url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://trekker.net/archives/tag/microsoft-office/
|
code
|
Office 2013 comes with a number of cool new features. One of those new features is the ability to save to “cloud” locations like SkyDrive and SkyDrive Pro right out of the box without having to install extra helper applications that sync the data down to the local system. With the big cloud push at Microsoft, the locations are now favored by default over saving to the local storage or mapped drives on a computer. This can be changed in the UI of the various Office applications. However, Microsoft chose not to include the option to change the default in Group Policy. The good news is that the settings can be configured in the Registry which means they can be manipulated by Group Policy Preferences.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668585.12/warc/CC-MAIN-20191115042541-20191115070541-00205.warc.gz
|
CC-MAIN-2019-47
| 710 | 1 |
https://www.numbrs.com/en_uk/support/contact-support/
|
code
|
If you have some feedback regarding the app, want to share your suggestions for future features or are experiencing technical issues, then you can send us your questions and feedback via email or directly from within the app as follows:
Open the Numbrs app.
Tap ‘More’ in the menu bar.
Enter your feedback and describe your concerns.
Tap ‘Send’ and we will get back to you within 24 hours.
Get the Numbrs App.
Download the Numbrs app for free and see for yourself.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999783.49/warc/CC-MAIN-20190625011649-20190625033649-00280.warc.gz
|
CC-MAIN-2019-26
| 472 | 7 |
https://www.habkorea.net/korea-travel-forum/page/3/?pageid=6&mod=document&uid=249
|
code
|
Hello, guys, :)
I am interested in moving to South Korea for a month (or so) as a volunteer. It is not about some organisation, it is about single volunteering at a hostel where I am supposed to work for food and accommodation.
So, the question is, if I go to the country as a single volunteer (not a member of a volunteering organisation), would it be legal? Do I need a specific visa for this? Or, the usual touristic visa would be enough?
What should I say to an officer (the person who checks arriving people) at the airport in this case?
Any help or advice would be very appreciated!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679103464.86/warc/CC-MAIN-20231211013452-20231211043452-00340.warc.gz
|
CC-MAIN-2023-50
| 588 | 5 |
https://tor.stackexchange.com/questions/19792/bookmark-removal
|
code
|
I am on Windows 10 with TBB version 8.0.8. I extracted the bundle to my desktop and used it form there for some time (Computer A). Of note, I created some bookmarks. I then moved the TBB folder to a removable drive. When I insert that drive into another computer (Computer B) and run the TBB, the bookmarks I created are not present. Furthermore, and of concern, when I reinsert that drive into the computer that originally had TBB on the desktop (Computer A), the bookmarks are again present. This indicated to me that the current TBB is storing this information on the local machine outside of the install folder. I Would like to know where this data is stored so I may remove it.
Normally, TBB is a sandbox that tries to avoid any data left on the system it was running on. So, you should not have this experience.
However, from the aspect of anonymity, I would suggest you to not use one TBB on different systems. Personally, I use one instance on every device.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662531352.50/warc/CC-MAIN-20220520030533-20220520060533-00118.warc.gz
|
CC-MAIN-2022-21
| 965 | 3 |
https://upvisayas.net/guides/teacherguide/course_page/
|
code
|
The Course Page
Course Page is where teachers add learning materials and activities for their students. While course may be created by administrator, the course page enables the teachers to add content and re-organize them according to their own needs. Here are the various parts of the Course Page:
- 1. Navigation block. Clicking this icon on the navigation bar toggles the navigation block. This block helps the users to find their way around the course and site.
- 2. Course Section. Here is where the learning materials are displayed. This element may be arranged in one or multiple weeks, topics, forums or other (non-standard) layout.
- 3. Side blocks. The blocks seen here are either controlled by the user or by the administrator. As in the illustration it contains the course administration.
- 4. Gear Menu. Contains features, functions, configurations and settings that are relevant in course page administration.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510238.65/warc/CC-MAIN-20230927003313-20230927033313-00858.warc.gz
|
CC-MAIN-2023-40
| 924 | 6 |
https://discuss.afni.nimh.nih.gov/t/syntax-error-afni-proc-py/323
|
code
|
Following some updates to my computer that were out of my control I get the following error when trying to run afni_proc.py:
awdpt800wg3:~ salzwedelap$ afni_proc.py
File “/Users/salzwedelap/abin/afni_proc.py”, line 754
print ‘%sSubjProcSream: %s’ % (mesg, self.label)
SyntaxError: invalid syntax
Normally, running this command would give you the help documentation, but as you can see it errors out. The same happens when I try to use afni_proc.py with specific inputs a la my old scripts.
Thank you for your help
I expect that you are using python 3 instead of 2.
What do these commands show?
Thank you for the quick inquiry Rick, you are the best.
Here are outputs you requested:
awdpt800wg3:~ salzwedelap$ which python
awdpt800wg3:~ salzwedelap$ python --version
awdpt800wg3:~ salzwedelap$ afni -ver
Precompiled binary macosx_10.7_Intel_64: Feb 25 2016 (Version AFNI_16.0.10)
Indeed, it looks like I’m using Python 3.X…
Replying to my own comment here, but for those using MacOS and MacPorts, you can switch the default python to 2.7 (assuming you have it installed) using:
sudo port select --set python python27
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100164.15/warc/CC-MAIN-20231130000127-20231130030127-00838.warc.gz
|
CC-MAIN-2023-50
| 1,127 | 18 |
https://toprecipe.loboblack.com/10167-easiest-way-to-make-yummy-simple-shrimp-chili-sauce/
|
code
|
Simple Shrimp Chili Sauce – This recipe is great for when you have no idea what to cook. You can have Simple Shrimp Chili Sauce using 8 ingredients and 4 steps. Here is how you cook it.
Ingredients of Simple Shrimp Chili Sauce
- It’s 14 of prawns Shrimp.
- You need 1/4 of Onions (finely chopped).
- You need 3 tbsp of ◯Ketchup.
- Prepare 4 grams of ◯Chicken stock granules.
- You need 100 ml of ◯Water.
- You need 1 of Doubanjiang.
- You need 1 pinch of Katakuriko.
- Prepare 1 of Vegetable oil.
Simple Shrimp Chili Sauce Step By Step
- Remove the shrimp shells and de-vein them. Rinse in baking soda. I recommend preparing them this way and freezing them for stock.
- Coat the shrimp in katakuriko.
- Coat a frying pan with vegetable oil and lightly fry. Be sure to cook them through.
- Add onions and the ingredients marked with ◯. Once it's cooked through, add doubanjiang as desired, and it's complete.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988850.21/warc/CC-MAIN-20210508061546-20210508091546-00619.warc.gz
|
CC-MAIN-2021-21
| 919 | 15 |
https://www.fr.freelancer.com/projects/software-architecture/develop-pos-with-custom-addons/?ngsw-bypass=&w=f
|
code
|
I need you to develop some software for me. I would like this software to be developed for Windows using Python. I don't know the exact skills required though but Python language will be preferred.
7 freelances font une offre moyenne de 12725 ₹ pour ce travail
Dear hiring manager, I can develop a POS for you with VB.net. I can show you some of the previous projects done with VB.net. please message me so we can discuss further. thanks. Labib
Hi, i'm Danilo! I'm new to Freelancer.com, and i want to grow up and improve. I have about 5 years of experience with Python, and in particular Data Science, Open Data, Big Data, Jupyter Notebook, Web/Data Scraping a Plus
We offer top edge software development services by combining our years of sectored experience, professional competency and relevant knowledge of the latest industry trends. Our developers offer a ready array of technol Plus
Hey, I'm interested in your project. Please send me a message so that we can discuss more. I have worked in a office and having a experience of 2 year this field with excellent knowledge of python. so you can easily re Plus
i am interested in your project, i have read the information provided. i have over 10 years experience in Software development including the skills required above. Lets discuss more. Thank you.
Dear Sir! Python is used for web applications. Java and C# are used for developing windows applications. I have a lot of experience in developing POS Applications for windows, I can provide you applications as demo wh Plus
Dear sir, I understand your requirements and i am intrested to do this. I have 6 years of experience in pos application development. I already developed so many types of pos application and already running in client si Plus
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178365186.46/warc/CC-MAIN-20210303012222-20210303042222-00333.warc.gz
|
CC-MAIN-2021-10
| 1,757 | 9 |
https://community.esri.com/thread/256528-how-to-create-an-editing-tool-that-draws-freehand
|
code
|
I would like to create an editing tool with which I can draw freehand.
In the constructor of the tool, I set the following:
IsSketchTool = true;
SketchType = SketchGeometryType.OpenLasso;
In the method HandleMouseDownAsync(MapViewMouseButtonEventArgs e), I get the current sketch because I want to add the clicked point to it:
Polyline sketchPolyline = await base.GetCurrentSketchAsync() as Polyline;
In the method OnToolMouseMove(MapViewMouseEventArgs e), I do the same as above.
My question: what geometry type does the method GetCurrentSketchAsync() return? It is not a polyline. But what else?
Thank you for your reply in advance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400201826.20/warc/CC-MAIN-20200921143722-20200921173722-00449.warc.gz
|
CC-MAIN-2020-40
| 634 | 9 |
https://www.semanticscholar.org/paper/Consttuctive-lntemction-and-the-Iterative-Process-Miyake/df5130e758bbca069b1e1cb431813fba6a20dcd3
|
code
|
When people try to understand complex physical devices (e.g., a sewing machine), they proceed in an iterative fashion. They seem to reach several points at which they claim to “understand” the device. Each point of understanding is incomplete and requires a new level of understanding. As a result, they cycle between understanding and non-understanding as they traverse different levels. The present study provides a framework to capture the iterotive noture of understanding. These points are discussed and illustrated through observations of three pairs of people constructively interacting to understand how a sewing machine works. In addition to the iterative search for understanding, the conceptual point in space from which the speaker appeared to be viewing the machine was important. This conceptual point of view (C-POV) was reflected in their use of longuoge. The C-POV appeored to be stoble during points of understanding and to shift frequently at points of non-understanding.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948579564.61/warc/CC-MAIN-20171215192327-20171215214327-00205.warc.gz
|
CC-MAIN-2017-51
| 994 | 1 |
https://forum.starling-framework.org/topic/away3d-skeleton-animation-in-2d-starling-scene
|
code
|
I have 3d skeleton model animation running on away3, and also have starling 2d isometric scene. I need to somehow place this model into isometric world with possibility to sort with isometric object.
It is possible to translate projection ov 3D-object to starling 2 object?
I think about several starling stages with away3d stage between them, but it will be problematic to place another model to scene.
Can you help me?
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218203515.32/warc/CC-MAIN-20170322213003-00479-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 420 | 4 |
http://fivehundreddaysofstyle.blogspot.com/2011/08/day-one.html
|
code
|
Hi! Welcome to my new blog, 500 Days of Style... After a recent trip to the fashion capital of my world, Paris, I've decided to amp up my style, and to chronicle each day in this blog!
Day 1-Day at the Lake
I still have the chicken pox, so I'm trying to cover up my shoulders (boo:( ), but I managed to wear my new PacSun shirt, so that rocks :)
- Shorts from Love Culture
-Underneath the shirt, I'm wearing a yellow tank top, also from Love Culture (http://www.loveculture.com/Item/ItemDetailView.aspx?StyleId=1020762 in yellow)
Left wrist: 5 homemade friendship bracelets
Right wrist: leather bracelet from Italy and 3 recycled flip flop bracelets
Right middle finger: owl ring
2 braids in the back to keep it from my face
To do: french braid 2 braids (about 1/2 inch width each) until they reach the middle of the back of your head. Then, for the top one, I used two black clips to secure in place, and for the bottom one, I banded with a black elastic and mixed in a bit of the non-braided hair from below
Look from the front:
Then, I took inspiration from a photo (below) to add in one more braid to my hair!
How it turned out on me:
It ended up looking like this:
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592523.89/warc/CC-MAIN-20180721110117-20180721130117-00540.warc.gz
|
CC-MAIN-2018-30
| 1,169 | 14 |
https://forum.iredmail.org/post3231.html
|
code
|
Topic: What's new in iRedMail: shadow address support for mail aliases.
As you may know, iRedMail supports domain alias in both MySQL and OpenLDAP backend, but in LDAP backend, it doesn't support alias (shadow address) for mail alias accounts, and just want to let you know, we have implemented this moment ago:
http://code.google.com/p/iredmail/sourc … c5f26d3f12
Domain alias support:
----Spider Email Archiver: On-Premises, lightweight email archiving software developed by iRedMail team. Stable release is out.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573145.32/warc/CC-MAIN-20220818003501-20220818033501-00223.warc.gz
|
CC-MAIN-2022-33
| 517 | 5 |
https://learn.microsoft.com/en-us/security-updates/SecurityBulletins/2012/ms12-065?redirectedfrom=MSDN
|
code
|
Microsoft Security Bulletin MS12-065 - Important
Vulnerability in Microsoft Works Could Allow Remote Code Execution (2754670)
Published: October 09, 2012
This security update resolves a privately reported vulnerability in Microsoft Works. The vulnerability could allow remote code execution if a user opens a specially crafted Microsoft Word file using Microsoft Works. An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
This security update is rated Important for Microsoft Works 9. For more information, see the subsection, Affected and Non-Affected Software, in this section.
The security update addresses the vulnerability by modifying the way that Microsoft Works converts Word documents. For more information about the vulnerability, see the Frequently Asked Questions (FAQ) subsection for the specific vulnerability entry under the next section, Vulnerability Information.
Recommendation. Customers can configure automatic updating to check online for updates from Microsoft Update by using the Microsoft Update service. Customers who have automatic updating enabled and configured to check online for updates from Microsoft Update typically will not need to take any action because this security update will be downloaded and installed automatically. Customers who have not enabled automatic updating need to check for updates from Microsoft Update and install this update manually. For information about specific configuration options in automatic updating in supported editions of Windows XP and Windows Server 2003, see Microsoft Knowledge Base Article 294871. For information about automatic updating in supported editions of Windows Vista, Windows Server 2008, Windows 7, and Windows Server 2008 R2, see Understanding Windows automatic updating.
For administrators and enterprise installations, or end users who want to install this security update manually, Microsoft recommends that customers apply the update at the earliest opportunity using update management software, or by checking for updates using the Microsoft Update service.
See also the section, Detection and Deployment Tools and Guidance, later in this bulletin.
Known Issues. None
Affected and Non-Affected Software
The following software have been tested to determine which versions or editions are affected. Other versions or editions are either past their support life cycle or are not affected. To determine the support life cycle for your software version or edition, see Microsoft Support Lifecycle.
|Maximum Security Impact
|Aggregate Severity Rating
|Microsoft Works 9\ (KB2754670)
|Remote Code Execution
|KB2680317 in MS12-028 replaced by KB2754670
Frequently Asked Questions (FAQ) Related to This Security Update
Where are the file information details?
Refer to the reference tables in the Security Update Deployment section for the location of the file information details.
Where are the hashes of the security updates?
The SHA1 and SHA2 hashes of the security updates can be used to verify the authenticity of downloaded security update packages. For the hash information pertaining to this update, see Microsoft Knowledge Base Article 2754670.
I am using an older release of the software discussed in this security bulletin. What should I do?
The affected software listed in this bulletin have been tested to determine which releases are affected. Other releases are past their support life cycle. For more information about the product lifecycle, see the Microsoft Support Lifecycle website.
It should be a priority for customers who have older releases of the software to migrate to supported releases to prevent potential exposure to vulnerabilities. To determine the support lifecycle for your software release, see Select a Product for Lifecycle Information. For more information about service packs for these software releases, see Service Pack Lifecycle Support Policy.
Customers who require custom support for older software must contact their Microsoft account team representative, their Technical Account Manager, or the appropriate Microsoft partner representative for custom support options. Customers without an Alliance, Premier, or Authorized Contract can contact their local Microsoft sales office. For contact information, see the Microsoft Worldwide Information website, select the country in the Contact Information list, and then click Go to see a list of telephone numbers. When you call, ask to speak with the local Premier Support sales manager. For more information, see the Microsoft Support Lifecycle Policy FAQ.
Severity Ratings and Vulnerability Identifiers
The following severity ratings assume the potential maximum impact of the vulnerability. For information regarding the likelihood, within 30 days of this security bulletin's release, of the exploitability of the vulnerability in relation to its severity rating and security impact, please see the Exploitability Index in the October bulletin summary. For more information, see Microsoft Exploitability Index.
|Works Heap Vulnerability - CVE-2012-2550
|Aggregate Severity Rating
|Microsoft Works 9
|Important \ Remote Code Execution
Works Heap Vulnerability - CVE-2012-2550
A remote code execution vulnerability exists in the way that affected versions of Microsoft Works parse specially crafted Word files. An attacker who successfully exploited this vulnerability could take complete control of an affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
To view this vulnerability as a standard entry in the Common Vulnerabilities and Exposures list, see CVE-2012-2550.
Mitigating Factors for Works Heap Vulnerability - CVE-2012-2550
Mitigation refers to a setting, common configuration, or general best-practice, existing in a default state, that could reduce the severity of exploitation of a vulnerability. The following mitigating factors may be helpful in your situation:
- The vulnerability cannot be exploited automatically through email. For an attack to be successful, a user must open an attachment that is sent in an email message.
- An attacker who successfully exploited this vulnerability could gain the same user rights as the current user. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
Workarounds for Works Heap Vulnerability - CVE-2012-2550
Workaround refers to a setting or configuration change that does not correct the underlying vulnerability but would help block known attack vectors before you apply the update. Microsoft has tested the following workarounds and states in the discussion whether a workaround reduces functionality:
- Do not open Word files that you receive from untrusted sources or that you receive unexpectedly from trusted sources. This vulnerability could be exploited when a user opens a specially crafted file.
FAQ for Works Heap Vulnerability - CVE-2012-2550
What is the scope of the vulnerability?
This is a remote code execution vulnerability.
What causes the vulnerability?
The vulnerability is caused when Microsoft Works parses specially crafted Word (.doc) files, potentially causing system memory corruption that could allow an attacker to execute arbitrary code.
What might an attacker use the vulnerability to do?
An attacker who successfully exploited this vulnerability could run arbitrary code as the current user. If the current user is logged on with administrative user rights, an attacker could take complete control of the affected system. An attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than users who operate with administrative user rights.
How could an attacker exploit the vulnerability?
This vulnerability requires that a user open specially crafted Word files with an affected version of Microsoft Works.
In a web-based attack scenario, an attacker could host a website that contains a Works file that is used to attempt to exploit this vulnerability. In addition, compromised websites and websites that accept or host user-provided content could contain specially crafted content that could exploit this vulnerability. In all cases, an attacker would have no way to force users to visit a specially crafted website. Instead, an attacker would have to convince them to visit the website, typically by getting them to click a link that takes them to the attacker's site, and then convince them to open the specially crafted Works file.
What systems are primarily at risk from the vulnerability?
Workstations and terminal servers that have affected versions of Microsoft Works installed are primarily at risk. Servers could be at more risk if administrators allow users to log on to servers and to run programs. However, best practices strongly discourage allowing this.
What does the update do?
The update addresses the vulnerability by modifying the way that Microsoft Works parses specially crafted Word (.doc) files.
When this security bulletin was issued, had this vulnerability been publicly disclosed?
No. Microsoft received information about this vulnerability through coordinated vulnerability disclosure.
When this security bulletin was issued, had Microsoft received any reports that this vulnerability was being exploited?
No. Microsoft had not received any information to indicate that this vulnerability had been publicly used to attack customers.
Detection and Deployment Tools and Guidance
Manage the software and security updates you need to deploy to the servers, desktop, and mobile systems in your organization. For more information see the TechNet Update Management Center. The Microsoft TechNet Security website provides additional information about security in Microsoft products.
Security updates are available from Microsoft Update and Windows Update. Security updates are also available from the Microsoft Download Center. You can find them most easily by doing a keyword search for "security update."
For customers of Microsoft Office for Mac, Microsoft AutoUpdate for Mac can help keep your Microsoft software up to date. For more information about using Microsoft AutoUpdate for Mac, see Check for software updates automatically.
Finally, security updates can be downloaded from the Microsoft Update Catalog. The Microsoft Update Catalog provides a searchable catalog of content made available through Windows Update and Microsoft Update, including security updates, drivers and service packs. By searching using the security bulletin number (such as, "MS12-001"), you can add all the applicable updates to your basket (including different languages for an update), and download to the folder of your choosing. For more information about the Microsoft Update Catalog, see the Microsoft Update Catalog FAQ.
Detection and Deployment Guidance
Microsoft provides detection and deployment guidance for security updates. This guidance contains recommendations and information that can help IT professionals understand how to use various tools for detection and deployment of security updates. For more information, see Microsoft Knowledge Base Article 961747.
Microsoft Baseline Security Analyzer
Microsoft Baseline Security Analyzer (MBSA) lets administrators scan local and remote systems for missing security updates as well as common security misconfigurations. For more information, see Microsoft Baseline Security Analyzer.
The following table provides the MBSA detection summary for this security update.
|Microsoft Works 9
Note For customers using legacy software not supported by the latest release of MBSA, Microsoft Update, and Windows Server Update Services, please see Microsoft Baseline Security Analyzer and reference the Legacy Product Support section on how to create comprehensive security update detection with legacy tools.
Windows Server Update Services
Windows Server Update Services (WSUS) enables information technology administrators to deploy the latest Microsoft product updates to computers that are running the Windows operating system. For more information about how to deploy security updates using Windows Server Update Services, see the TechNet article, Windows Server Update Services.
Systems Management Server
The following table provides the SMS detection and deployment summary for this security update.
|SMS 2003 with ITMU
|System Center Configuration Manager
|Microsoft Works 9
Note Microsoft discontinued support for SMS 2.0 on April 12, 2011. For SMS 2003, Microsoft also discontinued support for the Security Update Inventory Tool (SUIT) on April 12, 2011. Customers are encouraged to upgrade to System Center Configuration Manager. For customers remaining on SMS 2003 Service Pack 3, the Inventory Tool for Microsoft Updates (ITMU) is also an option.
For SMS 2003, the SMS 2003 Inventory Tool for Microsoft Updates (ITMU) can be used by SMS to detect security updates that are offered by Microsoft Update and that are supported by Windows Server Update Services. For more information about the SMS 2003 ITMU, see SMS 2003 Inventory Tool for Microsoft Updates. For more information about SMS scanning tools, see SMS 2003 Software Update Scanning Tools. See also Downloads for Systems Management Server 2003.
System Center Configuration Manager uses WSUS 3.0 for detection of updates. For more information, see System Center.
For more detailed information, see Microsoft Knowledge Base Article 910723: Summary list of monthly detection and deployment guidance articles.
Note If you have used an Administrative Installation Point (AIP) for deploying Office 2003, you may not be able to deploy the update using SMS if you have updated the AIP from the original baseline. For more information, see the Office Administrative Installation Point heading in this section.
Office Administrative Installation Point
If you installed your application from a server location, the server administrator must update the server location with the administrative update and deploy that update to your system.
- For supported versions of Microsoft Office 2003, see Creating an Administrative Installation Point. For more information on how to change the source for a client computer from an updated administrative installation point to an Office 2003 original baseline source or Service Pack 3 (SP3), see Microsoft Knowledge Base Article 902349.
Note If you plan to manage software updates centrally from an updated administrative image, you can find more information in the article, Distributing Office 2003 Product Updates.
- For creating a network installation point for supported versions of Microsoft Office, see Create a network installation point for Microsoft Office.
Note If you plan to manage security updates centrally, use Windows Server Update Services. For more information about how to deploy security updates for Microsoft Office, see the Windows Server Update Services website.
Update Compatibility Evaluator and Application Compatibility Toolkit
Updates often write to the same files and registry settings required for your applications to run. This can trigger incompatibilities and increase the time it takes to deploy security updates. You can streamline testing and validating Windows updates against installed applications with the Update Compatibility Evaluator components included with Application Compatibility Toolkit.
The Application Compatibility Toolkit (ACT) contains the necessary tools and documentation to evaluate and mitigate application compatibility issues before deploying Windows Vista, a Windows Update, a Microsoft Security Update, or a new version of Windows Internet Explorer in your environment.
Security Update Deployment
For information about the specific security update for your affected software, click the appropriate link:
Microsoft Works 9
The following table contains the security update information for this software. You can find additional information in the subsection, Deployment Information, in this section.
|Inclusion in Future Service Packs
|The update for this issue will be included in a future service pack or update rollup
|Installing without user intervention
|Installing without restarting
|Update log file
|For detection and deployment, see the earlier section, Detection and Deployment Tools and Guidance.
|In some cases, this update does not require a restart. If the required files are being used, this update will require a restart. If this behavior occurs, a message appears that advises you to restart.\ \ To help reduce the chance that a restart will be required, stop all affected services and close all applications that may use the affected files prior to installing the security update. For more information about the reasons why you may be prompted to restart, see Microsoft Knowledge Base Article 887012.
|Use Add or Remove Programs item in Control Panel.
|See Microsoft Knowledge Base Article 2754670
|Registry Key Verification
Installing the Update
You can install the update from the appropriate download link in the Affected and Non-Affected Software section. If you installed your application from a server location, the server administrator must instead update the server location with the administrative update and deploy that update to your system. For more information about Administrative Installation Points, refer to the Office Administrative Installation Point information in the Detection and deployment Tools and Guidance subsection.
This security update requires that Windows Installer 3.1 or later version be installed on the system.
To install the 3.1 or later version of Windows Installer, see one of the following Microsoft websites:
- Windows Installer 4.5 Redistributable for Windows Server 2008, Windows Vista, Windows Server 2003, and Windows XP
- Windows Installer 3.1 Redistributable for Windows Server 2003, Windows XP, and Microsoft Windows 2000
For more information about the terminology that appears in this bulletin, such as hotfix, see Microsoft Knowledge Base Article 824684.
This security update supports the following setup switches.
|Displays the command-line options.
|/quiet or **/q[n
|Quiet mode, no user interaction or\ /q[n
|f] sets user interface level:\ n - No user interface\ b - Basic user interface\ r - Reduced user interface\ f - Full user interface (default)
|Unattended mode - progress bar only.
|Do not restart after the installation is complete.
|Enables logging. Options:\ i - Status messages\ w - Nonfatal warnings\ e - All error messages\ a - Start up of actions\ r - Action-specific records\ u - User requests\ c - Initial UI parameters\ m - Out-of-memory or fatal exit information\ o - Out-of-disk-space messages\ p - Terminal properties\ v - Verbose output\ x - Extra debugging information\ + - Append to existing log file\ ! - Flush each line to the log\ * - Log all information, except for v and x options
|Equivalent of /l* <LogFile>.
Note You can combine these switches into one command. For backward compatibility, the security update also supports many of the setup switches that the earlier version of the Setup program uses. For more information about the supported installation switches, see Microsoft Knowledge Base Article 262841.
Removing the Update
To remove this security update, use the Add or Remove Programs item in Control Panel.
Note When you remove this update, you may be prompted to insert the 2007 Microsoft Office CD in the CD drive. Additionally, you may not have the option to uninstall the update from the Add or Remove Programs item in Control Panel. There are several possible causes for this issue. For more information about the removal, see Microsoft Knowledge Base Article 903771.
Verifying that the Update Has Been Applied
Microsoft Baseline Security Analyzer
To verify that a security update has been applied to an affected system, you may be able to use the Microsoft Baseline Security Analyzer (MBSA) tool. See the section, Detection and Deployment Tools and Guidance, earlier in this bulletin for more information.
File Version Verification
Because there are several editions of Microsoft Windows, the following steps may be different on your system. If they are, see your product documentation to complete these steps.
- Click Start and then enter an update file name in the Start Search box.
- When the file appears under Programs, right-click the file name and click Properties.
- On the General tab, compare the file size with the file information tables provided in the bulletin KB article.
Note Depending on the edition of the operating system, or the programs that are installed on your system, some files that are listed in the file information table may not be installed.
- You can also click the Details tab and compare information, such as file version and date modified, with the file information tables provided in the bulletin KB article.
Note Attributes other than the file version may change during installation. Comparing other file attributes to the information in the file information table is not a supported method of verifying that the update has been applied. Also, in certain cases, files may be renamed during installation. If the file or version information is not present, use one of the other available methods to verify update installation.
- Finally, you can also click the Previous Versions tab and compare file information for the previous version of the file with the file information for the new, or updated, version of the file.
Microsoft Active Protections Program (MAPP)
To improve security protections for customers, Microsoft provides vulnerability information to major security software providers in advance of each monthly security update release. Security software providers can then use this vulnerability information to provide updated protections to customers via their security software or devices, such as antivirus, network-based intrusion detection systems, or host-based intrusion prevention systems. To determine whether active protections are available from security software providers, please go to the active protections websites provided by program partners, listed in Microsoft Active Protections Program (MAPP) Partners.
How to obtain help and support for this security update
- Help installing updates: Support for Microsoft Update
- Security solutions for IT professionals: TechNet Security Troubleshooting and Support
- Help protect your computer that is running Windows from viruses and malware: Virus Solution and Security Center
- Local support according to your country: International Support
The information provided in the Microsoft Knowledge Base is provided "as is" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.
- V1.0 (October 9, 2012): Bulletin published.
Built at 2014-04-18T13:49:36Z-07:00
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816879.72/warc/CC-MAIN-20240414130604-20240414160604-00894.warc.gz
|
CC-MAIN-2024-18
| 23,832 | 149 |
https://www.indiedb.com/news/icebox-v064-development-update
|
code
|
The Icebox development has been advancing steadily over the past few months. A Demo is currently being prepared for players at this weekend's AVCon event in Adelaide, Australia. Fortunately, with regular playtesting sessions and feedback from a collection of local gamedevs, the demo has received significant polish and is set to take stage in the Indie Games Room at AVCon.
Recently, in the lead up to the AVCon event, Carmine was invited to join the D1DLC.com crew for Episode 17 of their weekly podcast, where he talks about the game's progress, the upcoming event, and the local game development community. Have a listen if you're interested in gaming related podcasts.
STEAM GREENLIGHT PREPARATIONS
The Icebox's Steam Greenlight page is also receiving significant polish, and like the game, it's regularly updated in preparation for a public launch. I expect the campaign to start soon after the AVCon event. We'll be collecting contact details from interested players to subsequently send links to download the game demo, invitations to join the Early Access and notifications about the Greenlight Campaign.
Here's the current Icebox Trailer mentioning the upcoming Greenlight Campaign.
Here's a few gameplay clips from later sections in the game as development and testing continues.
With the lead up to AVCon underway, Games Of Edan is publishing some 20s clips, one each day, to the website and twitter accounts. Here's a couple for your perusal. If you want to watch a few more, you can check out the Youtube Playlist.
SPEEDRUNS & DEVELOPMENT TESTING
Recently, the D1DLC.com crew had a private gaming session on an early Icebox level. They laid down the challenge to Carmine from Games Of Edan, and he responded with this development video. Plus he previewed a few other levels in the new Icebox demo being prepared for AVCon. If you like listening to game developers drivel on about their mundane ideas and thought processes, then it may be worth a watch...
If you're in Adelaide this weekend, come checkout The Icebox in the Indie Game Room. Say hi to Carmine, Chris & Yeu Lin. Give us some feedback & submit your contact details to register for the free demo and an invitation to join the early access program. Each day we'll be giving away t-shirts to say thanks.
Until next time,
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510516.56/warc/CC-MAIN-20230929122500-20230929152500-00365.warc.gz
|
CC-MAIN-2023-40
| 2,294 | 11 |
https://developer.grammarly.com/docs/quick-start
|
code
|
Here is an overview of how to get the Text Editor SDK up and running in your app in just a few steps.
Create an application
From My Appsopen in new window, create an application and give it a name, such as "Grammarbot" or "Grammarbot Development." You can edit your application name any time, and set a separate, public application name and developer name later if you’re allowing users to connect their Grammarly accounts.
Only alphanumeric characters, symbols like
+ (plus), and the blank space are allowed in the app name and client name.
Install the Text Editor SDK
In the App Console, you'll see a quick start guide for the Text Editor SDK. The guide contains client-specific installation commands and code snippets you can copy. With just a few lines of code, you can add the Grammarly Text Editor Plugin to the desired HTML elements in your app.
In the following docs, you’ll find more installation and usage options for each client platform we support:
- Text Editor SDK for React
- Text Editor SDK for Vue
- Text Editor SDK for Electron (desktop clients)
Set up credentials
Below the quick start guide, you'll find the client credentials. The client ID is the unique public identifieropen in new window for your application. You will need it when initializing the Text Editor SDK in your application. The code samples in the quick start already contain this client ID.
Preparing for production
Before making your app available in a production environment, please take note of the recommendations in Securing Your Integration.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506669.96/warc/CC-MAIN-20230924223409-20230925013409-00754.warc.gz
|
CC-MAIN-2023-40
| 1,538 | 15 |
http://imaucblog.com/archive/2009/07/30/let-us-not-forget-microsoft-hyper-v-server-2008-r2-has-rtm-ed/
|
code
|
Let us not forget Microsoft Hyper-V Server 2008 R2 has RTM’ed
We should not forget that with a new version of Windows Server comes an updated Hyper-V (Hyper-V Server 2008 R2), this brings a wealth of new functionality and gives VMware’s equivalent a real kicking!
“Market dominant VMware has something to fear.” -PC Magazine
“Unlike VMware’s offering, [Hyper-V] Live Migration doesn’t cost extra and isn’t particularly difficult to configure.” -ZDNet
(An comparison of v.1 vs v.2 is seen in the table below)
The first thing that excites me is the support for 8 physical CPUs (not cores – they are virtual) and now with live migration and high availability too! But wait, there’s more (and we are not talking a free set of steak knives here) Hyper-V Server 2008 R2 will BOOT FROM FLASH.
“Microsoft Hyper-V Server 2008 R2 includes the unique ability (compared to Windows Server Hyper-V) to boot from flash. We’re making the documentation available to our OEM partners as part of the OEM Preinstallation Kit (OPK). Boot from flash is specifically designed for our OEM partners who want to ship an embedded Hyper-V hypervisor and thus will be supported via our OEM partners.”
For more information see this recent post over at the Windows Virtualisation Blog.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120461.7/warc/CC-MAIN-20170423031200-00564-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,282 | 8 |
https://community.appsheet.com/t/detail-views-space-saving-trick-to-display-columns-horizontally/14497
|
code
|
Cool, this looks like something that could help me, TYTYTY!!!
I have a Meetings App to schedule Meetings, each meeting will have 15 Roles for Members. I need to compactly display a simple/succinct “Next 3 Meetings” view that shows the next 3 meetings Date & their Roles. See Example below. I am building a Google Doc Template to Workflow email this out to Members, but I would like to also be able to display this inside the App, similar to how my Template image below is laid out. I don’t need the table squares to appear like in my Template image, just the data. I am using a table inside my Template Doc to keep everything lined up nice-nice. I think that you are doing something like this with your brilliant Trick here. The display advantage that I want is that I can only display the Role Name once, down the left hand side, and not for every single Role displayed. This is the only way that I can keep all Roles on one Page in my Template email. I think this view in my App will mainly be viewed on a Desktop, but conserving space on Device screen is just as important as in the Template Doc. Nobody wants a 3 page Report when all data could easily appear in one Page if Smartly formatted.
**And, slightly related, I have not yet figured out how to pull the future Meeting Date 2 & 3 & future Role data into my Workflow template, or into a View inside the App. It’s gotta be possible, if you know how to do that, I need it, please & TYTY!!
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107876136.24/warc/CC-MAIN-20201021064154-20201021094154-00351.warc.gz
|
CC-MAIN-2020-45
| 1,454 | 3 |
http://blogs.ucdavis.edu/egghead/tag/marine-biology/
|
code
|
By Karley Marie Lujan
Seagrass carpets the seafloor creating a unique and vital ecosystem in shallow marine environments. Sea turtles graze on seagrass leaves while smaller organisms seek refuge in the green fields but, on the microscopic level, seagrass is also home to microbial communities. Such microbes compose the seagrass microbiome and potentially play a role in seagrass ecology.
UC Davis graduate student Cassie Ettinger identifies and characterizes seagrass-associated microbial communities. A study published last year in the journal PeerJ suggests how understanding the role of these microbes could reveal new information about seagrass sulfur cycling and establish seagrass as a model organism.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376830305.92/warc/CC-MAIN-20181219005231-20181219031231-00350.warc.gz
|
CC-MAIN-2018-51
| 708 | 3 |
http://superuser.com/questions/461651/can-i-restrict-which-usb-sticks-may-be-mounted-in-windows-7
|
code
|
I know it's possible to prevent any USB sticks from being mounted, but is it possible to (somehow) only allow some USB sticks (either by volume name, a key file on the stick, or some other mechanism) while denying others?
Here is a possible solution, hinging on user permissions and drivers. Essentially, you remove all USB drivers for USB drives, and only allow certain drivers. That way, unless someone knows what kind of drive you use, they won't be able to use theirs. Lockdown USB to Specific Removable USB Drives
Edit: Here's another article that provides some powerful techniques for Windows 7 specifically. Locking down Windows Vista and Windows 7 against Malicious USB devices
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257825358.53/warc/CC-MAIN-20160723071025-00322-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 685 | 3 |
https://connections-ideas.hcltechsw.com/ideas/IDEACNCTNS-I-1485
|
code
|
The old CKEditor wasn't really awesome as TinyMCE, but it has a few features that were missing in the new one. We miss the ability of right clicking on a image and add certain propertys like adding a border, apply custom css and similar ones.
TinyMCE has the advantage image tools that allows nice features like cutting images etc but it can't add a border or custom css. This has to be done manually in the html view. Especially for non-technical users it would be helpfull when they can enter a border without having coding skills.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572870.85/warc/CC-MAIN-20220817062258-20220817092258-00763.warc.gz
|
CC-MAIN-2022-33
| 533 | 2 |
https://gitlab.freedesktop.org/tpm/gst-ci/-/commit/2320cfaffdf58d60052322b19a545e3bcc838b9c
|
code
|
Verified Commit 2320cfaf authored by
build_manifest: Drop the group search for now
Since we can't authenticate with the CI_JOB_TOKEN it needs a workaroud. Currently it falls back to the upstream repo which is good enough to get us going.
Showing with 0 additions and 51 deletions
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039490226.78/warc/CC-MAIN-20210420183658-20210420213658-00576.warc.gz
|
CC-MAIN-2021-17
| 279 | 4 |
http://stackoverflow.com/questions/2349000/centring-fixed-width-div-inside-100-width-parent-div/2367090
|
code
|
I have a setup similar to below:
<!DOCTYPE html PUBLIC "-//W3C//DTD XHTML 1.0 Strict//EN" "http://www.w3.org/TR/xhtml1/DTD/xhtml1-strict.dtd"> <html xmlns="http://www.w3.org/1999/xhtml”> <div id=“a” style=“width: 100%”> <div id=“b” style=“width: 200px; margin: 0 auto”> </div> </div>
And this centres fine in everything except IE.
Anyone have any idea what is going on and how to fix it. I know of the text-align trick, but there must be a better method. I hate sloppy code :-)
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701163421.31/warc/CC-MAIN-20160205193923-00183-ip-10-236-182-209.ec2.internal.warc.gz
|
CC-MAIN-2016-07
| 495 | 4 |
https://www.embeddedsingapore.com/products/rtos-and-middleware/ittia/
|
code
|
Gopalam Embedded Systems Pte Ltd (GES) is ITTIA's Certified Partner
ITTIA is revolutionizing the future of embedded device data management on the Internet of Things (IoT) through its ITTIA DB line of advanced, secure products. ITTIA DB is secure embedded data management software enabling embedded systems and intelligent device manufacturers to gain real-time insight into the system, continuously monitor live data, query for interesting events, and securely store information. Its ease of use, security, and simplicity provide developers with exceptional productivity and certainty when developing secure embedded systems.
The Software Development Kit (SDK) for Building Embedded Systems and IoT Devices
ITTIA provides secure time-series data management and stream processing software for edge IoT devices running on microcontrollers (MCUs) and microprocessors (MPUs). It enables embedded systems to monitor, process, act upon, and manage data. ITTIA database technologies are a modern development platform—seen as a symbol of speed, security, and ease—supported by a reasonable, cost-saving business model.
ITTIA DB is the secure platform for IoT device real-time data management. ITTIA DB IoT for MCUs is a high-performance time-series software development library for real-time resource-constrained microcontrollers, and it supports most 32-bit microcontrollers. ITTIA DB SQL for MPUs is the time series data management platform for building smart IoT device applications.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499816.79/warc/CC-MAIN-20230130101912-20230130131912-00512.warc.gz
|
CC-MAIN-2023-06
| 1,482 | 5 |
http://bugs.jquery.com/ticket/8373
|
code
|
Ticket #8373 (closed bug: duplicate)
input:text[val=xy]:first selector and actual input value
|Reported by:||romuald||Owned by:|
Example currently at: http://jsfiddle.net/dsjy6/3/
With the following selector:
which should return the first empty input inside the #someid element (otherwise, the problem is on my side :)
jQuery will currently only return the first input that was empty when the page was loaded.
In the example, clicking multiple times on the link will only update the 3rd input each time.
The second code example works fine (modifying the first element of the list, without :first)
Moreover, I found out that removing #someid will work correctly (but in my case, this is not what I want)
Tested with 1.5 and 1.4.4
Version 1.3.2 works as intended
- Priority changed from undecided to low
- Component changed from unfiled to selector
- Status changed from open to closed
- Resolution set to duplicate
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164567400/warc/CC-MAIN-20131204134247-00026-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 913 | 16 |
http://www.geekstogo.com/forum/topic/233862-cannot-download-avg-free-85/
|
code
|
Just to add to " rshaffer61 " post
" tofu5 , Quote: do I lose bookmarks "
" rshaffer61, Quote: you cannot uninstall IE as it is part of windows itself " , That is correct...
tofu5 , You are able to Back-up your bookmarks
Also , When you install firefox ( If you haven't already ) It will ask if you wish to import the bookmarks from another location , Such as IE.. you would select Internet Explorer
, then all internet explorer favourites will be imported to firefox bookmarks
Hope that clears that issue up
" tofu5 , Quote I was going to use avast anti-virus but it seems people have been having problems with it also "
I Have been running Avast for quiet some time now , Runs Excellent / VERY smooth !
I Recommend it to everyone
If you wish to not go with avast , avira is also a good choice...
This is only a personal recommendation , As everyone is different we all prefer different software
Best of luck
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125945459.17/warc/CC-MAIN-20180421223015-20180422003015-00274.warc.gz
|
CC-MAIN-2018-17
| 909 | 13 |
https://app.teachaway.com/community/general-discussion/beginners-corner/how-edit-my-experience-certification-education-my
|
code
|
I want to rectify some mistakes. Is there anyway to reopen those sections (mentioned in the title) and correct something?
Yes, of course. While logged into your profile, visit your dashboard (https://www.teachaway.com/dashboard) and click any of the sections you mentioned to add or edit content. If you've already completed your profile entirely and want to make changes, use your profile icon in the top right hand corner of your screen on both mobile and desktop and select the "Edit Profile Summary" option. From here, you'll be able to make the changes you mentioned.
Hope this helps.
Best of luck in your job search!
Hello, I have already completed my profile entirely. But I want to edit and update some sections which I found impossible. Once I click on the section, the save button is not activated for me to be able to save the changes. What can I do? Thanks.
I kindly ask if I can edit my resume
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100287.49/warc/CC-MAIN-20231201120231-20231201150231-00264.warc.gz
|
CC-MAIN-2023-50
| 906 | 6 |
https://www.computing.net/answers/networking/how-to-network-three-laptops-as-a-homegroup/52213.html
|
code
|
|We’ll create the Homegroup on the desktop computer, then join the laptop to it.|
Create a Homegroup
To start using the Homegroup feature we need to create one first. On the desktop computer type homegroup into the search box in the Start Menu and hit Enter.
In the window that pops up click on the Create a homegroup button.
In the next screen select what you want to share with the other computers in the homegroup and hit Next.
The Homegroup is created and a password will be generated that other computers will need to join it.
You may need to wait a few moments while the sharing of the libraries of the Homegroup are completed. The items under Share libraries and printers will be grayed out until the the sharing is completed.
Change Homegroup Password
You can certainly stick with the password Windows created for the Homegroup, or can change it to something that’s easier for you to remember. Under Other homegroup actions click on Change the password.
In the next screen type in the password you want to use and click Next.
You will get a screen letting you know it was successfully changed…click Finish.
Join Computer to Homegroup
Now that we have the Homegroup established, it’s time to join another computer to it. On the laptop click on Start and type homegroup into the search box and hit Enter.
In the next screen you will see a description of the Homegroup we just created—click the Join now button.
Decide what to share on the laptop with the Homegroup and click Next.
Type in the password to join the Homegroup and click Next.
Provided the network connection is established and you entered in the correct password…you’ll get the following screen indicating the join was successful.
Now you can open up Windows Explorer and should see the Homegroup you just joined in the Navigation Pane and be able to share files, folders, and printers.
Also on the laptop, if you go to Start \ Devices and Printers…
There you should see the printer connected to the desktop and can set it as your default printer.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190295.65/warc/CC-MAIN-20170322212950-00245-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 2,033 | 20 |
https://server.vpnwp.com/vmware/updating-hpe-proliant-g10s-with-esxi-6-7-custom-image/
|
code
|
A while back I built x8 HPE Proliant G10s all on ESXi 6.7 U1. There seem to be some stability issues due to drivers and other problems related to vsphere replication with this build.
I want to update all hosts to the latest HPE 6.7 U3 and get all the latest drivers from HPE installed. What is the easiest/safest way to achieve this? Can I just boot the servers in to the ESXi iso using iLO and run the iso choosing the update option? Will this also update all the drivers or just the OS?
Also my vcenter is 6.7 U1, is it ok to update your ESXi hosts past the version that vcenter is running at? Is 6.7 u3 ESXi hosts on a 6.7 u1 vcenter?
Thanks for any help!
View Reddit by SuperGuy41 – View Source
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737233.51/warc/CC-MAIN-20200807231820-20200808021820-00262.warc.gz
|
CC-MAIN-2020-34
| 700 | 5 |
http://www.techarena.in/news/23687-run-packages-natively-virtually-cloud-few-clicks.htm
|
code
|
BitNami, the site that simplifies the process of deploying web applications natively, virtually and in the cloud, announced today that it has partnered with the Spree project to provide an easy to deploy package for the open source e-commerce platform. Spree capitalizes on the dynamic nature of the Ruby programming language to provide the most flexible commerce platform available. It has been designed from the ground up to be as open and extensible as possible. Spree supports over 50 payment gateways and includes the ability to add customized logic for taxation, shipping, discounts and coupons, along with a host of other features. Because Spree is licensed under the liberal New BSD License, anyone can use it free of charge for both commercial and non commercial purposes.
"We are excited to add Spree to the long list of applications that are available on BitNami.org" said Daniel Liszka, a BitNami developer. "E-commerce platforms can often be inflexible and difficult to get up and running. Because it is built on top of Ruby on Rails, Spree is easy to extend and BitNami makes installation and configuration a snap. " The new BitNami Spree Stack makes deploying Spree a fast, painless process. To install the e-commerce platform on their system, users just download BitNami Spree Stack from BitNami.org and click through the simple installation and configuration wizard. In less than 10 minutes, they can have a completely configured Spree installation up and running on their system, free of charge.
BitNami also offers users the option of downloading a virtual machine image or deploying the BitNami Spree Stack directly to Amazon EC2. Regardless of the deployment target, users will get a completely integrated, ready to run package that includes Spree and all of its dependencies. No manual configuration is required, so users at all technical levels can deploy Spree in minutes. "BitNami stacks are a great solution for encouraging the adoption of open source technologies. They significantly lower the barrier to entry for getting a fully functional stack up and running on a local machine" said Sean Schofield, CEO Rails Dog LLC and contributor to the Spree project. "Even though Spree is open source, people still like to "try before they buy." This will make it easier for our prospective users to take the software for a test drive as well as to show it off to other stakeholders."
In addition to Spree, BitNami.org offers a wide range of popular open source applications for wikis, blogs, document management, bug tracking and more. BitNami-packaged applications are available as native installers, virtual machine images and Amazon Machine Images (AMIs) and GoGrid Server Images (GSIs).
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710765.76/warc/CC-MAIN-20221130160457-20221130190457-00347.warc.gz
|
CC-MAIN-2022-49
| 2,711 | 4 |
https://www.weasyl.com/journal/131372/will-try-online-broadcasts-of-my-drawings-again
|
code
|
Yeah I'm going to try and start streaming again, just not this weekend.
It's been a VERY long time since I have and I kind of want to at least do a few streams every now and then.
'll be reopening commissions and maybe (and I mean a REALLY BIG MAYBE) open requests again. There'll be a journal if and when I do either one of those.
I'll be updating some rules, prices and conditions, again I'll journal that too.
Just wanted to update on that matter.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250608295.52/warc/CC-MAIN-20200123041345-20200123070345-00507.warc.gz
|
CC-MAIN-2020-05
| 450 | 5 |
https://awesomeopensource.com/project/seedifferently/nogo
|
code
|
nogo blocks access to various sites (ads, tracking, porn, gambling, etc) by
acting as a DNS proxy server with host blacklist support.
It requires minimal setup, and includes a simple web control panel for managing the host blacklist.
I wanted an open source ad blocker solution that was more universal than a browser plugin, and:
Simply download a binary release
for your platform. Or, if you already have Go v1.8 or later installed you can
go get github.com/seedifferently/nogo
nogobinds to the DNS port 53 by default, it must be given access to "privileged" ports (e.g. via
-helpswitch for information on additional runtime options (such as disabling or password protecting the web control panel).
For those who would rather clone the repo and build from source:
Install Go (requires v1.8 or later).
Clone the repo, then
cd into it.
Install the dependencies by running
make deps. Or if you don't have
go get github.com/miekg/dns
go get github.com/boltdb/bolt
go get github.com/pressly/chi
Build the app by running
make. Or if you don't have
Run the app:
nogo doesn't ship with a built-in blacklist, so it won't block any hosts until
you add them.
There are currently two methods for adding hosts to the blacklist:
Navigate to the web control panel (default:
http://localhost:8080/) and add
a host using the form.
Download a popular hosts list file (e.g. pick one from the list at
https://github.com/StevenBlack/hosts), and execute
nogo with the
switch on its first run.
Your computer/mobile device/etc is probably set up by default to utilize a DNS
server which allows connections to any host. Unless you update your DNS
configuration to point to
nogo (and only to
nogo), nothing will change.
For those of you who may be unfamiliar with how to update your DNS configuration, check out Google's guide for their DNS service here: https://developers.google.com/speed/public-dns/docs/using
You can follow their instructions, but don't forget to substitute their DNS
service IP addresses with the sole IP address of the machine running
My name is Seth and I've been talking to machines in various languages since the early 90s. If you find this useful and want to say thanks, feel free to tweet me. If you'd prefer to give back in some way, you could buy me a beer, share some Satoshi, or pass my resume on to someone you know who is tackling interesting problems using technology.
Copyright (c) 2017 Seth Davis
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989766.27/warc/CC-MAIN-20210512162538-20210512192538-00619.warc.gz
|
CC-MAIN-2021-21
| 2,408 | 41 |
https://www.akeeba.com/support/akeeba-backup-wordpress/Ticket/27429:after-migrating-multisite-cannot-login.html
|
code
|
After I migrate a multisite from one domain to a newly created domain I cannot login with the normal credentials.
When I try to reset the password I get a mail but when I click the reset link I see the normal login screen.
Don't know how to login now.
|WordPress version (in x.y.z format)||4.7.3|
|PHP version (in x.y.z format)||5.6.29|
|Akeeba Backup version (x.y.z format)||2.1.1|
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154471.78/warc/CC-MAIN-20210803191307-20210803221307-00041.warc.gz
|
CC-MAIN-2021-31
| 382 | 6 |
https://www.analystforum.com/t/mock-exam/13053
|
code
|
I just finished it. Result wasn’t great but acceptable. Some feedbacks, 1. Questions are more interesting, certainly some of the performance questions hit my blind spot. I’m sure I need revision on those. 2. There is one item set that appears in version 2 of sample exam. Something to do with calculating covariance of global equity and global fixed income. Unfortunately, I paid for both, what a rip… 3. You get sector score breakdown, you also get solution. But unlike answers for sample exam. It does not indicate which one is the right answer. I guess, assuming we don’t take screenshot, do not remember much of the question, it doesn’t make much of a difference. Damn, it’s inconvenient… More thoughts on the exam, before I took the mock exam, I was somehow sus about the whole “take extra mile to kik schweser users” thingy. I took the samples and thought… They’re not really picking on anybody. It’s their usual way of “testing” us as poor candidates. After the mock exam. Hell I’m wrong… whatever Schweser says not important, it’s in there. My next step, go through Schweser, remember whatever that’s classify as “not important”, “you probably won’t see it in exam”, “I doubt they will ask this but know how to interpret them”…
thanks takumi for your fair feedback
Got 71% on that one, found it useful… Ponpon
I got killed on this one. Made a lot of stupid mistakes, plus the trouble answering questions on the screen made it worse. Trying to regain my confidence at this point.
Just checking. Are you talking about CFAI online exam here ?
Yes. The 3 hrs one.
Thank you, takumi, for sharing your thoughts. What do you think of those contents that are in the CFAI readings, but are absent from both LOS and Schweser? For example, “using swaps to create and manage the risk of structured notes”, “synthetically removing a call feature in callable debt”, etc.
If it’s not in LOS, it shouldn’t be in the exam. But who knows…
I think if it’s not marked optional, it’s fair game.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038067870.12/warc/CC-MAIN-20210412144351-20210412174351-00302.warc.gz
|
CC-MAIN-2021-17
| 2,053 | 9 |
https://www.petergyory.com/
|
code
|
Hi, I'm Peter Gyory
I am a Researcher and Game Designer who primarily makes games with weird controllers. I am currently based in Boulder Colorado where I am working on my PhD in Creative Technology and Design as a student at the ALTAS Institute.
A DIY platform for creating custom mini arcade games.
A frantic co-op game where players must reconfigure the controller while they play.
An interactive installation that blends dance, technology, design and sound.
Data Is Yours Toolkit
An educational project for teaching information literacy through physical data representations.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100287.49/warc/CC-MAIN-20231201120231-20231201150231-00789.warc.gz
|
CC-MAIN-2023-50
| 579 | 7 |
http://cmsimple-le.eu/manage/dj-snake-let-me-love-you-ft-justin-bieber.html
|
code
|
Dj Snake Let Me Love You Ft Justin Bieber MP3
Description Dj Snake Let Me Love You Ft Justin Bieber
DJ Snake - Let Me Love You ft. Justin Bieber - YouTube Best of DJ Snake https://goo.gl/qwC5gY Subscribe for more https://goo.gl/J1Cxx5 Listen to DJ Snake’s album Encore, out now on Spotify: http://smarturl.it ...
Please understand the website doesn't save in hosting any files! We're just a search engine like mediasearch.
Related Video / MP3 Dj Snake Let Me Love You Ft Justin Bieber
Is there any listed find result/s that violate your DMCA? Please send us the full name of the result ( artist + song name : dj snake let me love you ft justin bieber ) or if you would like to block a youtube videos please send us the video id (example kah8ue). And we'll block all results as soon as possible. Usually we need 24-48 hours to answer your dmca request.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934807084.8/warc/CC-MAIN-20171124031941-20171124051941-00305.warc.gz
|
CC-MAIN-2017-47
| 853 | 6 |
https://bintanvictor.wordpress.com/2017/04/17/does-inline-really-make-a-difference/
|
code
|
MSVS and g++ debug build both disable inline (presumably to ease debugging). The performance difference vis-a-vis release build is mostly due to this single factor, according to [[optimized c++]]
The same author asserts that inlining is probably the most powerful code optimization.
Stroustrup singled out inline as a key feature of c++.
In his low-latency seminar, Martin Thompson also quoted a computer scientist saying “Inlining is THE optimization”. This is now a memorable quote.
I think one of my java performance books singled out inlining as the single most effective optimization compiler can do.
Pimpl effectively disables inlining
vptr-based dispatch also disables inlining
C++faq gives many reasons for and against inline.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347396089.30/warc/CC-MAIN-20200528104652-20200528134652-00112.warc.gz
|
CC-MAIN-2020-24
| 738 | 8 |
https://medium.com/@unicefinnovationfund/can-my-product-be-open-source-and-make-money-22c3d98f665e
|
code
|
Can my product be open source and make money?
Open source business model research
YES. Open source business models have the ability achieve widespread impact and create revenue opportunities for businesses, often, better than proprietary technology.
“Technology thrives in the open, where people are free to share their ideas and build on the work of others.” — RedHat
Technology firms which have made strides through disruptive innovation dominate today’s list of Fortune 500 companies. These firms have defined and redefined industries, culture and society through innovation. With this new wave of enterprise is a new wave of how to create value for the business and its customers. Tech giants including Microsoft, Google and Amazon employ a SaaS model (Software as a Service)1 which has proven effective for both proprietary and open source technology.
This paper outlines some of the strategies that can be used to create value and generate revenue for open source hardware, software, and content. It explores opportunities for open source businesses and how they play a significant role in today’s rapidly changing innovation landscape.
1. WHAT IS OPEN SOURCE TECHNOLOGY?
“Open-source software development is a production model that exploits the distributed intelligence of participants in Internet communities. This model is efficient because of two related reason: it avoids the inefficiencies of a strong intellectual property regime and it implements, concurrently, design and testing of software modules. Because open source works in a distributed environment, it presents an opportunity for developing countries to participate in frontier innovation.” — B. Kogut and A. Metiu, Oxford Review of Economic Policy
Defining open source
Open source refers to the principles and methodology of open source software (OSS) and open source hardware (OSH) that are continuously improved, modified and redistributed:
Open source software:
Enables the original source code to be made freely available to the public and may be modified and redistributed. For software, it means the original source code is publically accessible for people to view the code, copy it, learn from it, modify it, or share it.2
Refers to tangible objects such as machinery and other devices whose designs are available and can be modified, changed or distributed, however, the copyright for the intellectual property (IP) in this business model is controlled by the original developer.
By providing the source code freely available to the public, some firms build broad communities of developers who innovate and develop a product together with users. Using this strategy, many companies have been successful at introducing their products globally because they have an existing user base, generate revenues and increase their economic outcomes.
There are several licenses that distributors can use. Companies or distributors benefit mainly from either, consultancy, services or the sale of hardware that runs open-source products such as providing software on CD or upgrading.
2. WHAT BUSINESS MODEL WORKS FOR OPEN SOURCE TECHNOLOGY?
Since the pioneering of the software industry, technology companies have used an enterprise sales model to sell and distribute their technology. The traditional approach was a company sells a license for a single download or use. Upgrades are prompted by the company when they happen to release one and are sold as an additional product. The product is created to fit a particular use case accompanied with heavy restrictions on how it can be used and shared.
Software companies are increasingly offering alternative business models that foster rapid innovation. In a SaaS model, the company hosts the hardware and/or software on its infrastructure and delivers it via the Internet. They support all the underlying computing software and provide key services such as application hosting, frequent version upgrades and other features that offer additional infrastructure. Products that use a SaaS model include Gmail, Google doc, Box, Dropbox, SAP and Microsoft office 365.
Benefits of a SaaS Model:
It gives the customer the option to access more or fewer services or features on-demand.
The customer will not have to hire additional staff to update their software.
Users can access a product from multiple devices.
3. HOW DO OPEN SOURCE BUSINESSES MAKE MONEY?
Revenue streams from open source solutions
An open source business can not charge a licensing fee. Using a SaaS model, there are many different dynamic ways in which a company can earn revenue and ensure a feasible, profitable and sustainable business model.
Here are three revenue opportunities. We provide some real business examples using these three revenue opportunities later in this document.
a business can offer consulting services to enhance the existing source code, use it for a different use case, or modify it to solve a specific problem. For hardware companies, businesses can consult to create customized products that align with a client’s requests. For open source businesses whose core product is content, sharing content allows the creator to showcase their work. In most sectors that involve content sharing, your portfolio creates opportunities/demand for commissioned work. Revenue can be earned from commissioned work that results from a showcase of your work.
Charge for additional or fringe services:
Companies can charge for additional services such as hosting the platform, for maintenance of the open source code or for additional features. The company could charge for additional features such as adding the client’s company logo to the dashboard or for additional log-in accounts similar to a freemium model to ensure it is unique to the client.
Sale of additional proprietary products:
Companies can sell additional closed source products that build on the core open source product. A common revenue stream for open source hardware companies is to charge a fee on the manufacturing cost of their open source designs. Here, anyone can download and modify the design and the company earns revenue once the product is made. For hardware companies some companies may sell the inputs required to manufacture their design.
4. WHAT ARE THE ADVANTAGES OF BEING OPEN SOURCE?
Open source allows a community of contributors to build on and improve existing source code. This enables knowledge sharing and brings diverse skills and expertise to your team. In turn, it significantly reduces development costs and enables your product to be continuously improved and upgraded.
Software, hardware and content are developed to solve a specific set of problems. When the developer, engineer or architect design a product, it is made to function in a specific way, for a specific customer, in a specific area. Open source allows the product to be modified and adapted for different geographical areas, for different contexts and users and to solve a different set of problems. Larger companies such as Microsoft and Oracle have to ensure that any software designed works in every geographic region, is understood in many different languages and is compatible for a wide range of devices. As an early stage venture, this would require a large amount of financial and non-financial resources. Some sources argue that by choosing to have a proprietary technology, it limits the lifespan of your product and increases market risk. A community of contributors, may ensure a wider adoption of your product as it allows for adoption in a local context with very little restrictions.
Because the source code is publicly available, open source exposes bugs or weaknesses in the system thus, increasing security. The only way to prove the security of a code base is that it is public, open, and testable by others. There have been far too many examples of companies saying “trust us” with the security of their code base only for their insecure code to be eventually infiltrated by hackers. Open-sourced code allows the public to test and comment. Users and the community of contributors can also help identify errors in design or bugs, reinforcing security by user collaboration.
4. WHAT OPPORTUNITIES EXIST FOR OPEN SOURCE BUSINESSES?
Investors are providing capital for open source businesses:
A number of investors are drawn to investing in networks and technologies with rapid adoption. Union Square Ventures, a thesis-based venture capital fund, places value on investing in businesses with a larger network effect. One of their investments is MongoDB, now valued at $1.6 billion. Founded in 2009, its database has since been adopted as backend software by websites and services including Craigslist, eBay and Foursquare.
Open source business are successfully exiting:
Open source business have a clear exit strategy. Large companies including Dropbox have acquired open source technologies and hired the team of developers who created the original source code to improve and grow the technology, creating opportunities for the open source founders.
For example, Dropbox released the Zulip chat app under an open source Apache Foundation licence. Zulip is a group chat application optimized for software development teams. Dropbox acquired it in 2014, and worked with the original Zulip developers to improve the product, and then launched it as an open source product. Zulip being open source has allowed it to be integrated with many platforms and products. For Dropbox, there is value in offering additional features and improving the user experience for their customers.
“At Dropbox, we love and depend on numerous excellent open source projects, and we consider contributing back to the open source community to be vitally important.” - Tim Abbott, Dropbox CEO
Large software clients are increasingly looking to purchase open source software and acquire the teams behind it:
Some of the world’s tech giants are now embracing open source technologies. According to Fortune Magazine, Apple is increasingly looking past large software enterprise technology companies like VMare, EMC and Oracle for smaller, unknown open source companies. These technologies are popular among web companies because they’re built to be fast, efficient and often address a particular set of problems. Web companies prefer open source technology because of their ability to contribute, modify and ensure it keeps up with the demand for performance, scale, security and other factors that are a priority for web companies — this is not feasible with proprietary technology.
Open source licenses open a significant client base from government and international organizations:
Companies that open source their products have the opportunity to work with public institutions including some of the United Nations agencies and government agencies who prefer to use open source technology for the procurement of products and services, for operational use and when selecting external partners and beneficiaries to receive funding. Having an open source technology creates opportunities for funding through venture capital, challenges and grants that will only invest in open source solutions. Open source is one of the Principles for Innovation and Technology in Development created by UNICEF. It has been endorsed by over 300 organizations. Recently, the French government, through SGMAP3, launched a pilot to explore various open source-based alternatives for building its own cloud computing infrastructure.4 On August 8 2016, the US President’s Executive Office issued an executive order requiring that US federal agencies publish at least 20 percent of their newly-made custom software as open source over the next three years. This requirement is part of a pilot established by the Federal Source Code Policy.
Today, innovation plays an integral role on creating social impact and when open source companies work with these agencies, they too became an important part of driving social change.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202924.93/warc/CC-MAIN-20190323181713-20190323203713-00058.warc.gz
|
CC-MAIN-2019-13
| 11,988 | 47 |
https://community.elastic.co/events/details/elastic-delhi-elastic-user-group-presents-april-elastic-meetup-delhi-ncr/
|
code
|
On 18th April, We'll be discussing about the new features of the ever-evolving Elastic stack. We'd have a talk from Animesh Bansriyar, who is a Solution Architect based in Delhi on the Elastic APM that let's you monitor your applications in real time.
We love it when our community members share how they're leveraging the Elastic stack. So, please let us know in the comments if you would like to speak at the meetup.
We're planning to have AMA as well. Come join us and ask us all the questions you have on Elastic Stack :)
1. Talk 1
Title: Elastic Application Performance Monitoring Speaker: Animesh Bansriyar Designation: Principal Solution Architect Company : Elastic Abstract/Details:
Elastic APM introduces a new developer-focused UI to drill into performance issues. Spend less time in the develop-test-deploy loop, and be able to ship code changes with confidence. APM agents automatically ships application performance metrics to Elasticsearch for visualization in Kibana with pre-configured dashboards and a dedicated Kibana UI to easily pinpoint and debug performance bottlenecks and errors in your code.
2. Talk 2
Title: Kibana as a Reporting Engine Speaker: Mohit Kalra Designation: Senior Product Developer Company: Stratbeans Consulting Abstract/Details: Reporting is an essential component of every product delivery. Visualization of reports becomes necessary given the amount of data being dealt with. This talk will be about how Kibana helped us empower our reporting mechanism. We'll talk about how you can ingest your reporting data into elastic using the Elastic Bulk API and how to visualize it using Kibana to create impressive dashboards for business insights.
3. Discussion about use cases of the community member. Ask Us Anything and Networking.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817106.73/warc/CC-MAIN-20240416191221-20240416221221-00231.warc.gz
|
CC-MAIN-2024-18
| 1,772 | 9 |
https://support.animaapp.com/en/articles/2369461-errors-and-bugs
|
code
|
Stay Up to Date
You can fix most issues by updating to the latest version of Anima. Updates are in our Change Log, where you can review all the progress we’ve made through each iteration.
After you update the plugin, make sure to restart Sketch.
Found something broken?
Report a bug here, make sure to add a sample Sketch file, links and video recording if possible.
You can use the chat bubble here, or email [email protected].
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655911896.73/warc/CC-MAIN-20200710175432-20200710205432-00141.warc.gz
|
CC-MAIN-2020-29
| 430 | 6 |
https://pt.bitcoinwiki.org/wiki/Utilizador:DustyKossak
|
code
|
Hello from Brazil. I'm glad to came across you. My first name is Jeannie.
I live in a town called Sao Paulo in east Brazil.
I was also born in Sao Paulo 22 years ago. Married in February year 2001. I'm working at the the office.
My webpage ... TV Licence customer service enquiries [Recommended Browsing]
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267865145.53/warc/CC-MAIN-20180623171526-20180623191526-00174.warc.gz
|
CC-MAIN-2018-26
| 304 | 4 |
https://scicomp.stackexchange.com/questions/33245/optimizing-for-multiple-objectives
|
code
|
Optimizing two models here, each model having its own set of parameters and an objective, but both models run on the same data which is difficult to compute, and which is computed based on both models' params. How can one optimize the models simultaneously both models relative to their respective objectives?
Here's what I've done so far:
ObjectiveFunction( model1, model2, data ): simulationResult = VeryExpensiveCall( model1, model2, data ) score1 = ComputeScore( model1, simulationResult ) score2 = ComputeScore( model2, simulationResult ) return score1 + score2 RunOptimization: genericOptimizer.SetMethod( "CRS2" ) genericOptimizer.SetMinObjective( ObjectiveFunction ) genericOptimizer.Optimize()
There is a problem with this solution of adding the individual scores to produce a combined one: the
genericOptimizer can get confused what parameter change affected a score and proceed in the wrong direction.
For example, supposed that between consecutive iterations
model2.param have changed, causing
score1 to decrease but
score2 to increase. The optimizer has no way of knowing that the change in
model1 was beneficial and in
model2 wasn't. It would seem that an optimizer that's aware of the model being a Cartesian product of two models should improve performance.
Thus the question: how can one take advantage of the Cartesian nature of the model and optimize for each objective?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100276.12/warc/CC-MAIN-20231201053039-20231201083039-00673.warc.gz
|
CC-MAIN-2023-50
| 1,389 | 12 |
https://neos-server.org/neos/solvers/milp:Cbc/AMPL.html
|
code
|
The COIN-OR Branch and Cut (Cbc) solver is an open-source mixed-integer
linear programming solver written in C++. Problems for Cbc can be submitted
on the NEOS server in AMPL, GAMS, or MPS format.
Cbc is intended to be used primarily as a callable library to create
customized branch-and-cut solvers, however, a basic stand-alone executable
is used to solve problems submitted to the NEOS Server.
Cbc utilizes other COIN-OR projects Cgl (Cut Generation Library) to generate
cutting planes and Cpl to solve the linear programs at each node of the tree.
Cbc was developed by John Forrest, now retired from IBM Research. The project
is currently managed by John Forrest and Ted Ralphs.
For more information on Cbc and the COIN-OR initiative, please visit the Cbc COIN-OR website.
The user must submit a model in AMPL
format. Examples are provided in
section of the AMPL website.
The problem must be specified in a model file. A data file and commands
files may also be provided. If the commands file is specified, it must
contain the AMPL solve command; however, it must not contain
the model or data commands. The model and data
files are renamed internally by NEOS.
The commands file may include option settings for the solver. To specify
solver options, add
option cbc_options 'OPTIONS';
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474360.86/warc/CC-MAIN-20240223021632-20240223051632-00215.warc.gz
|
CC-MAIN-2024-10
| 1,287 | 22 |
http://www.felienne.com/archives/4772
|
code
|
Pharo has a nice convention where arguments should be named as their types:
Boris says this is a wonderful idea “please do it!” Not only is it good for readability, but also some IDEs depend on this for features like autocompletion.
So, do people actually do this ‘in the wild’? Boris studied about 150,000 arguments and found that 36% does do it but 64% did not. That sounds like a lot of fails. He studied the results a bit deeper and found that some types were treated differently.
For example, people would not write aClosure, but rather aBlock or they would not write aByteString, but rather aSmallString. More interesting cases even would be combinations: aDateorNumberorString. A ducktype argument name! Or even (real life example)
If these types were treated as correct, they got to about 50% of successful argument names.
Are devs lying?
Yes, sometimes. Boris studied 300 manually and compared the arguments to the runtime types. and 76% matched and 24% did not! Were they lying, well, no. There were small differencem likt aBrowser for aGMLBrowswer. So the developer knew what he was expecting, they were just too lazy to type the whole thing. Or sometimes, an argument was called aBlock (=a closure) but the type would be the output of running the closure.
Nice work! There also is a preprint.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891105.83/warc/CC-MAIN-20180122054202-20180122074202-00036.warc.gz
|
CC-MAIN-2018-05
| 1,312 | 8 |
https://findyourphonelifebalance.com/research
|
code
|
RESEARCH PHONE/LIFE BALANCE WITH US
SPACE works to support researchers looking to better understand phone/life balance, problematic phone use, phone usage patterns and, more broadly, how individuals and society relate to technology.
Through our trusted consultancy and data sharing services, we are able to provide you with access to the quantitative evidence you need for your cutting edge research.
We charge a small consultancy fee for collecting, organizing and sharing any existing data in an appropriate and reliable fashion. This includes drawing from more than 50,000 active data sets, or building additional or bespoke functionality to test your hypotheses.
What Data we can Collect
Collection of Existing Data Sets
- Phone usage (locks/unlocks with timestamp to the millisecond)
- App usage (timestamp & duration)*
- Pausing of the app (timestamp & duration)
- Focus mode timestamps (when a user starts the focus mode to stop notifications)*
- User set time and unlock goals
- Profiles (if the user fills in the ‘My Profile’ section)
- Type of phone users (if user completes quiz)
*only on Android
Creation of New Data Sets
We are also able to run extension studies for a set-group of uses to collect additional information, such as:
- Apps excluded to be counted from SPACE time
- Phone call monitoring
- Text messages
- Phone events
- Switch on/off
- Airplane mode
- Location tracking
- Time spent at locations
- Apps used at locations
- Battery status at points in the day
(Note, these are Android only)
Evolution of the User Experience & UI
Have an additional functionality that you are looking to build?
We are able to work with you to build new functionality into SPACE to test your hypotheses. This may involve:
- Building new functionality into the product
- Adding a survey
- Launching direct messaging with your participants
- Changing the look and feel of the product
- Projects are costed on a time basis.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987836295.98/warc/CC-MAIN-20191023201520-20191023225020-00329.warc.gz
|
CC-MAIN-2019-43
| 1,931 | 35 |
http://www.aikiweb.com/forums/showpost.php?p=316916&postcount=27
|
code
|
Re: Problem student!!
Of course it would be incredibly frustrating. I didn't mean anyone was actually insulting him, just that if someone like that is oversensitive they may take any advice or criticism as an insult in their own mind. In any case, like I said, I'm not there.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163056120/warc/CC-MAIN-20131204131736-00029-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 275 | 2 |
http://www.molvis.org/molvis/v23/198/mv-v23-198-f2.html
|
code
|
Figure 2. Summary of the referenced and the novel mutations on the GCAP1 primary structure. Schematic representation of the guanylate
cyclase-activating protein 1 (GCAP1) showing the location of the two novel mutations presented in this study (in bold and
framed) and the known mutations (in bold and underlined; in bold and double underlined when two different mutations are localized
on the same amino acid; in dashed underline for unlikely mutations). The EF-hand domains consist of an alpha-helix (E), a
12-amino-acid loop, and a second alpha-helix (F). The Ca2+ ion is bound in the EF2–4 loops at specific sites (arrowhead); EF1 does not bind calcium. The mutations associated with a
macular dystrophy (MD) phenotype are displayed with a hashtag. EF1–4, EF-hand domains; Myr, N-terminal myristoylation.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585280.84/warc/CC-MAIN-20211019171139-20211019201139-00331.warc.gz
|
CC-MAIN-2021-43
| 811 | 6 |
https://beta.steemit.com/steemit/@khaleelkazi/re-jamesdenny-how-good-is-that-post-really-an-idea-to-find-and-keep-good-writers-on-steemit-20171215t062213609z
|
code
|
RE: How good is that post really? - An idea to find and keep good writers on Steemit
This is a great post... I do think there is a huge issue with whales getting their posts high above all the "minnows" even when their content isn't nearly as good sometimes.
"One idea I had was to input an additional number to each post, a quality score, sort of like the reputation score on everyone's accounts."
I really really really like this idea and haven't heard anyone else talk about it... A quality score on posts would be a godsend and I think if we can get more people talking about it, it could actually be implemented.
I'm trying to do my part by upvoting any high quality content I come accross and my readers are doing a great job sharing content with me for this purpose. If you find/author any high-quality posts, don't hesitate to get in touch with me via comment or tag and I'll upvote every time. I think this is a real issue with steem and we need to work on it for mass adoption to be practical. Thanks for sharing this!
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585837.82/warc/CC-MAIN-20211024015104-20211024045104-00718.warc.gz
|
CC-MAIN-2021-43
| 1,028 | 5 |
https://www.yinfor.com/tag/sipura/
|
code
|
I bought Sipura SPA-2002 VOIP phone adapter about six years ago.
When I clean up my folders of hardware documents, I saw this guide.
To save the space and for reference purpose, I scan it and you can download it here.
I have a SPA-2002 device for 8 months. I also use VOIPSTUNT as my Voip serivec provider.
The Firmware with device is 3.1.2(a). Nothing wrong.
I went to SIPURA website, and saw the new firmware there.
So, I upgrade it to new version.
Let me show you how to do the upgrade.
1) Download it from the download page.
2) Decompress it into a folder.
3) There are two files, spa2002-03-01-05.bin and spa2002-03-01-05.exe.
4) Get the IP address of your SAP-2002.
You can go to SPA’s voice menu by pressing **** on your analog phone and press 110#.
Your current IP will be announced.
5) Run the windows executable from windows machine. It will ask for SPA’s IP-address. It will then try to identify the SPA, and perform the upgrade.
Note: Don’t power off at this time.
Continue reading “Upgrade SPA-2002 Firmware”
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371818008.97/warc/CC-MAIN-20200408135412-20200408165912-00198.warc.gz
|
CC-MAIN-2020-16
| 1,031 | 17 |
https://www.star2billing.com/products/auto-dialer-platform/newfies-dialer-application-development/
|
code
|
One of the strengths of Newfies-Dialer is the flexible API’s that are included, this allows Newfies-Dialer Platform owners to integrate Newfies-Dialer into existing applications for automated outbound calling. The Star2Billing Software Development team can work with vendors and in-house technical staff to interface the Newfies-Dialer Platform into a wide range of existing applications.
Each Newfies-Dialer Platform deployment is different, serving different needs and requirements. Again the Star2Billing Development Team are on hand to discuss, advise and create a software specification then go on to develop your chosen voice application.
The Newfies-Dialer Platform is supplied with some voice applications as standard, which can easily be modified. These include: A simple play message on answer, and hangup, play message on answer, then pass the call to a pre-determined SIP destination, for instance a queue on an IP-PBX, and finally, an automated voice conferencing solution to automatically call people in a phone book, and on answer, place them in a conference.
With custom development, more complex and extensive voice applications can be designed and built by Star2Billing. Please contact us with your ideas.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00840.warc.gz
|
CC-MAIN-2023-40
| 1,225 | 4 |
https://www.smartftp.com/static/forums/14/12647/upload-has-suddenly-stopped-working/
|
code
|
I've been using SmartFTP for just over 30 days to create my website and it has worked fine until yesterday. Now when I try to upload (I usually do it direct to folder) it places the file in the Transfer Queue and keeps trying to upload from there but without success.. I've noticed that all my folders have Permissions set to 755 with Read, Write and Execute allowed for User and lesser permissions for others. The public_html folder is set at 0, with no permissions. I don't know whether this is as it should be as I have not looked before my problem. I did try setting it to 755 but all it seems to go through is a refresh then it sets itself back to 0. Am I missing something? Any advice appreciated, cheers in advance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525659.27/warc/CC-MAIN-20190718145614-20190718171614-00143.warc.gz
|
CC-MAIN-2019-30
| 722 | 1 |
http://www.sailnet.com/forums/562680-post200.html
|
code
|
Originally Posted by TAK
Sad to see, looks like the owner put some effort into keeping them off the boat.
One of the things I found so frustrating when I lived out there is that you were pretty much expected to sit back and take it.
In situations like that though, I think the best option is to get rid of the lifelines and anything else that could be damaged so they have easy on/off access.
Of course, the -best- option would be to make the preservation groups responsible for damages, but that is extremely unlikely.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422115867691.21/warc/CC-MAIN-20150124161107-00181-ip-10-180-212-252.ec2.internal.warc.gz
|
CC-MAIN-2015-06
| 519 | 5 |
https://xenforo.com/community/threads/iphone-doesnt-like-the-navigation.562/
|
code
|
Sorry, I couldn't post the image from the phone, TinyMCE isn't loading.It does, but since you have no mouse, you can not "hover"; ergo, only click (touch).
This is an issue not limited to iPhone, until some sort of delay.state is introduced in webkit.
TinyMCE does have iPhone/iPad support, since 3.2.4. (r.isIDevice=/(iPad|iPhone)/.test(f)) I know there were a few issue with WebKit, so this might be contributary. We're out by 0.0.2 versions of TinyMCE.It probably isn't recognized as modern browser, or fully Safari, so it falls back to 'working version', for say IE6, etc.
I remember during the internal demo that it was mentioned they haven't had time yet to dive fully into the mobile part of things.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824180.12/warc/CC-MAIN-20181212225044-20181213010544-00349.warc.gz
|
CC-MAIN-2018-51
| 706 | 4 |
http://cncfaq.us/ufaqs/how-do-i-save-find-my-digitized-3d-touch-probe-file/
|
code
|
How do I save/find my digitized 3D Touch Probe file?
If you are having trouble saving or finding your digitized file after scanning with the 3D touch probe, you may have to force Windows to save the file as a .txt file. To do this, either initially after the scan or after opening the file, save as and type your file name, followed by .txt and enclosed in quotes. For example…
This will force windows to save the file as a .txt, which can be easily recognized and opened.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500813.58/warc/CC-MAIN-20230208123621-20230208153621-00623.warc.gz
|
CC-MAIN-2023-06
| 474 | 3 |
https://uqworld.org/t/input-moment-and-sampling/509
|
code
|
I’m majoring in chemical engineering.
i’m conducting research to simulate the process using simulation programs such as Aspen.
PCE has the advantage that it can produce good results with less data than MC, so I want to apply PCE to my research.
I’m using PCE to approximate the underlying function and do a sensitivity analysis.
Before proceeding with the above research, first, i will extract data using simulation program.
At this point, i want to use a sampling technique such as LHS to obtain the data points that need to be extracted. (If the data extraction point is randomly selected, the model does not perform well. Aspen simulation data is a time-consuming task.)
Assume that the input of data consists of x1, x2, and x3. At this time, the distribution of x1, x2, x3 is unknown. Can I assume this is uniform distribution like in uq_Example_input_01_Sampling?
Additional question. Last time, when setting the moment and type required to generate a PCE model, you answered that i use plotmatrix to see the distribution. (Thank you for your kind reply.) The picture below shows the Truss data using plotmatrix.
In the above figure, all the distributions represented by Pi are expressed as Gumbel as Type, Mean as 50000, and Standard Deviation as 7500.
In the figure, the shape of the distribution is similar, but the specific parameters of the distribution are likely to be different.
Is there a criterion (or tip) for determining the distribution of input data? Or is it just a toy problem, so is it rough?
Finally, the question is about copula. Studying manual, copula seems to be an indicator of the dependencies between variables. This is also an option for creating PCE models. This is a low level question, but what exactly does the copula function do?
(I don’t understand the result of the copula function example.)
(How do i determine if the data is dependent on each other or independent? Based on knowledge?)
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655919952.68/warc/CC-MAIN-20200711001811-20200711031811-00456.warc.gz
|
CC-MAIN-2020-29
| 1,933 | 14 |
https://links.kirsch.mx/?searchtags=raspberrypi
|
code
|
This is an unbelievably cool application for the Raspberry PI: Emulate a 68040 that is super powerful compared to what was available in the eighties, and connect it to a Commodore Amiga. Throw in USB bridge, SCSI, etc.
Took long enough to produce a new model rather than a tiny tweak. I don't expect most people to use the Windows 10 for IoT on this thing though. I think for most people Linux will still be the way to go.
FoldFold allExpandExpand allAre you sure you want to delete this link?Are you sure you want to delete this tag?
The personal, minimalist, super-fast, database free, bookmarking service by the Shaarli community
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573029.81/warc/CC-MAIN-20220817153027-20220817183027-00487.warc.gz
|
CC-MAIN-2022-33
| 632 | 4 |
https://mail.openjdk.java.net/pipermail/valhalla-spec-observers/2017-April/000155.html
|
code
|
Draft JVMS changes for Nestmates
david.holmes at oracle.com
Wed Apr 19 06:40:46 UTC 2017
First, thanks for getting to this so quickly! Much appreciated.
On 19/04/2017 4:42 AM, Dan Smith wrote:
> Hi, all.
> I've uploaded a draft of JVMS changes for JEP 181 "Align JVM Checks with Java Language Rules for Nested Classes" to:
> Some comments below on my thinking in drafting the spec text, and on the JEP generally.
> JEP name
> I don't know how permanent JEP names are supposed to be, but I'd prefer a different name at this point. Something like: "Expanded JVM Access to Private Members"—shorter, focused on the feature itself rather than its relationship to the Java language. Or maybe "Class Nests for Access to Private Members".
The intent of the name is to aid in the contextual positioning of this
JEP ie address why do we even need this. The JEP addresses an
inconsistency between access controls in the Java programming language
and access controls in the JVM. The primary goal here is to align the
two, while at the same time allowing for additional usage of nestmates
in the future.
> The term "nest" is nice because it's short and mostly unspoiled by overloading in this context (I think?); it's not great because it's informal and doesn't mean anything the first time you hear it. I thought about something more clinical like "access control context", but I'm not convinced that's an improvement. How do others feel?
I think John has been talking about "nests" for at least 4 years now. :)
It fits nicely with the existing terminology of "nested types" - it
seems quite natural that "nested types" form a "nest". I have no problem
with it being "informal" in some sense, but we are using it to define a
specific relationship between certain types.
> The JEP uses "nest top" to describe the class that nest members reference; I prefer "host class", which better describes the class's role and isn't tied to the Java "top level class" concept. I know we use "host class" internally in Hotspot, perhaps when working with anonymous classes (of the JVM flavor), but I think in that context it will ultimately mean the same thing? Are we comfortable repurposing the term in this way?
Given that a nest-top type must be a top-level type, I think nest-top
fits perfectly. I dislike "host class" because that is already used for
the quite different case of VMACs. I can live with other names but I
think they should incorporate "nest" eg. nest-holder, nest-host. But I
think nest-top is an ideal match. (And no I didn't invent this
terminology :) ).
> I follow Brian's model when it comes to nest membership (5.4.4): every class belongs to a nest, possibly (in the absence of MemberOfNest) the nest hosted by itself. Many nests are singletons without any associated explicit attributes.
I have not yet seen a follow up from John as to whether we require or
just allow, an empty NestMembers attribute to indicate a singleton nest
> Verification of MemberOfNest
> I include a discussion block about different options of validating MemberOfNest. I think the consensus, and my preference, is to do it during verification of the member class. (NestMembers, on the other hand, is never validated, except as a side-effect of checking MemberOfNest.)
Given verification is optional the current approach is to validate
during linking just prior to the verification step. Whether that can
conceptually be considered part of verification I am unsure.
> Verification of invokespecial
> Allowing invokespecial to refer to classes other than the current class and its supers is a significant change. I noticed and relied heavily on the parallel with invokevirtual making protected method calls. So I tried to make the two as similar as possible. In a few places, the treatment of protected methods doesn't seem ideal, and rather than trying to mirror that with non-private invokespecial, I modified the protected method treatment.
This concerns me because protected-access is a somewhat complex/messy
issue so aligning private-access with it seems to go in the wrong
direction. Cleaning up the protected access rules, while perhaps
desirable, is technically out-of-scope for this JEP in my opinion.
> The "protected check" of verification, in particular, was a mess before, and I think I've made it a lot more manageable, and compatible with a parallel rule for invokespecial. I could use some feedback on exactly what Hotspot's verifier has been doing here, though, since I'm pretty sure it didn't match the old specified rules.
Might be better to take this up separately.
> MethodHandle resolution
> The spec (126.96.36.199) is vague about what errors can occur during MethodHandle resolution. I assume any linkage error specified for the instruction can also occur via MethodHandle resolution, and that will include failures due to invokespecial improperly referencing a class.
This is an area I have least understanding of, but this seems to cover it:
"In each step, any exception that can be thrown as a result of failure
of resolution of a class or interface or field or method reference can
be thrown as a result of failure of method handle resolution."
> Dynamic checking of invokespecial receivers
> When invokespecial involves interface types, the verifier can't guarantee that receiver objects actually implement that interface (JDK-8134358). It's an open question whether this is really a problem, but I included a tentative fix in the invokespecial runtime rules.
This seems out of scope in the general case, but there may be nestmate
specific actions required.
> Compiler changes
> The JEP text can't seem to decide if compiler changes are part of it, or a follow-up exercise. I think we're best off explicitly including the compiler changes, which will provide opportunities for design validation and testing.
Not sure what gives you that impression, but javac changes are an
essential part of this. Lacking a compiler spec I assume this will be
handled informally. But the attribute definitions (see comments below)
should dictate what a source compiler is required to do.
> API changes
> I haven't tried to address changes that need to be made to APIs. Somebody will need to. For example, Lookup.findSpecial probably needs to make adjustments to account for private members in nestmates, and to parallel the new verification/linkage rules (e.g., follow Lookup.findVirtual in restricting the receiver type).
API changes will be addressed as each API needs to be modified.
> Security risk
> The JEP text should acknowledge that, while this does allow compilers to grant finer-grained access to members shared by nestmates, it also pushes compilers to grant broader access to members that were previously kept private. It's a trade-off, and presumably a good one because nestmates are completely trusted, while package-mates might sometimes be suspect.
I'm not following you here. What broader access is being granted to
members that were previously kept private? This effort allows
private-only access to members that were previously package-accessible.
> (I guess this argument really ought to be made from the top: declaring things with package access is worse than inventing a new level of access because ________.)
Now looking at specific proposed changes to the spec wording ...
Regarding the Exceptions attribute, it seems to be used only to store
data to be passed back to the libverify and the reflection API.
Regarding the definitions of NestMembers and MemberOfNest ... I modelled
the definitions in:
based on those for the innerclass (and related) attributes. I'm not sure
why you moved away from those definitions as they pinned down exactly
when these attributes are expected to appear. Without those parts the
current definitions seem optional - ie they define what the attribute
means if present, but they do not require its presence. I do not believe
these attributes should be optional for classfile version 54, but
required whenever a nest does exist. A java source compiler writer
should look at these definitions and know when they must generate these
4.7.26 The MemberOfNest Attribute
"the class is implicitly a member of its own nest"
I suggest changing "a" to "the sole". Otherwise "a" implies there may be
other members. As these are static properties being defined I don't
think we need to be accounting for some future dynamic expansion of a nest.
4.9.2 Structural Constraints
The changes to invokespecial seem okay, but I have a problem with
"If invokespecial is used to invoke a non-private, non-<init> method,
referenced via a superclass or a direct superinterface, ..."
what does "referenced via" mean?
"If getfield or putfield is used to access a protected field referenced
in a superclass ..."
and following, you changed "declared" to read "referenced". Again I do
not understand what this is supposed to mean. It is the declaration site
of the field or method that is needed to determine whether that member
is in the same or another package. To me "declared in a superclass ..."
was exactly correct. Your note does not make the change any clearer to me.
4.10.1 Verification by Type Checking
Does the order in the rules mandate the order in which the VM must
actually check things? classHasValidNest seems much more complex than
the actual runtime process of validation (though it may just be exposing
distinct steps that are lumped together at runtime).
188.8.131.52 Type Checking for Restricted Member References
I'm not very good at reading or understanding these rules, but I'm
surprised that the invokespecial rules seem to make no mention of
nestmates at all:
"A method reference is allowed by an invokespecial instruction if it is
not a restricted invokespecial reference, ..."
This seems to open things up to all private method references??
5.4.4 Access Control
I don't think you need to restate:
"A class with a MemberOfNest attribute belongs to the nest hosted by the
referenced host class.
A class without a MemberOfNest attribute implicitly belongs to a nest
hosted by the class itself. (If the class also lacks a NestMembers
attribute, then the nest has only one member.)"
The rule is simply stated as is: "belonging to the same nest as D" -
belonging to the same nest is, or should be, already defined elsewhere.
I'm avoiding commenting on the protected access changes but do want to
raise a concern that there are no changes to Method resolution (184.108.40.206)
yet resolution relies on the definition of access control to
prune/discard inaccessible methods. It appears now that we're allowing
more potential successful resolutions, then using the additional rules
on the invoke* bytecodes to try and discard any undesirable results.
6.5 getfield (and others)
You note "These rules are redundant: verification already guarantees
them " but this brings me back to an area I keep raising concerns about:
the split between static verification based checks and dynamic runtime
checks. Yes the verifier precludes certain things but if we run without
verification the rules expressed for the bytecodes are considered to be
still required at runtime. If you delete them because they overlap with
verifier rules we have no way to tell which rules must be enforced
regardless of verification status.
You note regarding the IllegalAccessError:
"This replaces a VerifyError previously specified by 4.9.2. The check
must be delayed until after resolution in order to determine whether the
referenced method is private."
We know the access flags for the referenced method at verification time
- shouldn't that be the sole basis for the verifier check? Afterall it
is verifying the static properties of the classfile and bytecode. If the
actual resolved method has different access to the referenced method
then that may lead to ICCE (depending on the exact nature of the change
- a private method made public may not be an issue for example).
220.127.116.11 Method resolution
You did not make any changes here, but as per my comment in the bug
report we do require, IMHO, further tightening here to ensure nestmate
invokespecial invocations do not resolve to method implementations that
they should not. The example here is a hierarchy of nestmates (C extends
B extends A) where A and C both declare a private method "void m()" and
we have an invocation c.m() where c is an instance of class C. We then
"separately compile" C to remove the definition of m(). At runtime
method resolution will locate A.m, even though the method reference was
for C.m. Normally the accessibility rules would exclude A.m from being a
viable candidate but here the classes are nestmates so A.m is
accessible. But it would be wrong to invoke A.m. This case should throw
ICCE or NSME.
More information about the valhalla-spec-observers
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585828.15/warc/CC-MAIN-20211023224247-20211024014247-00552.warc.gz
|
CC-MAIN-2021-43
| 12,752 | 160 |
https://dribbble.com/shots/2912627--3-Market-Items
|
code
|
This time i tried to cover the case where you want to store items within a sections. Each item wld have a few (or more) shiny pictures in addition of hidden description and extra possible actions.
This approach can easily be used for pretty much any set of items you want to show an extra stuff of without spending a valuable time by getting to separate page(and back). Those might be documents, tickets, afore depicted market items, hotels etc.
This shot is being a part of so called interaction library, launch of which's been announced at my previous post.
Interaction library would aim a few main targets:
- Quick access to the example of a generic interaction you can quickly share with your client to get a reference point on the table;
- It’s easy to select and implement a behaviour type that would be suitable for a particular project you work on, as i’ll try for them to serve a typical UX need;
- I will as well try to cover the most interesting and non-standard approaches to explore relatively fresh behaviours so we all stay mainstreamed and aware;
- I do love create nice and smooth interactions and so now i have a chance of doing that independently of the project i currently work on most of my time :)
P.s. Hope that is any helpful, hit "L" if you feel like it :)
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474795.48/warc/CC-MAIN-20240229071243-20240229101243-00058.warc.gz
|
CC-MAIN-2024-10
| 1,285 | 9 |
https://sites.insead.edu/bsw/doc9i6.html
|
code
|
This is a list of articles
from the intersection of
Organizational change and Influence processes: Power, Status & Politics
- Simons R. 1994. How new top managers use control systems as levers of strategic renewal. Strategic Management Journal 15(3): 169-189.
- Zhang Y, Rajagopalan N. 2010. Once an outsider, always an outsider? CEO origin, strategic change, and firm performance. Strategic Management Journal 31(3): 334-346.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039603582.93/warc/CC-MAIN-20210422100106-20210422130106-00231.warc.gz
|
CC-MAIN-2021-17
| 426 | 5 |
https://www.linuxjournal.com/content/seamlessly-extending-irc-mobile-devices
|
code
|
Seamlessly Extending IRC to Mobile Devices
Internet Relay Chat (IRC) is one of the older real-time communications methods still in active use on the Internet. Due to its popularity, flexibility and cross-platform nature, it still has a very vibrant user base today. Personally, I've been on IRC since the late 1990s, and it's been very useful and lots of fun—particularly the #linuxjournal room on Freenode—stop in sometime!Drawbacks to IRC
As great as IRC can be, there's one thing about it that's always bothered me, and it's something that Jabber got right—the concept of a resource and priority. In IRC, when you log in as whatever user you are, you can't log in as that user again from another machine. Jabber allows multiple user logins, so long as the "resource" is different, and it'll route your messages to the client with the lowest priority. IRC doesn't even have that concept, so once you log in on your desktop, you have to log in as another user if you want to log in on your laptop, which results in lots of logins like "WildBill|Laptop" and such. This causes a problem if people want to private-message (PM) you, as they never know what login you're on.
For years, I've used a fairly common workaround to bypass this problem to a certain degree. If you use a text-based client like Irssi, and run that client on a machine that's on all the time, you can run the client within a terminal multiplexer, such as GNU Screen. That gives you the ability to run the client, detach from the terminal session, then log in via SSH on another machine and reattach to your session, where you can catch up on what you may have missed. By and large, this is an acceptable workaround...except when I forget to log in to that Screen session. I've been known to have a few days' worth of PMs piled up before I remember to log in and check. By that time, people who PM'd me probably forgot what they pinged me about.
The other major flaw with this scheme is that it doesn't work well with mobile devices like tablets and mobile phones. Yes, I could SSH from my iPhone to my Linux server and attach to that Screen session with Irssi running in it, but a terminal emulator on a 3.5" screen, where a good portion of the screen is taken up with an on-screen keyboard, is a recipe for a headache. There are excellent IRC clients for mobile phones, like Colloquy on the iPhone, Yaaic for Android and wIRC for WebOS, but if you run them while you have a Screen session going, you're back to the same problem mentioned above where you wind up with a "WildBill|Phone" login. There simply had to be a better way.Is There a Better Way?
It turns out, after noodling around for a while one day, I did find a way. Irssi, the text-mode client I usually use via Screen and SSH, has a "proxy" (or "bouncer") mode where you can have it listen on a couple additional ports and then attach another IRC client to it. Enabling the proxy is relatively easy, and it can be done from within Irssi with only a few commands (assuming your Irssi is packaged and includes the proxy module). This also assumes you have Irssi already configured to work properly with whichever IRC networks you wish. Of course, substitute your own password for "mypassword", define whatever IRC networks you want to proxy with Irssi, and pick an arbitrary open port on which to have the proxy listen:
/LOAD proxy /SET irssiproxy_password mypassword /SET irssiproxy_ports linuxjournal=9000 /SAVE
Once you get the proxy module running successfully, connecting to it is as easy as pointing another IRC client at it. Just specify the fully qualified domain name of the host running your Irssi client in your second IRC client's configuration, and give it the password and ports you called out in the Irssi commands above. This client can be a "regular" desktop or laptop, or it can be a mobile device, such as an Android phone or an iPad running an IRC client.
Although this works just fine, it bothers me a little bit, as the password that's sent between the mobile device and your Irssi session that's running in Screen is sent in the clear. I'd much prefer that to be SSL-encrypted, so no one can intercept that password. Unfortunately, the Irssi proxy module doesn't support SSL, but there's a way around that through the use of the stunnel utility.
Stunnel is a generic encryption wrapper that's designed to add SSL encryption to any non-encrypted service. It's not hard to wrap the Irssi proxy service with stunnel. First, to prevent anyone on the outside from accessing the proxy without SSL, I bound the ports on the Irssi proxy to the loopback interface using the following Irssi command:
/SET irssiproxy_bind 127.0.0.1 /SAVE
Next, use your distribution's method for installing stunnel. On Ubuntu
10.04, a simple
sudo apt-get install stunnel4 took care of that. I
had to create a self-signed SSL certificate (see Resources
for a how-to on this), and I put that cert in /etc/stunnel. Next, I had
to create an /etc/stunnel/stunnel.conf that referred to the certificate
I created and specified the Irssi proxy in the stunnel.conf file. An
example follows below (adjust the file paths, "accept" IP address
and port as necessary):
; stunnel.conf code snippet ; Certificate/key is needed in server mode and optional in client mode cert = /etc/stunnel/cert.pem key = /etc/stunnel/key.pem [linuxjournal] accept=184.108.40.206:9000 connect=127.0.0.1:9000
So, what the previous code snippet does is specify the cert/key file for the self-signed SSL cert, then binds the SSL side of stunnel to the external IP address 220.127.116.11 on port 9000, and it'll hand off packets to my Irssi proxy running in the clear on 127.0.0.1 (localhost) on port 9000. The last adjustment to this setup would be to go to the mobile device and specify that the IRC connection should be SSL, and now I have a secure proxy I can attach to with any client of my choice. Now I can log in to IRC from my regular Irssi client, but then when I'm on my phone, I can use the friendlier interface that Colloquy provides, all without having different nicknames on IRC.Being "Pinged" and Getting Alerted
I still have a problem though. I still forget to log in to IRC and check my private messages—and some friends stack up many "pings" before they finally give up in frustration. I got to thinking and realized that since I'm on a mobile phone, it might be possible to send an e-mail to the SMS gateway my mobile provider runs when I get a PM. That'd give me a reminder to log in to IRC in the event that I forget. After searching the Internet for a bit, I discovered some other fellow had much the same idea. Michael Lustfield explains it on his blog in far more detail than I can put in this article (there's a link in the Resources section), but I'll summarize his technique here. He's got two Irssi scripts he uses: screen-away.pl monitors if there's an active connection to the Irssi proxy, and awayproxy.pl sends any highlights off to a designated e-mail address if there isn't an active client connected to the Irssi proxy.
Figure 1. Getting an SMS on WebOS
"But Bill...e-mail isn't an SMS!" You may think that, but just
about every mobile carrier can accept SMS messages for delivery to
a mobile phone via e-mail. In my case, I use AT&T, so any e-mail sent
to <myphonenumber>@txt.att.net will arrive as a text message on my
phone. So, all I have to do is drop Michael's scripts in my Irssi scripts
folder, adjust awayproxy.pl so that the
[email protected], and then activate both scripts from
within Irssi by doing a
/script load awayproxy.pl
screen-away.pl. Now, any mention of my name in any of the channels I
sit in will cause an SMS to be fired off to my phone, and I can log in
from my phone or tablet and jump into the conversation.
Figure 2. Jumping into the Conversation—Using wIRC on WebOSWe Can Rebuild It, We Have the Technology...
This solution, although totally usable, isn't quite as elegant as I'd like. My "main" tablet and phone are both iOS devices (iPad and iPhone, but let's not discuss my choice of mobile devices here), and Apple has a very clean, integrated push notification system. I started poking around to see if there was any way to send push messages to my iDevices rather than rely on SMS—that way my iPad would receive IRC "pings" as well.
It turns out, the Internet already had an answer for this problem as well. A fellow named Chris Jones already put together a patched version of Irssi and an Irssi script that does all the heavy lifting for this solution. His Web page (see Resources) talks all about the details on this and how to install it. He even mentions using Irssi with stunnel!
Figure 3. Getting a Push Notify on an iPhone
Figure 4. Looking at My Previous Notifications
In closing, utilizing this set of scripts has really brought IRC into the 21st century for me. I love the idea of IRC, but it shows a lack of mobility features due to its age. With this set of scripts and the right mobile tools, you can bring your IRC addiction up to date—and have it with you, anywhere you go!
Figure 5. Firing Up Colloquy to Join the ConversationResources
Irssi Proxy Documentation: http://www.irssi.org/documentation/proxy
Michael Lustfield's Irssi-to-SMS Plugin Use: http://michael.lustfield.net/content/irssi-sms
Chris Jones' Irssi Proxy and iPhone: http://www.tenshu.net/2010/12/old-and-new-mixing-irssi-and-iphones.html
Stunnel Home Page: http://www.stunnel.org
Generating a Self-Signed SSL Certificate: http://www.akadia.com/services/ssh_test_certificate.html
"Internet Relay Chat" by Jayson Broughton: http://www.linuxjournal.com/content/internet-relay-chat
"IRC, Still the Best Support Around" by Shawn Powers: http://www.linuxjournal.com/content/irc-still-best-support-around
Linux Journal IRC Channel: #linuxjournal on Freenode
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644913.39/warc/CC-MAIN-20230529205037-20230529235037-00715.warc.gz
|
CC-MAIN-2023-23
| 9,808 | 51 |
https://www.webmasterworld.com/forum40/437.htm
|
code
|
Welcome to WebmasterWorld Guest from 220.127.116.11
Forum Moderators: bakedjake
This is the same scenario as
after the last debacle, mail was down for a couple of weeks. The support droids were going to reimage the server but somehow managed to fix it without reimaging.
Here's what happened this time.
I did an apt-get install webmin which proceded to upgrade to the latest version. I did apt-get install webmin-mysql and all the other modules that I require.
I also did apt-get install webmin-procmail and procmail filter and this is what I think has screwed up qmail. It asked me a lot of questions such as 'is this an internet server answer 1-5 or x to restart'. I just took the defaults.
Now I have qmail "running" but any mail sent to @mydomain.co.uk is bouncing 550 saying relay not permitted.
ps aux ¦ grep qmail
root 242 0.0 0.2 1948 656? S 10:01 0:00 /usr/bin/tcpserver -H -R 0 pop-3 /usr/sbin/qmail-popup xxx.xxxx
internet.com /var/lib/vpopmail/bin/vchkpw /usr/sbin/qmail-pop3d Maildir
root 599 0.0 0.1 1184 272? S 10:01 0:00 supervise qmail-smtpd
root 601 0.0 0.1 1184 272? S 10:01 0:00 supervise qmail-send
qmaill 603 0.0 0.1 1204 316? S 10:01 0:00 multilog t ./main
qmails 605 0.0 0.1 1236 340? S 10:01 0:00 qmail-send
qmaill 610 0.0 0.1 1196 260? S 10:01 0:00 multilog t ./main
qmaill 611 0.0 0.1 1200 384? S 10:01 0:00 splogger qmail
root 612 0.0 0.1 1200 272? S 10:01 0:00 qmail-lspawn ¦dot-forward .forward?¦preline procmail
qmailr 613 0.0 0.1 1196 268? S 10:01 0:00 qmail-rspawn
qmailq 614 0.0 0.1 1192 292? S 10:01 0:00 qmail-clean
root 3260 0.0 0.1 1284 416 ttyp0 R 10:10 0:00 grep qmail
In the /var/log/qmail-smtpd/current file I got lots of tcpserver: fatal: unable to bind: address already used
But I don't know if they are recent or not because they are not timestamped.
Any ideas? I'm getting little support from the webhosters (again). Their attitude is "you broke it, you fix it"
How have you installed qmail? There might be something wrong with the packages. If you use qmail, you shouldn't have exim installed, in fact you should not be able to install it without removing qmail.
I tracked some dependencies (using "apt-cache show pkgname") and
webmin-procmail requires procmail
procmail recommends exim ¦ mail-transport-agent ¦ fetchmail
If I for example look at the postfix, exim or sendmail package, they have
satisfying procmail's requirement, but I cannot find any qmail related package in stable, testing or unstable that has that. I haven't seen the package generated from qmail-src, but if it hasn't got the above line, that is a problem.
Since Debian has tryed to install exim, it cannot see your qmail installation, and apparently assumes you haven't any mail-transport-agent installed. When you install something that requires an MTA, the default MTA (exim) is installed.
You need to sort out the qmail installation, so Debian is fully aware of what you have installed.
The webhosters said they "locked" it so that webmin wouldnt do it again, but it has!
Qmail was working fine. Haven't reinstalled it or upgraded it.
What I have done now is to remove exim. The problem I have now has changed from a 550 bounce to a "Sorry, no mailbox here by that name. (#5.1.1)"
The mailboxes should be a catch all one, and a postmaster one
e.g. [email protected] and [email protected]
Qmail must be working in the sense that it is receiving mail, but it doesn't know what to do with it. I think Vpopmail is being used to put it in the right queue?
syslog is now showing:
myhost qmail: 1046xxxxx.xxxx inf msg xxxxx: bytes 1535 from <[email protected]> qp xxxxx uid xx
...starting delivery to local [email protected]
....status: local 1/10 remote 0/20
....delivery 12: failure: Sorry, no_mailbox_here_by_that_name._(#5.1.1)/
You must have the original generated qmail package somewhere. If you are sure what configuration changes you have made to it, you could try to reinstall the package with "dpkg -i qmail.deb" or try to purge it completely before reinstalling, with "dpkg -P qmail".
either a) you used the qmail-src debian package which downloads the source, patches it, and compiles + installs it ( unlikely since it installed exim which should confilict with the package qmail-src makes
you download the qmail src and installed it.
But, did you make a fake qmail package? if not, then exim can be installed and muck up your mail.
So, when installing qmail from original sources, you must also make a fake qmail package that provides "qmail". The program to do this is called "equivs" ( apt-get install equivs ). Installing a fake qmail package, will prevent exim from being installed.
as for installing exim, and what it does, i think you should be back to normail if you check inetd that it isn't starting exim, and check
/usr/sbin/sendmail and /usr/lib/sendmail as they should both be symlinks
/usr/sbin/sendmail -> /var/qmail/bin/sendmail
/usr/lib/sendmail -> /var/qmail/bin/sendmail
I don't know if it is true or not. It is what the webhost support guys are telling me.
Anyway, no need to worry about this now. I got so cheesed off with the lack of support from the hosters that I've dumped them.
I still have that duff server working whilst the new server is configured. Mail is arriving but two things happen depending on who the mail is addressed to
1) [email protected] goes straight to the Linux mailbox - I can only read this now by typing MAIL on the console
2) [email protected] (including postmaster etc) fails, but somehow I have managed to get it to forward the fail message and the original message to [email protected]
I got my email client to connect retrieve mail from [email protected] and it works in the sense that I can see mail sent to the site (albeit as a forwarded bounced message).
But as I say, this problem has fixed itself by ditching the webhosters :-)
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648431.63/warc/CC-MAIN-20180323180932-20180323200932-00096.warc.gz
|
CC-MAIN-2018-13
| 5,873 | 59 |
https://azure.microsoft.com/tr-tr/resources/videos/azure-friday-azure-app-service-diagnostic-and-troubleshooting-experience/
|
code
|
Bu video Türkçe dilinde kullanılamaz. Bu video English (US) dilinde kullanılabilir.
Azure App Service Diagnostic and Troubleshooting Experience
Steve Ernst joins Scott Hanselman to introduce App Service diagnostics, which is the home for diagnosing and troubleshooting problems with your app. This intelligent service was built to diagnose many different problems and suggest targeted solutions for the customer.
For more information, see:
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487611641.26/warc/CC-MAIN-20210614074543-20210614104543-00218.warc.gz
|
CC-MAIN-2021-25
| 443 | 4 |
http://www.flashloaded.com/flashcomponents/various/
|
code
|
Creates simple Flash poll voting systems with a single question and multiple answers. Data is stored in an XML file, without the need for a database. Uses browser cookies and Flash's shared object to prevent voting more than once.
A highly flexible system for recording feedback from visitors to your websites. The component is deployed on the server side using PHP and MySQL with the resulting messages displayed within the Flash movie.
An easy to use, light weight Flash component that displays tweets from single or multiple Twitter feeds. It's fully customizable and skinnable. Includes auto scroll or built-in scrollbar and optional retweet button.
The Style Manager is a panel extension for Adobe/Macromedia Flash that allows you to create and then apply styles to text fields and movie clips. Consistent styling can easily be applied across any number of documents.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936463093.76/warc/CC-MAIN-20150226074103-00228-ip-10-28-5-156.ec2.internal.warc.gz
|
CC-MAIN-2015-11
| 872 | 4 |
http://forum.gsa-online.de/discussion/23418/any-good-open-source-php-web-based-linux-file-managers
|
code
|
Anyone else like re-inventing the wheel?
I once did, but I got sick of doing this. lol
If anyone knows of a freeware program that I can run on a linux server running PHP 5.x, if you don't mind sharing the name and a little bit about it, that would be great.
Features I would like concern batch file actions like mass CHMOD changes, mass filename changes, mass delete, etc.
Yes, you can write a script for each and every function you need. But playing with mass files means you can't make any errors, and writing a new script on-demand for each and every needed file action means you will eventually mess up one day when you are thinking of fifty eight other things. lol And then, a mass mess up! haha
Also, it's a waste of time doing this when you can use a GUI-based file manager.
(I know there's command line linux, but I need this is for servers/systems with "lite" plans and no prompt.)
Thank you, anyone!
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912205600.75/warc/CC-MAIN-20190326180238-20190326202238-00411.warc.gz
|
CC-MAIN-2019-13
| 909 | 8 |
https://community.cisco.com/t5/routing/otv-on-asr-fragmentation-not-working/m-p/3959887
|
code
|
I want to implement OTV in my network with the ASR routers. But as usual, I am testing and studying it in my VIRL lab first. First of all, there is no ASR in VIRL. I am using CSR instead. I am assuming that the behavior would be the same between the ASR and CSR.
Here is my config. Everything works except the fragmentation. My topology is super simple:
SW1 --- Gi3 CSR01 Gi2 --- Layer 2 switch --- Gi2 CSR02 Gi3 --- SW2
otv site bridge-domain 1 otv fragmentation join-interface GigabitEthernet2 otv site-identifier 1111.1111.1111 otv isis Overlay1 log-adjacency-changes all otv isis Site ! interface Overlay1 no ip address otv join-interface GigabitEthernet2 otv adjacency-server unicast-only service instance 3 ethernet encapsulation dot1q 3 bridge-domain 3 ! interface GigabitEthernet3 no ip address service instance 1 ethernet encapsulation untagged bridge-domain 1 ! service instance 3 ethernet encapsulation dot1q 3 bridge-domain 3 !
otv site bridge-domain 1 otv fragmentation join-interface GigabitEthernet2 otv site-identifier 2222.2222.2222 otv isis Overlay1 otv isis Site ! interface Overlay1 no ip address otv join-interface GigabitEthernet2 otv use-adjacency-server 18.104.22.168 unicast-only service instance 3 ethernet encapsulation dot1q 3 bridge-domain 3 ! interface GigabitEthernet3 description to iosvl2-2 service instance 1 ethernet encapsulation untagged bridge-domain 1 ! service instance 3 ethernet encapsulation dot1q 3 bridge-domain 3 !
The SW1 and SW2 just have a trunk port connected with the CSR routers. I created a vlan3 interface (10.0.3.1 and 10.0.3.2 on the two switches, respectively) for testing. Ping with 1458 works but not 1459.
iosvl2-1#ping 10.0.3.2 size 1458 re 5 Type escape sequence to abort. Sending 5, 1458-byte ICMP Echos to 10.0.3.2, timeout is 2 seconds: !!!!! Success rate is 100 percent (5/5), round-trip min/avg/max = 6/9/18 ms iosvl2-1#ping 10.0.3.2 size 1459 re 5 Type escape sequence to abort. Sending 5, 1459-byte ICMP Echos to 10.0.3.2, timeout is 2 seconds: ..... Success rate is 0 percent (0/5)
Where did I do it wrong? Is there any debug command that can help me troubleshoot this?
OTV has been introduced on Nexus NX-OS but it is supported on ASR 1000 too.
As a reference see the following document on ASR 1000 Fuji 16.9.x cfg of OTV
Indeed it is based on IS-IS protocol that thanks to its flexibility it used TLV (Type Length Value) it can be used to advertise MAC addresses and Vlans so it is a good protocol to interconnect few datacenters.
Overlay transport virtualization can use an IP4 unicast routed network or an IPv4 multicast routed network.
In case of use og IPv4 multicast SSM multicast is preferred.
see the following restrictions:
Configure the join interface and all Layer 3 interfaces that face the IP core between the OTV edge devices with the highest maximum transmission unit (MTU) size supported by the IP core. OTV sets the Don’t Fragment (DF) bit in the IP header for all OTV control and data packets so that the core cannot fragment these packets.
Ensure that PIM is not enabled on the join interface; enable only passive PIM on the join interface. Configure SSM for the OTV data group multicast address range by using the ip pim passive command.
To be honest I don't know if CSR in an emulated environment can support OTV.
However. OTV and fragmentation are not compatible also on real devices as explained so your results are to be considered normal behaviour and not the sign of a wrong configuration
Hope to help
However, as per this document, the fragmentation is supported on the ASR routers...
Some service providers are unwilling or unable to provide larger MTU values for their WAN circuits. If that is the case, the ASR 1000 router can perform fragmentation of the OTV transported data. The Nexus 7000 switch does not have this capability. Mixed ASR 1000 and Nexus 7000 OTV networks with fragmentation enabled on the ASR 1000 are not supported.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347406365.40/warc/CC-MAIN-20200529183529-20200529213529-00398.warc.gz
|
CC-MAIN-2020-24
| 3,938 | 21 |
https://community.nxp.com/thread/394520
|
code
|
Are there any sample applications to use the FTM module for other functionality like interrupt generation, input capture, output compare and external clock inputs? The only demo included in Kinetis SDK v2.0 is a very limited PWM application which doesn't help much with developing other timer applications.
Is FTM the right module to use for generating accurate delays in applications. Should I be looking at another timing module for this purpose (Sleep mode and energy consumption are not my current focus)? Which Kinetis timer system is preferred for use as the core of an RTOS?
Platform: I'm using the bare bones SDK with ARM GCC embedded from launchpad on OSX
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738735.44/warc/CC-MAIN-20200811055449-20200811085449-00431.warc.gz
|
CC-MAIN-2020-34
| 664 | 3 |
https://en.forums.wordpress.com/topic/can-someone-help-me-with-google-app-verification-for-email
|
code
|
Hey I signed up for google apps so I could use an email address for my website RatchetBrews.com
My domain name was purchased and website hosted through wordpress. Google gives me an html code to include for verification. I must not be doing it right because when I post it, it shows up as text on the page. Can someone help me through this. I read a few tutorials, but couldn't seem to wrap my head around it.
So, dumbing it down and assume I know nothing. How do I do this so I can use my email through google?
The blog I need help with is ratchetbrews.com.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123491.79/warc/CC-MAIN-20170423031203-00338-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 558 | 4 |
https://www.experts-exchange.com/questions/23135985/Ms-Access-Continuous-form-with-a-many-to-many-relationship.html
|
code
|
I have a form based on tblMain, it has a subform on it that is continuous based on tblCondition. Now I need to allow for each record in tblCondition to be able to have 'many' records in tblMeds. So would this be a continuous form on a continuous form? I know I can't put it in the detail section. But I was wondering since I am early in the deisgn phase, if there is another way I can structure this. Basically each person can have many conditions, and each of their conditions can have many medications.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221214713.45/warc/CC-MAIN-20180819070943-20180819090943-00418.warc.gz
|
CC-MAIN-2018-34
| 504 | 1 |
https://forum.espruino.com/conversations/365032/
|
code
|
So far Espruino has been awesome but as a beginner I have some issues wrapping my head around targeting the pins. In the documentation I can see
However there is no mention of the buildin led on the board. How can I select that?
Also I don't know how I can select the other pins for example S1 S2 EN and RX.
you should be able override it just like that var LED1 = NodeMCU.D2; to put NodeMCU.D2 on LED1 (or just any other (var) name). Since it is a pin, it 'understands' .set() and .reset() and all other pin related 'methods' as documented in https://www.espruino.com/Reference#Pin documentation. Since Espruino boards have the LEDs known and (may) preset pin mode, you may need to do that too with the assignment, such as pinMode(NodeMCU.D2,"output"). --- Let us know if it works... your board's built-in LWD - if there is one on any of the pins - or to which pin you will connect the LED w/ resistor - will define the code detail.
var LED1 = NodeMCU.D2;
I actually managed to get the built-in LED on with :
var led = NodeMCU.D4; // built-in LED
var state = true; // LED switched on by default
var duration = 500; // blink the LED every 500 ms
state = !state; // toggle LED state
Thank you so much for guiding me
...very self explanatory! Thanks for sharing.
Don't worry about formatting, just type in the text and we'll take care of making sense of it. We will auto-convert links, and if you put asterisks around words we will make them bold.
For a full reference visit the Markdown syntax.
© Espruino, powered by microcosm.
Report a problem
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510481.79/warc/CC-MAIN-20230929022639-20230929052639-00473.warc.gz
|
CC-MAIN-2023-40
| 1,545 | 16 |
https://about.viindoo.com/apps/app/15.0/to_approvals
|
code
|
|Read description for||v 13.0 v 14.0|
|Required Apps||Discuss (mail) Employees (hr)|
|Included Dependencies||Viin HR Base|
|Extensions||Recruitment Requests/Approvals Product Warehouses Distribution Request/Approval Overtime Approval HR Timesheet Approval Supply Approvals Maintenance Approval|
What it does
This module is a base for the development of other approval modules: Procurement approval, Maintenance approval, Timesheet approval, Overtime Approval
- Manager can create approval types with multiple approvers.
- Employee can create approval requests.
- Team leader can see the request of their own employees.
- Followers who are usual employees can only see the request.
- When the employee clicks the confirm button, a notification message will be sent to the next approver.
- Request approval will be reviewed and approved in sequence by those on the list of approvers
- Request approval is in accepted state if the number of approvers is equal to or greater than the minimum number of consents which must include those marked "required".
- Request approval is in decline if at least one person is marked "required" to reject, or the number of rejected votes is greater than the number reviewers minus the minimum
- When the request is done, a notification message will be sent to the employee who created it.
- If the request is refused, a notification message will be sent to the employee who created it.
- Community Edition
- Enterprise Edition
This software and associated files (the "Software") may only be used (executed, modified, executed after modifications) if you have purchased a valid license from the authors, typically via Odoo Apps, or if you have received a written agreement from the authors of the Software (see the COPYRIGHT file).
You may develop Odoo modules that use the Software as a library (typically by depending on it, importing it and using its resources), but without copying any source code or material from the Software. You may distribute those modules under the license of your choice, provided that this license is compatible with the terms of the Odoo Proprietary License (For example: LGPL, MIT, or proprietary licenses similar to this one).
It is forbidden to publish, distribute, sublicense, or sell copies of the Software or modified copies of the Software.
The above copyright notice and this permission notice must be included in all copies or substantial portions of the Software.
THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE SOFTWARE.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573104.24/warc/CC-MAIN-20220817183340-20220817213340-00459.warc.gz
|
CC-MAIN-2022-33
| 2,896 | 23 |
https://quickbooks.intuit.com/learn-support/forums/forumtopicprintpage/board-id/other-questions-uk/message-id/2329/print-single-message/true/page/1
|
code
|
Thanks for quick response!!
Let me brief you with the situation, we are having 10 users license for Quick Books Enterprise Solutions 14.0 (UK version); data file has been stored on server; data file size approximate 500 MB.
We are in service sector some of the services are taxable at flat 15% and rest exempted from VAT; apart from the VAT there is no any other tax and using Quick Books to raise invoices, to maintain AR, AP & expenses as well.
We are encountering an error i.e. at several occasion application is not responding or it will not allow to do anything to the user and forced to abort the program, that's why we are worried about company data file in case if something goes wrong.
We want to increase number of users from 10 to 15 and also to can we create year-wise data file for previous 4 years.
Kindly suggest us all the available option.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439740929.65/warc/CC-MAIN-20200815154632-20200815184632-00288.warc.gz
|
CC-MAIN-2020-34
| 856 | 6 |
https://truefair.news/
|
code
|
Analysis: President Biden's 6 Million popular vote difference. Where did it come from?
First off, How does one calculate the popular vote? The popular vote is calculated by the total vote difference between the 2 presidential candidates. The candidate with the most votes minus the votes of the other candidate gives you the actual number. There are 2 ways to increase the popular vote margins, the first, be popular across the country's 3000+ counties where the candidate adds a large number of smaller vote counts than the other candidate provided they also have the same appeal acro
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103347800.25/warc/CC-MAIN-20220628020322-20220628050322-00784.warc.gz
|
CC-MAIN-2022-27
| 585 | 2 |
https://shelomipriskila1995.medium.com/?source=user_followers_list-------------------------------------
|
code
|
Today heart failures are main issue among people, as a result of not following a healthy life styles. This is a project to predict if a patient is having a heart disease or not by considering several health factors.
The dataset is known as heart.csv downloaded from Kaggle. There are numerical and categorical values.
There are 13 features in it. They are
age : age in years
sex : 1 = male ; 0 = female
cp : chest pain type (0–3)
trestbps : resting blood pressure(in mm Hg on admission to the hospital
chol : serum cholestora…
AWS refers to Amazon Web Services and its a platform that provides solutions to anyone on a metered pay-as-you-go basis. In cloud computing anyone can access through a remote server. AWS services launched in 2002 and when it becomes 2019 it was able to provide more than 100 cloud services.
With the increase of computer power , accessing data has been increased gradually. Data scientists have to solve problems related to data science by using decision making process. So data science methodology is an iterative method that guides to the best solutions for the problems on data science.
1 . Business understanding
Data Science methodology begins with spending the time to seek clarification to attain what can be referred to as a business understanding. Having this understanding is placed at the beginning of the methodology because getting clarity around the problem to be solved allows to determine which data will…
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780055645.75/warc/CC-MAIN-20210917120628-20210917150628-00239.warc.gz
|
CC-MAIN-2021-39
| 1,454 | 12 |
https://www.functionrecords.com/product-tag/bundle/?add-to-cart=25627&add_to_wishlist=25630
|
code
|
tramadol and zolpidem
It is the largest music collection east of Raleigh. Self-funded employers who contract a TPA receive a monthly report detailing medical claims and pharmacy costs. Implicit in this is the right of men and women to be informed and to have access to safe, effective, affordable, and acceptable methods of family planning of their choice, as well as buy ambien online no rx other methods of their choice for regulation of fertility, which are not against the law, and the right of access to health care services that will enable women to go buy ambien online 2018 no prescription safely through buy ambien online no rx pregnancy and childbirth. Hydroxocobalamin has also been used in the treatment buy ambien online no rx of cyanide poisoning. AIDS experts point out that the ingredients of the anti-retroviral drugs are unlikely to cause the whoonga high and users may where can i buy zolpidem online be fooling themselves in that regard. Cheapest generic ultram online in usa They have deliberately converged their codes in recent buy ambien online no rx revisions so that the manuals are often broadly comparable, although significant differences remain. Feedback carburetors were mainly used because they were less expensive than fuel injection systems; they worked well enough to meet 1980s emissions requirements and were based on existing carburetor designs. There should be regular buy ambien online no rx internal evaluations. Alibaba offers several types of payment systems, including credit card, debit card, Alipay, Quick-pay, and online banking. Margaret Sanger and buy ambien online no rx elsewhere under Marie Stopes. The first freshman class for these campuses came in the fall of 2006, and both campuses now offer a selection of master's degree programs as well. RPM, speed buy ambien online no rx and other basic engine data. At the junction of two Roman roads, the town has developed into a transport hub over the centuries. There are attempts to introduce a category of relational disorder, where the diagnosis is of a relationship rather than on any one individual in that relationship. Every year, an annual event Ashwamedh is organized at the how to get ambien prescription educational complex. When allowed by law, abortion in the developed world is one of the safest procedures in medicine. MedPlus started selling private label products in 2010 under brand names EatRite for Food products, and Avelia and Urbania for personal care products. Although decay energy is sometimes buy ambien online no rx defined as associated with the difference between the mass of the parent nuclide products and the mass of the decay products, this is true only of rest mass measurements, where some energy has buy ambien online no rx been removed from the product system. Roger is frequently unfaithful to Mona, but after his heart attack in season one he appears to briefly re-devote himself to his family, ending his affair with Joan. Repetitive transcranial magnetic stimulation temporarily improves levodopa-induced dyskinesias. Two well known examples for those attacks are phishing and pharming. This approach has increased both the numbers of people entering the criminal justice system and how long they remain under correctional control. Kramer's voice, and that the right has coopted so skillfully. In contrast there were poets and painters who would contrast free young beauty of bodies in the water buy ambien online no rx with the approaching grind of maturity and responsibility. It is an equilateral triangle, at the base is a volcano between three castles, over buy cheap zolpidem 10mg no prescription which is a rainbow and the sun shining. Astin faced a maximum of 20 years in prison and a fine of up to $1 million on each count. Moshoeshoe II ambien prescription bottle returned from exile in 1992 as an ordinary citizen. It may influence pair-bonding in voles. The opioid epidemic is often discussed in terms of prevention, but helping those who are already addicts is talked ambien otc about less frequently. It also owns the total of French buy ambien online no rx dissertations in medicine and dental surgery and keeps one copy of each. Baltimore Street cheap ambien tablets online station of the Baltimore Light Rail system, which is at the eastern edge buy ambien online no rx of campus. A witness said a woman with two children in tow became upset with the way people were pushing in line. The roots of Merck reach back as far as the 17th century in Germany. Evidence is lacking on whether it does so in children under five years of age. The latter led to emergence of the worldwide entertainment industry. The patent for the drug combination is buy ambien online no rx owned by Gilead in some regions. Other drills such as drinking and under-mask decontamination are also practised. Almost all practitioners of Hinduism are found among the Indo-Surinamese population. The voluminous data produced by these databases enables detailed examination of behavioural factors that contribute to customer re-purchase intentions, consumer retention, loyalty and other behavioural intentions such as the willingness to provide positive referrals, become brand advocates or engage in customer citizenship activities. Like standard oil-tar creosote, it has a low amount of tar acids and tar bases, and has less antiseptic qualities. Resorptive poisoning by a large quantity of phenol can occur even with only a small area of skin, rapidly leading to paralysis of the buy ambien online no rx central nervous where to buy ambien online india system and a severe drop in body temperature. A potentiometer or a redox zolpiem new zealand indicator is usually used to determine the endpoint buy ambien online no rx of the titration, as when one of the constituents is the oxidizing agent potassium dichromate. the isolated ambien 10mg best price locations of some tribes make traveling to facilities far too difficult to travel the distance, hazardous roads, high rates of poverty mean less access to healthcare and means of transportation to get said health care, and too little staff in hospitals near reservations combined with the high numbers of patients with diabetes and extrarenal diabetic complications results in less availability for proper treatment. This disease takes two forms: We can't back down when someone disrespects us. For example, it is a main purification technique for removing organic impurities from bright nickel plating solutions. Senna derivatives are a type of stimulant laxative and are of the buy ambien online no rx anthraquinone type. While coverage of live events usually brings in the largest viewership counts, the recent popularization of streaming services has allowed individuals to broadcast their own gameplay independent of such events as well. However, unlike today's electrically powered fuel injection systems, the 300 SL's mechanical fuel pump would continue to inject gasoline into the engine Purchase generic adipex 37.5mg in canada during the interval between shutting off the ignition and buy ambien online no rx the engine's coming to a stop; this unburned gasoline washed lubricating oil from the cylinder walls, which not only left them unprotected in affected areas during start-up but would dilute the engine's entire oil supply if the car was not driven buy ambien online no rx hard or long enough to reach a sufficient temperature to evaporate the gas out of the oil. When added to plastics, phthalates allow the long polyvinyl molecules to slide against one another. adhesion. The purpose of these seals is to increase the confidence of buy ambien online no rx online shoppers. The abdomen of an earthworm of the L. One 2017 review found evidence of benefit from low-quality studies. Side effect management is an important part of TRC, as side effects are a large contributor to patients not complying with their drug regimens.
Tramadol online pharmacy overnight shipping Lorazepam 5 mg dosage Carisoprodol new york Cheapest generic klonopin with prescription
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668712.57/warc/CC-MAIN-20191115195132-20191115223132-00443.warc.gz
|
CC-MAIN-2019-47
| 8,054 | 3 |
https://www.opcdatahub.com/Docs/re-reservedwords.html
|
code
|
— a table.
The following table provides a list of words
which are reserved by the Gamma language. No symbols can be
defined by the user that are identical to these reserved words.
Table 10. Words reserved in Gamma
Copyright © 1995-2010 by Cogent Real-Time Systems, Inc. All rights reserved.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646350.59/warc/CC-MAIN-20230610200654-20230610230654-00650.warc.gz
|
CC-MAIN-2023-23
| 293 | 6 |
http://www.donationcoder.com/forum/index.php?topic=23890.0
|
code
|
I've attempted to fix this problem by scanning the boards for related issues, and I found two... the "space issue", and the "execution style issue". Neither fix appears to work. The problem is the following: I have a spreadsheet file (.xls) that I can double-click in explorer and launch successfully. If I search for it in FARR and hit enter, since its the first match, FARR closes, and does nothing. I've attempted to change the execution method (through preferences->general->use document launcher help utility and its options) and neither work. I've also checked for spaces before and after the filename, and it doesn't have any. Also, if I right-click the file and try properties or "shell context menu", I can't get either to pop up. Is there a directory size limit to the match? I'm using a document under the start menu in Windows 7, which is buried quite deep directory-structure wise.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823550.42/warc/CC-MAIN-20181211015030-20181211040530-00192.warc.gz
|
CC-MAIN-2018-51
| 894 | 1 |
http://www.digimongames.me/game/digimon_7.html
|
code
|
How to play:
Player one: AD keyboard keys to move around, J key attack, K key to jump (which can be two-hop / animal power jump);
Player 2: ? ? arrow keys to move around, a key attack, two key jump (to two hops / animal power jump).
Gold studio summer special masterpiece "Digimon 7" back all the faithful of the players, this is a very interesting game, let you in this summer with a small partner to accompany the digital world adventure, go and try it!
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823630.63/warc/CC-MAIN-20171020025810-20171020045810-00692.warc.gz
|
CC-MAIN-2017-43
| 455 | 4 |
https://whitneyibeblog.wordpress.com/2021/01/04/focus-to-the-point-of-obsession/
|
code
|
Focus. Focus. Focus. To the point of obsession this 2021.
Make using world-class language your top goal. With all the turbulence that 2020 brought, it wouldn’t be out of place to get disconnected from your #mission, #vision, values and even #goals.
The harsh yet painful fact is that….
Read more 👉https://whitneyibeblog.com/focus-to-the-point-of-obsession/
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571483.70/warc/CC-MAIN-20220811164257-20220811194257-00450.warc.gz
|
CC-MAIN-2022-33
| 363 | 4 |
https://sta.laits.utexas.edu/blog/2022/01/24/germanic-studies-flyer-and-graphics/
|
code
|
Germanic Studies Flyers
Happy new year!!! I know January is almost over but here’s to hoping that the rest of the year brings great things to us all 🙂 In other news, let me tell you about this project…
Project: Germanic Studies Flyer
Client: Dr. Hans C. Boas
Completion Status: In progress…
Staff Guidance: Suloni Robertson, and Abriella Corker
STA Team Members: Cristina (t’is I), and during my winter break absence, Abriella Corker
Description/Plans: To design a unified flier that explains to UG students what is needed to get a German certificate and/or a German major.
So, first things first, I started out the project back in December (pre winter break), by proposing a few design ideas like colors, fonts and mockups to define a style, and send those out to get feedback and also have Dr. Boas answer additional questions I had.
These are a few examples of what I ideated:
As I waited for a response, I started drafting some ideas of what I thought the format could look like.
Afterwards I had to leave for the winter break, so Abriella took over the project…
Eventually, with the support of Suloni and others in our daily check-in meetings (brought to us by the Omicron variant therefore having to revert to remote work mode), I was able to play around with the colors and style a bit more.
Moving on, I sent two of the previous styles to Dr. Boas, and now I’m awaiting feedback. I’ll keep you up to date with this project as soon as possible….
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816863.40/warc/CC-MAIN-20240414002233-20240414032233-00491.warc.gz
|
CC-MAIN-2024-18
| 1,471 | 14 |
https://knowledge.kofax.com/MFD_Productivity/Power_PDF/Troubleshooting/Error_finding_WINWORD.EXE_when_trying_to_convert_a_PDF_to_Word_using_Power_PDF
|
code
|
Error finding WINWORD.EXE when trying to convert a PDF to Word using Power PDF
Errror finding WINWORD.EXE when trying to convert a PDF to Word using Power PDF. The document does convert to MS Word, but when the program tries to launch Word, it puts up the following error:
Windows cannot find "C:\Program Files\Microsoft Office 15\root\office 15\WINWORD.exe".
Make sure you type the name correctly, and try again.
PowerPDF reads this registry key when it goes to launch MS word: HKClassesRoot\Word.Document.12\shell\Open\command\(Default)
For example, on a workstation which is running office 365, here is the value in this key:
Windows Registry Editor Version 5.00
@="\"C:\\Program Files (x86)\\Microsoft Office\\Root\\Office16\\WINWORD.EXE\" /n \"%1\" /o \"%u\""
Please have the client correct this registry key everything should work fine.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499816.79/warc/CC-MAIN-20230130101912-20230130131912-00408.warc.gz
|
CC-MAIN-2023-06
| 842 | 9 |
https://help.givegetgigs.com/article/42-how-to-get-job-leads
|
code
|
How to turn jobs you don’t want into leads
When you are communicating with a potential client, and it looks like his job/project is not going to work for you, you can say something like: I don’t think it’s for me. Let me know if you want me to recommend someone
In most cases, the client will say something like: Yes, please, that will be helpful
Then you can ask a few more questions about the gig, approximate pay, etc., and tell the client: If I have someone interested, he’ll email you directly.
That’s it! Just copy and paste the email thread.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499891.42/warc/CC-MAIN-20230131222253-20230201012253-00747.warc.gz
|
CC-MAIN-2023-06
| 558 | 5 |
http://forums.wolfram.com/mathgroup/archive/2009/Jun/msg00542.html
|
code
|
Restrictions for J/Link-ed Programs?
- To: mathgroup at smc.vnet.net
- Subject: [mg100887] Restrictions for J/Link-ed Programs?
- From: Christian Staudt <christian.staudt at ira.uka.de>
- Date: Wed, 17 Jun 2009 04:38:04 -0400 (EDT)
Hi MathGroup, I would like to use Mathematica with J/Link as a frontend and plotting environment for a computing-intensive benchmark written in Java. Unfortunately, I ran into the following two (related?) problems: a) As soon as the memory footprint of the Java process reaches about 260 MB (on my Macbook) or about 320 MB (on my Linux machine), it grinds to a halt. Apparently, the memory footprint is not allowed to increase any further, so the garbage collector goes out of its way to free memory - but will eventually fail with a "GC overhead exceeded" exception. This happens only if the program is called with J/Link. Called from the command line, it runs normally since it is allowed to use more memory. I tried to pass e.g. "java -Xmx2000m ..." as an Argument to ReinstallJava[CommandLine->...], but Mathematica seems to ignore or override the -Xmx option. b) The benchmark uses the linear program solver Cplex, which needs to communicate with a license token server in order to work. Again, it runs just fine from the command line, but not with J/Link. The communication with the license server fails with a timeout. My guess is that Mathematica puts restrictions on the linked program for security reasons or similar - affecting memory usage (a) and network communication (b). I could not find information on this on the web. Is my guess correct? If yes, how can these restrictions be removed? If I cannot solve this I have to do a laborious workaround, calling the Java program via Run ... so quick help would be very much appreciated. Thank you! Greetings, Christian
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400232211.54/warc/CC-MAIN-20200926004805-20200926034805-00595.warc.gz
|
CC-MAIN-2020-40
| 1,810 | 6 |
https://github.com/kku1993
|
code
|
Create your own GitHub profile
Sign up for your own profile on GitHub, the best place to host code, manage projects, and build software alongside 31 million developers.Sign up
Indoor Navigation Using Beacons
Forked from ispc/ispc
Intel SPMD Program Compiler
Web Interface to Visualize ISPC Program Performance
Forked from ACMCMU/BoredPrototype
A not-so-boring school project. Original version: http://tinyurl.com/cmuboredcast ... See below for prototype.
A mobile application suite for roommates.
For ACM Crash Course
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247484689.3/warc/CC-MAIN-20190218053920-20190218075920-00526.warc.gz
|
CC-MAIN-2019-09
| 517 | 10 |
https://discourse.threejs.org/t/seeking-for-three-js-developer-in-warsaw-poland/56520
|
code
|
Looking for an experienced Three.js developer with an Angular knowledge in Warsaw, Poland.
Long-term, all the benefits and a high salary.
It’s not the best description of the position, but please check it out.
Please write to my mail if you need more info: [email protected]
As a professional 3D Website Developer with 8+ years of experience, I am interested in this job position so I would like to work with you.
In the past, I have developed several 3D Virtual Tour , 3D Interactive WebSites, 3D Metaverse using WebGL/ Three.js, so I’m confident in such projects.
Please check my portfolio and previous projects.
In the past , I have worked as a full stack 3D developer (three.js /webGL developer) in several IT companies as a part of the development team and during that time, I have gained extensive experience in developing complex 3D web applications using Three.js/ WEbGl/ React.js/Vue.js
My main 3D skills are creating 3D interactive animations, 3D Product Configurator, 3D web games and other 3d web apps using Three.js ,R3F, Next.js and Vue.js
I hope that you’ll find my experience, interests, and character intriguing enough to warrant a face-to-face meeting. I am confident that I could provide value to you and your customers as a member of your team.
I promise to keep good communication and high quality work, instant update.
I would like to discuss further, I am ready to start working right now.
Thank you .
This topic was automatically closed after 30 days. New replies are no longer allowed.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100258.29/warc/CC-MAIN-20231130225634-20231201015634-00696.warc.gz
|
CC-MAIN-2023-50
| 1,516 | 14 |
http://www.syllixmusic.com/
|
code
|
NEW REMIX - Angels In Paradise (Angel Island & Azure Lake) This is my submission for the first round of the 2014 Sonic Zone ReMix Competition. The two sources in this remix are Angel Island Zone (Sonic 3) and Azure Lake (Sonic 3).
JANUARY 22, 2014
NEW TUTORIAL - Using Reverb as a Send Effect In this short video I explain the reasons why I prefer using reverb as a send effect rather than a direct insert. Although I specifically am using Logic Pro X, the same fundamental idea applies to all DAWs.
JANUARY 5, 2014
NEW VIDEO - Music Production Screencast #1 Welcome to the first edition of my music production screencast series! The main purpose of this video and the continued series are to help you folks out with music production, and to also show you how I work. If you like this kind of thing and feel these screencasts are helpful, let me know.
JANUARY 1, 2014
NEW VIDEO - Preview: Glitch Audio Music Production Screencast In this video I give a brief overview of what I'll be producing in an upcoming music production screencast I plan on making. I want this to turn into a series where every week or so I do a screen capture of me producing some music. I'm hoping this will be a new way to teach you guys about music production in a different format than the standard tutorial (I still plan on making tutorials though). The screencasts will just be production - there will be no commentary. Hopefully it will be received well.
Happy New Year everyone! :D
DECEMBER 19, 2013
NEW TUTORIAL - Logic's New EQ (Logic Pro X Update 10.0.5) Logic Pro just released update 10.0.5 and in addition to tons of bug fixes and improvements came a new EQ! In this video I show off some of the new features of the Channel EQ as well as explain some of the more convoluted parameters it now has.
Harmony (March 2013) Available for download / pay-what-you-want on Bandcamp)
Tranquility EP (December 1, 2012) Available for download / pay-what-you-want on Bandcamp)
This is here for those who'd like to donate a few dollars or buy me a coffee :)
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999654613/warc/CC-MAIN-20140305060734-00012-ip-10-183-142-35.ec2.internal.warc.gz
|
CC-MAIN-2014-10
| 2,031 | 13 |
https://jobs.yolo-india.com/job/new-comment-by-titanlegering-in-ask-hn-who-is-hiring-november-2023/?id=https%3A//news.ycombinator.com/item%3Fid%3D38219380
|
code
|
New comment by titanlegering in "Ask HN: Who is hiring? (November 2023)"
Original link: https://news.ycombinator.com/item?id=38219380
DATA ENGINEERING, Data DevOps, Data Mesh core platform | Aira Home Energy | Sweden - Stockholm | Full time Employment
Want to make your cloud data engineering hours matter for the planet, not only sales?
Does it make you excited to see real hardware, mechanical & on-board software stuff lyiung around next to your desk, where you code your modern cloud data stack things?
Do you want to be in a start-up that is already operational, with strong financial backing and scaling up?
Do you want to join our core data team where we build the data platform for this growing and evolving business to act on, in a data mesh-inspired fashion, using all the best practices we can distill from this very experienced data & analytics engineering team?
Are you comfortable hands-on with a few things like GCP, AWS, Python, Terraform, CICD, data movement & job orchestration tools, streaming data ingest, data infrastructure, data security, data transformation and processing?
Or is this a friend of yours we are talking about? Or you, in the future?
In any case, go ahead and check out the positions we are looking to fill:
Analytics engineer: https://app.teamtailor.com/companies/boeOAWhya8s/jobs/330286...
This position will be mainly on-site in Stockholm, Sweden. Nice central location and an inspiring culture.
- Climate tech company, dedicated to replacing fossil fuel with heat pumps and other smart climate tech for residential home heating
- Behind the hardware offering, there is data and software engineering all over the value chain for us to be part of with data
- Current consumer offering live in Italy, Germany, UK
- Head office in Stockholm
- Initially funded by Vargas Holding, after that a recent round closed, more info: https://www.airahome.com/news/clean-energy-tech-champion-air...
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679103558.93/warc/CC-MAIN-20231211045204-20231211075204-00417.warc.gz
|
CC-MAIN-2023-50
| 1,925 | 17 |
https://vincenttam.github.io/blog/2014/01/26/working-with-vims-autocommand-groups/
|
code
|
Before including the autocommand group, I’d write about the reason of using it.
In my post titled Links to Good Posts, I’ve included some
custom autocompletion keyboard mappings for the automatic completion
() blocks in my VIMRC file.
Last Thursday, I extended them to blocks enclosed by single or double quotes.
1 2 3 4
How can Vim do the same type of job for angled block for HTML files only?
It is possible that you can find the
< character in $\rm \LaTeX$
source files which contains an inequality. In this case, we don’t
> character to be Automatically inserted to the right-hand
side of the
< character. Therefore, we need to enable this
completion only for the files with the right extension name(s).
From some web pages that include some autocommands that deal with some
specific type(s) of files, one can easily learn what to do, instead of
reading the long Reference Manual. The events needed are
1 2 3 4 5 6
At line 2, I initially tried using a whitespace character to separate
the two extension names. After that, I tried to edit an HTML file with
:e testing.html, but the autocompletion didn’t work. For
:e testing.htm, Vim threw me an error. It took me a
short while to figure out that commas should be used instead of
whitespaces. I know that the problem can be beautifully solved by
using regular expressions, but I’m not sure if
.htm[l] is correct,
and I lack time to test it. I’d like to insert an angled block with
empty content, but after I inserted the string
<> into my VIMRC
file, the syntax highlighter of Vim told me that Vim perceived the
empty angled block as the surrounding parts of a literal string which
represents a keystroke. To solve this problem, I inserted the literal
string that represents a
<Left> key followed by a
inside the originally empty angled block
<>. This is what you can
see at line 87. With the aid of the syntax highlighter of Vim, the new
autocommand has “revealed its colour” in my VIMRC, indicating the
success of this change.
Despite the uselessness of this autocommand, I thought I had found out
a way to switch Vim’s spell check on for $\rm \LaTeX$ source files.
However, moved to a buffer for $\rm \LaTeX$ source files to another
buffer for an HTML file, I discovered that the
spell option is
still on, which is not desired for editing an HTML file.
Fortunately, I succeeded in finding the correct autocommand
P.S. While writing HTML code in Vim, if you need to include the
character, you can record the encoded string of this character into a
l, which stands for “less than”) To use the
<C-r> in the insert mode first. Then input the name
of the register. (a lowercase alphabet) In addition, I use the
register for inserting a hyperlink which opens the target in a new
tabbed page in an HTML file.
(Last edited on FEB 3, 2014)
It seems that what I need is the
1 2 3 4 5
(Added on DEC 13, 2014)
Posted via UltraBlog.vim.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526506.44/warc/CC-MAIN-20190720091347-20190720113347-00116.warc.gz
|
CC-MAIN-2019-30
| 2,901 | 58 |
https://jobs.servicefinder.am/application/detail/91552
|
code
|
Development Manager at Alcumus () (allows remote)
Type: Full Time
Created: 2021-04-24 05:00:50
Alcumus is the UK’s market-leading provider of technology led compliance and risk management solutions, our purpose is to help organizations be safer, healthier, and stronger.
eCompliance and ContractorCheck as North America's extension to Alcumus:
eCompliance is the #1 software solution for improving worker participation in safety activities across blue collar industries. With a mission to eliminate 1 million workplace incidents, we are the fastest growing company keeping everyday people safe on the job each and every day. We are committed to developing an awesome product that makes an impact on the lives of others, wow-ing our customers, and creating a world-class company culture.
ContractorCheck is an innovative software company. As an independent third-party, ContractorCheck provides contractor management and compliance for clients and awards health and safety pre-qualification accreditation to contractors across Canada. With a mission to be the risk management company most committed to its innovation, people, and dedication to client service. Our people feel a strong sense of purpose by keeping other people safe. At ContractorCheck, we want you to enjoy coming to work so we are dedicated to building a fun and inclusive company culture.
Upholding the Company Values
Know your stuff -Ensure you have the technical know how you need. Keep building and improving on it every day.
Be brave -Speak up, find a way and dare to try. Take accountability for the part you play.
Be a team player -Be inclusive, both within your immediate team and across the business. Help your stakeholders to achieve their potential.
Enjoy the journey -Work hard, keep perspective and have fun along the way. Take a positive and constructive outlook to help drive change.
This is a great opportunity to join a growing software development company. You will have the best of both worlds: join a software company that has a real product, real customers, growing revenue and a rock-solid financial picture, and have the opportunity to work for a cool technology company with tons of growth potential. Our office is that perfect mix of urban cool and industrial chic. As a Development Manager, you will inspire your team to be their best for a product that will make organizations Safer, Healthier, and Stronger.
Here’s what you will be doing:
- Build high quality, globally available, fault-tolerant systems and products
- Work on problems with your team, roll up your sleeves, form an opinion and advocate for engineering-specific roadmap items
- Work with product, UX, Data and other disciplines to discover the best solutions for our merchants
- Be a technical influencer across the company. Provide technical direction through technical design reviews, GitHub pull requests, and pair programming
- Grow the team both through internal development and helping with external hiring
- Advocate for quick iterative development accompanied by experimentation analysis
- Has 5+ years and proven technical leadership skills working with complex software systems with a common framework (.Net, Java, NodeJS, etc)
- Has direct experience working to build a software product in an agile methodology
- Has proven senior leadership skills
- Has experience building and successfully growing successful and high-performance software teams
- Drives personal and team delivery of technical excellence and results, backed by data
- Effective at communicating and explaining complex systems
- Demonstrated skill in coaching and mentorship via code review and other processes
- Personal project work that is online, or available via github, or other activity supporting the software ecosystem (ex: meetups, StackOverflow participation, etc)
- Experience working with micro-services infrastructure supporting a software Product
- Experience working with Big Data technology: kafka, redshift, etc, and BI/Reporting Solutions using Looker
- Excellent communication and team skills (remote working experience).
- Excellent knowledge of agile software development practices, and examples of providing leadership in supporting these practices in the workplace
***Option to work fully remote anywhere in Canada/US. You must be legally entitled to work in Canada/US.
The Alcumus Advantage
At Alcumus we encourage inclusiveness, purpose and innovation. We offer flexible work hours, birthdays off, bi-weekly lunch, team socials, happy hours and career progression in a high growth environment.
Due to COVID-19 the Alcumus team is currently working from home. We have the tools, instruction and a brilliant team to set you up for work from home success!
The typical recruitment process for shortlisted candidates will be an initial conversation with the recruitment team followed by two/three stages of interviews.
These may take place via telephone, Microsoft Teams or face to face. Please be advised that only those candidates selected for interviews will be contacted.
References will be requested for those candidates selected in the final interview stage.
Equal Employment Opportunity
Alcumus is an equal opportunity workplace. All candidates will be afforded equal opportunity through the recruiting process. We do not discriminate against any employee or applicant for employment because of race, color, sex, age, national origin, religion, sexual orientation, disability, gender identity and/or expression. We are dedicated to growing a diverse team of highly talented individuals and creating an inclusive environment where everyone feels empowered to bring their authentic selves to work.
If you are contacted for an interview and require accommodation during the interviewing process, please let us know.
If you want to join a company that strives for a mission, purpose and making an impact in the lives of others, we encourage you to apply today.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363510.40/warc/CC-MAIN-20211208114112-20211208144112-00259.warc.gz
|
CC-MAIN-2021-49
| 5,927 | 43 |
https://www.gridgain.com/products/software/control-center
|
code
|
GridGain Control Center is a comprehensive cluster management and developer tool for GridGain® and Apache Ignite®. It is available as a free hosted GridGain Control Center SaaS solution or as a paid on-premises tool. A free, 2-node version of the on-premises GridGain Control Center is available for development use and for evaluation by DevOps and operations professionals considering the on-premises version for production environments. Control Center supports GridGain 8.7.18+ and Apache Ignite 2.8.1+ (requires installation of the Control Center Agent).
Customizable, Intuitive Dashboard
Control Center features a flexible, user-configurable dashboard. The dashboard provides a visual view of the cluster status and tools for managing cluster behavior. The drag-and-drop interface allows you to monitor any of 200+ OpenCensus-based metrics. Multiple data visualization options like charts, graphs, and heat maps make it easy to understand the current status of your clusters.
User-Defined Production Alerts
Easily configured production alerts enable you to quickly identify and resolve production issues. Custom alerts can be created for any tracked metric by setting the conditions and threshold. Alerts have multiple notification options available including SMS, email, and within Control Center.
Query Development Tools
Control Center helps developers accelerate query development. A comprehensive SQL editor provides code completion, validation, and syntax highlighting during query development and execution. You can browse the database tree to understand schema and table relationships. You can also monitor running queries and analyze query execution statistics to fine tune query development and maximize performance. All clusters, caches and schemas can be displayed in real-time to speed query development and optimization.
Active Tracing and Root Cause Analysis
Control Center provides active tracing based on the OpenCensus standard which visualizes API calls as they execute across the nodes of the cluster. Tracing improves understanding of GridGain and Ignite processes and accelerates root cause analysis when a problem occurs. Control Center provides insights into stack traces, execution timings, thread details, logs and more.
Disaster Recovery and Backup Management
Control Center allows you to define and manage full, incremental, and continuous snapshots for cluster backup and recovery when used with the GridGain Ultimate Edition. You can validate the integrity of your backups and check the current status of backup operations. If you experience data loss, you can restore cluster environments to a previous point in time with a few clicks.
Monitor Rolling Upgrades and Cluster Rebalancing
Control Center enables you to view the status of cluster upgrades when using the Rolling Upgrades feature in GridGain Enterprise or Ultimate Edition. It also provides a view of the status of data rebalancing when new nodes are added to your cluster. Problematic nodes are easily identified and isolated.
Simple Configuration of Apache Ignite Clusters in Control Center
You can easily setup the Control Center monitoring agent and securely monitor multiple GridGain and Ignite clusters simultaneously and across multiple versions. The Control Center agent is available for free on the GridGain Downloads page. Configuration instructions for deploying the agent and connecting to your cluster are available in the tool.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988831.77/warc/CC-MAIN-20210508001259-20210508031259-00370.warc.gz
|
CC-MAIN-2021-21
| 3,438 | 15 |
https://www.programmableweb.com/api/tomtom-extended-search
|
code
|
The TomTom Extended Search API provides EV charging station availability information. This includes the number of charging spots that are available, occupied, reserved, of unknown availability, or out of service. Updates are typically provided within minutes. The API can respond in either JSON or XML format. Developers will need an API key.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103945490.54/warc/CC-MAIN-20220701185955-20220701215955-00182.warc.gz
|
CC-MAIN-2022-27
| 342 | 1 |
https://www.macupdate.com/app/mac/30806/safari-4-modifier
|
code
|
Safari 4 Modifier... I have to set up quite a few Macs, and as I got tired of always using the terminal to change the hidden preferences of Safari 4 I wrote a quick app using REALbasic to make life easier for me. As others might find it useful too I decided to put it out into the wild - but please be aware that you are using it at your own risk. The app is doing the same thing that the terminal commands are doing so nothing should go haywire.
What's new in Safari 4 Modifier
S4M could get trapped in an error loop if the unix shell (for whatever reason) cannot execute the given commands
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370503664.38/warc/CC-MAIN-20200331181930-20200331211930-00198.warc.gz
|
CC-MAIN-2020-16
| 591 | 3 |
https://www.tr.freelancer.com/projects/data-processing-data-entry/need-guest-blog-post/
|
code
|
i need only 5 guest post with in 2 days,can any one experienced to do it.i need a perfect one.
i will provide you all details as like (article,website url,keyword etc).remember i need only 5 published link not more,budget is [url removed, login to view] happy bidding.
7 freelancers are bidding on average $34 for this job
hi, I'll be happy if you choose me to write the posts. I'm very accurate and considerate. It's my first bid - so I hope luck is on my side!
Hi, I would like to apply to this project. I'm into blogging. I can provide you my sample works if you like. 'Looking forward for a partnership with you. Thank you.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948616132.89/warc/CC-MAIN-20171218122309-20171218144309-00396.warc.gz
|
CC-MAIN-2017-51
| 627 | 5 |
http://www.fluidinteractive.com/software/frame-simulator/
|
code
|
NEW!! Frame Simulator 2 for Mac OS X is out!
Frame Simulator, together with Frame Composer, makes windows and doors transmittance computation (applying UNI-EN ISO 10077-1 and 10077-2) an extremely easy process. With few and simple steps you will be able to apply finite elements method without the need to know anything about the theory behind it.
Frame Simulator Viewer is completely free; you can open and explore any project created with Frame Simulator.
Here you are some examples of slide shows created with Frame Simulator:
After downloading the files above, please open them with Frame Simulator Viewer.
Window Transmittance and ISO 10077
Here you are a list of the main features of Frame Simulator, the ideal tool for window transmittance computation:
- get extremely accurate results with few and simple operations for every kind of frame; you don’t need to know anything about UNI EN ISO 10077;
- use finite elements methods without real efforts; the mathematical model is completely hidden to the user;
- foresee thermal behaviour of frames before producing a prototype;
- analyze and discover weak points of frames through heat flow visualization;
- import projects created with other software;
- send stunning presentations to your clients thanks to the newest features.
EN ISO 10077-2 (2012)
Frame Simulator is certified according to EN ISO 10077-2 norm. Here you are the certification, with all the relative test projects:
Create your own slide shows!
You will be able to create real slide shows of your projects: simple “record” some screenshots and Frame Simulator will automatically generate an animation. To distribute it, for example, to some clients, is immediate: you just have to make them open your projects, containing the presentation, with the “Viewer” version of the software. This version is completely free and time unlimited, but it can just view files and not modify them.
You’ll find much more videos at our YouTube channel
Fully customizable print report
Forget the old reports: now you can modify and customize reports as you wish. You’ll have an internal editor (similar to the ones you’re familiar with) to define every single detail you want to print. It is even possible to save reports i various file formats (also html, readable by any computer). You’ll be able to insert various kinds of labels, adding more information; it is a key point for a complete documentation.
Frame Simulator is distributed by Dartwin; please visit www.framesimulator.com for more information.
Together with Frame Simulator, we’ll give you for free Frame Composer, useful to compose frames and systems of windows and doors with closures and courtains. Frame Composer can also be purchased alone; please go to Frame Composer’s page for more information.
Two years of hard work gave life to Frame Simulator version 2; lots of new features have been added and improved the existing ones, keeping the ease of used tipical of this product.
The number of news is so large that we can just show you some examples; here you are the complete list of Frame Simulator tutorials, useful to have an idea of its potential:
- Tutorial 1: a very simple project
This tutorial shows you some of the main features of Frame Simulator. It points out how simple it is to compute transmittance of a window frame;
- Tutorial 2: segment materials
Materials can now be set also on segments; this tutorial shows how to set reduced emissivity on cavities of an aluminium frame;
- Tutorial 3: labels
This is an example of how to add various kinds of labels to your projects;
- Tutorial 4: views
Learn how you can record views and create beatiful slide shows of you projects;
- Tutorial 5: gas material
This is an example of how gas material has to be used when simulating glazings;
- Tutorial 6: linear thermal transmittance
Since version 2 linear thermal transmittance computation becomes extremely simple; this tutorial shows you how to get it;
- Tutorial 7: transparent material
This tutorial shows how useful transparent material can be when simulating roller shutter boxes.
Here you are a list of blog articles about Frame Simulator:
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698017611/warc/CC-MAIN-20130516095337-00063-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 4,149 | 39 |
https://www.fwusy.net/bluehost-youtube-tutorial/
|
code
|
Bluehost Youtube Tutorial
Locating a top quality economical webhosting supplier isn’t very easy. Every site will have different demands from a host. Plus, you need to compare all the functions of a hosting firm, all while seeking the best deal possible.
This can be a whole lot to type via, specifically if this is your very first time purchasing hosting, or constructing a site.
A lot of hosts will provide extremely economical initial prices, just to increase those rates 2 or 3 times greater once your initial contact is up. Some hosts will offer free bonus offers when you subscribe, such as a free domain name, or a free SSL certification.
While some hosts will certainly be able to offer far better efficiency and high degrees of security. Bluehost Youtube Tutorial
Listed below we dive deep into the very best cheap host plan there. You’ll learn what core holding functions are vital in a host and also exactly how to evaluate your very own hosting requirements to make sure that you can select from among the very best economical hosting carriers listed below.
Disclosure: When you buy a host plan through links on this web page, we gain some compensation. This helps us to maintain this website running. There are no extra prices to you whatsoever by using our web links. The listed here is of the best cheap web hosting packages that I have actually directly used and evaluated.
What We Take into consideration To Be Economical Webhosting When we explain a web hosting plan as being “Low-cost” or “Budget” what we indicate is hosting that falls under the cost bracket between $0.80 to $4 monthly. Whilst researching low-cost holding service providers for this guide, we checked out over 100 various hosts that came under that cost variety. We after that assessed the quality of their most inexpensive organizing plan, worth for cash and also customer support.
In this write-up, I’ll be going over this first-rate web site holding company and stick in as much relevant information as possible.
I’ll look at the features, the rates options, and also anything else I can think of that I think may be of advantage, if you’re choosing to register to Bluhost as well as get your internet sites up and running.
So without additional trouble, allow’s check it out.
Bluehost is among the largest web hosting firms in the world, getting both enormous advertising assistance from the business itself as well as associate marketing professionals who advertise it.
It really is a large company, that has been around for a long time, has a large online reputation, and is certainly one of the top choices when it pertains to web hosting (definitely within the leading 3, at the very least in my publication).
Yet what is it exactly, and also should you get its services?
Today, I will certainly address all there is you need to understand, provided that you are a blogger or a business owner who is searching for a webhosting, as well as does not know where to begin, considering that it’s a wonderful solution for that target market generally.
Allow’s picture, you intend to host your sites and make them noticeable. Okay?
You already have your domain name (which is your website destination or LINK) now you wish to “transform the lights on”. Bluehost Youtube Tutorial
You require some holding…
To complete every one of this, as well as to make your internet site noticeable, you require what is called a “server”. A server is a black box, or device, that saves all your internet site information (files such as photos, messages, videos, web links, plugins, and other details).
Currently, this server, has to get on all the time as well as it has to be attached to the net 100% of the time (I’ll be stating something called “downtime” in the future).
Additionally, it likewise needs (without getting also fancy and right into information) a file transfer protocol frequently known as FTP, so it can reveal web internet browsers your web site in its designated kind.
All these points are either costly, or need a high degree of technological ability (or both), to create and keep. And you can totally go out there as well as discover these points by yourself and established them up … yet what regarding instead of you acquiring and maintaining one … why not just “renting organizing” rather?
“This is where Bluehost can be found in. You rent their servers (called Shared Hosting) and also you launch an internet site utilizing those servers.”
Because Bluehost maintains all your documents, the business also enables you to establish your content administration systems (CMS, for brief) such as WordPress for you. WordPress is a super popular CMS … so it simply makes sense to have that option offered (practically every organizing business now has this choice too).
In short, you no longer require to set-up a web server and then integrate a software application where you can construct your material, individually. It is already rolled right into one plan.
Well … visualize if your web server is in your residence. If anything were to occur to it in any way, all your data are gone. If something fails with its inner procedures, you need a specialist to repair it. If something overheats, or breaks down or obtains damaged … that’s no good!
Bluehost takes all these hassles away, and takes care of whatever technical: Pay your web server “rent”, and also they will certainly look after everything. And also as soon as you purchase the service, you can then start concentrating on adding material to your website, or you can put your initiative right into your advertising campaigns.
What Services Do You Obtain From Bluehost?
Bluehost uses a myriad of different services, but the main one is hosting of course.
The holding itself, is of different kinds by the way. You can rent a shared server, have a devoted web server, or also an online exclusive web server.
For the purpose of this Bluehost testimonial, we will focus on hosting services and other solutions, that a blog owner or an on-line entrepreneur would require, as opposed to go unfathomable into the rabbit opening and also talk about the other solutions, that are targeted at more experienced individuals.
- WordPress, WordPress PRO, as well as ecommerce— these organizing services are the packages that allow you to host an internet site making use of WordPress and also WooCommerce (the latter of which enables you to do shopping). After purchasing any one of these packages, you can begin building your web site with WordPress as your CMS.
- Domain Market— you can likewise buy your domain from Bluehost instead of various other domain name registrars. Doing so will certainly make it simpler to point your domain to your host’s name web servers, because you’re utilizing the very same marketplace.
- Email— as soon as you have bought your domain name, it makes good sense to likewise obtain an e-mail address connected to it. As a blog owner or online business owner, you ought to practically never utilize a complimentary email solution, like Yahoo! or Gmail. An email like this makes you look amateur. Fortunately, Bluehost offers you one absolutely free with your domain.
Bluehost additionally supplies dedicated web servers.
As well as you may be asking …” What is a specialized server anyhow?”.
Well, the important things is, the fundamental webhosting bundles of Bluehost can only a lot traffic for your site, after which you’ll require to update your hosting. The factor being is that the usual web servers, are shared.
What this means is that one web server can be servicing 2 or more websites, at the same time, among which can be yours.
What Does That Suppose For Yourself?
It implies that the solitary web server’s sources are shared, and also it is doing numerous jobs at any kind of given time. Once your site begins to hit 100,000 site sees each month, you are mosting likely to need a specialized web server which you can additionally receive from Bluehost for a minimum of $79.99 per month.
This is not something yous needs to stress over when you’re beginning but you need to maintain it in mind for certain.
Bluehost Rates: Just How Much Does It Expense?
In this Bluehost evaluation, I’ll be concentrating my attention mainly on the Bluehost WordPress Hosting packages, because it’s one of the most popular one, and very likely the one that you’re seeking which will suit you the best (unless you’re a massive brand, firm or website).
The three readily available plans, are as complies with:
- Standard Plan– $2.95 monthly/ $7.99 normal rate
- Plus Plan– $5.45 each month/ $10.99 normal cost
- Option And Also Strategy– $5.45 per month/ $14.99 normal rate
The first rate you see is the price you pay upon subscribe, and also the second price is what the expense is, after the first year of being with the firm.
So essentially, Bluehost is going to charge you on an annual basis. As well as you can additionally select the amount of years you want to hold your site on them with. Bluehost Youtube Tutorial
If you pick the Fundamental strategy, you will certainly pay $2.95 x 12 = $35.40 starting today and also by the time you enter your 13th month, you will currently pay $7.99 per month, which is also billed per year. If that makes any kind of feeling.
If you are serious about your web site, you should 100% get the three-year option. This implies that for the standard plan, you will pay $2.95 x 36 months = $106.2.
By the time you hit your 4th year, that is the only time you will pay $7.99 each month. If you consider it, this method will conserve you $120 throughout three years. It’s very little, yet it’s still something.
If you wish to obtain more than one site (which I highly advise, as well as if you’re major, you’ll possibly be obtaining even more at some time in time) you’ll intend to take advantage of the choice plus plan. It’ll enable you to host endless web sites.
What Does Each Plan Offer?
So, in the case of WordPress organizing plans (which resemble the shared holding strategies, yet are a lot more geared towards WordPress, which is what we’ll be focusing on) the features are as complies with:
For the Fundamental strategy, you get:
- One internet site just
- Guaranteed website via SSL certification
- Maximum of 50GB of storage space
- Cost-free domain name for a year
- $ 200 advertising and marketing debt
Bear in mind that the domain names are purchased separately from the hosting. You can obtain a cost-free domain name with Bluehost right here.
For both the Bluehost Plus hosting and also Choice Plus, you obtain the following:
- Endless number of websites
- Free SSL Certificate. Bluehost Youtube Tutorial
- No storage space or data transfer limit
- Complimentary domain for one year
- $ 200 marketing credit rating
- 1 Workplace 365 Mailbox that is complimentary for thirty day
The Choice Plus strategy has actually an included advantage of Code Guard Basic Back-up, a back-up system where your data is conserved and replicated. If any type of accident happens and also your site information vanishes, you can recover it to its initial form with this function.
Notice that even though both plans set you back the very same, the Choice Strategy after that defaults to $14.99 monthly, regular cost, after the collection amount of years you’ve picked.
What Are The Benefits Of Using Bluehost
So, why choose Bluehost over other web hosting services? There are numerous webhosting, much of which are resellers, however Bluehost is one pick couple of that have actually stood the test of time, and it’s possibly the most well known out there (as well as for good reasons).
Below are the 3 primary advantages of selecting Bluehost as your web hosting company:
- Web server uptime— your internet site will certainly not be visible if your host is down; Bluehost has greater than 99% uptime. This is very crucial when it pertains to Google SEO and also positions. The higher the much better.
- Bluehost speed— just how your server feedback determines how fast your site reveals on a web browser; Bluehost is lighting quickly, which means you will certainly reduce your bounce rate. Albeit not the best when it comes to filling rate it’s still hugely important to have a quick rate, to make customer experience better as well as better your position.
- Unrestricted storage— if you obtain the Plus strategy, you need not bother with the number of documents you store such as video clips– your storage capacity is endless. This is really essential, since you’ll most likely face some storage space problems later on down the tracks, as well as you don’t want this to be an inconvenience … ever before.
Last but not least, client assistance is 24/7, which implies despite where you are in the world, you can call the assistance team to fix your site concerns. Pretty basic nowadays, yet we’re taking this for granted … it’s likewise really crucial. Bluehost Youtube Tutorial
Additionally, if you’ve gotten a cost-free domain with them, then there will be a $15.99 fee that will certainly be subtracted from the amount you originally purchased (I imagine this is because it sort of takes the “domain out of the market”, not exactly sure about this, yet there possibly is a hard-cost for registering it).
Finally, any kind of requests after one month for a refund … are void (although in all honesty … they need to possibly be rigorous here).
So as you see, this isn’t necessarily a “no doubt asked” policy, like with some of the other organizing choices around, so make sure you’re all right with the plans prior to continuing with the organizing.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500304.90/warc/CC-MAIN-20230206051215-20230206081215-00489.warc.gz
|
CC-MAIN-2023-06
| 13,714 | 81 |
https://mail.xfce.org/pipermail/xfce4-dev/2005-August/016219.html
|
code
|
Brainstorming for the manager project name!
info at sten-net.de
Tue Aug 16 12:48:38 CEST 2005
if nothing is opposed to the package manager project we discussed
lately, I'd like to introduce the great brainstorming for a project name
with a few suggestions.
They mainly follow the current naming scheme which is, in general,
storms (or wasn't Thunar kind of a storm?). They all have to do with the
origin of hurricanes -- I thought this might fit very well, since the
program is supposed to bring us "storms" in terms of Thunar, Orage and
These are my proposals (I don't have a personal favorite yet):
Any ideas are greatly appreciated!
More information about the Xfce4-dev
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819273.90/warc/CC-MAIN-20240424112049-20240424142049-00297.warc.gz
|
CC-MAIN-2024-18
| 672 | 13 |
https://quantum.microsoft.com/en-us/explore
|
code
|
Dr. Krysta Svore and Mark Russinovich explore Microsoft’s latest quantum computing advancement, enabling quantum and classical compute to integrate seamlessly together in the cloud. Register for the series.
Dr. Chetan Nayak discusse Microsoft's quantum hardware journey, specifically touching on Microsoft's physics breaktrhough and the science behind the topological qubit.
At Microsoft, we believe that it will take the world’s collective genius to realize the full potential of quantum computing. Read the Azure Quantum blog to learn more about our vision for the quantum future and how you can participate.Read now
Microsoft is dedicated to minimizing the efforts required by our customers and partners to become quantum-safe, and to using our world-leading research and engineering teams to keep our products and services secure.Read now
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510300.41/warc/CC-MAIN-20230927135227-20230927165227-00157.warc.gz
|
CC-MAIN-2023-40
| 846 | 4 |
http://www.webassist.com/forums/posts.php?id=27151
|
code
|
CSS & DataBridge won't play nice
I can't seem to get the latest release of DataBridge and CSS Menu Writer & CSS Sculptor to play nice anymore. I can't justify $200 upgrade when i own all but 1 of the extensions. Is there a better upgrade deal to get everything to play along nice????
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823785.24/warc/CC-MAIN-20181212065445-20181212090945-00062.warc.gz
|
CC-MAIN-2018-51
| 283 | 2 |
https://bugs.java.com/bugdatabase/view_bug?bug_id=6696166
|
code
|
jdk version: 6u10
If an application uses titled borders and starts under Numbus Look and Feel and then sets another Look and Feel (for example, Metal), all titled borders don't change their title positions.
To reproduce the problem use TitledBorderTest.java from the attachment:
1. Run the test
2. Note that it is the Metal Look and Feel and that the title position is ABOVE_TOP instead of CENTER (screenshot WrongTitlePosition.JPG).
3. Comment the 11th line in the test: // setLaF(LAF.NIMBUS);
4. Run the test again and note that the title position is correct (screenshot ProperTitlePosition.JPG).
If a Look and Feel sets the "TitledBorder.position" UI property and if an application uses this L&F at first and then changes it to another L&F that doesn't set the property, titled border position is turned out wrong. It becomes the same as the default position of the first L&F instead of the default position of the second one.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817112.71/warc/CC-MAIN-20240416222403-20240417012403-00731.warc.gz
|
CC-MAIN-2024-18
| 929 | 8 |
https://www.codepath.org/
|
code
|
College Students: Your Tech Career Starts Here
College courses only prepare you so much for the real world. Get the technical training, career guidance, mentors, and community you need to successfully navigate the tech industry and jumpstart your SWE career … at no cost.
Excel in Tech
A successful career in tech requires a lot more than just theory. CodePath courses are developed by industry leaders, and applicable to real-world careers—so you’re ready to hit the ground running once hired. Through our curriculum, you’ll build applications, pass technical interviews – plus you’ll be supported by a community of peers and mentors who, like you, have overcome great challenges to get to where they are today.
Technical interview prep courses. Invitation-only career fairs with Fortune 500 companies and unicorn start-ups. Resume reviews with personalized feedback. One-on-one mentorship with industry leaders. Private events and workshops with companies such as Amazon, Y Combinator, LinkedIn, and Walmart. As a CodePath student, you get unrivaled career support that will have you starting your own Reddit thread about how you got hired.
Prep your CV, ace interviews and get career-ready with mock interview sessions, resume reviews, and more.
Networking & Events
Grow your network, knowledge, and hireability at technical industry events and our Emerging Engineers Summit.
Learn directly from the best. Get matched with an industry mentor for one-on-one support.
Hear from CodePath Alums
"The support that CodePath is able to give students is invaluable. Through their guidance, I found the education and career path I want to pursue in computer science. During the program, I built an award-winning mobile application, secured technical internships at Meta (formerly known as Facebook), Amazon and other high growth tech companies. SXSW EDU 2022 selected me to speak. Also, in March, I will start working full-time as a software engineer, while I continue to pursue my bachelor’s degree."
"CodePath has a variety of courses for many different types of students, ranging from mobile app development courses like iOS and Android development to CyberSecurity courses. As a student who was a bit lost and did not have much knowledge on a specific programming field, after taking the Android development course I learned I had a passion for mobile app development. Through the help of CodePath’s community of mentors and TAs I was able to continue improving on my Android skills and even land an internship for the Summer. I recommend CodePath for anyone who is seeking in solidifying knowledge on a specific field like mobile app development or even improving your technical interviewing skills, you will gain valuable skills and will come out with more confidence after taking a CodePath course."
"My experience with CodePath at UCI was one of the best decisions I’ve ever made. When I joined and saw that my instructors were just other students I knew this would be an environment where I would be able to learn without the stresses of school. Throughout the course, I was able to learn valuable skills about app development and industry skills that are not usually part of the school curriculum. During the end of the course, I got the opportunity to build my own app and potentially showcase it to companies. Apart from the classes, CodePath hosted a networking event where I got the opportunity to speak with industry professionals for the first time without the crowds of events like job fairs and improve my networking skills. "
"I got a first hand view of what software engineering and app development looked like. CodePath’s iOS course gave us the tools needed to create an app, from the design, and planning stages to the actual implementation of the app. I am grateful for the learning opportunity given to me and hope to apply those skills as an engineer."
"My goal has always been to make a positive impact in the world through technology, and CodePath has given me the support and platform to do just that. Within a year, I have combined my passion for teaching and my love for mobile development while working alongside some of the most outstanding engineers in the industry. I completed the Android Development course this past Spring. Since then, I have built an award-winning mobile application, reached Top 10 in one of the country's largest hackathons, and worked at Meta (Facebook) as an Android Intern Lead by helping to instruct and facilitate the diverse Facebook University Program for incoming interns. In addition, I am currently working as an Android Tutor for Google's pilot program, which aims to increase Black representation in tech. I can say, without a doubt, that I have become a better engineer thanks to CodePath."
"Becoming a participant for CodePath has been the best thing that happened to me during my college so far. I learned the fundamentals of iOS mobile development. This program awakens an interest in mobile development which l hope to explore more. The course structure was challenging at the same time interesting. There were times when l would get stuck. In those times the teaching assistants were always ready to help. Being a participant for code gave me the wings I need to fly in my career."
"When I decided to leave behind my country and my original field of Fashion Design, come to the United States and go back to school for computer science, I felt very behind and quite lost, to say the least. CodePath's Technical Interview Prep Course gave me the knowledge, support, and access to inspiring figures I needed in order to find my place in the field and the confidence I lacked in my technical interviewing skills. I am now looking forward to my second Software Engineering internship at Microsoft for summer 2022, and I know I could not have done it so early on in my CS degree without CodePath. With their help, anyone can reach that and so much more!"
"My experience at CodePath was by far the most significant experience I’ve had in college. Before CodePath I had no idea what I wanted to do with tech I just knew I wanted to be in it. The future was still very hazy and I was getting anxiety because I was worried I wasn’t going to succeed despite being at a great university. After CodePath, I continued working on my final project for that class and applied to be part of The Basement at UCSD’s summer incubator program where I evolved my project into a startup. I have never been more confident in what I want to do now and it’s all thanks to CodePath."
"I learned how important communication is not only in your career but in life in general. I communicated with instructors, mentors, peers in the program, and invitees who taught us about a specific part of tech. I learned that there are so many diverse careers in tech, whether you like art, research, data/numbers, security, etc. Talking to everyone I encountered during this program helped broaden my mind for the numerous opportunities I have in this industry and helped me realize how important diversity is in my life."
“If you are a CS major, then CodePath is the place to be. Without CodePath's technical interview prep courses I don't know where I would be in navigating technical interviews and applying to tech companies. Thanks to them I managed to secure an internship and I have to thank the amazing technical mentors and teaching assistants. CodePath is where you want to be!"
"Taking the CodePath Mobile App Design course was a great experience. Building an app from the ground up has helped spark my interest in Mobile Development as I learned about key concepts such as UI’s, passing and saving data, libraries, animations, and more. The CodePath team was incredibly helpful and responsive in making sure we got the help we needed to succeed. In addition, we were given the opportunity to grow our network by attending industry panels with top professionals. Thank you CodePath!"
"I have been enrolled in three CodePath courses. This program has singlehandedly changed my programming experience for the better. I would not have gotten the experience I gained from these courses from anywhere else. Sign up for a CodePath course, you will not regret it!"
"When I first joined CodePath I just thought it's just another class, but I was really surprised about everything! Everything is organized to be easy to understand and everyone is motivating me to succeed, The most thing I liked about CodePath is that the class doesn't only teach you scientific concepts but teach you how to navigate the whole process of landing a job in the Tech industry which includes teaching concepts, behavioral questions, negotiating an offer and communicating with recruiters which usually doesn't get taught in a university class and all that is being taught by instructors from top tech companies! Thank you CodePath! It's been an amazing experience."
"I'd like to personally thank CodePath for being such a great organization and providing students with such wonderful opportunities. From its classes, developing my technical skills and preparing me for software engineering positions, to its events like the Virtual Career Fairs, where I was able to directly meet and interact with recruiters and managers from various top tech companies, as well as progressing deep into the interview process with several of them. I would eventually end up receiving an offer from MathWorks to be a part of their EDG program as a software engineer. Without CodePath and its Virtual Career Fair, I would not have known about these positions or had the opportunity to establish relationships with these companies. I owe CodePath a tremendous amount of gratitude for the position I am in today!"
"CodePath is an awesome organization that provides a supportive community where scholars could have an opportunity to learn at a steady pace with confidence."
"I'm one step closer to making my dream a reality! I'm so excited to announce that I'll be joining LinkedIn as a Machine Learning Intern this summer! Thank you CodePath.org for helping me develop my craft as a developer through your SITE program and for the technical prep course over the summer."
BY ENGINEERS, FOR FUTURE ENGINEERS
“As someone who grew up in a low-income household in rural Maine, I didn’t know anyone in tech, and didn’t have access to computer science classes. When I began studying CS in college, I dropped out of the program due to a lack of support and role models. I got lucky and was able to get back into tech, but students like me - Black, low-income, first-generation college students - often never even get the opportunity to start tech careers.”
“When I began my career in tech, I felt underprepared compared to my peers. It is my goal that no other low-income, minority student feels that way.”
"I’m deeply passionate about changing the national infrastructure of CS programs: to shift what it looks like for students from low-income backgrounds to become technical professionals - empowered to reach their full potential.”
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819067.85/warc/CC-MAIN-20240424045636-20240424075636-00084.warc.gz
|
CC-MAIN-2024-18
| 11,065 | 30 |
https://forums.bignerdranch.com/t/cant-get-cocoaserver-to-build/2281
|
code
|
I can’t get CocoaServer to build. I’m running OS X 10.7.3, Xcode 4.3. No doubt it’s something simple I’m leaving out. But I can’t get around this link error:
Undefined symbols for architecture x86_64:
"_OBJC_CLASS_$_HTTPServer", referenced from:
objc-class-ref in CocoaServerAppDelegate.o
ld: symbol(s) not found for architecture x86_64
clang: error: linker command failed with exit code 1 (use -v to see invocation)
I wonder if someone can check to see if this happens to them. You don’t have to re-do the whole project. It’s 2 lines of code, or simply copy and paste. It’ll take someone two minutes, tops, and any insight would be sorely appreciated.
Make a new project (Mac OS X Cocoa Application), call it CocoaServer (just to match my code below). You can leave ARC on or turn it off. It doesn’t matter.
Drag the HTTPServer and TCPServer .h & .m files into the project and check the box that says to copy them. [As you recall, we get these files by downloading the code at http://www.bignerdranch.com/solutions/iOSProgramming.zip and looking in the solutions directory for the CocoaServer project.] You should now have the following files in the project:
In CocoaServerAppDelegate.h, add
so that it looks like this:
@interface CocoaServerAppDelegate : NSObject
@property (assign) IBOutlet NSWindow *window;
- In CocoaServerAppDelegate.m, simply alloc/init an HTTPServer:
@synthesize window = _window;
- (void)applicationDidFinishLaunching:(NSNotification *)aNotification
HTTPServer *server = [[HTTPServer alloc] init];
The sample code compiles just fine. But my code won’t link. What am I doing wrong?
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267155413.17/warc/CC-MAIN-20180918130631-20180918150631-00491.warc.gz
|
CC-MAIN-2018-39
| 1,626 | 18 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.