
code
|
- Going by the name, Standard means part of standard C++, Template means the classes and functions contained in the STL are generic and in C++ terms they are template classes or template functions, and Library means collection of these classes and functions.
- Originally, STL was conceived by HP and now supported by almost all C++ compilers that support ISO/ANSI C++.
- STL contains 3 things:
- Iterator: For accessing elements of a container. May be forward only, bi-directional, random access, output iterators and input iterators.
- Algorithms: To perform functions on elements contained in a container. Examples are: find, merge, sort etc.
Points to Ponder
- STL Algorithms are generic and not member function or friend function of any class. So these algorithms can be used with non STL containers also like you can use sort() for C++ arrays.
- Although, STL is quite useful, efficient, and robust but your compiler may report some warnings etc. which can be handled easily like turning off warnings, not using pre-compiled headers etc.
Or, wait for detailed post later.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578531462.21/warc/CC-MAIN-20190421120136-20190421141838-00042.warc.gz
|
CC-MAIN-2019-18
| 1,077 | 9 |
https://forums.macrumors.com/threads/isight-not-found-on-my-mbp.881824/
|
code
|
Hi, I have a Macbook pro Late 2007 with a built-in iSight (of course) and Mac OS X 10.6. Some weeks ago my iSight started to be not recognized by software like Photo Booth of Skype. As I don't use it frequently I didn't search a solution but now I miss my webcam. Photo Booth simply show a message like "webcam not connected". I think that the problem started when i uninstalled an app which emulate a webcam from a video file. But I can't remember the name of this app. What can I do now? Thanks.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583510853.25/warc/CC-MAIN-20181016155643-20181016181143-00091.warc.gz
|
CC-MAIN-2018-43
| 497 | 1 |
https://www.question-defense.com/2009/10/30
|
code
|
I have been doing some business with people overseas and sometimes we communicate via text message so I needed to verify how much it cost to send text messages from my iPhone on ATT Wireless’s network to cell phones overseas. In my specific case I wanted to verify sending text messages from the United States to London, England or the United Kigdom. After looking around a bit I found that only certain countries are supported and it costs $0.25 per text message. Below I have listed some more resources and information on picture messaging.
**UPDATE: New article here.
Its a little more complicated to create a read only database user with PostgreSQL than say using something like MySQL. You will need to grant select access on each table in the database for the read only user. Keep in mind that each time you add a new table you will need to either run the shell script below again or manually grant select access on the new table for the read only user.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526506.44/warc/CC-MAIN-20190720091347-20190720113347-00145.warc.gz
|
CC-MAIN-2019-30
| 960 | 3 |
https://rdrr.io/github/bearcreek/domstolr/
|
code
|
Tool for extracting text data from decisions handed down by the Norwegian Supreme Court.
|Package repository||View on GitHub|
Install the latest version of this package by entering the following in R:
Add the following code to your website.
For more information on customizing the embed code, read Embedding Snippets.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202689.76/warc/CC-MAIN-20190322200215-20190322222215-00359.warc.gz
|
CC-MAIN-2019-13
| 317 | 5 |
https://umbra3d.com/sdk/
|
code
|
Umbra SceneStream SDK consists of low-level C-APIs and relevant wrappers — divided into two main parts:
Extract meshes, textures and point clouds into Umbra Platform
Progressive streaming and rendering of Umbrafied 3D data
The optimization backend architecture itself is designed with scalability in mind, thus the optimization can be run in a variety of configurations - from local nodes to cloud environments.
Umbra maintains a few active reference integrations, such as Unity 3D and three.js. Also, a shared-resource cloud optimization service hosted by Umbra is available today.
SDK with low-level C-APIs, C++ wrappers and development tools to integrate Umbra SceneStream into your workflow:
Unity SDK uses C# wrappers and is shipped as a plugin. It has ready-made implementations of the Import and Runtime APIs to get you started quickly.
Umbra.js low-level API allows you to build fully customized rendering solutions with Umbra’s scene streaming, while three.js integration makes it easy to jumpstart your 3D deployment to a web browser.
Need help with getting started or isn't something working like it's supposed to? Just contact our support team and we would love to help you out.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347388758.12/warc/CC-MAIN-20200525130036-20200525160036-00199.warc.gz
|
CC-MAIN-2020-24
| 1,194 | 9 |
https://www.gamefront.com/forums/sw-eaw-modding-mapping-and-editing/cis-mod-crashing
|
code
|
Whenever i try to load a space battle it locks, dings, and crashes.
Can simulate them fine, but am not able to actually do the space battles.
Any help would be much appreciated.
Eh, reinstalled EAW, reinstalled the mods....
Now none of the mods work. Game loads using the CiS bat file, but there are no custom anythings...
are you playing FoC or Eaw?
and make sure the lucasarts folder is in the correct program files folder, as some vistas have a x86 program files folder
Yeah, its in the right folder.... EAW.... uninstalled / deleted FoC cause the mod was not supposed to work with it.
Just seems like it doesnt want to work.... and I know it is some stupid fucking user error, I just cant figure out what.
Have you edited any xmls in it?
How when I start it with the CiS bat file, it doesnt even load the goofy thing.
Game starts, with no custom units etc.
Reinstalled / repatched the game / CiS maybe 5 times.
After it crashes, and reverts back to windows. What error message do you get? If it's an exception, then that is a little harder to find. If it says "xml parse error" then that is easy to fix.
Just tried it all over again.
Got it to load the mod this time... was able to load up a space combat screen.... figured the test run was over. Restarted a new game since that was just to test it, and when one of my systems got attacked it crashed with the exception again.
wait, are you loading old saved games?
make sure when you use a new mod start a new game.
There is no really easy way to find an exception, but you could try the following....
1. Load each new file one at a time, 2. Look at the units involved at the time of the crash,
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107912593.62/warc/CC-MAIN-20201031002758-20201031032758-00009.warc.gz
|
CC-MAIN-2020-45
| 1,649 | 20 |
https://betteroutreach.io/it-was-great-meeting-you
|
code
|
Hi [first name],
Our team enjoyed meeting you at Dreamforce - you may remember us scanning your badge when you stopped by our booth. Your personal journey with Outreach begins with this email!
Watch as my follow-up unfolds and compare it with how your team might currently follow up with leads generated at events like this. Our entire team will follow up with every lead this way, helping us to expand our pipeline (all while taking care of our normal sales motions).
Below are the process steps Outreach will empower me to do:
- Email 1 (today) - Outreach sent this email after you were loaded as a lead in Salesforce by our marketing team
- Email 2 (tomorrow) - You'll receive a reply to this thread that Outreach will send for me from my email account
- Email 3 (2 days later) - Outreach will send another reply for me in this same thread
- Call 1 (1 day later) - Outreach will queue a phone call (with a Voicemail if we don't connect)
- Social Touch 1 - Outreach will instruct me to connect with you on LinkedIn
- Call 2 (2 days later) - Outreach will prompt me to call you again (no VM)
- Social Touch 2 (4 days later) - Outreach reminds me to visit your LinkedIn profile so your LinkedIn recap shows you my profile picture in your "Who's Viewed Your Profile" section
- Email 4 (1 day later) - Outreach will send an email as part of a new thread
- Call 3 (2 days later) - Outreach will tell me to call you and leave a VM
- Task 1 (2 days later) - Outreach will tell me you haven't replied and prompt me to decide on next actions
That's 9 touches over 15 business days -- unless you decide to engage with me somewhere along the way. The system is also smart enough to pause and resume at a later date if we get an out-of-office reply. All of this activity will be auto-logged on your contact (and account) record in Salesforce. In addition, your lead status will be updated to reflect where you are in our conversion funnel and we'll have insights on every interaction you have with any content in my messaging.
So, hold me to it. You'll only stop this stream if you engage with me. Then, we'll schedule a time to show you how your team can follow up like this (which is just one need/challenge Outreach solves).
Look for my next email in two days.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335504.37/warc/CC-MAIN-20220930212504-20221001002504-00711.warc.gz
|
CC-MAIN-2022-40
| 2,253 | 17 |
https://forums.veeam.com/vmware-vsphere-f24/surebackup-job-on-offsite-backup-t16237.html
|
code
|
lobo519 wrote:The static route that is added to the Veeam server by the job on our main site is 10.10.10.0 255.255.255.0 192.168.5.5.
192.168.5.5 = vlab appliance at our colocation which is on a site to site VPN with our main site..
10.10.10.0 = Masquerade IP
What am I missing?? I am thinking its a routing issue but not sure where the break down is..
You're right, it's a routing issue. Veeam can only add a static route to the proxy appliance NAT to your Veeam server, it can't add it to your routers or even to the correct gateway. Notice about that we added a route to 192.168.5.5 because we expect 192.168.5.5 to be on the same network with the Veeam server. In your setup, it is not, it's remote, so you would need a static route to your local gateway, and then your gateway (and any other gateways in between) would also need this route added.
It's completely possible to actually do this, but it's a complex setup. There's already some threads where I have outlined the required steps, but effectively it involved making sure that your entire network will properly route the NAT network to the proxy at the remote site.
Other options include configuring a layer-2 bridge between the two sites, from the Veeam server to perhaps another server at the remote site or I've known one customer that used a VPN configuration, I think using OpenVPN.
Another, sometimes simpler option is to just install a copy of Veeam at the remote site and use this instance to run the SureBackup job.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084893397.98/warc/CC-MAIN-20180124050449-20180124070449-00180.warc.gz
|
CC-MAIN-2018-05
| 1,487 | 8 |
https://answerofmath.com/solved-fixed-effects-have-df0-and-chi-sq0-when-tested-using-anova/
|
code
|
I have a made a linear mixed model using
I began with a maximal model containing 6 terms and all two-way interactions (15 total), I also have a random effect of subject ID. Of these terms, 11 interactions were significant and so were kept in the final model. I found this by dropping interactions and comparing to previous model using
anova(). As all 6 fixed terms are part of a significant interaction they remained in the model. My problem is that when I tried to test the fixed terms to find a chi-squared value for them by removing the term and comparing to the full model, the
anova output said
chisq = 0, df=0 but that
p< 2.2e-16. I don't understand how p can be so small if
chisq = 0. I also don't understand why
df=0 which would suggest I am comparing the same model when actually I have removed a term. What does this mean? Have I fit too many interactions to my data (I only have 160 data points). Is there any point in finding the chi-squared value for these fixed effects?
Probably because you write the wrong code. I got
df=0 too, and found out why.
For example: I used the formula:
y ~ x1 + x2 +x1*x2 + (1|x3) in
lmer, and then:
y ~ x2 +x1*x2 + (1|x3).
Then I used
anova to get the p-value for
x1 using the above two
lmer outputs. It gives result
chisq=0, and very small p.
I found out that I misunderstood
x1 + x2 + x1:x2, whereas
x1:x2 is the interaction of
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506429.78/warc/CC-MAIN-20230922234442-20230923024442-00113.warc.gz
|
CC-MAIN-2023-40
| 1,373 | 22 |
https://www.preservationtalk.com/2-general-property-discussion/13210-processors-needed.html
|
code
|
Join Date: Jan 2017
Thanked 3 Times in 3 Posts
OP I will private message you about what ive done with processing. I''ve tried hiring my own processors and direct out-sourcing. They either cost too much money, had too many errors, or I didn't like that I had to manage the other person all the time. I went with an out-sourcing company from a guy a met at one of the conventions. He opened up a company and was directly involved with my account when we started.
He was just starting out so i'm sure that's why he made sure I was happy. I had to do some work for the first couple of weeks when I first made my decision. but its pretty much autonomous now. You just got to remember that it's not 100 percent. I'd say it was closer to 95% error free the first month and closer to 99% now.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347409171.27/warc/CC-MAIN-20200530102741-20200530132741-00338.warc.gz
|
CC-MAIN-2020-24
| 784 | 4 |
https://forum.getkirby.com/t/image-block-background-color/22102
|
code
|
I am using Image Blocks to manage sponsor logos in the footer of a page. I have chosen Image Blocks over just a Files Field, because the right away offer more options to the editors for linking, captions, etc.
Now since the website is on a dark background all images are transparent with white content. Which leads to this issue:
I would like to avoid writing a custom blocks plugin only for the background color. And now I was wondering if there is such a things as
back: black for the image blocks?
Thanks a lot!
You don’t need a plugin, but you can override both the image blocks snippet and the image block blueprint to add an additional field, see the docs: Blocks | Kirby CMS
i think what i dont understand is, where to change the preview.
In the Tab-View it is by default with a black background, because the blueprint under
blueprints/blocks/image.yml it says
back: black. So that looks fine.
But where would I find the blueprint for the preview (aka the screenshot in the first post, where you cannot spot the graphic at all)?
sorry, sometimes the mighty multi-levels of the blueprints can be tough to navigate
Ah, ok, sorry, now I understand. In this case, you actually do need a custom preview in a plugin.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335365.63/warc/CC-MAIN-20220929194230-20220929224230-00671.warc.gz
|
CC-MAIN-2022-40
| 1,219 | 13 |
https://www.freelancer.com/projects/website-design-joomla/cross-browser-css-for-drop/
|
code
|
I need a drop down menu set up that looks exactly the same as the attached file.
I have the component SWMenuFree installed in Joomla 1.0.13. You only need to change the style sheet to control it.
The stylesheet it is located at:
[url removed, login to view]
The test site is located at:
[url removed, login to view];task=view&id=12&Itemid=26
The menu system will need to look exactly the same on IE7,IE6, and Firefox. A white border is required for all the menu items and they all need to line up under each other.
The job should only take 15 minutes for a CSS expert so it should cost around $30-$40.
Please give examples of other drop down menu systems that you have customised when you bid.
If I am happy with your work there will be other CSS work for you.
12 freelancers are bidding on average $34 for this job
i have to 2 years of experience of joomla , and i have to garuntee to you that you satisfy with my work and rate so if you have interested then contact me gmail ID : [url removed, login to view]
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647545.84/warc/CC-MAIN-20180320224824-20180321004824-00131.warc.gz
|
CC-MAIN-2018-13
| 1,010 | 12 |
https://github.com/queenypingcap
|
code
|
Prevent this user from interacting with your repositories and sending you notifications.
Learn more about blocking users.
You must be logged in to block users.
Contact GitHub support about this user’s behavior.
Learn more about reporting abuse.
Forked from rust-unofficial/awesome-rust
A curated list of Rust code and resources.
Forked from rust-lang/this-week-in-rust
Data for this-week-in-rust.org
Forked from ngaut/builddatabase
Build a distributed SQL database from the ground up
Forked from grpc/grpc.github.io
The grpc.io website. (on GitHub pages)
Forked from pingcap/weekly
Seeing something unexpected? Take a look at the
GitHub profile guide.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585196.73/warc/CC-MAIN-20211018031901-20211018061901-00168.warc.gz
|
CC-MAIN-2021-43
| 653 | 16 |
https://ldbcouncil.org/post/snb-data-generator-getting-started/
|
code
|
In previous posts (this and this) we briefly introduced the design goals and philosophy behind DATAGEN, the data generator used in LDBC-SNB. In this post, I will explain how to use DATAGEN to generate the necessary datatsets to run LDBC-SNB. Of course, as DATAGEN is continuously under development, the instructions given in this tutorial might change in the future.
Getting and Configuring Hadoop
DATAGEN runs on top of hadoop 1.2.1 to be scale. You can download it from here. Open a console and type the following commands to decompress hadoop into /home/user folder:
$ cd /home/user $ tar xvfz hadoop-1.2.1.tar.gz
For simplicity, in this tutorial we will run DATAGEN in standalone mode, that is, only one machine will be used, using only one thread at a time to run the mappers and reducers. This is the default configuration, and therefore anything else needs to be done for configuring it. For other configurations, such as Pseudo-Distributed (multiple threads on a single node) or Distributed (a cluster machine), visit the LDBC DATAGEN wiki.
Getting and configuring DATAGEN
Before downloading DATAGEN, be sure to fulfill the following requirements:
- Linux based machine
- java 1.6 or greater
- python 2.7.X
- maven 3
After configuring hadoop, now is the time to get DATAGEN from the LDBC-SNB official repositories. Always download the latest release, which at this time is v0.1.2. Releases page is be found here. Again, decompress the downloaded file with the following commands:
$ cd /home/user $ tar xvfz ldbc_snb_datagen-0.1.2.tar.gz
This will create a folder called “ldbc_snb_datagen-0.1.2”.
DATAGEN provides a run.sh is a script to automate the compilation and execution of DATAGEN. It needs to be configured for your environment, so open it and set the two variables at the top of the script to the corresponding paths.
HADOOP_HOME points to the path where hadoop-1.2.1 is installed, while LDBC_SNB_DATAGEN_HOME points to where DATAGEN is installed. Change these variables to the appropriate values. Now, we can execute run.sh script to compile and execute DATAGEN using default parameters. Type the following commands:
$ cd /home/user/ldbc_snb_datagen-0.1.2 $ ./run.sh
This will run DATAGEN, and two folders will be created at the same directory: social_network containing the scale factor 1 dataset with csv uncompressed files, and substitution_parameters containing the substituion parameters needed by the driver to execute the benchmark.
Changing the generated dataset
The characteristics of the dataset to be generated are specified in the params.ini file. By default, this file has the following content:
scaleFactor:1 compressed:false serializer:csv numThreads:1
The following is the list of options and their default values supported by DATAGEN:
|scaleFactor||1||“The scale factor of the data to generate. Possible values are: 1, 3, 10, 30, 100, 300 and 1000”|
|serializer||csv||“The format of the output data. Options are: csv, csv_merge_foreign, ttl”|
|compressed||FALSE||Specifies to compress the output data in gzip.|
|outputDir||./||Specifies the folder to output the data.|
|updateStreams||FALSE||“Specifies to generate the update streams of the network. If set to false, then the update portion of the network is output as static”|
|numThreads||1||Sets the number of threads to use. Only works for pseudo-distributed mode|
For instance, a possible params.ini file could be the following:
scaleFactor:30 serializer:ttl compressed:true updateStreams:false outputDir:/home/user/output numThreads:4
For those not interested on generating a dataset for a given predefined scale factor, but for other applications, the following parameters can be specified (they need to be specified all together):
|numPersons||-||The number of persons to generate|
|numYears||-||The amount of years of activity|
|startYear||-||The start year of simulation.|
The following is an example of another possible params.ini file
numPersons:100000 numYears:3 startYear:2010 serializer:csv_merge_foreign compressed:false updateStreams:true outputDir:/home/user/output numThreads:4
For more information about the schema of the generated data, the different scale factors and serializers, please visit the wiki page of DATAGEN at GitHub!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100593.71/warc/CC-MAIN-20231206095331-20231206125331-00073.warc.gz
|
CC-MAIN-2023-50
| 4,251 | 37 |
https://sunrise.co/news/sunrise-technologies-announces-now-microsoft-cloud-solution-provider-csp/
|
code
|
Oct 22, 2015
Sunrise Technologies, a worldwide provider of ERP and BI consulting services, today announced its participation in the Microsoft Cloud Solution Provider (CSP) program. As an authorized Cloud Solution Provider, Sunrise Technologies can now deliver and support a suite of solutions, including Azure, Office 365, Microsoft Dynamics, and others that are offered as part of the Microsoft cloud.
As a Cloud Solution Provider, Sunrise can better support its customers in making these cloud based solutions a seamless part of the IT organization, while also incorporating industry best practices for apparel, footwear, home furnishings, consumer products, manufacturing, distribution, and retail. This translates to reduced IT costs and a faster time to value for Sunrise clients.
“We are committed to helping our customers on their cloud journey and providing differentiated, industry-specific solutions, in partnership with Microsoft. The CSP program was just announced in July at the Microsoft Worldwide Partner Conference and I’m pleased Sunrise is one of only a few early adopters,” said John Pence, President of Sunrise Technologies.
This latest achievement follows Sunrise’s Microsoft Cloud Platform Competency announced July 30, 2015.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647409.17/warc/CC-MAIN-20230531182033-20230531212033-00657.warc.gz
|
CC-MAIN-2023-23
| 1,255 | 5 |
https://github.com/glv
|
code
|
Create your own GitHub profile
Sign up for your own profile on GitHub, the best place to host code, manage projects, and build software alongside 28 million developers.Sign up
Maze algorithms in Clojure (from Jamis Buck's "Mazes for Programmers" book)
Adds test/unit compatibility to Rspec.
Smithereen is a Ruby library for building Top-Down Operator Precedence parsers.
A Naked Objects framework for Ruby
A small library to assist in writing filtering programs for icalendar files or streams.
Talk and sample code for a talk on Sinatra
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221213689.68/warc/CC-MAIN-20180818134554-20180818154554-00680.warc.gz
|
CC-MAIN-2018-34
| 536 | 8 |
https://docsconsole.com/angular/angular-architecture
|
code
|
By AmarSivas | | Updated : 2021-03-16 | Viewed : 10938 times
Please find the below given diagram for different type of code blocks/clases and how they are interacted each other.
First we will discuss about the ngmodule. The main theme of making application as modules is maintenance and reusability.
When we want to organize a complex application, we should make application as number of modules. So we can easily maintain application. Ngmodule will be used for maintenance and reusability. We can combine all similar functional code blocks such as services, components as one module. So entire code maintenance will be easy and we can reuse the different modules. Each module will be represented as unique module for specific purpose
A template contains html and binding markup. Before rendering the html elements, Angular will create or modify the html elements by using the binding markup. Binding markup will be used by the angular to know the way of rendering. The markup or binding markup will be provided by the directives.
Directive is class, will be used by angular to render the template into the DOM. Directive contains the logic, which will be used to render the template. While before rendering the template as html into DOM, angular will render the html as per directive’s instruction.
Service classes will send/fetch data to/from the server/back end. The fetched data will be used by component to display as view. Simply we can say services are responsible for specific functionality. Some of the services classes are reusable. Actually service classes will injected by Injectors as decencies into components. Service classes contains the metadata, which is useful for injecting the service into the components.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710968.29/warc/CC-MAIN-20221204072040-20221204102040-00523.warc.gz
|
CC-MAIN-2022-49
| 1,728 | 7 |
https://lists.freedesktop.org/archives/xdg/2003-August/000586.html
|
code
|
[Annoyances] X-Windows Copy & Paste
giles.atkinson at eu.citrix.com
Wed Aug 20 14:08:01 EEST 2003
Richard Boulton wrote:
> I've found this a most interesting discussion.
> To summarise, my understanding is that applications should set PRIMARY to
the contents of the selection whenever it is modified, and set CLIPBOARD
only on an explicit user command. Whenever CLIPBOARD is set, PRIMARY should
also be set to the same thing (but this probably happens implicitly anyway,
since the usual way to set CLIPBOARD involved making a selection first).
> Applications should paste from CLIPBOARD if an explicit paste is done (eg,
from a menu), but may support an alternate method for pasting from PRIMARY,
such as middle button click. CLIPBOARD is the copy&paste mechanism that
must be implemented to ensure interoperability with all applications -
therefore applications must simply provide some means of setting CLIPBOARD
in order to be able to paste into all other applications.
> The "explicit action" to set CLIPBOARD could be a keyboard shortcut, a
toolbar menu option, a context menu option, or possibly something else, as
long as it is an explicit step that the user takes to perform the copy.
CLIPBOARD should not be set simply by making a selection, since this is too
destructive of data deliberately copied by the user.
> The only time it would be excusable to set CLIPBOARD on selection without
an explicit action would be if there was absolutely no way that such an
action could be built into the UI. However, I don't know of a situation
where this is the case: for a terminal application for example, at least one
of a right-click context menu or a keyboard shortcut would be appropriate.
> An appropriate patch to Pterm to make it support the above would be:
> * Leave the current behaviour of setting PRIMARY on selection with the
> left button, and pasting from PRIMARY on the middle button.
> * Add context menu options for "cut" and "paste", which work only on
> CLIPBOARD, and have no interaction with PRIMARY.
> This seems neat, and hopefully avoids confusing users. It also avoid the
risk that when I'm pasting from one pterm to another I slip and press the
wrong mouse button (particularly common when using "emulate 3 buttons"), and
lose my selection.
> I think I've got it clear enough in my head I can write a patch now, and
convince the maintainers to accept it. Thanks for that.
This seems fine except that most XDG-compliant applications will also be X
and as such should be compliant with the ICCCM. I think this is part of the
Havoc was making. The ICCCM is explicit on the PRIMARY selection:
"The selection named by the atom PRIMARY is used for all commands that take
only a single argument and is the principal means of communication between
use the selection mechanism".
Only a small change to Richard's text is needed.
In the third paragraph above it should be enough to change "but may" to "and
"... but may support an alternate method for pasting from PRIMARY,
such as middle button click."
The appeal to existing standards also makes it clear what is really wrong
Mozilla/pterm/Wine example: Wine ignores the primary selection. Its not
clear what the
right behaviour is for an emulator, but Unix-style middle button paste would
probably be more useful in practice that the Windows middle-button actions.
There is also a more interesting issue of usablility here.
I have been somewhat surprised at the view that
middle button paste is some sort of frill for experts. Am I alone in
traditional X-windows actions (slice/move/click) a vastly superior user
the Mac/Windows slice/control-c/move/control-v, with hands moving between
mouse and keyboard? (Of course in practice that is often
slice/control-c/move/click edit/click chevrons/click "paste special"/
click "text"/click OK, thanks to the inclusion formatting by default,
but that is another story.) We have a genuinely superior interface and
should make the most of it, not treat it as an anachronism to be hidden.
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the xdg
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573832.23/warc/CC-MAIN-20190920050858-20190920072858-00374.warc.gz
|
CC-MAIN-2019-39
| 4,101 | 65 |
https://blog.spiralofhope.com/3117/file-managers.html
|
code
|
On Linux ∞
TODO - find my other notes
Untested GUI ∞
- KDE: https://userbase.kde.org/Dolphin
- Too old/unmaintained?
- Seems amateurish.
Untested Console ∞
- Really rough, looks great but just isn't user-friendly
- Untested, seems too simple
What I really want out of a console file manager is something like DOS' "Director". It was fucking spectacular.
On Windows ∞
On Windows, my preference is not to have a separate program as a file manager, but to enhance the existing
explorer.exe. I'm mostly interested in giving it tabs.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487613380.12/warc/CC-MAIN-20210614170602-20210614200602-00337.warc.gz
|
CC-MAIN-2021-25
| 536 | 13 |
https://www.embo-embl-symposia.org/symposia/2017/EES17-01/index.html
|
code
|
- Metabolism in time and space
- Mechanistic insights - crosstalk metabolism/cellular functions
- Metabolic control of development
- Metabolism in growth control
- Beyond the canonical roles of metabolism
This symposium focuses on the role of metabolism in controlling cellular and developmental programs in its spatial and temporal complexity. There is a fundamental interest in deciphering the intricate link between metabolism and regulatory cellular programs during cell differentiation and the development of multicellular organisms. Recent technological progress has enabled us to analyse metabolism and metabolic activities with spatio-temporal resolution. This creates unprecedented potential to address how metabolic state impacts on cellular and developmental programs.
It is the overarching goal of this meeting to enable interdisciplinary discussion on the role of metabolism in controlling cellular and developmental programs in its spatial and temporal complexity. Special focus will be given to discuss emerging imaging or biosensor technologies and bioinformatics and how they can enable addressing fundamental biological questions.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251671078.88/warc/CC-MAIN-20200125071430-20200125100430-00006.warc.gz
|
CC-MAIN-2020-05
| 1,148 | 7 |
https://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=12354403
|
code
|
MetService Weather Wellington: August 7th7 Aug, 2020 4:16am Quick Read
Media Council says Herald story was unfair7 Aug, 2020 6:00am 4 minutes to read
More from New Zealand
- 2 minutes to read
A woman who died after falling on Mt Ruapehu had travelled to the region on a club outing.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401582033.88/warc/CC-MAIN-20200927215009-20200928005009-00108.warc.gz
|
CC-MAIN-2020-40
| 282 | 5 |
https://chadthompson.me/about-me/
|
code
|
I’m a technology lead that has been building and managing software for the web for nearly 20 years. During that time, I’ve held a number of titles – developer, consultant. architect, etc. – but have been focused on building and managing web experiences. A few recent career highlights:
- I am currently managing teams of software developers and systems engineers. My teams focus mainly on building interactive experiences for employers and recruiters using Dice.com and maintaining the infrastructure and reliability of the overall Dice experience.
- I built and managed a team that migrated the entire infrastructure of Dice.com (a site that sees roughly two million unique visitors per month to a cloud based (in our case, Amazon Web Services) environment. This was an 18th month, $1.5 million project that reduced the operational cost of Dice.com by nearly one half while fostering a new environment for product innovation. Along the way. we built skills on the team with a mix of systems engineers, software artisans and a lot of elbow grease. In the end, we completed the project, delivered on budget goals and did so without hiring a single proclaimed or certified AWS expert.
- I lead efforts to both migrate and automate cloud environments for our Dice International (now defunct) and Workdigital properties that have been folded into Dice.com and search platforms. Along the way, I introduced the organization to deploying infrastructure as code using tools such as Terraform and Puppet.
- I was lead for a number of years with Dice.com / DHI in managing and implementing technology solutions as both an individual contributor and team lead. In that role, I improved the stability and reliability of web and search applications – automating and implementing observability on complex systems.
- I’ve written a few things along the way, including the publication of a book filled with recipes and tips for implementing Vagrant into development workflows.
- I’ve also recorded some online training and short technology tips for O’Reilly Media.
- A few years ago, I was a technology lead on an academic study focused on the use of computational science in learning. That experience changed how I approach learning and mentoring in the workplace.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525136.58/warc/CC-MAIN-20190717101524-20190717123524-00258.warc.gz
|
CC-MAIN-2019-30
| 2,266 | 8 |
https://www.mail-archive.com/[email protected]/msg11279.html
|
code
|
On 04/19/2012 07:43 PM, Simo Sorce wrote:
> Ok, this come close to a proper solution but not quite.
> So first of all, kerberos keys are available in the master, we do not
> need to also store the clear txt password and regenerate them, but we do
> need to be able to convey them to the replica wrapped in a different
> master key.
> Let me explain what I had in mind to attack this problem (I hinted at it
> in a previous email).
> The simplest way is to use a principal named after the branch office
> replica as the 'local'-master and (possibly a different one)
> 'local'-krbtgt key, this way the key is available both to the FreeIPA
> masters and to the branch replica.
> Assume a realm named IPA.COM we would have principals named something
> like [email protected]
> As for transmitting these keys we have 2 options.
> a) similar to what you describe above, unwrap kerberos keys before
> replication and re-wrap them in the branch office master key.
> b) store multiple copies of the keys already wrapped with the various
> branch office master keys so that the replication plugin doesn't need to
> do expensive crypto but only select the right pair
I was under the assumption that to be able to wrap things properly you
need both user password in clear that you have only at the moment the
hashes are created and the key for the branch office replica. Is this
the wrong assumption? If you do not need raw password you can rewrap
things later but you should do it only on the fly when the attribute is
replicated. You do not want to create re-wrapped hashes when the
replica is added - that will be DDoS attack.
If the assumption is correct then you would have to force password
change every time you add a branch office replica.
> With a) the disadvantage are that it is an expensive operation, and also
> makes it hard to deal with hubs (if we want to prevent hubs from getting
> access to access krb keys).
Why this is a problem?
> With b) the disadvantage is that you have to create all other copies and
> keep them around. So any principal may end up having as many copies are
> there are branch offices in the degenerate case. It also make it
> difficult to deal with master key changes (both main master key and
> branch office master keys).
> Both approaches complicate a bit the initial replica setup, but not
> terribly so.
So which one do you propose? It is not clear.
>> > Using this approach we have several benefits:
>> > 1) Remote office can enjoy the eSSO
>> > 2) If the remote replica is jeopardized there is nothing in it that can
>> > be used to attack central server without cracking the kerberos hashes.
>> > 3) Authentication against the remote server would not be respected
>> > against the resources in the central server creating confined environment
>> > 4) Remote office can operate with eSSO even if there is no connection to
>> > the central server.
> Not so fast! :-)
> User keys are not all is needed.
> Re-encrypting user keys is only the first (and simplest) step.
> Then you have to deal with a) the 'krbtgt' key problem and b) the Ticket
> granting Service problem. They are solvable problems (also because MS
> neatly demonstrated it can be solved in their RODC), but requires some
> more work on the KDC side.
> So problem (a): the krbtgt.
> When a user in a branch office obtain a ticket from the branch office
> KDC it will get this ticket encrypted with the branch office krbtgt key
> which is different from the other branch offices or the main ipa server
> krbtgt key.
> This means that if the user then tries to obtain a ticket from another
> KDC, this other KDC needs to be able to recognize that a different
> krbtgt key was used and find out the right key to decrypt the user
> ticket to verify its TGT is valid before it can proceed.
I am not sure this needs to be solved. It depends what kinds of central
services are required for the local office users to access. Can we defer
> We also have a worse reverse problem, where a user obtained a krbtgt for
> the ipa masters but then tries to get a service ticket from the branch
> office TGS which does not have access to the main krbtgt at all (or it
> could impersonate any user in the realm).
> So for all these case we need a mechanism in the KDC to i) recognize the
> situation ii) find out if it can decrypt the user tgt iii) either
> redirect the user to a TGS server that can decrypt the tgt or 'proxy'
> the request to a KDC that can do that.
Seems very complex and too generic. May be we should slice it into
several use cases and address them one at a time.
> The problem in (b) is of the same nature, but stems from the problem
> that the branch office KDC will not have the keys for a lot (or all) of
> the service principal for the various servers in the organization.
> So after having solved problem (a) now we need again to either redirect
> the user to a TGS that have access to those keys so it can provide a
> ticket, or we need 'proxy' the ticket request to a server that can.
> In general we should try to avoid tring to 'redirect' because referrals
> are not really well supported (and not really well standardized yet) by
> many clients and I am not sure they could actually convey the
> information we need to anyways, so trying to redirect would end up being
> an inferior solution as it would work only for a tiny subset of clients
> that have 'enhanced' libraries.
> OTOH proxying has a couple of technical problems we need to solve.
> The first is that we need a protocol to handle that, but using something
> derived from the s4u2 extensions may work out. The second problem is
> that it requires network operations in the KDC, and our KDC is not
> currently multithreaded. However thanks to the recent changes to make
> the KDC more async friendly this may not be a problem after all. As the
> KDC could shelve the request until a timeout occurs or the remote KDC
> replies with the answer we need.
Sr. Engineering Manager IPA project,
Red Hat Inc.
Looking to carve out IT costs?
Freeipa-devel mailing list
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812978.31/warc/CC-MAIN-20180220145713-20180220165713-00704.warc.gz
|
CC-MAIN-2018-09
| 6,051 | 101 |
https://www.daniweb.com/programming/software-development/threads/429189/dll-exports-point-to-the-same-function
|
code
|
I hooked a game's OpenGL.dll with my own glwrapper but this game uses two dll's.. It uses a wrapper of OpenGL32 and my hook is also a wrapper. So what I need:
I want to know if these symbols point to the same functions..
@28, @28, @28.. That means they all point to the same function when exported right? The same export numbers mean they all point to a single function right?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046151641.83/warc/CC-MAIN-20210725080735-20210725110735-00154.warc.gz
|
CC-MAIN-2021-31
| 376 | 3 |
https://www.theicct.org/job-postings/fellowship-opportunity-global-transportation-energy-and-climate-modeling-and-data
|
code
|
The International Council on Clean Transportation (ICCT) seeks a Fellow to contribute to our highly influential research concerning the energy and climate impacts of transportation sector policies in Europe, US, China and other key vehicle markets. The position will provide robust analysis and modeling of the global transportation sector to inform and support ICCT's activities on all major transportation modes. Model results will be used to inform better policies and strategies to reduce transportation sector energy consumption and GHG emissions.
Under the direction of a Lead Model Developer in the Transportation Roadmap program, the position responsibilities will include, but not be limited to the following tasks:
- Compile, validate, and analyze transport data for multiple countries and modes.
- Collaborate with external partners to collect and improve transportation data.
- Monitor and report on trends in global transport energy use and GHG emissions.
- Update and expand our internal databases of "model-ready" data inputs.
- Analyze the energy and climate impacts of transportation sector policies.
- Validate modeled results against other transportation models and data sources.
- Upgrade model capabilities under the direction of a Lead Model Developer.
- Master's degree, or equivalent level of graduate coursework, or 2 years experience with transport sector energy and climate data analysis and modeling.
- Proven quantitative and analytical skills required.
- Proficiency with a programming language for data analysis is required. Experience with Python for data analysis is highly desirable.
- Excellent data organization skills and attention to detail.
- Strong English communication skills, both written and verbal.
- Collaborative, flexible, and positive attitude.
This is a full-time, temporary position (40 hours/week) for 6 months. It includes health insurance and paid time off benefits. Compensation is based on experience. The position may lead to regular, full-time employment contingent on organizational resources and the Fellow’s performance. The position location will be in our San Francisco, CA office.
Please send your resume, cover letter, a sample of your analytical work, and the names and contact information for three professional references (letters not necessary) to [email protected] using “Global Transportation Energy and Climate Modeling and Data Analytics” as your message’s subject heading. Preference will be given to candidates whose cover letters directly address the position being offered. This is an immediate opening and the position will remain open until filled.
No calls and no recruiters, please. Equal Opportunity Employer.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823712.21/warc/CC-MAIN-20181212022517-20181212044017-00418.warc.gz
|
CC-MAIN-2018-51
| 2,712 | 18 |
https://www.vn750.com/forum/35-new-member-introductions/21439-hi-guys.html
|
code
|
tried posting a hi thread the weekend, but it seems my post hasnt been approved...
vn750 owner from the UK here
bought an '85 VN a couple of months ago, which is a decent bike, and only cost me £800 with a spare engine, and a few boxes of bits with it.
then, a spare bike came up, completely stripped down, but hte PO had raked the front end a little, so thought it would be ideal for a build, and it only set me back £175 too, so bargain of the century, hopefully lol.
will get pics up of both as soon as i can, but hope to be picking brains and getting ideas from this forum very soon.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348526471.98/warc/CC-MAIN-20200607075929-20200607105929-00367.warc.gz
|
CC-MAIN-2020-24
| 589 | 5 |
https://forums.adobe.com/thread/1300456
|
code
|
I'm trying to create guides which snap to the ruler divisions (which is set to pixels) for a website layout.
For some reason holding shift has no effect on making the guide snap to the increments (in this case pixels)
I'm able to place a couple of guides accurately using view/new guide but I'd like to know why it's not working.
Have you tried using menu View>New Guide then set in the exact pixel value you want it set at?
Thanks JJ, yep that was how I got going until I realized I must have hit ctrl+shift : instead of ctrl+: at some point, I didn't realize you needed snap enabled for guides as well.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267157569.48/warc/CC-MAIN-20180921210113-20180921230513-00295.warc.gz
|
CC-MAIN-2018-39
| 604 | 5 |
https://forum.obsidian.md/t/cmd-click-inconsistent-between-live-preview-and-source-mode/33943
|
code
|
Cmd-Clicking in Live Preview mode used to open the note in the current pane. Cmd-Shift-Click would open in a new pane. However, now this behaviour seems lost. Cmd-Clicking opens in a new pane, and Cmd-Shift-Click doesn’t work, period. This is deeply confusing and inconsistent with Source Mode, and feels like a regression bug.
A. Cmd-Click an internal link in Live Preview mode.
B. Cmd-Shift-Click an internal link in Live Preview mode.
A. Note opens in current pane.
B. Note opens in new pane.
A. Note opens in new pane.
B. Nothing happens.
SYSTEM INFO: Obsidian version: v0.13.33 Installer version: v0.12.12 Operating system: Darwin Kernel Version 21.1.0: Wed Oct 13 17:33:23 PDT 2021; root:xnu-8019.41.5~1/RELEASE_X86_64 21.1.0 Login status: logged in Catalyst license: none Insider build toggle: off Live preview: on Legacy editor: off Base theme: light Community theme: none Snippets enabled: 1 Safe mode: on
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499524.28/warc/CC-MAIN-20230128054815-20230128084815-00216.warc.gz
|
CC-MAIN-2023-06
| 916 | 8 |
http://www.elsething.com/tech/linksys-wap54g-ap-client-mode.html
|
code
|
|You are here.|
How to Set Up the Linksys WAP54G in AP Client Mode
First off, my WAP54G is version 3.1, and I do not use the 192.168.1.0/24 address block that is standard with this unit. In theory, this access point should be able to be a client for any other protocol-compliant 802.11b/g device, even non-Linksys units, but I did not test that. My setup keeps it all in the family: my Linksys WAP54G is client to a Linksys WRT54G. They're cheap enough that I don't need to go around hunting another brand. YMMV.
First off, plug in the AP's power, but not the network cable, and turn it on. When the AP is up, you should see the activity light and the power light. (There will not be a link light, since your network cable isn't plugged in).
Hold down the reset button (a pinhole found in the back... use a paperclip) for 10-15 seconds until the activity light goes out. Then release the reset button.
When your router wakes up, its addressing info will have reverted to factory defaults, shown below. Now is the time to plug in the network cable to the access point.
This may or may not have any bearing on your network. Stay tuned.
Your screen should look like this:
Login with a blank username and password 'admin'. These are the defaults.
After you login, your screen should look like this:
The little red dots that look like chicken pox are my annotations. This is where you configure your network information. I do not use a 192.168.1/24 subnet, and I want this unit assigned a DHCP address from my router, and so I simply select the DHCP option (one red dot). If you use the 192.168.1/24 subnet, you may skip this step entirely unless you have another device using 245. If you know exactly where you want to nail down this sucker, you may enter its addressing information next to the two red dots (and keep 'Static IP' selected above). If you don't know what the hell any of this means, try the defaults first. If that doesn't work, you can figure out what subnet you're on by using the ipconfig utility from the command line (Start | Run... | 'cmd.exe' [OK], then type IPCONFIG at the prompt and it will tell you how your network is addressed.) 192.168.0/24 is another popular one. So is 10/8. If none of this works, try DHCP configuration. If that doesn't work, call someone who knows something about IP networks and pay him in pizza.
I set mine up for DHCP, as shown below, and saved settings. Note that after selecting DHCP, the factory default addresses are shown until you Save Settings.
After you click Save Settings, you hope to see "Your settings have been saved" with a big button to Continue. If you changed the address on your AP, then you'll need to change it in your browser's address bar to complete the rest of the configuration. If you're using DHCP, you'll need to figure out where the AP answers the phone these days. DHCP could assign the AP one of many different addresses. My network is 172.16.32/24, and my DHCP pool goes from .51-.100, and I have only a handful of DHCP clients, so I just ping around until I find it. This unit does not answer broadcast pings, so you may have to be a little resourceful. If you have access to your DHCP server, you can check to see what IP addresses have been assigned lately and to what MAC addresses. The MAC address for the access point is conveniently written on its underside. If you don't have access to your DHCP server, you'll have some guessing to do. Get a DOS prompt (Start | Run... | 'cmd.exe', [OK]) and start pinging around your subnet (e.g. ping 172.16.32.53, or whatever your subnet is) until you find something. Again, this unit does not answer broadcast pings, so ping everything in sight and then check the ARP tables to see which IP address corresponds to the MAC address on your access point. (ARP -A from the DOS prompt.) Lucky me, my access point was assigned 172.16.32.53 from my DHCP server. My equipment is so well-behaved. So that's the address I need to put in my browser; the default 192.168.1.245 is meaningless now. (Again, if you didn't make any changes to the IP configuration, you can continue to address the access point using its factory default network settings. Login with the WAP54G's default password of 'admin' as shown below:
Now you're here at your configuration screen. First thing to do is change your password by clicking the Administration tab and filling in the blanks. Remember to save your settings.
After you change your password, you hope to see this screen:
Now since you changed your password, the router doesn't recognise the old one your browser is sending, so you have to log back in using the new one, shown below:
Next go to Setup tab and click 'AP Mode'. Select 'AP Client', as shown below in red:
Now click Site Survey. (Your wireless router should be broadcasting its SSID! You gain no security from trying to keep it a secret. It broadcasts with every packet that goes to and from it. Disabling SSID Broadcast only disables beaconing. Anyone with 60 seconds can sniff your SSID out of the air using Network Stumbler or other utilities, so this is not security. Use cryptography for security.) Anyway, Site Survey is shown below:
And then it sniffs around for routers that are beaconing (aka, SSID broadcasting)... it will not report ones that aren't (not because it can't, but because Linksys doesn't want you to know what a crappy security mechanism this really is, and it's not their fault; they didn't write the protocol, but it is their fault that they pitch this as a way to attain additional security. There is no good reason for this 'feature' to be part of the protocol.) If your router doesn't beacon, and you don't have the access to turn its beacon on, then you'll need to get the MAC address of the router you're trying to become a client of and key it in manually (without using the Site Survey feature. Did I mention that disabling beaconing is idiotic?) Next, we see the networks in my neighbourhood that are beaconing:
Looks like the nobody network is alive and well. There are about a dozen others within reach of me (open networks, too), but because they don't broadcast their SSID, they're not shown here. It would not stop me for one moment in connecting to them. Cryptography is the only thing that stands a chance at keeping your network secure.
Now I am warned that this is a secured network, and that I must enter my secret pass phrase. I generate new ones all the time. If you have access to a Unix machine, you can use dd to fetch some stuff from /dev/random or concatenate a bunch of random files and get an MD5 or SHA hash. But if you're bridging, you'll be using the one that's been pre-programmed into the router, so get it. After clicking OK here, you'll get the following screen where you can enter your network key:
Key in your pass phrase and click to Save Settings. After you save your settings, you should get this confirmation:
After you've keyed all that garbage in, you're presented with a final confirmation screen, and the router's MAC address should appear in red, under the selected AP Client radio button, as seen below. Do not change anything here; just save your settings.
When you see the screen below, UNPLUG the network cable from the AP. Otherwise you'll get a nasty routing loop, where the MAC address of your access point is directly reachable by two network interfaces (not good).
Now your AP client is ready to go into service. Put it wherever your non-wireless device lives, and plug an Ethernet cable between the two. Your access point will continue to have its own address, and your non-wireless client that you're bringing into the network to will have its own. Your network address is probably different from mine, and the IP addressing will reflect that. If you're using 192.168.1/24 and you don't have a lot of devices on the network, you might try a static assignment of 192.168.1.201 if you can't use DHCP. Otherwise, just make your non-wireless machine a DHCP client. (The WAP54G will forward discovery requests.)
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704131463/warc/CC-MAIN-20130516113531-00055-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 8,005 | 25 |