url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://www.singlecellomics.org/pages/tools/index
|
code
|
A plethora of SCO tools exist, and yet standards on how to benchmark or evaluate the accuracy of each tool are lacking. Furthermore, most benchmark efforts are focused on certain cell types or tissues.
Researchers in computational biology and other scientific fields often encounter the challenge of selecting the most appropriate computational methods to analyze their data. To determine the strengths of each method or to make recommendations on the best options for an analysis, benchmarking studies are conducted, which rigorously compare the performance of different methods using well-characterized benchmark datasets. However, to ensure that the results are reliable, unbiased, and informative, benchmarking studies must be carefully designed and executed. Weber et al. (2019) provided a set of practical guidelines and recommendations for conducting benchmarking analyses of high quality.
As single-cell technologies continue to advance, an increasing number of analysis tools are becoming available to researchers. Consequently, there is a growing need for datasets and methods that support systematic benchmarking and evaluation of these tools. Validating and benchmarking analysis tools for single-cell measurements is part of the “Eleven grand challenges in single-cell data science” [Lähnemann et al. (2020)].
Benchmarking can be approached at two different level:
The validation and comparison of tools in the field of simulation is an intriguing area. Despite the fact that simulators have several limitations, there has been a significant effort in the past few years to enhance their power, as noted by Cao et al. (2021). The scDesign3, a newly published simulator by Song et al. (2023), appears to be a versatile tool that is capable of overcoming some of the limitations of other existing simulators, according to the developers.
Over the past few years, there has been a significant increase in the number of published single-cell omics studies, which serve as valuable resources for benchmark experiments. In particular, Svensson et al. (2020) have compiled a comprehensive collection of single-cell omics datasets with manually curated metadata. As part of the implementation study of the single-cell omics community, we are creating a series of datasets specifically designed for benchmarking computational tools that focus on single-cell tumor heterogeneity.
Tumor heterogeneity, where distinct cancer cells exhibit diverse morphological and phenotypic profiles, including gene expression, metabolism, and proliferation, poses challenges for molecular prognostic markers and patient classification for targeted therapies. Various omics technologies, such as bulk [Babu & Snyder (2023)] and single-cell omics [Flynn et al. (2023)] approaches, have enabled the characterization of diverse molecular layers at an unprecedented scale and resolution, offering a comprehensive perspective on the behavior of tumors. The integration of multiple omics datasets enables systematic exploration of diverse molecular information [Yue et al. (2023)] at each biological layer, but also presents challenges in extracting meaningful insights from the exponentially growing volume of multi-omics data. To address this challenge, efficient algorithms are required to dig into the data and reveal the underlying complexities of cancer’s intricate biological processes. The past few years have seen a proliferation of new computational methods for analyzing single-cell omics data, which can make it challenging to select the most appropriate tool for a particular task. As a result, it is crucial to establish benchmarking platforms [Mangul et al. (2019), Decamps et al. (2021), OpenEBench, Omnibenchmark, Knight et al. (2023)] and datasets [Tian et al. (2018), Refine.bio] in order to create a controlled environment for the validation of bioinformatics tools in the field of single-cell omics analysis.
CELLxGENE is a suite of tools that help scientists to find, download, explore, analyze, annotate, and publish single cell datasets. it is characterised by the possibility to download a wide set of published single cell experiments as h5 or seurat (v3) format.
Data were generated using 10XGenomics v2 chemistry. The raw count table was provided without the association of the cell lines to each cell. We have assigned the cell line name to each cell via the similarity between single cell clusters and cell lines bulk data from CCLE database. The annotated count table and the full procedure used for the annotation are present a figshare dataset [doi.org/10.6084/m9.figshare.23274413.v1]
In GEO NCBI repository are available single cell data on PC9 untreated lung cancer cell line done in two different labs, using both 10XGenomics and Drop-seq platforms and produced from in vitro culture or xenograph experiments.
These datasets, because of their differences, i.e. platforms, growth, labs, represent an ideal instrument to benchmark batch removal methods as well as integration methods. The seven sets are available as datasets with the same gene annotation (ensemblID:Symbol). Each set has the cellID with the extension _s(1:5) and set6 has two extensions _s6PC9 and _s6U937. These datasets and the script used for annotation are available as figshare repository (10.6084/m9.figshare.23626407).
Gavish and collaborators [Nature 2023] have recenty curated, annotated and integrated the data from 77 different single cell transcriptomics studies encompassing a total of 1,163 tumour samples covering 24 tumour types and more than 23 milions cells. The data are accessible at 3CA site.
As part of the Single Cell Community implementation study we are focusing in providing a set of benchmark experiments to address the extraction of biological knowledge from “controlled” cancer heterogeneity.
We have done a 10XGenomics scRNAseq experiment including the following elements:
The above figure described the driver genes associated to each cell line. Only a minimal part of the connections has been shown to easy readability of the image. Full list of the interactions depicted by IPA are available at figshare [10.6084/m9.figshare.23284748]. All driver genes have been observed in resistence occuring upon treatment with Isomertinib of EGFR mutated lung cancers [Gomatou et al. (2023)].
The experiment was done using CellPlex technology from 10XGenomics allowing multiplexing samples into a single channel and therefore removing unwanted batch effects.
The count tables from the entire BE1 experiment are available through an R Shiny app, allowing users to construct datasets encompassing different cell lines at varying ratios. An R package providing the same functionalites of the R Shiny app is available at github.com/kendomaniac/BE1.
The above figure show the sequencing statistics of the 7 cell lines.
Processed data are available at: 10.6084/m9.figshare.23939481
For further information please contact raffaele dot calogero at unito dot it
The cell lines from for BE1 will be used to generate surrogate tumor-tissues for spatial transcriptomics, by embedding in matrigel pools of the 7 cell lines at different ratios. For each cell ratio we will generate a slide (2 sections) using Visium for FFPE samples and six slides using Curio Bioscience spatial platform for OTC fresh frozen samples. In total we expect produce three cell lines ratios:
Actual state of the project: Expecting results from BE1.
Expected data availability: March 2024
A549, CCL.185.IG, NCI-H596 (HTB178) and PC9 cell lines will be used to generate combined scRNAseq and scATACseq experiment using 10X genomics technology for multi-omics.
Actual state of the project: Ordered 10XGenomics multi-omics kit.
Expected data availability: January 2024
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474744.31/warc/CC-MAIN-20240228175828-20240228205828-00240.warc.gz
|
CC-MAIN-2024-10
| 7,743 | 26 |
https://forum.rclone.org/t/help-needed-in-copying-multiple-directories-from-one-google-team-drive-to-another-server-side/24989
|
code
|
I'm trying to create a --filter (or --include) syntax to copy multiple directories (~20TB) by grouping them (to around 700GB, to avoid hitting Google Drive's copy limit) from one team drive to another (server sided).These directories have lots of content inside of them (multiple sub-directories and files).
The directories in the source remote have general names made of multiple RANDOM words. Examples below:
remote:Main/Apples are good
remote:Main/Arrested dead feather
remote:Main/Between two rocks
remote:Main/Bingo made game
like this, all the way upto 'Z' when sorted alphabetically.
Google Drive has a 750GB copy limit.
So, I want to group these directories so that their collective size comes at around 700GB and then I can start the copying process. OR
EDIT: Just group (or select) multiple directories, then manually check their size, and then copy. This will work too, as long as I am able to copy multiple directories at once.
I tried reading the wiki on filtering, but couldn't understand a thing. Programming is not my background. Tried finding similar posts, but couldn't find any. If you find similar posts to my problem, you can link them in reply.
Any help would be appreciated.
Thanks in advance!
What is your rclone version (output from rclone version)
Which OS you are using and how many bits (eg Windows 7, 64 bit)
Android 10 (termux), 64 bit
Which cloud storage system are you using? (eg Google Drive)
The command you were trying to run (eg rclone copy /tmp remote:tmp)
Then, again I will have to rearrange all the files into directories after copying. There are hundreds of directories and there are hundreds of files and sub-directories inside of them.
I read the description of the --bwlimit option. It says it will limit the speed of the transfer, I don't understand how it will limit the total transfer size.
I've bookmarked your termux wiki. I'll definitely hit you up when I'm setting that up. But for now I've to solve this problem first.
I've made a small edit to my post. If you could take a look that would be great. EDIT: Just group (or select) multiple directories, then manually check their size, and then copy. This will work too, as long as I am able to copy multiple directories at once.
if you slow down the transfer speed to 8.0M, you slow down the total amount of data copied in a given time period of time
at that speed, rclone will never transfer more than 750GB per day, rclone will never hit that hard limit
you need only one rclone copy command to transfer 20TB
@Animosity022, now i am thinking that --bw-limit does not work with server-side-copy.
so what would you suggest to the OP?
I read the description of the --order-by flag.
If I use --order-by name , does this apply to the main directories I'm trying to copy alphabetically or the content inside them (individual files and sub-directories)?
I mean, does rclone index all the files alphabetically or the directories they're in?
I asked this because I've seen that when I'm copying a directory, rclone copies the content inside the directory and does not create the directory itself and paste content inside.
If I run, rclone copy remote1:MAIN remote2: rclone copies the content from inside the directory MAIN to the root of remote2 and does not create the directory MAIN .
Is it possible to change this behaviour to create the directory there and paste inside of there?
Also, is there a command to stop an ongoing process like to stop copying?
Thanks for taking the time to answer these basic questions here.
I ran a few tests on my drives.
I still don't understand the pattern here. It doesn't seem to organise the top level directories alphabetically. Does it group with same names like - top directories with the name 'one', then 'two' and 'three' randomly without following any alphabetical order?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337490.6/warc/CC-MAIN-20221004085909-20221004115909-00776.warc.gz
|
CC-MAIN-2022-40
| 3,808 | 37 |
https://www.freelancer.com.ru/projects/php/website-updates-37209117
|
code
|
Оплачивается при доставке
I need a freelancer to help me with updating my website. Specifically, I need assistance with content changes, and I already have the new content ready. Needs to be done by around 10 October. I need a booking system plugin added and payment options for course bookings.
ID проекта: #37209117
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100286.10/warc/CC-MAIN-20231201084429-20231201114429-00522.warc.gz
|
CC-MAIN-2023-50
| 347 | 3 |
http://ah-kai-aka-josh-oh.blogspot.com/2007/06/
|
code
|
Worse i am thinking i might got to serious illiness lol... cause
I am dying of drinking lot of WATER
I Felt SO thirsty lol DAMD ....
Going see Doc tomolo... Doc here i come!!
anyway this is the neoprint i took with serene and charlotte
spoke at : 11:29 PM
Sunday, June 10, 2007
Omg this weekend is a unforgetable weekend for mi cause nv nv in my life time
SO many ppl jio mi out lol.....
haha... 1 thing special is that AI LIAN actually jio mi out!!!
omg so RARE haha
Hai recently also quite piss la hai~~
Friday went for BL meeting then after that i went
MANJONG haa haa LOST X_X
Then SATurday i went MANJONG TOO!!!
We play 5 POK haha fo 11 hoursssss + break tooo
that my short short narration on my LIFE haha...
Hmm recent in class i did
" DISCOVER YOUR PERSONALITY STYLE"
and it analysis mi to be a C person which is = to
And my GREATEST FEAR is CRITICISM
My pattern Description is ASSESSOR....
I dunnoe wat that lol
but it say other well known assessors are BILL GATES!!!
gosh m i the 2nd bill gates??? haha let mi dream man haha
Anyway that thing is given by my PIE teacher haha.....
One last thing i would like to touch on is i really cant stand PEOPLE who i sms DUn even give a damd to reply mi...IT really piss mi off lol...i sent u a sms u is either DUN reply if not reply mi abt 3hours ltr??? seem like wat ever i sms u seem not important then final i dun sms u then as it goes to all..it not the first time i received such a prob le lol...although i have 1000 free sms that does not mean i nid your help mi to waste my SMS Hmm thinking of creating a BLACKLISTED naumber le!!!!!!!!! current in mind there are 5>.........
spoke at : 3:45 PM
Tuesday, June 05, 2007
WOw i long long long de time nv blog le haa... Haa.....
My life is so busy nw ...
Manjong + School + work = MUST HAVE in my life for nw........
Hmmm regarding my recent Quiz abt mi
YOu guy cAn find it at my blog under ME or find it at my friendster too...
PRimary school fren should be able to Score abt ...... hmmmm 8/15 correct bah i think!!!!
Secondary fren should be able to score abt...------ 12/15 correct!!! haha higher expectation
As for ITE fren should be Scoring abt ---- 8/15 ... HMmm just pass good good haha.....
ONLY the closer fren of my can get ALL RITE and that ME!!!!! wahaha....
So hurry up n do my QUIZ... I am looking forward for the RESULT!!!!!!!
spoke at : 12:27 AM
Oh Kai Ming aka josh aka yellow Ranger
09/07/1988 BL NPCC Photography
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583690495.59/warc/CC-MAIN-20190120021730-20190120043730-00432.warc.gz
|
CC-MAIN-2019-04
| 2,431 | 42 |
https://community.familysearch.org/en/discussion/108539/source-box
|
code
|
Source Box is totally changed as of today and would like to know how to understand how one is to use it now......cannot find a source added from record seek AND it has all the sources already attached with no PID ???? This is Nov. 8, 2021 and NO clear instructions on how to attach that new source ?? and how it should work now ??
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100523.4/warc/CC-MAIN-20231204020432-20231204050432-00705.warc.gz
|
CC-MAIN-2023-50
| 330 | 1 |
https://flexibeast.space/gemlog/2020-12-30.html
|
code
|
Geminispace vs. Beeblebroxians
“I am so amazingly cool you could keep a side of meat in me for a month. I am so hip I have difficulty seeing over my pelvis.”
-- Douglas Adams, “The Restaurant at the End of the Universe”
i really hope geminispace doesn't become hip. Over the years, i've seen a number of communities become dominated by people who have apparently joined less because they're attracted to the underlying philosophy and values of a community, and more because they're seeking the status of being an ‘early adopter’ of a non-mainstream space. In particular, some such people don't care as much about the philosophy and values as they do about having ‘trend-setter’ status, and so need the space to become as popular as possible even at the expense of the philosophy and values. Communities that had formed in an attempt to provide an alternative space find themselves getting pushed back towards having the very sort of characteristics from which they were trying to find a refuge.
Some people just can't seem to comprehend the notion that popularity isn't necessarily the primary goal. FOSS project after FOSS project gets lectured by users on how they'll never be successful unless they do X, as though ‘market share’ is the only possible metric for ‘success’ that anyone could (or should) consider. Myself, i'd be happy if geminispace became popular because lots of other people agree with the philosophy and values behind the Gemini project[a]. But i wouldn't be happy if geminispace became popular because it had moved from being a souped-up-Gopher to being a Web-with-slightly-fewer-flies.
In the Haskell world, there's a phrase: “Avoid success at all costs.” A number of people have parsed this as “(Avoid success)(at all costs)”, i.e. “Doing anything necessary to avoid being successful”. My understanding, however, is that it's intended to be parsed as “(Avoid)(success at all costs)”, i.e. “Success regardless of the costs is something to avoid.” Of course, different people can, and do, have different assessments of what the costs are. But i think it's useful for people to take some time to consider what type of ‘success’ is being sought by a community, and that when proposing ‘improvements’, they take some time to consider what the costs might be - not only to particular individuals within the community, but to the character of the community in general.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819668.74/warc/CC-MAIN-20240424143432-20240424173432-00615.warc.gz
|
CC-MAIN-2024-18
| 2,437 | 6 |
http://www.rcgroups.com/forums/showpost.php?p=23744766&postcount=3
|
code
|
Originally Posted by CrazyLittle
So you're taking pleasure in the pain and suffering of storm survivors. Okay.
Back and neck pain is the ticket for big lawsuit on whoever owns that subway. Back and neck pain is something that is nearly impossible to disprove... Maybe im missing something?
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645359523.89/warc/CC-MAIN-20150827031559-00218-ip-10-171-96-226.ec2.internal.warc.gz
|
CC-MAIN-2015-35
| 289 | 3 |
http://afristarfoundation.org/working-agreement-definition-agile/
|
code
|
All sprints should update the labour agreement, often through a retrospective review and a question such as: “Are these still our work agreements? What do we want to update? What are the areas that require new agreements? If I share my story, I hope it will inspire others to realize that the process of creating work agreements has created opportunities for collaboration and guidance that have helped a distributed team deliver better value. Please note that if I cannot disclose the name of the company, I can only report that it is a financial services company based in Texas. The names of all parties have been changed to protect privacy. Keeping and respecting a fresh work agreement is really the place where the magic happens. I can`t tell you how many teams forget it after spending a few hours creating it and not using it. People, especially engineers, are not very good at resolving conflicts, and when that happens, the best way to do that is to pay attention to a work agreement. Here are some important things you need to keep in mind when creating your own teamwork contract. Teams must hold each other to account. People will have differences of opinion and will have to re-examine them. “In the spirit of transparency and continuous improvement, team members should reconsider employment contracts from time to time and ask, “Should they be updated?” Don`t let things go too far. Teamwork agreements should describe how team members work together to create a positive productive process. For each team member, the only way to do that is to add their two cents to the development of these policies. The views of all members are important and inclusion is the glue that keeps the agreement in common.
Steve begins to ask for proposed agreements in his first priority area: Daily Scrum Start Time. After any possible work agreement, it uses the Decider protocol to quickly examine the possibility of consensus. If there is no immediate consensus, the person who said “no” to an idea suggests what they see as a better idea. If more than one person has a problem, everyone is expected to offer a better idea. If too many people say “no,” the applicant should consider withdrawing the proposal. In the case of Steve`s team, after 20 minutes, the team has its first work agreements: Gitlab, the open source development tool company, has infused its distributed team culture with a work agreement that describes how remote work should be done. They call it “The Remote Manifesto,” which is part of onboarding for new employees.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057496.18/warc/CC-MAIN-20210924020020-20210924050020-00071.warc.gz
|
CC-MAIN-2021-39
| 2,558 | 2 |
http://www.anjuansimmons.com/blog/
|
code
|
Welcome to my blog! Please keep these three things in mind:
1. Everything on my blog is my point of view and does not represent the view of any company I've worked for, past, present, or future.
2. If you want to respond to anything I've written, use my Contact form.
3. The previous version of my blog is partially available online, but I put the best parts of it in my first book, Minority Tech: Journaling Through Blackness and Technology. You should buy it. It's fun.
One of the hardest aspects of Agile Software Development is the alignment of design and engineering. This is because design is usually seen as purely a creative exercise while engineering is formal and structured. Of course, most people who have been exposed to both the design and engineering aspects of software development understand that creativity and structure exist in both competencies.
Scrum outlines a "cross-functional" Development Team that, at the minimum, has all of the skills needed to move a feature from user story to working software. However, a higher level of "cross-functional" is "cross-fungible". That means that members of the Scrum are interchangeable and everyone can perform UX, visual design, software development, testing, etc. However, it takes most Scrum teams months to reach cross-fungibility. In the interim, tight integration between roles is the next best thing.
I constantly strive to help my Scrum Teams become more tightly integrated, especially by aligning design and engineering. Here is a good article about that:
I had the honor of serving on the Advisory Board for the 2015 SXSW Interactive festival. In fact, you can read my tips about how to make the most of SXSW Interactive here.
As an Advisory Board member, I was responsible for evaluating 200 panel proposals, and I saw so many amazing ideas! However, I was only able to vote for a small percentage of these submissions so I saw firsthand how hard it is to get an idea accepted into Interactive. Having gotten four panel proposals successfully accepted in previous years, I knew how to create a winning proposal. However, evaluating proposals provided me with newfound insights.
Here is my advice for creating a SXSW panel proposal with a maximum chance of being selected for presentation:
I've been holding out on my Development Team. However, I've been doing it with a purpose in mind. Often, the best way to learn something is to experience life with the absence of that learning. Take programming for example. If you're teaching someone who has never programmed before, you may want to jump into teaching them about object oriented programming. However, as their eyes glaze over, you realize that you are confusing them more than educating them. So, you help them understand relatively easier concepts like variables, strings, input/output, reading files, functions, conditionals, and loops. Maybe you'll tease them a little with lists and dictionaries. You'll pat them on the head and send them of to try building a few programs. You smile as they create a few choose-your-own-adventure type games using lists and functions. Then you wait. You wait for them to come back to you and complain about having to update their code in multiple places just to make a small change. Their code is so complex and unreadable that they are thinking about giving up. Then you say, "Ah ha!".
Photo Credit Paramount
You show them how to use classes and methods. They marvel at how they can clean up their code. You teach them constructors, and they squeal with delight. You barely finish explaining inheritance before they start cackling with glee. Understanding object oriented programming was something they could grok and appreciate because they had experienced what its like to try programming without it.
Similarly, there are several aspects of Scrum that I haven't explained yet because I wanted the Development Team to experience practicing Scrum without them. Also, I would have to stop the team for several days if I tried to explain everything I think we need to understand about Scrum. So, I'm taking an iterative approach to improving our practice of Scrum by doling them out in digestible chunks. Based on the Sprint Retrospective feedback, I think we're ready to understand the Definition of Ready and the Sprint Burndown chart.
The Definition of Ready
We've covered the Definition of Done (DoD), and the Definition of Ready (DoR) is a similar concept. Like many aspects of Scrum, the DoR is just a checklist. However, the DoR is used before the sprint even begins. All user stories must meet the DoR before they are analyzed during the Sprint Planning meeting. Like the DoD, the DoR is collaboratively created by the Product Owner and the Development Team.
The DoR evolved in Scrum to address the same concerns shared during the last Sprint Retrospective. This includes items like:
Teams often look to the DoD for guidance in creating the DoR. This is reasonable, and you can find our current DoD here. However, a more useful guideline is the INVEST criteria for user stories. INVEST is often useful for splitting user stories, but it also provides good characteristics for user stories of any size. The INVEST criteria recommends that users stories are:
The ultimate goals is to not let anything into our sprint that is not Ready and to not let anything leave our sprint that is not Done. We'll further discuss the DoR during our next Sprint Retrospective.
The Sprint Burndown Chart
The Sprint Burndown Chart is far more canonical to Scrum than the DoR, but it can be a discouraging artifact because it often shows problems before it starts showing success. This is because the Burndown Chart is often a lagging indicator of the team's success at practicing Scrum. In other words, the Development Team is often better than what is currently being shown by the chart.
Ideally, the chart is self-explanatory. The ideal line is formed by dividing the story points we committed to in this sprint by the number of days in the a two week sprint. So, if we completed roughly an even number of story points per day to finish by the morning the day after the sprint, then our work would follow the ideal line.
I should pause here to say that we will never match the ideal line. Never. Ever. It is just a guideline.
The blue bars show the amount of work that is left to be done in the sprint. Every morning I update this chart for the previous day. Any cards in the Done lane are deducted from the blue bars based on their point value. So, this chart will be updated for what happened today sometime tomorrow morning. That is because the blue bar should represent a full day's worth of work.
So, that's the DoR and the Sprint Burndown Chart. I'll share more techniques when the team is ready for them.
A friend recently asked me this question:
Hello, Anjuan! I'm in a bit of a pickle. I went to law school and in law now but want to pursue tech. As such, I'd love to attend networking events with other entrepreneurs, angels and VCs but haven't a clue where to look and where to RSVP. I want to meet other amazing people in tech and get my product out there for feedback and possible investment! Can you possibly suggest a starting point?
Here's my response:
A user in one of the Agile Linkedin groups I follow posed this question:
Could some one provide me the information about story pointing bugs? Is it right way? or when can we?
Here's my answer
Here are the principles I apply to this:
I was recently asked a question by a colleague who is a professor at AACSB University. Here it is:
I hope this message you doing well! I read the information on the link you provided. I am interested to know if you think SCRUM should be taught to management students? I was thinking about adding this practical application of problem solving and management to design thinking To foster creative thinkers and problem solvers – people who will have to tackle complex challenges like the ebola epidemic, data security breaches, climate change...
Here's the answer I sent to her:
When people ask me what a Scrum Master does, I often use the analogy of a referee. In any sport, the referee is not the center of attention and often disappears into the mechanics of the game. However, the impact of the referee is present in every play. The role of the referee is to make sure that everything happens in accordance with the guidelines of the game.
Scrum Masters do the same thing. We make sure that the Scrum Development Team works in accordance with the guidelines of Scrum. That means that we actively remove practices that are against the guidelines of Agile Software Development (specifically, Scrum).
However, Scrum Masters are more than just referees. We are also coaches. We coach the Product Owner about ways to manage the Product Backlog. We coach the Development Team in how to practice Scrum more effectively. Also, we coach the organization by tailoring other Agile methods to the needs of the company.
Here's an email I received from a client asking for clarity about how the Development Team would practice various aspects of Scrum. I've removed any identifying information from the exchange, but it's a good example of an email driven coaching session:
Great questions! My answers are below:
One of the principles of Agile is the "Definition of Done". This is a checklist of the things that must be satisfied before a user story is complete and ready to be deployed to customers. It's important that this include everything that needs to be complete before deployment from development to QA.
I found a great example Definition of Done on an agile Linkedin group I follow. It was submitted by Bruce K:
I occasionally review websites for how usable they are on the UserTesting.com site. I enjoy user interface design, and UserTesting.com also pays for each site you review. It's a nice way to fund my Starbucks habit. :)
My feedback about how to be an effective user tester was recently posted on the site's blog. You can find it here.
I've reprinted my advice below:
One reason I wanted to offer advice on using filler words is that I constantly work to remove them from my everyday speech. Even great public speakers occasionally use filler words in personal conversations. I see filler words as lazy mental shortcuts that we use to avoid silence and gather our thoughts. As I said in my blurb above, it's ok to have a little silence!
On a related note, I enjoy doing interviews because they give me a chance to hear my recorded voice. While I personally think my recorded voice sounds strange, I listen to recordings of my interviews to see how I'm doing with filler words. I used to use "you know" a lot, and I've worked to stop doing that. However, I now see that I'm using "right" as a filler word when I speak. For example, I need to stop using right, right? That is pretty irritating, right? You get my point, right?
It takes work to stop using filler words, but it's worth the effort. This is especially important for those of us who are public speakers, but it's also important for everyday conversation.
A question was asked in one of the agile development groups I follow on Linkedin. Do you think the presence of the PO in the same room will affect the Dev Team results? And how? Here is the response I posted:
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246661364.60/warc/CC-MAIN-20150417045741-00267-ip-10-235-10-82.ec2.internal.warc.gz
|
CC-MAIN-2015-18
| 11,292 | 49 |
http://security.sys-con.com/node/612180
|
code
|
|By Business Wire||
|July 15, 2008 04:30 PM EDT||
Digitiliti, Inc. (the “Company”)(Pink Sheets: DIGI), announced today that it had filed its Form 10/A-2 Registration Statement with the Securities and Exchange Commission (the “SEC”) and had released its unaudited condensed consolidated financial statements for the first quarter 2008.
Form 10/A-2 Registration Statement
The Company’s filing of its Form 10/A-2 Registration Statement with the SEC became effective on July 14, 2008, following an amended filing with the SEC on July 11, 2008. The filing makes the Company a “reporting issuer” under the Securities Exchange Act of 1934, as amended. Once any additional comments that the SEC may have, if any, are satisfied, the Company intends to seek quotations of its common stock on the OTCBB.
Unaudited Condensed Consolidated Financial Statements
The Company released its unaudited condensed consolidated financial statements for the quarter ending March 31, 2008, in this filing, and these financial statements will appear in Standard and Poor’s Daily News Section of Corporation Records within a few days.
The Form 10/A-2 Registration Statement containing the unaudited condensed consolidated financial statements may be viewed in the SEC’s Edgar Archives at www.sec.gov and has been filed with Pink OTC Market, Inc. (the “Pink Sheets”) and included in the Company’s web site. Further, all current information about the Company that has been previously listed in the Pink Sheets can be accessed at www.pinksheets.com and by the Company’s symbol (“DIGI”) in the “Get Quote” box and then clicking on the “Filings” link. This information can also be accessed in the Company’s web site, www.digitiliti.com, under the heading “Shareholder Information.”
About Digitiliti: Digitiliti, based in St. Paul, Minnesota, is a pioneer and technology leader in the on-line data storage solutions business. Digitiliti’s fast growth results from its focus on providing SMB/SME companies with enterprise class features and services that are easy to use. All Digitiliti services include comprehensive off-site data protection, on-demand user scalability, rapid file restoration and disaster recovery.
Forward Looking Statements:
This release contains forward-looking statements. Actual results may differ from those projected due to a number of risks and uncertainties, including, but not limited to the possibility that some or all of the pending matters and transactions considered by the Company may not proceed as contemplated. These statements are made based upon current expectations that are subject to risk and uncertainty. The Company does not undertake to update forward-looking statements in this news release to reflect actual results, changes in assumptions or changes in other factors affecting such forward-looking information. Assumptions and other information that could cause results to differ from those set forth in the forward-looking information can be found at www.pinksheets.com.
SYS-CON Events announced today that BMC Software has been named "Siver Sponsor" of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2015 at the Javits Center in New York, New York. BMC is a global leader in innovative software solutions that help businesses transform into digital enterprises for the ultimate competitive advantage. BMC Digital Enterprise Management is a set of innovative IT solutions designed to make digital business fast, seamless, and optimized from mainframe to mo...
May. 30, 2016 09:15 AM EDT Reads: 2,359
SYS-CON Events announced today that MobiDev will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. MobiDev is a software company that develops and delivers turn-key mobile apps, websites, web services, and complex software systems for startups and enterprises. Since 2009 it has grown from a small group of passionate engineers and business managers to a full-scale mobile software company with over 200 develope...
May. 30, 2016 09:15 AM EDT Reads: 2,793
As cloud and storage projections continue to rise, the number of organizations moving to the cloud is escalating and it is clear cloud storage is here to stay. However, is it secure? Data is the lifeblood for government entities, countries, cloud service providers and enterprises alike and losing or exposing that data can have disastrous results. There are new concepts for data storage on the horizon that will deliver secure solutions for storing and moving sensitive data around the world. ...
May. 30, 2016 09:00 AM EDT Reads: 1,417
SoftLayer operates a global cloud infrastructure platform built for Internet scale. With a global footprint of data centers and network points of presence, SoftLayer provides infrastructure as a service to leading-edge customers ranging from Web startups to global enterprises. SoftLayer's modular architecture, full-featured API, and sophisticated automation provide unparalleled performance and control. Its flexible unified platform seamlessly spans physical and virtual devices linked via a world...
May. 30, 2016 08:00 AM EDT Reads: 2,379
SYS-CON Events announced today that ContentMX, the marketing technology and services company with a singular mission to increase engagement and drive more conversations for enterprise, channel and SMB technology marketers, has been named “Sponsor & Exhibitor Lounge Sponsor” of SYS-CON's 18th Cloud Expo, which will take place on June 7-9, 2016, at the Javits Center in New York City, New York. “CloudExpo is a great opportunity to start a conversation with new prospects, but what happens after the...
May. 30, 2016 07:15 AM EDT Reads: 1,393
Companies can harness IoT and predictive analytics to sustain business continuity; predict and manage site performance during emergencies; minimize expensive reactive maintenance; and forecast equipment and maintenance budgets and expenditures. Providing cost-effective, uninterrupted service is challenging, particularly for organizations with geographically dispersed operations.
May. 30, 2016 07:00 AM EDT Reads: 2,242
The IoTs will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform. In his session at @ThingsExpo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm and share the must-have mindsets for removing complexity from the development proc...
May. 30, 2016 06:00 AM EDT Reads: 2,011
SYS-CON Events announced today TechTarget has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. TechTarget is the Web’s leading destination for serious technology buyers researching and making enterprise technology decisions. Its extensive global networ...
May. 30, 2016 05:30 AM EDT Reads: 3,300
SYS-CON Events announced today that Commvault, a global leader in enterprise data protection and information management, has been named “Bronze Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. Commvault is a leading provider of data protection and information management...
May. 30, 2016 04:45 AM EDT Reads: 3,321
The essence of data analysis involves setting up data pipelines that consist of several operations that are chained together – starting from data collection, data quality checks, data integration, data analysis and data visualization (including the setting up of interaction paths in that visualization). In our opinion, the challenges stem from the technology diversity at each stage of the data pipeline as well as the lack of process around the analysis.
May. 30, 2016 03:15 AM EDT Reads: 1,539
A strange thing is happening along the way to the Internet of Things, namely far too many devices to work with and manage. It has become clear that we'll need much higher efficiency user experiences that can allow us to more easily and scalably work with the thousands of devices that will soon be in each of our lives. Enter the conversational interface revolution, combining bots we can literally talk with, gesture to, and even direct with our thoughts, with embedded artificial intelligence, wh...
May. 30, 2016 03:00 AM EDT Reads: 2,089
Designing IoT applications is complex, but deploying them in a scalable fashion is even more complex. A scalable, API first IaaS cloud is a good start, but in order to understand the various components specific to deploying IoT applications, one needs to understand the architecture of these applications and figure out how to scale these components independently. In his session at @ThingsExpo, Nara Rajagopalan is CEO of Accelerite, will discuss the fundamental architecture of IoT applications, ...
May. 30, 2016 03:00 AM EDT Reads: 1,397
SYS-CON Events announced today that Tintri Inc., a leading producer of VM-aware storage (VAS) for virtualization and cloud environments, will exhibit at the 18th International CloudExpo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, New York, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
May. 30, 2016 02:45 AM EDT Reads: 2,533
SYS-CON Events announced today that MangoApps will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. MangoApps provides modern company intranets and team collaboration software, allowing workers to stay connected and productive from anywhere in the world and from any device. For more information, please visit https://www.mangoapps.com/.
May. 30, 2016 02:45 AM EDT Reads: 1,083
SYS-CON Events announced today that Alert Logic, Inc., the leading provider of Security-as-a-Service solutions for the cloud, will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. Alert Logic, Inc., provides Security-as-a-Service for on-premises, cloud, and hybrid infrastructures, delivering deep security insight and continuous protection for customers at a lower cost than traditional security solutions. Ful...
May. 30, 2016 02:15 AM EDT Reads: 3,024
In his session at 18th Cloud Expo, Bruce Swann, Senior Product Marketing Manager at Adobe, will discuss how the Adobe Marketing Cloud can help marketers embrace opportunities for personalized, relevant and real-time customer engagement across offline (direct mail, point of sale, call center) and digital (email, website, SMS, mobile apps, social networks, connected objects). Bruce Swann has more than 15 years of experience working with digital marketing disciplines like web analytics, social med...
May. 30, 2016 02:00 AM EDT Reads: 1,489
SYS-CON Events announced today Object Management Group® has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
May. 30, 2016 01:00 AM EDT Reads: 2,697
SYS-CON Events announced today that EastBanc Technologies will exhibit at SYS-CON's 18th International Cloud Expo®, which will take place on June 7-9, 2016, at the Javits Center in New York City, NY. EastBanc Technologies has been working at the frontier of technology since 1999. Today, the firm provides full-lifecycle software development delivering flexible technology solutions that seamlessly integrate with existing systems – whether on premise or cloud. EastBanc Technologies partners with p...
May. 29, 2016 10:00 PM EDT Reads: 2,422
WebRTC is bringing significant change to the communications landscape that will bridge the worlds of web and telephony, making the Internet the new standard for communications. Cloud9 took the road less traveled and used WebRTC to create a downloadable enterprise-grade communications platform that is changing the communication dynamic in the financial sector. In his session at @ThingsExpo, Leo Papadopoulos, CTO of Cloud9, will discuss the importance of WebRTC and how it enables companies to fo...
May. 29, 2016 04:15 PM EDT Reads: 2,623
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discuss how businesses can gain an edge over competitors by empowering consumers to take control through IoT. We'll cite examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He'll also highlight how IoT can revitalize and restore outdated business models, making them profitable...
May. 29, 2016 02:00 PM EDT Reads: 3,017
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464051035374.76/warc/CC-MAIN-20160524005035-00074-ip-10-185-217-139.ec2.internal.warc.gz
|
CC-MAIN-2016-22
| 13,456 | 51 |
https://www.jefflindsay.com/bme5.shtml
|
code
|
Book of Mormon Nuggets
Supplementing Jeff Lindsay's Book of Mormon Evidences page.
The Lachish Letters
In 1935, some of the most important documents ever found relevant to Old Testament history were discovered. They are also star witnesses for the authenticity of the Book of Mormon. These ancient Hebrew writings from the time of Jeremiah and Lehi reveal point after point about that time that is consistent with Nephi's writings. Hugh W. Nibley discusses many of these points in his article, "Two Shots in the Dark" in Book of Mormon Authorship (Noel B. Reynolds, ed., Provo, Utah: FARMS, 1982), pp. 103-141. Many significant features of the Lachish letters of importance in Nibley's report were brought to light by the scholar Harry Torczyner in Lachish I (Tell ed Duweir): The Lachish Letters (Oxford University Press, 1938). Issues of interest include the practice of preserving ancient records, the tensions and intrigues associated with a transition in government in the days of Zedekiah, the possible hint at writing on plates, the adoption of Egyptian ways of writing documents in the days of Zedekiah, the presence of other prophets besides Jeremiah preaching unpopular messages, reference to "cursing the seed" of somebody (found as well in the Book of Mormon in Alma 3:9 and 2 Nephi 5:23, but not the Bible), and so forth. Nibley is impressed that these documents would overlap with a critical time and place in Book of Mormon history and provide confirmation of several important points found in the Book of Mormon. This seeming "coincidence" is all the more remarkable when one realizes that the Lachish letters are "the only first-hand writing surviving from the entire scope of Old Testament history" (Nibley, p. 119).
Though much could be said about many issues, one aspect of the Lachish Letters that I find especially interesting are the names mentioned in these documents. Here is an excerpt from Nibley (pp. 108-109):
The proper names in the Lachish Letters and the Book of Mormon belong to one particular period in Jewish history - the same period. Seven of the nine proper names in Letter 1 end in -yahu, which later became -iah, and during the Babylonian period lost the "h" entirely. Ina ll the letters there are no Baal names and no El names - the lack of which was once thought to be a serious defect in the Book of Mormon. Torczyner finds "the spelling of the names compounded with -iah" to be most important.
Nibley then mentions the abundance of a similar ending in personal names of Jews at Elephantine in Egypt, who, like the Nephites, also built a temple after the model of Solomon's temple. The -yahu ending
abounds at Elephantine, but in a more abbreviated form (-iah) than at Lachish (-yahu) a hundred years earlier. The same variety of endings is found in the Book of Mormon, e.g., the Lachish name Mattanyahu appears at Elephantine as Mtn, and in the Book of Mormon both as Mathonihah and Mathoni. The Book of Mormon has both long and short forms in the names Amalickiah, Amaleki, and Amlici, cf. Elephantine MLKih (Torczyner, p. 24).
The Lachish Letters also show that Jaush = Josh was an authentic Hebrew man's name from Lehi's time. It is not found in the Bible but is in the Lachish Letters (p. 120) and in the Book of Mormon, both as the name of a Nephite commander (Mormon 6:14) and as the name of a city (3 Nephi 9:10).
The abundance of -iah names as well as direct hits with Mathonihah/Mathoni and Josh score impressive points for Book of Mormon authenticity.
Tangential note: Recently I saw an anti-Mormon Web page attacking Nibley for his use of the Lachish letters. Among the surprising mistakes made in the attack is the antiquated claim that there is virtually no evidence of ancient writing on metal plates. Granted, that concept was utterly laughable in 1830, and thus was the topic of much anti-Mormon derision. Sadly, anti-Mormon "scholarship" has remained in that rut while real scholars are providing dozens and dozens of examples that verify the plausibility of almost every particular of what Joseph Smith reported to have found: an ancient sacred text engraved in a special script on metal plates hidden in a stone box with other sacred relics and buried in the earth to be preserved until a future time. Kevin Barney deals with one such anti-Mormon article in his excellent review of an excellent book by John A. Tvedtnes, The Book of Mormon and Other Hidden Books (Provo, Utah: FARMS, 2000). See Kevin's well-written review, "A Seemingly Strange Story Illuminated."
[Book of Mormon Evidences] [previous nugget] [next nugget]
[nuggets index] [close window]
Created: July 24, 2001
One of many pages at JeffLindsay.com.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476396.49/warc/CC-MAIN-20240303142747-20240303172747-00717.warc.gz
|
CC-MAIN-2024-10
| 4,678 | 15 |
http://keegannojey.ampedpages.com/The-C-homework-help-online-Diaries-16723046
|
code
|
The particular tasks that prompted me to get started on building and utilizing C++ (at first called "C with Courses") had to do with distributing functioning program amenities across a network. You'll find far more in-depth explanations in The look and Evolution of C++. See also A Heritage of C++: 1979-1991 and Evolving a language in and for the true environment: C++ 1991-2006. Why did AT&T help the development of C++?
On this move we look at file functions. Within this movie I reveal tips on how to open up and shut disk documents so that you can save and load info to and from them.
Often you will have far more information lurking at midnight corners of one's Personal computer’s than you expect. Listed here I describe several of the mysteries of buffers and why they need to be flushed.
Static memory allocation: space for the thing is presented within the binary at compile-time; these objects have an extent (or life span) assuming that the binary which consists of them is loaded into memory.
The C++ programming language was devised by Bjarne Stroustrup as an approach to supplying item-oriented features that has a C-like syntax.
Dynamic memory allocation: blocks of memory of arbitrary size might be requested at run-time applying library features which include malloc from a region of memory called the heap; these blocks persist right up until subsequently freed for reuse by view it now calling the library operate realloc or totally free
After a application passes Lint, it can be then compiled using the C compiler. Also, numerous compilers can optionally alert about syntactically legitimate constructs which are very likely to really be problems. MISRA C is often a proprietary set of guidelines in order to avoid these types of questionable code, created for embedded programs.
Effective computer software is extended-lived; daily life-spans of a long time aren't unheard of. A good software/plan often outlives the hardware it absolutely was check this site out created for, the running program it had been written for, the info base procedure it in the beginning employed, and so forth. Often, a fantastic piece of software package outlives the companies that provided The essential technologies utilized to develop it. Frequently a successful software/system have clients/end users preferring a number of platforms. The list of attractive platforms alter given that the person population modifications.
This is the perform that normally takes Yet another perform as input and returns a purpose item that numerically computes the by-product from the enter perform.
We also manage e-commerce for yourself! You don't require to bother with how dad and mom pay out you and if you will get payment. About the 15th of each and every month, we will pay you by means of PayPal for expert services rendered through the preceding month.
A few of these supplemental notes are great, Many others only rough drafts or fifty percent-done. Simply because they are designed only to deliver more
The default Edition performs a memberwise copy, the place each member is copied by its own duplicate assignment operator (which can also be programmer-declared or compiler-produced).
C99 is for the most part backward suitable with C90, but is stricter in certain means; particularly, a declaration that lacks a type specifier no more has int implicitly assumed. An ordinary macro __STDC_VERSION__ is defined with worth 199901L to point that C99 assist is accessible.
This tutorial discusses the best way to declare variables and how to input knowledge into software applying keyboard from regular input console.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256381.7/warc/CC-MAIN-20190521122503-20190521144503-00016.warc.gz
|
CC-MAIN-2019-22
| 3,619 | 14 |
http://www.aspmessageboard.com/showthread.php?36375-a-querystring-related-question-about-login
|
code
|
I implemented a database-driven login page. I have a problem now:<BR>when a user click a link, such as this: <a href=list2.asp?ID=23&Type=A&Lang=P>go to list2</a>, and he doesn't login in, I will redirect the user to login.asp page with two parameters like this: login.asp?act=login&url=..., the url should contain the link to list2.asp page with its original parameters. And, when the user login successful, he should be redirect to list2.asp?ID=23&Type=A&Lang=P. How to code it out? TIA.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988720760.76/warc/CC-MAIN-20161020183840-00138-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 489 | 1 |
https://www.forumlyoncat.com/d/339-bash-server-xxxxx-cannot-execute-binary-file-exec-format-error
|
code
|
pm2 start server .xxx ->
./server_1xxxxx yazdığımda -bash: ./server_xxxx: cannot execute binary file: Exec format error
pls help me
dranse Please upload the ZIP from email to your server and unzip on your host, do not unzip it on your local computer (windows).
thank you run.
why do we install kms chmod with docker when we get the information
dranse i dont understand what do u mean.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652116.60/warc/CC-MAIN-20230605121635-20230605151635-00664.warc.gz
|
CC-MAIN-2023-23
| 387 | 7 |
https://pypi.org/project/email-filter/
|
code
|
Adds the script, which process given emails to proxy them, replacing real email addresses by company's local ones taken from the contrib.auth module.
Module provides proxying emails from external addresses to local ones according to ``django.contrib.User`` emails
1. Install emailfilter to your project's environment. If your env should be activated by hand, then create script (``mail_route.sh``) like this::
echo "$(cat)" | /path/to/env/bin/python /path/to/env/bin/mail_route.py >> /path/to/logs/mail_route.log 2>&1
2. Add new pipe to ``mail_route.py`` script in postfix (by default it should be placed in ``/etc/postfix/master.cf``)::
mailproxy unix - n n - - pipe
flags=FR user=user_that_runs_uwsgi_or_project argv=/path/to/mail_route.sh
3. Then this transport should be used to process mails.
For example you want to process mails to ``domain.com`` and you are using cdb storage for postfix.
Add this to ``/etc/postfix/transport``::
Then update cdb map::
4. now you should create ``/path/where/you/place/mail_route_settings/mail_route_settings.py``::
PROJECT_BASE_DIR = '/path/where/project/settings/can/be/imported/'
DJANGO_SETTINGS_MODULE = 'project.settings'
PROCESS_OUTGOING_EMAILS = False
SELF_ADDRESS = '[email protected]'
Some django settings are available for configuration:
* ``EMAIL_HOST``, ``EMAIL_PORT`` — host and port used to "forward" emails
* ``EMAIL_SERVER_DOMAINS`` — list of domains that should be checked for mail forwarding. Example::
EMAIL_SERVER_DOMAINS = ['@42cc.co', '@42coffeecups.com', '@khavr.com']
Not Django settings in mail_route_settings.py file:
* ``SELF_ADDRESS`` — email address of mail_rote. For example if you forwar all emails from somewhwere
to mail_route by bcc`ingthem then you should set ``SELF_ADDRESS`` to bcc address and it will be ignored
when forwarding address(es) is determined
* ``PROJECT_BASE_DIR`` — this directory will be added to PYTHONPATH
* ``DJANGO_SETTINGS_MODULE`` — env variable with same name will be set to value of this setting
* ``LOG_PATH`` — where logs should be saved
Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
Hashes for email-filter-0.2.12.linux-x86_64.tar.gz
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100781.60/warc/CC-MAIN-20231209004202-20231209034202-00861.warc.gz
|
CC-MAIN-2023-50
| 2,226 | 29 |
https://chevroletforum.com/forum/chevrolet-forum-community-69/
|
code
|
New to CF? Stop in and introduce yourself.
This section is not for help threads.
Please introduce yourself here, but go to your model vehicle section to post questions and get answers to them. Thanks! :)
Stop in here to get the latest on CF happenings! This is also the place to get some information about site usage and the rules of the forum. Only staff and those permitted by the staff may post a new topic in this section. For permission to post something here, contact EvansBlue.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118963.4/warc/CC-MAIN-20170423031158-00130-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 484 | 4 |
http://www.foxydatascience.com/blog/previous/2
|
code
|
Recently I attended JuliaCon 2018, a conference about the Julia language. There people talked about the various cool things the language has to offer and how it benefits the world (not just the scientific world but the other parts of the world too). Yet, as it often happens to open-minded conferences like this one, there are some unusual ideas and insights that float around during the more relaxed parts of the conference. One such thing was the Nim language (formerly known as Nimrod language, a very promising alternative to Julia), since one Julia user spoke very highly of it.
As I’m by no means married to this technology, I always explore alternatives to it, since my commitment is to science, not the tools for it. So, even though Julia was at an all-time high in terms of popularity that week, I found myself investigating the merits of Nim, partly out of curiosity and partly because it seemed like a more powerful language than the tools that dominate the data science scene these days.
I’m still investigating this language but so far I’ve found out various things about it that I believe they are worth sharing. First of all, Nim is like C but friendlier, so it’s basically a high-level language (much like Julia) that exhibits low-level language performance. This high performance stems from the fact that Nim code compiles to C, something unique for a high-level language.
Since I didn’t know about Nim before then, I thought that it was a Julia clone or something, but then I discovered that it was actually older than Julia (about 4 years, to be exact). So, how come few people have heard about it? Well, unlike Julia, Nim doesn’t have a large user community, nor is it backed up by a company. Therefore, progress in its code base is somewhat slower. Also, unlike Julia, it’s still in version 0.x (with x being 18 at the time of this writing). In other words, it’s not considered production ready.
Who cares though? If Nim is as powerful as it is shown to be, it could still be useful in data science and A.I., right? Well, theoretically yes, but I don’t see it happening soon. The reason is three-fold. First of all, there are not many libraries in that language and as data scientists love libraries, it’s hard for the language to be anyone’s favorite. Also, there isn’t a REPL yet, so for a Nim script to run you need to compile it first. Finally, Nim doesn’t integrate with popular IDEs such as Jupyter and Atom, and as data scientists love their IDEs, it’s quite difficult for Nim to win many professionals in our field without IDE integration.
Beyond these reasons, there are several more that make Nim an interesting but not particularly viable option for a data science / A.I. practitioner. Nevertheless, the language holds a lot of promise for various other applications and the fact that it’s been around for so long (esp. considering that it exists without a company to support its development) is quite commendable. What’s more, there is at least one book out there on the language, so there must be a market for it, albeit a quite niche one.
So, should you try Nim? Sure. After all, the latest release of it seems quite stable. Should you use it for data science or A.I. though? Well, unless you are really fond of developing data science / A.I. libraries from scratch, you may want to wait a bit.
The previous week has been intense as I was working on a part of the proposal for a new project, attending a conference, and figuring out some things about my publication-related endeavors. With all that in mind, it was natural that I didn’t post anything on the blog, even though I wanted to. However, as my focus is always on quality, I didn’t want to just publish a rushed post or a simple announcement. That’s why I waited until now to get a new post out.
The Event of the Decade
On 8/8/18 the new release of Julia came out. This wasn’t just any release though, but the big one: 1.0. It is really hard to overestimate the importance of this release, even if the most conservative Julia users still feel that it would take a few months before the full force of v. 1.0 will reach the world. After all, just because Julia is now production ready, it doesn’t mean that everyone using it can benefit from this the same way, since the packages people depend on may take some time before they are fully compatible with the new release. Nevertheless, those who prefer to rely on our own code primarily can experience the benefits of Julia right now. Whatever the case, the fact is that Julia has now entered a new era, since it has proven itself to be robust and even faster than ever before.
To give you an example of that, in the conference there was a talk about how Julia is applied in Robotics, via a specialized package some Robotics researcher developed recently. Even though this guy had worked with C++ before for the same project, he eventually shifted to Julia for the vast majority of the code, since it was good enough (i.e. sufficiently fast and reliable) to perform challenging optimization-related tasks in real-time. To be exact, the operations were 36% faster than real-time, enabling a robot operation frequency of 1000 Hz, at least in the simulations he was conducting. At the time of this writing, no other language has accomplished that, without having significant dependencies on C libraries.
Ramification of Version 1.0 in Data Science and A.I.
But how does all this affect us, as data science and A.I. professionals? Well, Julia isn’t evolving merely on the Base package or the fairly niche application of Robotics. In fact, there are now full-fledged packages that cover a variety of data science related applications, including deep learning models. In the conference there was a talk about the Knet package, for example, which is a deep learning package built entirely on Julia. Personally I don’t know any other deep learning tool that has been built entirely on a data science language (I don’t consider C++ to be such a language by the way, since data scientists tend to use high-level languages mainly). What’s more, this deep learning tool has comparative performance with other more established frameworks, while in one of the benchmarks it outperformed all of them.
But data science is not just deep learning. There is a significant part of it that has to do with more conventional methods, mainly deriving from Statistics. What about Julia’s role in all that? Well, Julia has a number of fairly mature packages in Stats, including Bayesian Stats. What’s more, there is a new book being written right now on Stats with Julia, by a couple of academics who teach Stats in a university in Australia. So, it’s safe to say that Julia is pretty evolved in this aspect of data science too.
More specialized parts of data science, such as Graph Analytics also have corresponding packages in Julia, while the LightGraphs package I talked about in my Julia for Data Science book, is still out there, now better than ever. Data engineering packages also exist, while there are several packages on optimization too, something data science can benefit from greatly, for the more challenging problems tackled.
From all this, I believe it’s fair to say that the age-old argument that “Julia is not ready for DS / A.I. because x, y, z” is now as ridiculous as the belief that the number of available libraries is what makes a language more suitable for data science. Sure, packages can help, but it’s mostly due to their quality, not their quantity, while how fast a language runs is an important factor when analyzing the truckload of factors in a modern data model. That’s not to say that Python, Scala, and other data science languages are not useful any more, but ignoring the value of Julia in the data science / A.I. arena is silly and to some extent unprofessional.
Recently I decided to do something a bit more experimental, which very few people have tried covering in a video. So, I tackled a more niche sub-topic of Natural Language Processing, related to custom-made features and their construction. Despite its seemingly simple nature, this skill is something that can differentiate you from a newcomer in NLP. This A.I. video assumes some knowledge of NLP but you don’t need to be a seasoned data scientist to follow. Also, I provide several examples, as well as an original taxonomy to help you organize all this information in your mind. So, check it out on Safari when you have a moment.
Note that a subscription to the Safari portal is required in order to view the video in its entirety. With the subscription you have access to a large number of books and videos, across various publishers and domains.
When a machine learning predictive analytics systems makes predictions about something chances are that we have some idea of what drove it to make these predictions. Oftentimes, we even know how confident the system is about each prediction, something that helps us become confident about it too. However, most A.I. systems (including all modern AIs used in data science) fail in giving us any insight as to how they arrived at their results. This is known as the black box problem and it’s one of the most challenging issues of network-based AIs.
Although things are hopeless for this kind of systems due to their inherent complexity and lack of any order behind their predictive magic, it doesn’t mean that all AIs need to be under the same umbrella. Besides, the A.I. space is mostly unexplored even if often seems to be a fully mapped terrain. Without discounting the immense progress that has been made in network-based systems and their potential, let’s explore the possibility of a different kind of A.I. that is more transparent.
Unfortunately, I cannot be very transparent about this matter as the tech is close-source, while the whole framework it is based on is so far beyond conventional data analytics that most people would have a hard time making sense of it all. So, I’ll keep it high-level enough so that everyone can get the gist of it.
The Rationale heuristic is basically a way analyzing a certain similarity metric to its core components, figuring out how much each one of them contributes to the end result. The similarity metric is non-linear and custom-made, with various versions of it to accommodate different data geometries. As for the components, if they are the original features, then we can have a way to directly link the outputs (decisions) with the inputs, for each data point predicted. By examining each input-output relationship and applying some linear transformation to the measures we obtain, we end up with a vector for each data point, whose components add up to 1.
Naturally, the similarity metric needs to be versatile enough to be usable in different scenarios, while also able to handle high dimensionality. In other words, we need a new method that allows us to process high-dimensional data, without having to dumb it down through a series of meta-features (something all network-based AIs do in one way or another). Of course, no-one is stopping you from using this method with meta-features, but then interpretability goes out the window since these features may not have any inherent meaning attached to them. Unless of course you have generated the meta-features yourself and know how everything is connected.
“But wait,” you may say, “how can an A.I. make predictions with just a single layer of abstraction, so as to enable interpretability through the Rationale heuristic?” Well, if we start thinking laterally about it we can also try to make A.I. systems that emulate this kind of thinking, exhibiting a kind of intuition, if you will. So, if we do all that, then we wouldn’t need to ask this question at all and start asking more meaningful questions such as: what constitutes the most useful data for the A.I. and how can I distill the original dataset to provide that? Because the answer to this question would render any other layer-related questions meaningless.
As someone once said, "Knowledge is having the right answer; Intelligence is asking the right question." So, if we are to make truly intelligence systems, we might want to try acting as intelligent beings ourselves...
Over the past couple of weeks I've been thinking about this topic and gathering material about it. After all, unlike other more attractive aspects of A.I., this one still eludes the limelight, even though it's become quite popular as a research topic lately. Since I believe this is a matter that concerns everyone, not just those of us who are in the A.I. field, I created this video on the topic. It's a bit longer than the other ones on A.I. topics, but I made an effort to make it relate-able and avoid too many technical terms. So, if you have a Safari account, I invite you to check it out here.
This past week we received the first round of feedback from our publisher, so my co-author and I have been feverishly working on refining the book, making clarifications where necessary and adding some content for better context here and there (mostly there). So, after a week’s worth of editing we have completed the revised version of the book which we’ve sent to the publisher this weekend...
Also, this past week I wrote three articles for one of the blogs of the company I work with in London, so it’s been quite busy writing-wise. These are all part of the SEO plan for one of the websites of the company, so they are a bit dry but they are still interesting to read.
What’s more, on my free time I’ve been thinking about A.I. Safety and creating mind maps on the topic. In fact, until further notice, that’s going to be my main past-time from now on, that and creative writing. After all, that sci-fi novella of mine isn’t going to write itself!
So, with all that going on, I didn’t have the chance to put together an article for this blog this week. Stay tuned though since the ones I have in mind are going to be unique and intriguing...
Many things have changed in data science over the past few years, yet recruiting doesn’t seem to be one of them. There are still companies and agencies evaluating candidates as if we were software developers or something, giving a disproportional amount of emphasis to experience, as well as other not-so-relevant factors. A data scientist, however, is much more than his / her coding skills or any other facet that’s reflected in the “years of experience” metric. This is especially true in our era where A.I. is gaining more and more ground, transforming the field in unprecedented ways.
Back in the day, you’d need to know a technology or a piece of know-how quite well, if you were to use it. Particularly when it came to data models, you had to know the ins and outs of them because chances were that you’d have to code one of them from scratch at some point, especially in cases where the two-language problem was an unresolved issue.
Now, however, these issues have withered as new technologies have come along. A.I. models have been proven to be better than even the best-performing conventional models, at least in cases where sufficient data is available. As big data is becoming more and more widespread, having sufficient data is less of an issue. Also, all of these A.I. models are made available as part of this or the other framework, so a data scientist usually needs to just create the necessary wrapper functions, a fairly easy task that can be mastered within a month or two. Therefore, a candidate having 5+ years of experience won’t necessarily be more adept at data modeling than a new data scientist who is trained in the latest technologies of our craft.
As for the two-language problem, that’s something that seems to linger more than reason would dictate. Nowadays there are various programming languages that can be used end-to-end in the data science pipeline (with Julia being one of the most prominent ones). Therefore, coding some method from scratch so that it can be deployed is masochistic at best. Even in Python there are APIs that make the deployment of a model feasible, without having to translate the corresponding code to C++ or Java.
As we are now in the post-AI era, there is a growing consensus among data scientists that the increased automation that A.I. provides is bound to bleed into our field too, meaning less and less low-level tasks needed to be carried out by the data scientist as the specialized A.I. will be able to do them instead. This doesn’t necessarily mean that humans won’t be in the loop, however. The data scientists involved will just have a different role to play, one that is still uncorrelated to years of experience and other obsolete metrics.
So, the only thing that stands in the way of new, enthusiastic, competent data scientists and their placement in data science jobs is the outdated recruitment processes that are attached to the job market like fleas. Fortunately, there are companies like ResourceFlow that evaluate candidates in a more holistic way, looking at both the technical and the non-technical aspects of them, while also opting for a good understanding of what exactly is required by the company having the vacancy, in terms of data science and A.I. expertise. So, even if most recruiting companies are still slow to adapt to the new realities of our field, fortunately companies like ResourceFlow give us hope about the future of data science recruitment.
This is a topic that I'm pretty confident hasn't been featured much anywhere in the pop data science literature. Although it is quite well-known in the research sphere, most non-PhDs (and some PhDs too!) may have never heard about it, or why it is useful in day-to-day data science work. So, if you are one of those people who are curious and interested in learning even the less popular topics of our field, feel free to check it out on Safari.
Note that although I made an effort to cover this subject from various angles, this is still an introduction video to its topics. Also, some experience in data science would be immensely useful, otherwise the video may appear a bit abstract. Whatever the case, I hope you find it useful and use it as a jumping board to new aspects of data science that you were not aware of. Cheers!
In many data science courses, these peculiar data points in a dataset often go by the term “anomalies” and are considered to be inherently bad. In fact, it is suggested by many that they be removed before the data modeling stage. Now, for obvious reasons I cannot contradict that approach partly because I myself have taken that stance when covering basic data engineering topics, but also because there is merit in this treatment of outliers and inliers. After all, they are just too weird to be left as they are, right?
Well, it depends. In all the cases when they are removed, it’s usually because we are going to use some run-of-the-mill model that is just too rudimentary to do anything clever with the data it’s given. So, if there are anomalous data points in the training set, it’s likely to over-fit or at the very least under-perform. This would not happen so often though in an A.I. model, which is one of the reasons why the data engineering stage is so closely linked to the data modeling one. Also, sometimes the signal we are looking for lies in those particular anomalous elements, so getting rid of them isn’t that wise then.
Regardless of all that though, we need to differentiate between these two kinds of anomalies. The outliers can be easily smoothed out, if we were to adopt a possibilistic way of handing the day, instead of the crude statistical metrics we are used to using. Smoothing outliers is also a good way to retain more signal in the dataset (especially if it’s a small sample that we are working with), something that translates into better-performing models.
Inliers though are harder to process. Oftentimes removing them is the best strategy, but they need to be looked at holistically, not just in individual variables. Also, even if they distort the signal at times, they may not be that harmful when doing dimensionality reduction, so keeping them in the dataset may be a good idea. Nevertheless, it’s good to make a note of these anomalous elements, as they may have a particular significance once the data is processed by a model we build. Perhaps we can use them as fringe cases in a classification model, for example, to do some more rigorous testing to it.
To sum up, outliers and inliers are interesting data points in a dataset and whether they are more noise than signal depends on the problem we are trying to solve. When tackled in a multi-dimensional manner, they can be better identified, when when processed, certain care needs to be taken. After all, just because certain data analytics methods aren’t well-equipped to handle them, we shouldn’t change our data to suit the corresponding models / metrics. Often we have more to gain by shifting our perspective and adapting our ways to the data at hand. The possibilistic approach to data may be a great asset in all that. Should you wish to learn more about outlier and inliers, you can check out my presentation video on this topic in the Safari platform.
First of all, I'd like to thank all of you for visiting this blog and checking out the various posts I've put up over the past couple of years. I appreciate it, even if I don't express it!
Lately it has come to my attention that many people comment in various posts for the sake of commenting. You never get to see these comments because I delete them or mark them as Spam. The reason is simple. Even if they don't directly promote this or the other company or brand, they are:
Naturally, even if a comment doesn't directly promote this or the other brand, it is accompanied by a link, so there is SEO value in it. Having served as an SEO manager in a company once, I'm quite familiar with these tricks. So, it seems that the intent of these comments is not aligned with the intent of this blog, which is to inform people about certain data science and A.I. related topics and challenge conventional ideas and preconceptions about them. I am considering removing the commenting option from now on, so if this happens, know that it is in order to avoid these noisy comments. Whatever the case, you are always welcome to contact me directly, like some of you have done already.
Again, thank you for reading this blog. I look forward to sharing more fox-like insights in the future!
Zacharias Voulgaris, PhD
Passionate data scientist with a foxy approach to technology, particularly related to A.I.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267163146.90/warc/CC-MAIN-20180926022052-20180926042452-00531.warc.gz
|
CC-MAIN-2018-39
| 22,737 | 49 |
https://lists.slackbuilds.org/pipermail/slackbuilds-users/2011-July/007867.html
|
code
|
[Slackbuilds-users] mumble and murmur
kingbeowulf at gmail.com
Tue Jul 19 00:23:09 UTC 2011
The mumble and murmur slackbuilds are different versions and I needed to run
the current 1.2.3-stable for my private game server. I am not certain if
murmur is still maintained. The murmur,SlackBuild needs this change when
qmake -recursive main.pro \
Also, murmurd did not run via rc.murmur as 'root' via rc.local - the uname
parameter must be set to some regular user ('root' and blank were a no-go,
and setting a user was not ignored). However, doing so means one has to
to that user, or you get a "not found" error and the log and sqlite end up
in the wrong place (and then clients can't connect).
Right now it is working with these changes, but I'd like to make sure I
didn't do something silly and bork the security before I open it up to the
world. Also, wouldn't it be better to consolidate the mumble and murmur
You! What PLANET is this!
-- McCoy, "The City on the Edge of Forever", stardate 3134.0
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the SlackBuilds-users
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488504838.98/warc/CC-MAIN-20210621212241-20210622002241-00175.warc.gz
|
CC-MAIN-2021-25
| 1,118 | 20 |
https://anyquestions.info/other/will_there_be_a_revolution_in_2018_if_putin_becomes_president_again/
|
code
|
- In which religions there is no God/gods as such, but there are nature spirits, mythical creatures?
- Are there any phenomena in nature that cannot be systematized and rationalized?
- How do pets help you deal with stress?
- Why is there confusion in the concepts of "matter" and "substance"?
- Strong feelings are shown only by a weak person, or vice versa, only a strong person is capable of strong feelings?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103669266.42/warc/CC-MAIN-20220630062154-20220630092154-00685.warc.gz
|
CC-MAIN-2022-27
| 411 | 5 |
http://drupal.stackexchange.com/questions/45657/create-specific-pages-programatically
|
code
|
Path (URL) to call custom module function
I would like to create specific page that will be shown only on specific url (for example, specific extended search page).
That page would reside, for example, in my template folder, and would trigger only when the url is visited.
That specific page is not part of any content type, but it is simmilar to view (but i do not want to use views). I would like to write all presentation and logic myself in that page, and would like that page to inherit theme wrapper (like it is a node).
For example, user visits http://www.mydomain.com/search And then my custom page search.php in template folder is "triggered"
Please advise what would be good way to achieve this.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737952309.80/warc/CC-MAIN-20151001221912-00044-ip-10-137-6-227.ec2.internal.warc.gz
|
CC-MAIN-2015-40
| 705 | 6 |
https://lists.kamailio.org/mailman3/hyperkitty/list/[email protected]/2012/3/?page=6
|
code
|
I'm getting the following error when attempting to load pv.so
kamailio: ERROR: <core> [sr_module.c:572]: ERROR: load_module: could not open module </usr/local/lib64/kamailio/modules_k/pv.so>: /usr/local/lib64/kamailio/modules_k/pv.so: undefined symbol: msg_ctx_id_set
I'm running Kamailio 3.2.x.
On Tue, Mar 27, 2012 at 3:13 PM, Uri Shacked <uri.shacked(a)gmail.com> wrote:
> Following the advice I got on the subject “remove_hf" and "append_hf" one
> after the other , twice, issue”, I tried to work with the “append_branch()”
> What I need to do is, after I received the invite from the original user,
> I use SIP methods to work with the NP server. I subst() the user part, send
> the call to the NP server, get the reply, parse it and then subst() back to
> the destination and send the call out.
> Doing it with “append_branch” seems logical.
> I do “append_branch()” before changing the user, get the reply (301),
> goes on to failure route after the branch route was called, and from there
> I have a problem.
> I need to continue my flow without the branch I added. How do I return to
> the original on?
> I read about the t_drop_replies but didn’t quit understand…..
Another one bites the dust ;).
My problem was strict vs loose routing done by loose_route function.
In order to loop through B2BUA I have defined the loopback interface's
IP as a local alias for simplicity in checking myself in routing
When doing loose_route, the route address was for some reason not
matching my server and due to strict routing the RURI was rewritten
with the weird address in the route header.
Hope my report helps someone in the future.
I read option 2 and i agree on 1 :-)
Didnt use any "branch stuff" yet :-(... it seems very logical to do so when
i send the call to the NP server.
Will hit the docs...
when you are adding the new Contact-Header in Failure-Route (after you
received the 3xx reply), you are working on the original message
again. So the old Contact is still removed and the new Contact is
added (as for the initial request).
There are two options for you:
1) Move your remove_hf/append_hf into a branch route (so the changes
are only for the current branch)
2) Use "msg_apply_changes()" before removing and adding the header
I i were you, i'd choose option 1, since for Option 2 the message and
the headers need to be parsed again.... (performance penalty).
2012/3/27 Uri Shacked <ushacked at
*>* In the scenario i am using, the flow is as followed:
*>* 1. Getting the INVITE from the user
*>* 2. Sending an INVITE with RURI changes to the NP server (sip NP server)
*>* 3. Getting a 301 reply (using the reply for the NP code)
*>* 4. Sending the call to the destination.
*>* My problem is that the NP server needs some parameters in the contact
*>* So, here is what i do :
*>* First, before sending the invite to the NP:
*>* :<sip:XXX at
*>* (The invite is sent perfectly and works great)
*>* After the NP reply i do:
*>* append_hf("Contact :$ct","Contact");
*>* Now I notice there are two contact headers. It seems that the remove_hf
*>* didn’t work this time.
*>* Any ideas?
In the scenario i am using, the flow is as followed:
1. Getting the INVITE from the user
2. Sending an INVITE with RURI changes to the NP server (sip NP server)
3. Getting a 301 reply (using the reply for the NP code)
4. Sending the call to the destination.
My problem is that the NP server needs some parameters in the contact
So, here is what i do :
First, before sending the invite to the NP:
(The invite is sent perfectly and works great)
After the NP reply i do:
Now I notice there are two contact headers. It seems that the remove_hf
didn’t work this time.
When provisioning subscriebrs to Kamailio with the kamctl tool i see the
passwords are stored in clear on the database. For my use-case I would not
like to have that passwords in clear on the db.
What can I do to avoid this problem? Should I provision the users in a
different way and not using kamctl tool or configure kamailio differently?
If there is no way to achieve this would be dangerous if I edit the kamctl
tool so it does not store any value on the password column and just store
HA and HA1B values?
> >How do you reload your htable? Is it using the exec( ) function to call
> >mi command sht_reload? Or do you have another method?
> I use the exec() to run a shell script with the relevant mi command. the
> shell script return code is used to make sure all went OK.
> On Mon, Mar 26, 2012 at 14:56, Uri Shacked <ushacked at gmail.com<http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-users>>
> >* Hi,
> *>* I made these kinds of tests before. I have two tips for you to pay
> *>* attention to:
> *>* 1. Read about the [routes] on SIPp, It is tricky to satisfy
> *>* with SIPp scenarios.
> *>* 2. Make sure your DB table is well build (use less varchars and
> *>* integers).
> *>* I found out that there are many kamailio modules I can use to load
> data in
> *>* to memory and I hardly use the DB (only for ACC). I use MTREE, HTABLE,
> *>* DIALPLAN, CARRIERROUTE, DROUTING, and so to store the information I
> *>* And I get it with the simple functions of the module.
> *>* I load around 6 million numbers and other data which takes about 1.5
> Gb of
> *>* the memory.
> *>* For getting around the real-time changes that I need to deal with (In
> *>* the data changes are immediately made on your service…). I have a
> *>* every 120 sec that check is a reload is needed. If so, it reloads the
> *>* relevant data (very fast).
> *>* BR,
> *>* Uri
> *>* Hello,
> *>* On 3/20/12 12:12 PM, Stephen Dodge (Bistech) wrote:
> *>* >*
> *>* *>* Hello,
> *>* *>*
> *>* *>* I am running Kamailio 3.1.5 with a MySQL backend on CentOS. A
> *>* *>* connection to MySQL (an off box MySQL cluster) is required for
> *>* *>* call, sqlops is used to determine destinations and acc to record
> CDR *
> *>* >* information.
> *>* *>*
> *>* *>* I am planning to load test our server using SIPp to generate
> calls, I
> *>* *>* was wondering if anyone has done something similar and could
> *>* *>* advice on what we should monitor on our Kamailio Server. i.e
> *>* *>* CPU & Memory
> *>* *>*
> *>* *>* Thanks in advance for your help.
> *>* *>*
> *>* *if you do a lot of direct DB interactions, perhaps latency of the
> *>* queries will be relevant. You can use benchmark module to see how long
> *>* it takes to execute part of the config file.
> *>* I think you don't fetch lot of records from db in config, so memory
> *>* should be no problem, however you can dump private/shared memory usage
> *>* via RPC commands within sercmd cli. CPU is a good metric always and
> *>* to watch with systems tools.
> *>* Cheers,
> *>* Daniel
> *>* >*
> *>* *>* Steve.
> *>* *
I use Kamailio 3.2.2 as TLS<=>TCP gateway this is working well, but if I
create some traffic by SIPP
then Kamailio response time increase with every new call, seems to be that
Kamailio process call by call.
I made a test with 30caps then after ~200calls Kamailio need ~3s to
response an initial INVITE from the PBX.
This delay seems to be increased with each call.
SIPP UAC---TCP---PABX---TLS---Kamailio---TCP---SIPP UAS
126.96.36.199 = PABX
188.8.131.52 = SIPP UAS
184.108.40.206 = Kamailio
if ($si == "220.127.116.11") # from PABX
xlog("L_INFO","FROM PABX: $rm, $ci\n");
I got all the calls in a single TLS connection from the PBAX so increasing
of TCP childs
doesn't help. I also already tried to adjust some TCP buffers and played
With UDP / TCP it's better, is really the TLS/openssl is the bottleneck or
the way I relay
The test machine has only 512MB RAM and is a single core cpu (2,8GHZ), but
30caps isn't much?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100779.51/warc/CC-MAIN-20231208212357-20231209002357-00609.warc.gz
|
CC-MAIN-2023-50
| 7,664 | 152 |
https://www.techspot.com/news/5637-carmack-on-comparing-ati-amp-nvidia-boards.html
|
code
|
John Carmack, 'the man' from id Software replied to this story posted at Slashdot regarding the recent 3DMark03 benchmark cheating fiasco. What is most interesting though is what he had to say about comparing NVIDIA and ATI boards directly, at what precision shaders work internally in each of the boards and a take from Doom3's perspective:
The significant issue that clouds current ATI / Nvidia comparisons is fragment shader precision. Nvidia can work at 12 bit integer, 16 bit float, and 32 bit float. ATI works only at 24 bit float. There isn't actually a mode where they can be exactly compared. DX9 and ARB_fragment_program assume 32 bit float operation, and ATI just converts everything to 24 bit. For just about any given set of operations, the Nvidia card operating at 16 bit float will be faster than the ATI, while the Nvidia operating at 32 bit float will be slower. When DOOM runs the NV30 specific fragment shader, it is faster than the ATI, while if they both run the ARB2 shader, the ATI is faster.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735909.19/warc/CC-MAIN-20200805035535-20200805065535-00301.warc.gz
|
CC-MAIN-2020-34
| 1,015 | 2 |
http://lists.openmoko.org/pipermail/community/2008-September/029000.html
|
code
|
Mofi on FR
stroller at stellar.eclipse.co.uk
Mon Sep 1 16:56:21 CEST 2008
On 31 Aug 2008, at 18:54, Nishit Dave wrote:
> Why doesn't somebody fix the charmed file in the repos? T
> ... standing around wifi hotspots, if they know they have to change
> init() to _init().
Oh, don't be ridiculous.
The guy standing in line for coffee next to you will have just
finished editing /usr/lib/python2.5/site-packages/gtk-2.0/gtk/
__init__.py on his phone, so will know to help you.
More information about the community
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084888135.38/warc/CC-MAIN-20180119204427-20180119224427-00660.warc.gz
|
CC-MAIN-2018-05
| 509 | 12 |
https://remotelywecode.com/job/UrmvVDVZdq/senior-software-engineer
|
code
|
Have you ever tried to hire a plumber? How about a house cleaner? If you have, chances are it took you way longer than it should. In the era of instant-everything, you shouldn’t have to waste an entire afternoon researching, calling and vetting local service professionals whenever you need one. The market for hiring them is huge — $1 trillion in the US alone — but the process is inefficient and largely offline.
Thumbtack is transforming this experience end-to-end, building a marketplace that matches millions of people with local pros for almost any project. In making these connections, not only do our customers get more done every day, our pros are able to grow their businesses and make a living doing what they’re great at.
These customers and pros come from all walks of life and every county in the country. We want our team to reflect that. If you come from an underrepresented background in tech, we strongly encourage you to apply. We challenge ourselves every day to make this a place where you can thrive just the way you are, so we can build a product that does the same for our customers and pros.
At Thumbtack, engineers at every level build products and systems that directly impact our customers and professionals. Our challenges span a wide variety of areas, ranging from building search and booking experiences to optimizing pricing systems, to building tools to help professionals grow their businesses. We believe in tackling these hard problems together as a team, with strong values around collaboration, ownership, and transparency. To read more about the hard problems that our team is taking on, visit our engineering blog.
As a Senior Software Engineer, you’ll focus on bringing the Thumbtack vision to life. You’ll collaborate with other engineers, designers and product managers to execute on a broad range of projects. This could include building new features to improve the experience of our users, architecting infrastructure to support a fast-growing user base, or optimizing our marketplace mechanics to make better matches between customers and professionals.
If you don't think you meet all of the criteria below but still are interested in the job, please apply. Nobody checks every box, and we're looking for someone excited to join the team.
Thumbtack is a local services marketplace – one of the largest in the U.S. – that helps millions of people hire local professionals. With hundreds of unique service categories, customers can find a Thumbtack pro for almost anything: landscapers, DJs, personal trainers, even piano teachers. And in making these connections, we empower local pros too. Helping them get new customers and make a living doing what they’re great at.
Founded in 2008 and headquartered in San Francisco, Thumbtack is backed by over $400 million in investment from Sequoia Capital, CapitalG, Tiger Global Management, Javelin Investment Partners and Baillie Gifford.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303717.35/warc/CC-MAIN-20220121222643-20220122012643-00194.warc.gz
|
CC-MAIN-2022-05
| 2,945 | 8 |
https://forums.phpfreaks.com/topic/22964-anyone-used-libchart-with-php/
|
code
|
because i am having problems using the classes they have given to detail the charts. I am trying to add a label to the y axis but the classes do not make sense to me.
If anyone has done this can you please show the code?
Anyone used LibChart with PHP.......
1 reply to this topic
Posted 04 October 2006 - 11:33 AM
Can you show us what you have written so far. I or maybe someone else could give you an example, but it might not even be doing what you need done. Which wouldn't help you. So help others, help you, by showing the code you have tried so far!
0 user(s) are reading this topic
0 members, 0 guests, 0 anonymous users
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814566.44/warc/CC-MAIN-20180223094934-20180223114934-00733.warc.gz
|
CC-MAIN-2018-09
| 627 | 8 |
https://kb.globalscape.com/Knowledgebase/10206/Does-EFT-Servers-LDAP-authentication-support-SSL-encrypted-sessions?Keywords=SSL
|
code
|
THE INFORMATION IN THIS ARTICLE APPLIES TO:
- EFT Server (All Versions)
- Does EFT Server's LDAP authentication support SSL encrypted sessions?
- What is the behavior of the SSL feature when configuring EFT to pull users from an LDAP Server?
- Does EFT act as a client and accept the LDAP server's SSL certificate (key) automatically?
Yes, a SSL encrypted session to the LDAP server requires that the server have a certificate, regardless of the protocol underneath SSL (FTP, HTTP, LDAP, etc.) EFT Server, acting as a client, is configured to accept any certificate presented by the LDAP server to which the auth manager is pointing.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473738.92/warc/CC-MAIN-20240222093910-20240222123910-00563.warc.gz
|
CC-MAIN-2024-10
| 633 | 6 |
https://panel.smsapproval.com/157-pyro-music
|
code
|
The Cheapest Pyro Music Sms Verify Service
Do you need phone verification for Pyro Music?
We offer the best Pyro Music sms verification service with cheaper price Pyro Music.
Your should receive Online SMS for Pyro Music. And Then, you be able to use one of the phone numbers on our website and use them for Pyro Music phone, SMS verification.
For example for verifying your Pyro Music account every day we add new temporary phone numbers and remove these ones that don’t work anymore. Therefore, you can rely to our website.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335058.80/warc/CC-MAIN-20220927194248-20220927224248-00114.warc.gz
|
CC-MAIN-2022-40
| 527 | 5 |
https://askubuntu.com/questions/520404/using-dd-and-an-sdcard
|
code
|
One of three things could be happening here (I'm not too familiar with Raspian):
The SD card is interfering with the boot sequence
It's possible that for some reason the boot process is picking up the partitions/files on the SD card and causing it to fail booting, try simply removing the SD card and reboot. I believe that should do the trick, if not you might have some trouble.
You fried your partition
If that command that you have above is the actual command you used, there shouldn't have been a problem. However, if you instead typed something along the lines of
of=/dev/sdX, then that would have friend the beginning of the partition number # or the beginning of the disk respectively.
If you did, in fact, somehow manage to fry your partition, then there's really not a lot you can do to recover the data aside from using a tool like
testdisk (which may or may not work depending on whether all backup superblocks were wiped) or, worst case,
scalpel to recover the files. Otherwise, simply reformat and try again.
dd can potentially be a very destructive program. It has no warnings that would tell you "Hey buddy, are you really sure you want to do this? It's probably a bad idea" -- it just goes. Therefore, you need to be sure that the command you type is the command you really want. For example, you might ensure that /dev/mmcblk is the correct device by first mounting the SD card (or a partition on it) and then finding the device listed in the
mount command. However, from the command you typed it should have worked as expected...
There is an error in the boot sequence
I've seen this happen while creating custom ISOs and it tends to happen when the root filesystem can't be found (or it's corrupted). If you have a separate /home partition, then there still may be problem with with the root partition while your /home partition remained untouched.
As described here, remove the kernel options
splash and append the kernel option
debug while in GRUB (the bootloader). To do this, press E while you have a boot option selected. Once the line is edited, press Ctrl+X to boot.
This will write a /tmp/initramfs.debug file. After the system fails to boot, you can then use the
httpd command to allow another computer to access the filesystem via a browser, or you can simply reboot with a LiveCD and examine the file. What you may be looking for is a line that says something similar to "Unable to find root partition."
It is also possible that the root filesystem is corrupt and needs to be fixed with a filesystem check. In order to do this, first boot from a LiveCD/USB.
- Open a console
- Find the partition in question using
gparted-pkexec. If you suddenly have a big block of free space on your drive, it's very possible that the root partition got overwritten and may not be recoverable. If that's not the case, continue to step 3.
e2fsck -p /dev/sdX# (where /dev/sdX# is the device and partition of your root filesystem (possibly /dev/sda4 or /dev/sda5, but you you'll want to verify that with
gparted-pkexec from the LiveCD/USB)
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943746.73/warc/CC-MAIN-20230321193811-20230321223811-00323.warc.gz
|
CC-MAIN-2023-14
| 3,052 | 24 |
https://fifthandfido.com/pages/contact
|
code
|
Hey, I'm Alexa, Queen of Customer Service. I'd love to hear from you if you have any questions or feedback on our natural pet products.
If you need to contact me with questions, feedback, or suggestions just email [email protected]. I respond to all emails within 24 hours, except weekends and holidays.
We truly care about our customers, so let me know how I can help make your experience the best one possible!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100800.25/warc/CC-MAIN-20231209040008-20231209070008-00011.warc.gz
|
CC-MAIN-2023-50
| 412 | 3 |
https://billroper.livejournal.com/1805678.html
|
code
|
I checked in a new set of APIs at work that substantially clean things up in the project that I'm working on. Sadly, they are -- unsurprisingly! -- not at all compatible with the old APIs that someone else on the team wrote. This will mean a certain amount of retrofitting is required. But when it is done, it will be better.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107887810.47/warc/CC-MAIN-20201025041701-20201025071701-00692.warc.gz
|
CC-MAIN-2020-45
| 325 | 1 |
https://extollo.garrettmills.dev/classes/routing.html
|
code
|
Application unit that loads the various route files from
app/http/routes and pre-compiles the route handlers.
The current status of the unit.
The global application instance.
Get the universal path to the root directory of the route definitions.
Get the global Application.
Get the global Container.
This method is called to stop the unit when the application is shutting down. Here, you should do any teardown required to stop the package cleanly.
IN PARTICULAR take care to free blocking resources that could prevent the process from exiting without a kill.
Resolve a UniversalPath to a file served as an asset.
Get the method with the given name from this class, bound to this class.
make() method on the global container.
Recompile registered routes into resolved handler stacks.
Register built-in servers and routes.
Register an asset directory for the given package. This creates a static server route for the package with the configured vendor prefix.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320305006.68/warc/CC-MAIN-20220126222652-20220127012652-00027.warc.gz
|
CC-MAIN-2022-05
| 958 | 15 |
https://rowanmcnyland.wordpress.com/2016/06/09/daily-design-day-160/
|
code
|
Daily Design: Day 160
Daily Design is a series of game concepts devised daily through all of 2016. These are just basic concepts, designed based on three randomly generated words. Today, they are;
Accuracy, Counting and Quick.
As such, the game I’ve designed today is…
Head Count is a simple game about keeping track of characters as they run left-to-right on the screen (just, uh, imagine the image above is reversed).
Players click or tap to increase their count per one, with the aim of staying at the same number of characters that cross. In other words, if five characters cross the screen, the player should have tapped five times before it ends.
The game is level based, with the difficulty increasing dramatically as the game goes on. Each level is slightly randomised, so the player can’t simply look up the solution to each.
As the levels get harder, the player has to contend with characters that look similar, begin to blend together, cross in front of / behind obstacles and more. This makes the game considerably more difficulty.
That’s it! Thanks for reading. I’ll be back tomorrow with another quick game concept.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257644271.19/warc/CC-MAIN-20180317035630-20180317055630-00149.warc.gz
|
CC-MAIN-2018-13
| 1,139 | 9 |
https://reverseengineering.stackexchange.com/questions/20954/how-to-get-address-of-pe-section-to-jump-in-while-backdooring-pe-binary
|
code
|
EDIT: I have posted this poste at security.stackexchange
I am trying to follow this tutorial to backdoor a simple 32bits PE binary (putty.exe).
The method used is to create a new section (named
.test) containing some shellcode, changing the first CALL instruction to JMP on it, executing it, and JMPing back to the original address the first CALL instruction contained before change for JMP.
First part is adding new section, and I am OK with it (done with LordPE). Here are its caracteristics:
Name VOffset VSize ROffset RSize Flags
.test 00110000 00001000 00106E00 00001000 E0000060
immunity, I have loaded
putty.exe. Memory view shows me that
.test section is getting mapped at address 00510000
Here are the first instructions being launched:
7D4D1512 PUSH EAX
0046F346 CALL putty. <--- I changed this for JMP putty.00510000
0046F34B JMP putty.
Debug mode JMP indeed to 00510000 ! So I copy/paste the payload at this place and debug again: payload created via:
msfvenom -p windows/shell_reverse_tcp LHOST=192.168.1.100 LPORT=4444 -f hex
I save the binary an re-launch immunity to debug it:
7D4D1512 PUSH EAX
0046F346 JMP putty.00510000
But JMP occurs now at the very end of the shellcode ! At 0051008E !
Feeling the beginning of the section with NOP does not change the behavior (always at the end of the shellcode).
How is it possible to force the execution flow to the beginning of my shellcode instead ? As no one seems to have encountered this trouble, I suppose I missed some basics.
The document explains how the address is getting calculating like this:
Next step is to hijack the first instruction by jumping to our new section,
for that we need the RVA for both the .test section, first CALL instruction
and address of the next instruction.
001C9DE6 > $ E8 15770000 CALL PsExec_b.001D1500
001C9DEB .^E9 7BFEFFFF JMP PsExec_b.001C9C6B
RVA of 001D1500 is RVA_11500. RVA of 001C9DEB is RVA_9DEB, RVA of .test is RVA_7D0000.
I have no idea how he gets from 001D1500 to 11500 and what is the 1C0000 gap between these two values.
Many thanks for you help understanding this point;
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475422.71/warc/CC-MAIN-20240301161412-20240301191412-00244.warc.gz
|
CC-MAIN-2024-10
| 2,086 | 31 |
https://authors.curseforge.com/members/vico_vps
|
code
|
Can someone make a mod for replacing the models and skins of villagers/Illagers/witches with human-like (Steve/Alex) models and skins?
Or at least to allow resource packs to change it.
How to download
Uh-oh. Seems like Risugami deleted his dropbox account.
The old versions links are still up, they are hosted on mediafire. But, yeah, they are for older versions, like the name says.
This would be amazing!
If anybody implements it, could put the elytra on charm slot? Or let the player to be able to change the slot on config.
Because i already use Bauble Shulker Boxes and it enables Shulker Boxes right on body slot.
In reply to Alexiy_Orlov:
Hi, can you have them add or add your Custom Mob Spwaner for version 1.12.2? is that in Aternos is the Mo Creatures 1.12.2 and not the custom mob spawner for that version, please it is one of the best mod
You can use BiomeTweaker to make this. Less coremoddy than CustomModSpawner
Visiting the thread of Risugami mods i noticed some of then didnt have a counterpart for modern Minecraft, even those being very util.
The ones i was thinking are:
A mod that adds a proper Dog entity, replacing the Tamed Wolf (thus separating wild Wolf and Tamed like Ocelot and Cats). It could use the same mob model than the (Wild/Tamed) Wolf, but have different textures for different breeds, in a NBT structure similar to the one found on Cats.
Of, if interested on different models for each breed, perharps something similar to Style models (sadly the mod seems to be discontinued).
In reply to vico_vps:
Sounds like you're the one who doesn't know what they're talking about.
I dont know what i'm talking about? Who was the first to tell bullshit without reading the whole post (i was talking about activate VANILLA-LIKE shaders on general gameplay, but in the style of Optifine).
Shaders without Optifine? You'd better have a top of the line pc.
What? Where did you get that nonsense from? Minecraft actually use shaders to render things like spider and creeper vision, not forgeting the old "Super Seecret Settings" that was present in MC menu until 1.9
Yeah its sad.
Maybe IF someone like this request and try to make a Forge version...
I know some modders would kill me because of this request, but ill post anyway.
Maybe to prevent confusion with native Forge mods the mod could load the JS mods from another folder at the root of the game profile (eg.: jsmods or even "plugins"), and each mod would consist of a zipped (or not) folder with the .js files in the root, and the structure of a resource/datapack (because every standard mod is both too).
Projects with concept similar, but for older versions of Minecraft:
Basically a way to let datapacks customize things like mob spawns, ores and other features currently not possible to tweak using vanilla datapacks).
"Why not just wait BiomeTweaker and Orespawn to be updated?"
Because datapacks are the new way to customize Minecraft, the old one (tweaking config files) is now a old mindset.
Currently to use shaders we need to resort to Optifine which is prone to break with some mods.
I was thinking about a way to make a shader system based on vanilla and embedded in resource packs (assets/minecraft/shaders/), but with a configuration system similar to the shader mod now build in OF.
Could be done? 1.12/1.14+
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987817685.87/warc/CC-MAIN-20191022104415-20191022131915-00096.warc.gz
|
CC-MAIN-2019-43
| 3,306 | 31 |
http://www.onrpg.com/boards/threads/223556-Black-Gold-Open-Beta-Started/page2?p=3012968&viewfull=1
|
code
|
Whelp! I won't be playing it any time soon, and honestly, I don't care much. It looks and sounds just like what I was expecting, and honestly, I'm just trying to burn time until the next semester or ArcheAge comes out.
I tried to use the downloader, but it pulls internet resources from every other THING that uses the internet in my parents' house, so I couldn't use the downloader while everyone was awake, so I just had to use the lengthy-ass direct download through Chrome which took roughly double the time, and could easily get corrupted or outright STOPPED if the internet connection goes down for a minute, which tends to happen out here in the country.
Long story short, I stopped the downloader, but the downloader didn't close all the way, even after I used task manager, so my computer got so bogged down, that once the game FINALLY finished downloading at 4:30 AM, I had to stop the installation mid-way and restart my computer. Then I fell to sleep, tried to install it again, but it said "too many cabs. were broken", or some shit like that, so I copied the things from the rar AGAIN which in itself took half an hour, and finally got the damn thing installed.
Will it be worth the wait? I doubt it, but I'm gonna try if I can today.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860122420.60/warc/CC-MAIN-20160428161522-00181-ip-10-239-7-51.ec2.internal.warc.gz
|
CC-MAIN-2016-18
| 1,248 | 4 |
http://monox.mono-software.com/Mono/Pages/Discussion/dtopic/RptohI3sZUKupp8nAMsdrg/Cannot-Login-to-system-with-Internet-Explorer-but-all-other-Browsers-work/?username=PatrickH&dmsgId=7-Cf20zj9EWvkZ8nAMsdrw
|
code
|
can you send us a Fiddler session attached to a post so we can check if IE is properly requesting the Default page after the login process.
1. Start fiddler
2. Go to login page (unauthenticated)
3. Login with your credentials
4. Go to fiddler and save the whole session (if you are not authenticated after the login of course)
5. Send the session to us
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100286.10/warc/CC-MAIN-20231201084429-20231201114429-00379.warc.gz
|
CC-MAIN-2023-50
| 352 | 6 |
https://wiki.dirty-cache.com/Oracle_AWR
|
code
|
Automatic Workload Repository
Oracle Automatic Workload Repository (AWR) is an Oracle feature that allows users to generate detailed database performance reports. It requires a Diagnostics Pack license. An alternative is Statspack - which doesn't require a license and requires a DBA to set it up properly - and it produces less detailed, but still useful, text reports.
See Oracle Base - AWR for more details on how to use it.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510319.87/warc/CC-MAIN-20230927171156-20230927201156-00734.warc.gz
|
CC-MAIN-2023-40
| 427 | 3 |
https://p3js.goncalomb.com/
|
code
|
Add/Remove/Edit assembly instructions here. The 'type' controls the instruction format (and how the operands are translated to binary). Check the documentation on the P3 assembly instruction format for more information.
<name> <opcode> <type>
The P3 is a 16-bit CPU used at Instituto Superior Técnico (IST) as a learning tool for Computer Engineering students.
For more information on the P3 CPU check p3doc on GitHub Pages.
It also includes a command-line assembler and simulator using Node.js.
This is an open source project, for more information check p3js on GitHub.
Please contact me with any issues or suggestions:
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476211.69/warc/CC-MAIN-20240303075134-20240303105134-00806.warc.gz
|
CC-MAIN-2024-10
| 621 | 7 |
http://azp.com.ar/enjoy-on-the-web-blackjack-inside-canada/
|
code
|
Doing so setting you’ve had step 3 hand the meanwhile to the betting user interface. Their set of real black-jack video game includes Western Black-jack, Pirate Black-jack, and you will Single-deck Black-jack, in addition to lots of live versions of the game. Eatery Casino advantages loyal participants with some ace incentives and you may promos that are delivered on the regular. Between its Gambling establishment Black, Gambling enterprise Red live gambling establishment areas and virtual games, Very Harbors hosts forty five blackjack variations at the time out of composing. You should buy around $5,100 if you deposit using fiat money or to $7,five hundred if you undertake the newest crypto option.
- All of the finest internet sites offering casino desk games is to offer advertisements to help you the new and you may existing professionals.
- Formerly known as Medical Online game, Light and Ask yourself is recognized for their commitment to digital video game, which have sophisticated blackjack variations for example Black-jack Button and you will Live Black-jack.
- The new blackjack laws and regulations designate mathematical blackjack credit philosophy to each and every cards.
- If you are to try out alive dealer black-jack, all of the athlete needs to create their move before the broker’s gamble.
- There are more than 30 blackjack tables to pick from, that is run from the top-notch blackjack gambling enterprise people.
- Entertaining gameplay if this’s trying to end up being classic or modern.
Ahead of we advice jungle wild casino game people casino, there are certain key elements it need to rating highly inside the. The essential black-jack method demands calculating your chances of heading boobs from the attracting some other cards. Including, if you get a 20, the chances of getting tits is actually twelve/13.
Where Can you Discover the Blackjack Desk Regulations?: jungle wild casino game
So it identifies a give that doesn’t contain a keen ace, or if perhaps there is a keen ace then it matters because the a one worth, unlike an enthusiastic eleven. Some other preferred adaptation in our classic Black-jack, our very own Totally free Bet Blackjack boasts some big extra web sites. As the label means, this really is Real time Black-jack that have unlimited chair during the dining table, rather than the common restriction away from seven seating. All of our educated group of editors and you can experts verify articles for accuracy and you may comprehensiveness. WikiHow’s Posts Government People very carefully checks work from your editorial team in order that for each and every blog post is supported by respected look and fits all of our top quality standards. For example, an excellent seven running count split up from the a couple of decks renders you with a real matter of around around three.
Tips Enjoy Blackjack Pro At the Betmgm
You may also play for lengthy making if the RTP will probably be worth the danger. Which have 100 percent free-gamble table video game, there isn’t any monetary stress to beat the house. You’ll find freeplay or real money black-jack at the virtually every a casino on the web. Particular gambling enterprises provides fascinating blackjack alternatives which have top bets and you can jackpots.
Five Suggestions to Help you Win Black-jack Video game
Real cash black-jack online game come anyway of the casinos in the above list. In addition to, some will let you try out free online game very first before you initiate playing blackjack for real money. «Brand new bets just» is even understood by phrase OBO; it offers an identical affect first strategy and also the home boundary while the reverting so you can a hole credit games. Of many on line blackjack gambling enterprises attract professionals by providing huge greeting incentives to own registering with the website.
It will always be smart to stay on the feet and get able to possess everything you, however it’s an error to help make reasons on your own problems. Every time you features doubts, make sure the web gambling enterprise, how they are audited and also the game RTP. There isn’t any reasoning to think that the cellular models of the game is actually shorter legitimate compared to desktop computer of these. Blackjack apps can’t be rigged if you obtain him or her in the certified website and you will enjoy during the an authorized gambling enterprise.
Play the better real money slots out of 2023 at the all of our finest gambling enterprises today. It’s not ever been better to win larger on your own favourite slot video game. Blackjack Switch uses all of the legislation out of old-fashioned blackjack, if you can gamble one kind of the fresh game, you’ll has a grasp of your own basic gameplay here too. Yet not, there are some extremely important transform you’ll must be aware of before you diving into your first hand. Blackjack try a casino game of utilizing effortless mathematics and you can believed, and thus demands a sound expertise in earliest approach.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817081.52/warc/CC-MAIN-20240416093441-20240416123441-00891.warc.gz
|
CC-MAIN-2024-18
| 5,059 | 16 |
https://neuraldsp.com/our-mission/
|
code
|
Neural DSP Technologies is an audio engineering startup on a mission to answer a deceivingly complex two-part question:
- What kind of tools will be crucial for musicians, composers and producers 2 or 3 decades from now?
- How can we accelerate the development of these tools by an order of magnitude?
Answering these questions is no easy task, but engineering the answers is a process exponentially more difficult.
We are currently tackling several problems simultaneously, below is a list of the highest impact technologies being advanced and/or developed by us (in order of short/mid-term relevance):
Advanced algorithm research
creating digital models indistinguishable from any analog circuit is a logical first step, in addition, we are developing a platform onto which completely new sounds and effects can be seamlessly implemented by users with no engineering knowledge required.
Deep machine learning
currently diverging into two main areas:
- The semi-automation and exponential improvement of the development of advanced algorithms (for both internal tooling and black box modeling product-features).
- Enabling the full automation of time-consuming, non-creative production work (quantifying, editing, mixing and even mastering).
User Interface Design
being able to simplify current interfaces has the power to revolutionize how we interact with our devices, which can be a game-changer when it comes to making complex tools easy to use.
The particular approaches for attacking all of these issues will be disclosed as we approach the viability of the first products in each area.
These breakthroughs will be the foundation for a new generation of tools, some in the form of pure software products and platforms, others in the integration of proprietary hardware and software.
The Neural DSP Technologies engineering team is working relentlessly to help your musical creativity expand alongside technology.
Neural DSP is comprised of a multidisciplinary team of experts solely focused on advancing the state of the art in the sonic industrial-sciences.
We are working relentlessly advancing and incorporating the latest developments in electronics engineering, digital signal processing, user interface/experience design, embedded systems and machine learning into the music industry.
Our mission is to design the next generation of both audio software and hardware products in order to empower musicians’ creativity to expand alongside technology.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370496330.1/warc/CC-MAIN-20200329232328-20200330022328-00302.warc.gz
|
CC-MAIN-2020-16
| 2,463 | 19 |
https://hasgeek.com/pyconpune/2017/sub/getting-started-with-python-packaging-on-fedora-X4saKuXF62NfHBkJTR1KhT
|
code
|
Getting started with Python Packaging on Fedora
Why is packaging important?
Why should an enterprise developer package their application?
Why python packages?
In this talk, the audience will get to know about the basics of packaging python applications on Fedora and the process to submit their first package and review packages by others. This talk will also cover how to build the package for different versions of Fedora and EPEL.
The talk will be as follows:
1. Introduction to Fedora packaging and setting up the system.
2. Creating a FAS account.
3. Discussing .spec file.
4. Mock build and testing the package.
5. Push the package upstream for testing and acceptance.
6. Reviewing others packages.
(Optional for a talk/required for a workshop) Laptop with f24 and fedora-packager installed for a hands-on experience.
Google Summer of Code 2015 student developer.
FudCon 2015 participant and speaker.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154304.34/warc/CC-MAIN-20210802043814-20210802073814-00004.warc.gz
|
CC-MAIN-2021-31
| 906 | 15 |
https://rd.springer.com/article/10.1007/s11219-016-9310-1?error=cookies_not_supported&code=2f04f319-58c3-42bc-9ec1-f78b7db0c477
|
code
|
Due to the increasing size and complexity of software systems, it becomes hard to test these systems exhaustively. As a result, some faults can be left undetected. Undetected faults can lead to failures in deployed systems. Such failures are usually reported by the users from the field or test engineers back to developers. It requires considerable time and effort to analyze and reproduce the reported failures because their descriptions are not always complete, structured and formal. In this paper, we introduce a novel approach for automatically reproducing failures to aid their debugging. Our approach relies on semi-structured failure scenario descriptions that employ a set of keywords. These descriptions are preprocessed and mapped to a set of predefined test case templates with valid input sets. Then, test cases are generated and executed to reproduce the reported failure scenarios. The approach is evaluated with an industrial case study performed in a company from the telecommunications domain. Several failures were successfully reproduced. The approach is also adopted in the quality assurance process of the company. After one-time preparation of reusable test case templates and training of test engineers, 24.9 % of the reported failures (and 40 % of those that were manually reproducible) could be reproduced without any manual effort.
This is a preview of subscription content, access via your institution.
Buy single article
Instant access to the full article PDF.
Tax calculation will be finalised during checkout.
Subscribe to journal
Immediate online access to all issues from 2019. Subscription will auto renew annually.
Tax calculation will be finalised during checkout.
We refer to both software test engineers and end users of the system as users.
The number of compatible issues were decreased due to a major version upgrade.
The average time to reproduce a failure is basically expert opinion. We collected estimations of all the involved engineers in the company.
Andrica, S., & Candea, G. (2011). Warr: A tool for high-fidelity web application record and replay. In Proceedings of the 41st annual IEEE/IFIP international conference on dependable systems and networks (pp. 403–410).
Arya, K., & Verma, H. (2014). Keyword driven automated testing framework for web application. In Proceedings of the 9th international conference on industrial and information systems (pp. 1–6).
Avizienis, A., Laprie, J. C., Randell, B., & Landwehr, C. (2004). Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 1, 11–33.
Bajpai, N., et al. (2012). A keyword driven framework for testing web applications. International Journal of Advanced Computer Science and Applications, 3(3), 8–14.
Briand, L., Labiche, Y., & He, S. (2009). Automating regression test selection based on UML designs. Information and Software Technology, 51(1), 16–30.
Friedl, J. (2006). Mastering regular expressions. Sebastopol: O’Reilly Media Inc.
Grottke, M., Nikora, A., & Trivedi, K. (2010). An empirical investigation of fault types in space mission system software. In Proceedings of the 40th IEEE/IFIP international conference on dependable systems and networks (pp. 447–456).
Hui, J., Yuqing, L., Pei, L., Shuhang, G., & Jing, G. (2008). LKDT: A keyword-driven based distributed test framework. In Proceedings of the international conference on computer science and software engineering (Vol. 2, pp. 719–722).
Jin, W., & Orso, A. (2012). Bugredux: Reproducing field failures for in-house debugging. In Proceedings of the 34th international conference on software engineering (pp. 474–484).
Lerman, J. (2013). Behavior-driven design with specflow. MSDN Magazine, 28(7), 12–22.
Naveen, K., & Hunter, P. (2012). Cost effective agile test practices and test automation using open source tools specflow and white. In Proceedings of the PNSQC (pp. 165–178).
North, D. (2006). Behavior modification (pp. 27–31). TechWell Corporation.
Pajunen, T., Takala, T., & Katara, M. (2011). Model-based testing with a general purpose keyword-driven test automation framework. In Proceedings of the IEEE fourth international conference on software testing, verification and validation workshops (pp. 242–251).
Sarma, M., & Mall, R. (2007). Automatic test case generation from UML models. In Proceedings of the 10th international conference on information technology (pp. 196–201).
Soeken, M., Wille, R., & Drechsler, R. (2012). Assisted behavior driven development using natural language processing. Proceedings of the 50th international conference on objects, models: Components, patterns (pp. 269–287). Springer.
Utting, M., Pretschner, A., & Legeard, B. (2012). A taxonomy of model-based testing approaches. Software Testing Verification and Reliability, 22(5), 297–312.
Vikram, K., Prateek, A., & Livshits, B. (2009) Ripley: Automatically securing web 2.0 applications through replicated execution. In Proceedings of the 16th ACM conference on computer and communications security (pp. 173–186).
Wang, C., Pastore, F., Goknil, A., Briand, L., & Iqbal, Z. (2015). Automatic generation of system test cases from use case specifications. In Proceedings of the international symposium on software testing and analysis (pp. 385–396).
Wynne, M., & Hellesoy, A. (2012). The cucumber book: Behaviour-driven development for testers and developers. Pragmatic Bookshelf.
Yue, T., Ali, S., & Briand, L. (2011). Automated transition from use cases to UML state machines to support state-based testing. In R. France, J. Kuester, B. Bordbar, & R. Paige (Eds.), Modelling foundations and applications, lecture notes in computer science (Vol. 6698, pp. 115–131). Berlin: Springer.
This work is partially supported by P.I.Works. We would like to thank software developers and software test engineers at P.I.Works for sharing their code base with us and supporting our case study.
About this article
Cite this article
Karagöz, G., Sözer, H. Reproducing failures based on semiformal failure scenario descriptions. Software Qual J 25, 111–129 (2017). https://doi.org/10.1007/s11219-016-9310-1
- Failure reproduction
- Automated test case generation
- Behavior-driven development
- Industrial case study
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991178.59/warc/CC-MAIN-20210516171301-20210516201301-00096.warc.gz
|
CC-MAIN-2021-21
| 6,273 | 39 |
http://livelifetoday-rebecca.blogspot.com/2011/04/
|
code
|
Ok the store is up and running.
It's name is Rebecca's Art and Decor.
Business is slow since I put all my money into inventory and none in advertisement. Big screw up.
I put out flier's Monday so we will see how that goes.
I have a running list of what customers have commented on wanting so I can carry them.
Listening to them is how I will make this work.
I also just received the information on advertising on our local radio stations. Hoping to start using it soon.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794863967.46/warc/CC-MAIN-20180521063331-20180521083331-00298.warc.gz
|
CC-MAIN-2018-22
| 469 | 7 |
https://tweaks.com/windows/37008/disabling-automatic-updates-properly/
|
code
|
A lot of people already know about Automatic Updates and how to disable them by selecting the appropriate option from within the Automatic Updates tab in My Computer. A lot of you might not realise this, but the Automatic Update service still runs even when you select to disable it here. To turn it off completely and for good do as follows:
1. Go into Control Panel > Administrative Tools > Services.
2. Highlight the service called "Automatic Updates". You will know when you have the correct one because you will see a description about it telling you what it does.
3. Right click once highlighted and click stop to terminate the service.
4. Right click on it again and go to Properties. Half way down the first tab there is "Startup Type:" change this to disabled.
Congratulations. You have now disabled Automatic Updates service. Not only will this make certain the service won't run, but by disabling it properly you are freeing up system resources as they won't be diverted to running a service that you don't use.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655092.36/warc/CC-MAIN-20230608172023-20230608202023-00761.warc.gz
|
CC-MAIN-2023-23
| 1,022 | 6 |
https://www.miart74.ru/javascript-function-for-validating-numbers-82.html
|
code
|
Otherwise a browser with Java Script disabled, or a hacker trying to compromise your site, can easily by-pass client-side validation.
For an alternative approach to client-side form validation, without Java Script, check out our new article on HTML5 Form Validation which is available now in most modern browsers. The first test in the example is therefore only necessary in order to provide a different error message when the input is blank.
Inside the function, the arguments (the parameters) behave as local variables. If the function was invoked from a statement, Java Script will "return" to execute the code after the invoking statement. The return value is "returned" back to the "caller": Since local variables are only recognized inside their functions, variables with the same name can be used in different functions.
The value of a text input box (or a textarea or password input) is available using the syntax that tells you which option has been selected.
The purpose of a form validation script is to return a boolean value ( to reference form fields, but that can lead to namespace conflicts and why make things more complicated than necessary.
When the form is submitted - either by hitting Enter or clicking on the Submit button - the to abort (cancel) the form submission. In a real-life situation you will most likely have more fields to check, and more complicated conditions, but the principle remains the same.
The illustration below shows this relationship: Note that the 'I' in selected Index needs to be capitalised - Java Script functions and variables are always case-sensitive. Read more about the humble checkbox in our HTML5 Checkbox Validation article.
Radio buttons are implemented as if they were an array of checkboxes.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038464045.54/warc/CC-MAIN-20210417192821-20210417222821-00182.warc.gz
|
CC-MAIN-2021-17
| 1,753 | 8 |
http://dhitahomeshop.com/page/revised_an_introduction_to_project_management_fourth_edition_with_brief_guides_to_microsoft_project_2013_and_attask/
|
code
|
Revised An Introduction to Project Management, Fourth Edition: With Brief Guides to Microsoft Project 2013 and AtTask
By: Kathy Schwalbe(Author)
Buy the paperback new from amazon.com and get the Kindle version FREE as part of the Kindle MatchBook program!(Sorry, only works in the U.S. so far.)Note that there is a newer edition. This revision only changes Appendix A to provide instructions for using Microsoft Project 2013 vs. 2010 in the original fourth edition (plus some corrections). This book provides up-to-date information on how good project, program, and portfolio management can help you achieve organizational success. It includes over 50 samples of tools and techniques applied to one large project, and it is suitable for all majors, including business, engineering, and more. This text uses a chronological approach to project management, with detailed explanations and examples for initiating, planning, executing, monitoring and controlling, and closing projects.
Kathy Schwalbe is a tenured Professor at Augsburg College in Minneapolis, primarily teaching courses in project management and problem solving for business. A professional working in the industry for ten years prior to entering academia in 1991, she is currently an active member of the Project Management Institute. Kathy earned her Ph.D. at the University of Minnesota, her MBA at Northeastern University, and her B.S. in mathematics at the University of Notre Dame. She was named Educator of the Year in 2011 by the Association of IT Professionals. She is also the author of IT Project Management and Healthcare Project Management.
||Revised An Introduction to Project Management, Fourth Edition: With Brief Guides to Microsoft Project 2013 and AtTask
You can download a free the eBook!
Or read online
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818695066.99/warc/CC-MAIN-20170926051558-20170926071558-00493.warc.gz
|
CC-MAIN-2017-39
| 1,786 | 7 |
http://www.free-ebook-download.net/mathematical-statistics-springer-texts-in-statistics/
|
code
|
Mathematical Statistics (springer Texts In Statistics)
This graduate textbook covers topics in statistical theory essential for graduate students preparing for work on a Ph.D. degree in statistics. This new edition has been revised and updated and in this fourth printing, errors have been ironed out. The first chapter provides a quick overview of concepts and results in measure-theoretic probability theory that are useful in statistics. The second chapter introduces some fundamental concepts in statistical decision theory and inference. Subsequent chapters contain detailed studies on some important topics: unbiased estimation, parametric estimation, nonparametric estimation, hypothesis testing, and confidence sets. A large number of exercises in each chapter provide not only practice problems for students, but also many additional results.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439736962.52/warc/CC-MAIN-20200806121241-20200806151241-00009.warc.gz
|
CC-MAIN-2020-34
| 851 | 2 |
https://www.mfarazmand.com/news
|
code
|
Sept. 19, 2022
Our paper "Quantifying rare events in spotting: How far do wildfires spread?" has been selected by the Editor-in-Chief as a featured article in the Fire Safety Journal:
May 13, 2022
Our PhD student, William Anderson, wins the 2022 SIAM Student Paper Prize. This prize is awarded annually to only 3 students worldwide. Congrats, William!
The prize is awarded for the following paper:
Evolution of Nonlinear Reduced-Order Solutions for PDEs with Conserved Quantities, SIAM J. on Scientific Computing, vol. 44, pp. A176-A197, 2022
April 25, 2022
Our PhD student, William Anderson, wins the Winton-Rose Award for excellence in research. Congratulations, William!
April 9, 2022
Our paper on "Shape-morphing reduced-order models for nonlinear Schrodinger equations" has been accepted for publication in the Journal of Nonlinear Dynamics.
March 27, 2022
Ethan Brady, our REU student, has been awarded the Goldwater Scholarship. Since May 2021, Ethan has been working with Dr. Farazmand on deep learning of rare extreme events from partial observations. Congrats, Ethan!
March 21, 2022
Our paper on "Model-assisted deep learning of rare extreme events from partial observations" has been accepted for publication in Chaos.
Nov. 8, 2021
Our paper on "Investigating climate tipping points under various emission reduction and carbon capture scenarios with a stochastic climate model" has been accepted for publication in the Proceedings of the Royal Society A.
October 8, 2021
Dr. Farazmand gave a talk as part of the UCLA Seminar Series on Network Science for Fluid Mechanics. A recorded version of the talk is available here.
October 8, 2021
Our paper on "Evolution of nonlinear reduced-order solutions for PDEs with conserved quantities" has been accepted for publication in SIAM J. on Scientific Computing.
August 9, 2021
Our paper on "Mitigation of rare events in multistable systems driven by correlated noise" has been accepted for publication in Phys. Rev. E.
August 2, 2021
During the summer, Dr. Farazmand supervised a group of undergraduate students as part of DRUMS, an REU program. For more information, visit the DRUMS webpage: https://drums.wordpress.ncsu.edu/
The following short video summarizes the research project:
April 30, 2021
Dr. Farazmand wins the John Griggs Award for Outstanding Research.
March 12, 2021
Dr. Farazmand gives a talk at the Fluid Mechanics Webinar Series jointly organized by University of Cambridge, Leeds Institute, UK Fluids Network and Journal of Fluid Mechanics:
Sept. 8, 2020
Dr. Farazmand gives a talk in the Second Symposium on Machine Learning and Dynamical Systems at the Fields Institute: Data-driven prediction of multistable systems from sparse measurements
Aug. 26, 2020
Dr. Farazmand is awarded the Faculty Research and Professional Development (FRPD) Award from NC State
June 29, 2020
Dr. Farazmand receives the Lloyd H. Donnell Applied Mechanics Reviews Paper Award from ASME. This award is given jointly to Dr. Farazmand and Dr. Themis Sapsis (MIT) for the paper Extreme Events: Mechanisms and Prediction.
June 15, 2020
Our paper "Multiscale analysis of accelerated gradient methods" is accepted for publication in SIAM Journal on Optimization.
February 21, 2020
Our paper on "Vortex boundaries as barriers to diffusive vorticity transport in two-dimensional flows" has been published in Phys. Rev. Fluids.
January 15, 2020
Dr. Farazmand presents his work on accelerated gradient optimization in the SIAM Minisymposium on Applications of Machine Learning to the Analysis of Nonlinear Dynamical Systems, Joint Mathematics Meeting, Denver, Colorado
January 8, 2020
Our paper "Mitigation of tipping point transitions with time-delay feedback control" is accepted for publication in Chaos' focus issue on Rare Events in Complex Systems: Understanding and Prediction
November 25, 2019
Dr. Farazmand gives a talk in the 72nd annual meeting of American Physical Society, Division of Fluid Dynamics.
November 3, 2019
Dr. Farazmand gave an invited lecture at 9th Naval Academy Science and Engineering Conference.
October 28, 2019
Dr. Farazmand presented his work on accelerated gradient optimization at UCLA's Institute for Pure and Applied Mathematics (IPAM) as part of the Workshop on Machine Learning. The recorded talk is available below:
September 24, 2019
Our invited review article is published in ASME Applied Mechanics Review:
Discussion by Prof. Grigoriu and Wayne Uy
September 16, 2019
Our paper "Closed-loop adaptive control of extreme events in a turbulent flow" is published in Phys. Rev. E.
November 18-20, 2018
I co-organized a focus session on Extreme Events in Atmospheric and Oceanic Flows (Focus Session 40.1) as part of the 71st Annual Meeting of the American Physical Society, Division of Fluid Mechanics. [Link]
January 29, 2018
Our article on extreme events appears in SIAM News:
September 22, 2017
MIT News writes a story about our paper on the prediction of extreme events:
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656675.90/warc/CC-MAIN-20230609100535-20230609130535-00507.warc.gz
|
CC-MAIN-2023-23
| 4,955 | 60 |
http://buzzwiki.robotplanet.dk/index.php/FAQ
|
code
|
- 1 Is Buzz Multi-Platform?
- 2 Who is developing Buzz?
- 3 I just Downloaded Buzz, and its not making any noise?!
- 4 Is Buzz Open-Source?
- 5 Does Buzz Support MIDI?
- 6 What native file Formats does Buzz Use/Accept?
- 7 Does Buzz support VST plugins and soundfonts?
- 8 Does Buzz work in Wine?
- 9 Is it hard to switch from Impulse Tracker (or other classic Trackers) to Buzz?
- 10 What do I get for Registering?
- 11 Buzz crashes and is unstable
Is Buzz Multi-Platform?
The current build of Jeskola Buzz reportedly runs on:
- Windows 2000
- Windows XP
- Windows Vista
- Windows 7
Who is developing Buzz?
Oskari Tammelin (of Finland) is the main developer from Buzz, while the machines and support are provided by a growing community of fanatics spread across the entire world.
I just Downloaded Buzz, and its not making any noise?!
The first step to Buzzing, is to setup your "Waveout" device in "View/Preferences/Wave Out". See Configuring Buzz
Is Buzz Open-Source?
No. The main development and binaries of Buzz are handled by Oskari, although all information you need to develop machines is standard installed with Buzz, and available to all.
Does Buzz Support MIDI?
Yes. In two different ways. First, after configuring your MIDI input settings, you can play and record notes just like with other MIDI-supporting software. This is accomplished by the machines itsself. Not all machines support MIDI-in, but more recent ones do. Second, the Buzz core supports audio parameter control via MIDI Continuos Controllers (the knobs found on most MIDI synths). While this does not sound powerful at first, it is. It gives users physical access to thousands of parameters for hundreds of machines.
What native file Formats does Buzz Use/Accept?
The native song file format of Buzz is .BMX. This file contains a machine layout, patterns, sequence, and all samples associated with one song. A .BMW is the same file, without the embedded samples. For Samples, Buzz accepts all standard Windows .WAV files, and for Instruments, Buzz accepts .XI multi-samples Fast Tracker Files. While the Buzz machines too could be considered media files, they all retain the generic .DLL extension. For Machine Presets, Buzz uses a proprietary .PRS file. Lastly, the HDD recorder in Buzz writes 16bit (integer) or 32bit (float) Stereo .WAV Files.
Does Buzz support VST plugins and soundfonts?
Yes, see here for Polac VST(i). Use Jeskola XS-1 to load standard .SF2 multi-sampled Sound Fonts.
Does Buzz work in Wine?
Reports have confirmed that Buzz is nearly functional (although not officially tested) to function under Wine. There are of course, a few unfunctional areas (such as the CPU Monitor which will attempt to fool you into thinking your entire song is wasting 4% of your CPU).
Is it hard to switch from Impulse Tracker (or other classic Trackers) to Buzz?
Not with this overly informative Converting from Impulse Tracker to Buzz document written by Skaven.
What do I get for Registering?
Besides your name in the Buzz About Box, you'll have the warm feeling in your heart knowing that you've helped Oskari buy yet another bottle of cheap Finnish liquor.
Buzz crashes and is unstable
Some machines cause Buzz to become unstable just by being there. You should remove the machines that are known to be unstable. See the machine blacklist.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583661083.46/warc/CC-MAIN-20190119014031-20190119040031-00481.warc.gz
|
CC-MAIN-2019-04
| 3,324 | 37 |
https://ectf.mitre.org/
|
code
|
Embedded Capture the Flag Competition
The Embedded Capture the Flag (eCTF) Competition is an attack-and-defend exercise for designing secure embedded systems
The Embedded Capture the Flag (eCTF) is an embedded security competition run by MITRE that puts participants through the experience of trying to create a secure system and then learning from their mistakes. The main target is a real physical embedded device, which opens the scope of the challenge to include physical/proximal access attacks. The eCTF is a two-phase competition with attack and defense components. In the first phase, competitors design and implement a secure system based on a set of challenge requirements. The second phase involves analyzing and attacking the other teams’ designs.
The 2024 eCTF is underway! Teams will design and implement a supply chain security solution for microcontrollers on a medical device. The system must securely verify the device integrity while keeping sensitive data confidential.
Countdown to Handoff
See our NICE K-12 Conference Talk
We presented at the 2022 NICE K-12 Conference about the eCTF and how the first and most successful high school team Delaware Area Career Center used the eCTF in their program.
How is the eCTF different from other competitions?
The eCTF is unique in three major ways. First, the focus is on securing embedded systems, which presents a new set of challenges and security issues that are not currently covered by traditional “online” CTFs. Second, unlike the standard attack-only CTF, the eCTF balances offense and defense by including design, build, and attack components. Finally, the eCTF runs over the majority of the spring semester through three phases, allowing time for development and for advanced attacks during the Attack Phase.
Focus on Embedded
Attack / Defend
Past eCTF Competitions
Teams designed and implemented a secure key fob system for a car door lock. The system had to protect the car from unauthorized entry and prevent attacks like replays and key fob cloning.
Teams designed a secure communications system for an unmanned aerial vehicle (UAV) package delivery system. The system had to be secure to prevent attackers from gaining access to the network to spy on and disrupt the UAV system.
Teams designed a secure audio digital rights management (DRM) module for a next-generation multimedia player on the Digilent Cora Z7. The system had to be secure to prevent users from playing pirated music, support region locking, and prevent the creation of cloned bootleg players.
Teams designed a secure video game console on the Digilent Arty Z7. The system had to attempt to protect the intellectual property of game designers, prevent users from loading their own software, and allow verified users to install and play games that they have purchased.
Teams were tasked with designing a modern chip-and-PIN ATM system. Teams had to design and implement the firmware, software, and protocols for the ATM card, the ATM, and the Bank Server to support secure cash withdrawals.
Amrita Vishwa Vidyapeetham University • Baldwin Wallace University • Boston University • Carnegie Mellon University • Cornell University • Dakota State University • Delaware Area Career Center • Florida International University • Florida State University • George Mason University • Indiana Institute of Technology • Massachusetts Institute of Technology • Michigan State University • Morgan State University • Norfolk State University • Northeastern University • Nova Southeastern University • Purdue University • Rensselaer Polytechnic Institute • Rochester Institute of Technology • Singapore Management University • Syracuse University • Texas A&M University • The Ohio State University • Tufts University • University at Buffalo • University of Alabama in Huntsville • University of California Irvine • University of Cincinnati • University of Colorado Boulder • University of Connecticut • University of Dayton • University of Florida • University of Illinois at Urbana-Champaign • University of Maryland College Park • University of Massachusetts Amherst • University of Massachusetts Lowell • University of Nebraska Omaha • University of New Hampshire • University of Pennsylvania • University of Texas at Dallas • University of Wyoming • Virginia State University • Virginia Tech • Worcester Polytechnic Institute
Interested in getting involved as a sponsor?
For the first time, the eCTF is accepting commercial sponsorships through MITRE Engenuity. See the MITRE Engenuity site below or email us at [email protected] for more information.
This CTF, although really hard, was extremely fun… [It] motivated me to dive in deeper and work that much harder to get better as an engineer. The MITRE staff was AMAZING! Thank you for this opportunity
-2021 eCTF Competitor
Navigating the intricacies of securing an embedded device was a fun and new experience. Overall, my experience with the eCTF has led me to consider pursuing embedded system security as a focus area / career.
-2022 eCTF Competitor
I had no security experience prior to this competition. The learning curve was HUGE and I LOVED that! I was forced to learn so much. I loved doing the research, designing and implementing the secure system, and reviewing and attacking other teams’ designs. It was a blast!
-2021 eCTF Competitor
Its a really fun challenge to think about, and putting it in a competition really gave me motivation to learn the skills I needed to learn, even if our team didn’t win, I ended up learning a lot of things that will be useful in the future.
I thought it was a great learning experience for practical applications especially embedded CTF. It was a great CTF topic this year since I really enjoy learning about bootloaders and boot secure devices and development.
-2022 eCTF Competitor
[I enjoyed] learning about how Embedded Security works and how to analyze secure systems vs unsecure systems and learning about the basics of bootloader management and designing a secure bootloader for a secure firmware/application management.
-2022 eCTF Competitor
Thanks so much for the time spent to host an awesome competition, and especially one that works as a capstone opportunity. Making the timeline roughly match the university semester meant I was able to use this for class and engage with it more thoroughly than I would have been able to if it was just a time-intensive extracurricular activity.
-2022 eCTF Competitor
This competition exposed an entirely new side of cybersecurity to me as a Computer Science major… [It] was a great learning experience and got me interested in lower-level security
-2021 eCTF Competitor
Frequently Asked Questions
Who can participate?
Anyone! The eCTF is open to all US citizens 13 or older and most non-US citizens 18 or older (see the participant agreement for all eligiblilty information and exceptions). Students at all academic levels are welcome to participate. Team sizes are unlimited (although a minimum of 3 students is recommended). Sponsorship of a teacher or faculty member to act as a team advisor is required.
However, to be eligible for prizes, students must be US Citizens as of the start of the competition.
Please see the 2024 eCTF Participant Agreement for full terms and conditions.
What does MITRE provide to help?
MITRE provides teams with a reference implementation, embedded hardware (and/or hardware emulator), and technical guidance.
Does the eCTF cost anything?
Participation in the eCTF is entirely free. MITRE will provide the resources to complete the competition including one set of development boards per team, however teams may choose to purchase additional resources to aid with development or attacking.
Are there awards?
Winning teams receive a cash prize, publicity from MITRE, and typically earn accolades from their university as well. The prize amount for 2023 will be announced at the kickoff, though the 2022 eCTF awarded $5,000 in prizes. Students have used their participation in eCTF to build resumes, present at conferences, and open the door to valuable internship and career opportunities, including engineering positions at MITRE and Riverside Research.
Can I earn college credits?
Most students can earn college credit. Work with your professor(s) / faculty advisor to determine how to earn credit at your institution. Remember that this is a significant time commitment, typically commensurate with the credit hours you may receive. An example syllabus is available from the eCTF organizers upon request.
What level of experience is required to compete?
We encourage teams of all levels of experience to compete in the eCTF and aim to make the eCTF accessible to students new to security and embedded systems. We do recommend an understanding of development in C and Python, as the reference design will be implmented in those languages.
However, while the competition may be approachable, the depth of embedded systems enables teams with more experience to attempt more advanced countermeasures and attacks, providing an engaging experience for students of all levels of experience.
How do I sign up?
When team registration opens in September, work with your faculty advisor to fill out this form.
Individual competitor regitration will open in December.
Do I need to travel for the competition?
The competition can be done 100% remotely. MITRE will provide teams with hardware and/or servers to develop and compete on. Once teams have a completed design, they submit the code to MITRE for testing and MITRE will ensure that all challenge requirements are met. Once this verification process is completed, your implementation (source code and protected binaries) will be provided to all of the attacking teams.
After the competition concludes, MITRE hosts an award ceremony in April where teams are invited to share in their accomplishments, meet participants from other schools, interact with MITRE staff, and see the final standings revealed! Prior to COVID, this award ceremony was in-person at MITRE in Bedford, MA, but has been a virtual event for the past 3 years. Plans for the 2023 award ceremony will be announced at kick-off in January 2023.
Can students who are MITRE employees compete?
Yes! Current and former MITRE employees frequently compete in the eCTF. To ensure fairness, competitors who are MITRE employees will have no additional access to the organizers or any internal eCTF resources and will be treated the same as any other competitor.
Can international students or teams compete?
We welcome international students and teams to compete except for students under 18 and students and institutions from Quebec, Russia, Crimea, Cuba, Iran, Syria, North Korea, and Sudan. However, prize money can only be distributed to US citizens atending US-based institutions.
Can high school teams compete?
Please contact the eCTF team at [email protected]
MITRE is a not-for-profit organization that operates research and development centers sponsored by the federal government. MITRE works with industry and academia to apply science, technology, and systems engineering that enables the government and the private sector to make better decisions. Learn more at www.mitre.org
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474893.90/warc/CC-MAIN-20240229234355-20240301024355-00808.warc.gz
|
CC-MAIN-2024-10
| 11,319 | 64 |
https://www.redskytv.com/packages/redtalks-with-louise-bernice-halfe/videos/mistatim-trailer-rev6
|
code
|
Live stream preview
REDTalks with Louise Bernice Halfe • 2m 22s
On September 30, 2021, students, teachers, and families are invited to experience Mistatim, an unforgettable story of reconciliation for children. Red Sky Performance’s acclaimed stage production has been digitally reimagined, featuring music co-created by TSO musicians and Indigenous music creators.
Under a prairie sky, a simple wooden fence is all that separates Calvin on his ranch and Speck on her reservation. In many ways, they are worlds apart - that is, until a wild horse turns their worlds upside down.
Up Next in REDTalks with Louise Bernice Halfe
Red Talks 1/14
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948868.90/warc/CC-MAIN-20230328170730-20230328200730-00354.warc.gz
|
CC-MAIN-2023-14
| 643 | 6 |
http://clearingthirdcreek.blogspot.com/2012/06/taking-shape.html
|
code
|
Now that the big burnings are done, we can get the site ready for the first round of planting. Sue has done an enormous amount of work lugging around the border logs, mapping out paths, creating sacred spaces as well as social spaces. The creek is a place to enjoy and experience, not just admire from the road or from above.
I appear to have lost some progression photos from my phone, so cannot update with visuals for this post. I will get fresh ones shortly!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591578.1/warc/CC-MAIN-20180720100114-20180720120114-00579.warc.gz
|
CC-MAIN-2018-30
| 462 | 2 |
https://fpgaconcepts.wordpress.com/2012/06/05/v5clb/
|
code
|
Xilinx Configurable Logic Block
Configurable Logic Blocks (CLB) are programmable elements inside a Xilinx FPGA.
The figure shown below depicts FPGA Device fabric which is made up of several CLB’s (Snapshot taken from Xilinx PlanAhead Tool). Each of those boxes inscribed in blue are CLB’s which consists of slices & other components.
A Virtex-5 CLB Tile consists of 2 SLICES. Figure depicts each CLB tile consisting of 2 slices. The components have been labelled for better understanding.
The above snapshot is taken from PlanAhead tool which is part of ISE Design Suite System Edition.
Each slice in a CLB consists of a 6 input LUT, Multiplexers (2:1), Carry logic made up of MUX & XOR gates, and D-Flip flops. All our logic gets mapped into these components using synthesis algorithms.
For more on FPGA architectures watch this space.
Filed under: FPGA Concepts, VLSI | 1 Comment
Tags: CLB, FPGA Architectures, FPGA CLB, FPGA Slice, ISE, PlanAhead, Slices, VLSI, Xilinx, Xilinx CLB
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189686.56/warc/CC-MAIN-20170322212949-00461-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 987 | 9 |
https://questioncove.com/updates/61efee2015e680aae35ffa00
|
code
|
https://testbook.com/question-answer/according-to-quantum-mechanics-a-moving-material--5fc8cb6a4869ccc8a31291ab Here is a source that may help!
Do you know of any other sources that may explain the basis of a wave packet?
https://personal.ems.psu.edu/~bannon/Packet.html#:~:text=A%20wave%20packet%20refers%20to,to%20as%20a%20wave%20group.&text=This%20principle%20states%20that%20if,holds%20only%20for%20linear%20systems. Try this.
Join our real-time social learning platform and learn together with your friends!
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662522309.14/warc/CC-MAIN-20220518183254-20220518213254-00401.warc.gz
|
CC-MAIN-2022-21
| 512 | 4 |
http://meta.superuser.com/users/179163/francis-kim
|
code
|
Top Network Posts
- 42Configuring Fiddler to use company network's proxy?
- 34wamp tmp folder takes some GB of space while running magento in localhost
- 28How can I switch to ruby 1.9.3 installed using Homebrew?
- 19Magento Front End Developer Certification
- 14font-smoothing not applied to buttons
- 11Adding a CMS block via setup script
- 10Install PHP 5.4 on Ubuntu 14.04 LTS without Compiling
- View more network posts →
Keeping a low profile.
This user hasn't posted... yet.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824037.46/warc/CC-MAIN-20160723071024-00283-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 483 | 11 |
https://gitlab.com/graphviz/graphviz.gitlab.io/-/issues/174
|
code
|
website claims Graphviz does not provide binary packages on Linux
The download page of the website says:
We do not provide precompiled packages any more.
This is quite surprising for me to read, as I'm pretty sure we do. Even the latest 6.0.2 release has a bunch of DEBs and RPMs attached, https://gitlab.com/graphviz/graphviz/-/releases/6.0.2.
This is an interesting position to be in, because the website actually documents the stance I think we should have. On Linux, you generally get your software through your native package manager (though the Ubuntu Graphviz packages are pretty out of date). If you cannot, then building from source is not complicated.
Not sure if we should update the website to be accurate, or update the release flow to do what the website claims.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100484.76/warc/CC-MAIN-20231203030948-20231203060948-00741.warc.gz
|
CC-MAIN-2023-50
| 776 | 6 |
https://drakensang.fandom.com/en/wiki/Treat_Wounds
|
code
|
A successful Talent Test heals lost vitality points equal to the value of the player's Talent Prowess plus the bonus of the item used over a certain period of time. If the wounded character is injured again during this period, the healing effect will immediately be interrupted. No new Tests can be performed on the injured character during this period. One wound is healed for each successful test and another for every three points of TP. A critical wound is converted to a regular wound by a successful Test.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370497171.9/warc/CC-MAIN-20200330150913-20200330180913-00325.warc.gz
|
CC-MAIN-2020-16
| 511 | 1 |
https://electronics.stackexchange.com/questions/369716/what-is-the-name-if-they-exist-of-pcb-mountable-120-ac-outlet-connectors
|
code
|
I am working on a self device which will plug into the wall, similar to this Wifi extender.
I am having trouble finding a way to attach the AC connectors to my design. I am considering mounting a connector directly on the PCB, something like this example. This one is a bit too large through (the black housing).
Do pieces like the one I am looking for exist? Or what is another way I may consider making the AC outlet connection?
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817144.49/warc/CC-MAIN-20240417044411-20240417074411-00823.warc.gz
|
CC-MAIN-2024-18
| 430 | 3 |
https://www.nist.gov/people/geoffrey-b-mcfadden
|
code
|
Geoffrey B. McFadden
• NIST Fellow, NIST, 2004 - Present
•Leader, Mathematical Modeling Group, NIST, 1999-2010
•Mathematician, NIST, 1982-1999
•Research Scientist/NSF Postgraduate Fellow, Courant Institute of Mathematical Sciences, NYU, 1979-1982
•Research Assistant/NSF Graduate Fellow, Courant Institute of Mathematical Sciences, NYU, 1975-1979
- Ph.D. (Mathematics), Courant Institute of Mathematical Sciences, New York University, New York, NY, 1979.
- M.S. (Mathematics), Courant Institute of Mathematical Sciences, New York University, New York, NY, 1977.
- B.A. (Chemical Physics, Mathematical Sciences, Mathematics), Rice University, Houston, TX, 1975.
Geoffrey B. McFadden is a mathematician in the Mathematical Modeling and Analysis Group of the Applied and Computational Mathematics Division in the NIST Information Technology Laboratory. His main interests are in applied mathematics, mathematical modeling, and scientific computing. He has worked extensively on diffuse interface models of phase transitions in materials science with colleagues in the NIST Material Measurement Laboratory. He has served on the editorial boards of the Journal of Computational Physics, the SIAM Journal on Applied Mathematics, the Journal of Crystal Growth, and Interfaces and Free Boundaries. He is a Fellow of the American Physical Society, the Society for Industrial and Applied Mathematics, and the Washington Academy of Sciences,
• W.J. Boettinger, M.E. Williams, K.-W. Moon, G.B. McFadden, P. N. Patrone, J. H. Perepezco, Interdiffusion in the Ne-Re System: Evaluation of Uncertainties, Journal of Phase Equilibria and Diffusion 38 (2017) 750–763. DOI: 10.1007/s11669-017-0562-7
• Sean Colbert-Kelly, Geoffrey B. McFadden, Daniel Phillips, and Jie Shen, Numerical Analysis and Simulation for a Generalized Planar Ginzburg-Landau Equation in a Circular Geometry, Communications in Mathematical Sciences 15 (2017) 329-357. DOI: 10.4310/CMS.2017.v15.n2.a3
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812579.21/warc/CC-MAIN-20180219091902-20180219111902-00521.warc.gz
|
CC-MAIN-2018-09
| 1,970 | 12 |
https://www.bleepingcomputer.com/forums/t/220427/new-instance-of-svchostexe-since-ms-april-updates/
|
code
|
But even checking with Process Explorer (which I am quite new to), I can't really see which handle for svchost.exe is the new one, as I have never listed what was normal before on paper (I think I shall today just so I'll know in future what is new). All handles appear to be legitimate Windows and security apps. One responder in the BBR forum thread (Noah Vail's post) thinks it is the HTTP SSL service. But my w3ssl.dll file properties shows it was created August 2004 & last modified on 4/14/2008 (not 2009). FWIW, my HTTP SSL service isn't even in Started status and is set to manual start type, and I have had no problems on-line on 3 different bank sites I use. So I'm not convinced this is what is causing the new instance of svchost.exe after updates.
FYI these are the items listed by Process Explorer for the now 6 instances of svchost.exe:
DCOM Server Process Launcher
Remote Procedurre Call
SSDP Discovery Service
TCP/IP NetBios Helper
Windows Image Acquisition
COM+ Event System
Distributed Link Tracking Client
Help & Support
Network Location Awareness
Remote Access Connection
Shell Hardware Detection
System Event Notification
System Restore Service
Windows Management Instrumentation
All look like legitimate WinXP services I have set on manual or auto. Anyone have any thoughts on this?
Edited by buttoni, 19 April 2009 - 10:25 AM.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827992.73/warc/CC-MAIN-20181216191351-20181216213351-00276.warc.gz
|
CC-MAIN-2018-51
| 1,350 | 18 |
https://www.npmjs.com/~freshlogic
|
code
|
- An alternative to the built-in Express middleware for serving static files. Electricity follows a number of best practices for making web pages fast.
- A personal name parser for Node.js: http://en.wikipedia.org/wiki/Personal_name
- The Markdown parser used on the forums at meh.com.
- A cache module for node.js that uses a two-level cache (in-memory cache for recently accessed data plus Redis for distributed caching) with some extra features to avoid cache stampedes and thundering herds.
- library for extracting marketing attribution data (such as search terms) from referrer URLs
- UDP-based write utility for InfluxDB
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647671.73/warc/CC-MAIN-20180321160816-20180321180816-00159.warc.gz
|
CC-MAIN-2018-13
| 627 | 6 |
https://www.avsforum.com/forum/90-receivers-amps-processors/1724250-pioneer-vsx-524-question.html
|
code
|
Pioneer VSX 524 question
I hate when I'm feeling stupid and have to ask for some help, but I'm not getting something....feel stupid....and need help.
Just hooked up a new vsx 524 and can't seem to get the home page to display on the tv. I hit reciever, then the home button, the reciever changes to say a mcacc, but the tv keeps playing what was on but minus the volume.
I'm sure I'm overlooking something very simple, but I'd be very appreciative if someone could point me in the right direction.
Going to work, can't reply till tomorrow.
PS, I can go downstairs to my other setup and get my VSX 23 to do as I want no problem...this one, not so much.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999000.76/warc/CC-MAIN-20190619143832-20190619165832-00257.warc.gz
|
CC-MAIN-2019-26
| 651 | 6 |
https://lists.freebsd.org/pipermail/freebsd-questions/2012-July/243231.html
|
code
|
> You don't. You wipe the FAT32 with fdisk and make a FreeBSD slice on it.
> Then you can bsdlabel it with one partition and newfs it. Or you can
repeat 100 times more that you "have to" make fdisk and bsdlabel. you
don't, and it doesn't make sense
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986670928.29/warc/CC-MAIN-20191016213112-20191017000612-00138.warc.gz
|
CC-MAIN-2019-43
| 248 | 4 |
https://dev.subrion.org/issues/537
|
code
|
Functionality that is not implemented
If no articles added to currently viewed category, the package offers a link to place a new article into category. This link contains the category GET parameter.
By pressing this link a user moves to submit page, but actually the specified category is not selected.
This issue is also affect the SEO aspect.
Since the script generates the same meta title independently of the category specified.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057337.81/warc/CC-MAIN-20210922072047-20210922102047-00368.warc.gz
|
CC-MAIN-2021-39
| 433 | 5 |
http://knoxtalk.blogspot.com/2009/12/value-of-role-playing.html
|
code
|
I appreciate that this runs counter to almost all accepted sales training methods; however, I have yet to be shown how role playing actually results in more successful pitches.
There is a lot of value; however, in practising your pitch before delivery. What's the difference between role playing and practising?
In role playing, not only are you practising your pitch you are also pretending that the person listening to your pitch is your final audience. Reality is, that person is also pretending, they are pretending to be your final audience. Simply practising your pitch removes the layer of make believe from role playing and allows you to focus on the most important aspect of your pitch - your content!
Give you an example. You are pitching the VP of Human Resources at your organization. A colleague agrees to "role play" as the VP. Why is your colleague qualified to pretend to be the VP? Are they and the VP personal friends? Have they worked together closely? Is your colleague a trained actor? Probably "none of the above." You will spend most of your role play responding to your colleague, who is inventing feedback they think the VP would say instead of focusing on your content.
Some of you are thinking, "role playing is valuable. You wouldn't give the same pitch to a peer as you would a Director, a VP or a CEO." I agree absolutely; however, how you pitch to each type of individual goes back to Communications 101 - know your audience.
Once you know your final audience - for example, your CEO responds best to visuals or your VP wants to see an implementation plan - you build your pitch to suit that audience. Then, when you ask a colleague to help you practise, that individual can focus on how well your content fits your final audience instead of trying to invent things your final audience might say.
What do you think? Does role playing have a place outside a stage or screen?
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592861.86/warc/CC-MAIN-20180721223206-20180722003206-00065.warc.gz
|
CC-MAIN-2018-30
| 1,904 | 7 |
http://stackoverflow.com/questions/8810529/how-can-i-set-an-app-pool-restart-schedule-in-iis7-via-wmi-powershell?answertab=oldest
|
code
|
I am creating a function to manage App Pools in IIS7 to our desired specifications, and I am having trouble converting one line from our equivalent IIS6 script; to set the restart schedule.
In IIS6 the line was:
$newPool.PeriodicRestartSchedule = @( '6:15' );
The naive translation for IIS7 is:
$newPool.Recycling.PeriodicRestart.Schedule = @('00000000061500.000000:000')
however this doesn't work because it throws the exception:
Exception setting "Schedule": "Unable to cast object of type 'System.String' to type 'System.Management.ManagementBaseObject'.
How do I create this
ScheduleElement array to assign to this value?
Edit: problem 1 down...:
$time = ([wmiclass]'root\WebAdministration:ScheduleElement').CreateInstance() $time.Value = '00000000061500.000000:000' $newPool.Recycling.PeriodicRestart.Schedule = $time;
Problem 2: This value doesn't seem to save when I call
$newPool.Put(). What's next?
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936462313.6/warc/CC-MAIN-20150226074102-00060-ip-10-28-5-156.ec2.internal.warc.gz
|
CC-MAIN-2015-11
| 907 | 13 |
https://forum.mibuso.com/discussion/77098/replace-namespace-in-xml-ports-with-net
|
code
|
i created an xml-export with a .net variable. (System.Xml.XmlTextWriter.'System.Xml, Version=220.127.116.11, Culture=neutral, PublicKeyToken=b77a5c561934e089')
My example code is like this
The result is:
So far it looks ok.
Now I want to change 'xmlns" in the CustomField-part by 'name'.
Anybody an idea how to solve this?
Thanks a lot.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573760.75/warc/CC-MAIN-20220819191655-20220819221655-00785.warc.gz
|
CC-MAIN-2022-33
| 336 | 7 |
http://jkv.vet.ku.ac.th/index.php/authors/peer-review-process
|
code
|
Peer Review Process
The manuscript submitted to the Journal of Kasetsart Veterinarians will be critically reviewed by two reviewers who are selected by the Editor. The review process is double-blinded. The review results will be notified as “Accepted as the original”, “Accepted after revision” and “Rejected”. If, in any cases, the opinions from the two reviewers are discrepancy, the third reviewer will be assigned. The review process usually takes 4 to 6 weeks after manuscript submission. Manuscripts that, in the reviewers’ opinion, require revision will be sent back to the corresponding author to respond to reviewer comments and make appropriate revision within 3 weeks. Manuscripts that pass peer review are accepted for publication providing that authors respond meaningfully to questions and concerns raised by the scientific reviewers. In cases that the manuscripts are “Rejected” for their publication by the reviewers, the Editor will send the reviewers’ comments to the corresponding author and the revised manuscripts could be resubmitted as new manuscripts. All accepted manuscripts will be published in the Journal in chronological order.
The Journal preserves the right to technically edit the manuscript according to the Journal style and format; however, any edited manuscripts will be sent directly to the corresponding authors to critically proofread before final publication.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401624636.80/warc/CC-MAIN-20200929025239-20200929055239-00555.warc.gz
|
CC-MAIN-2020-40
| 1,420 | 3 |
https://www.intelisecure.com/back-from-rootedcon-2010-intelisecure-2/
|
code
|
I know, I didn’t write anything about the Rootedcon as I promised last week but following the congress I came up with some new ideas and I have been busy coding them.I don’t know how to describe the congress. Simply amazing is a good approach. I met a lot of fantastic people and saw a lot of friends again. And, of course, we talked and learnt about security, so, what more I can ask for?The first day (the Thursday) we had some less technical sessions about how to start a career as pentesterand the actual situation of the national (Spanish) security. We also received a very interesting speach about computer forensics. The day ended in a pub near the congress place talking with the speakers and meeting people I only know from Internet.Friday was a very intense day. The most technical sessions took place on this day. Also the CTF (Capture The Flag) tournament started. It was a shame that I was unable to participate, but I didn’t want to miss any of the sessions, maybe next year!
We saw some 0-days exploits in the conferences: One for airodump, another for a support ActiveX program widely use in some big companies such as Telefonica and Symantec and others for the Oracle Financials 12. The most technical speach was the presentation of the Radare2 tool. Very low level programming and high level concepts which was difficult for me to understand. I’ll try to download it and understand better how it works and how to use it.Last day the sessions were very interesting too. Android forensic, metadata security, cryptography, botnets and one about hackers in the comics too! It was a very good mix of themes to finish the event. Also we had dinner with almost all the speakers so we kept talking about security even after three days. After dinner we went to a party but I’m not going to comment on this…
I have to admit that after the congress I was really tired but also shocked! I met all these incredible people who know a lot about security making me realise that I need to keep studying and researching because out there are more things that I can imagine… and I want to learn them all!P.S.
I’ll try to add the slides of the rest of the speaks when they release them. They release the slides today and you can see them online at Slideshare.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056892.13/warc/CC-MAIN-20210919160038-20210919190038-00228.warc.gz
|
CC-MAIN-2021-39
| 2,273 | 4 |
https://www.rozee.pk/supplier-in-china-php-laravel-developer-lahore-jobs-839146.php
|
code
|
Are you a Senior PHP Engineer who is is comfortable working across the full technology stack? Are you energized by taking on challenging problems? Do you continually seek to develop your skills, learning tools, and technologies that help you master your profession? If so, we are looking for you! As a Senior PHP Engineer at SIC, you will work within a small team of likeminded and talented engineers in a focused, no bureaucracy environment, striving to push the limits of our capabilities while delivering tremendous value to our customers.
What You Will Do
- Integration and development of user-facing elements and user experiences.
- Design for extensible and scalable multi-threaded solutions, optimizing for resource utilization, performance, and supportability.
- Investigate and leverage 3rd party API’s for use in product (e.g. Google, Facebook, LinkedIn, Twitter, etc…).
What We Are Looking For
- 3-5+ years of recent production quality PHP product development experience.
- Expert knowledge of PHP web frameworks such as Laravel, CodeIgniter, Yii, etc…
- Experience with back-end development (LAMP stack).
- Having experience of real time Chat app using (pusher , node js ) .
- Experience with integration of multiple data sources and databases into one system.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583662893.38/warc/CC-MAIN-20190119095153-20190119121153-00477.warc.gz
|
CC-MAIN-2019-04
| 1,278 | 11 |
https://www.echosector.com/forum/threads/keenan-we-need-to-contact-jason-ely.120/page-2
|
code
|
Hello all. I am around. I have been very busy with my next MMO project. (And yes I've had thoughts for a Crusader themed MMO for a number of years).
I have a multiplayer version that was created under Watcom DOS compiler and used Dos4Gw. It would be rather simple to convert to WinXp in DirectX. I'm sure the project would take a number of months to complete. I have started the conversion a few times and then something in real life always pulled me away.
We had simple 4 player (doom style) combat. You could run around with different colored silencers (8 different colors I believe) and shoot each other. The character motion was much different. In Crusader the series the creatures all walked pixel perfect. In this one the creatures skated some. This was to give a more interesting control when in the heat of battle. It needed some work of course.
The game has a built in world editor. I'm sure I could make it work in XP using No Remorse or No Regret assets. So you would have to own a copy of the game to play it... For legal reasons.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654097.42/warc/CC-MAIN-20230608035801-20230608065801-00170.warc.gz
|
CC-MAIN-2023-23
| 1,042 | 4 |
https://discuss.appium.io/t/appium-and-wkwebview/4769
|
code
|
Currently we use Appium for our IOS Automation and working fine with webview until IOS 7 devices. But for IOS 8 devices, its not working fine with wkwebview.
Can you please let me know if Appium supports for ios 8 devices with wkwebview?
Amy help on this will be very much grateful.
Interesting, @jlipps is it a desirable feature?
Thanks for the response,
Yes we are using IOS8 devices and wkwebview, so that i want to know if anyone has any idea how to try automation in it.
PLease let me know if you need more info on it.
does wkwebview not support the remote debugger? that’s what we use to talk to the webview
+1 … Appium doesn’t seem to be aware of wkwebview contexts. I can interact with these webviews with Safari’s web inspector however. This is a blocker for testing hybrid webapps.
Does being able to access the wkwebview with Safari’s web inspector imply that the remote debugger is supported? Possibly related:
It probably doesn’t matter, but I’m using Appium-Python_Client 0.20.
I’m blocked by this as well. Are there any plans for Appium to support wkwebview?
Not able to inspect WKwebview in appium.
Any solution to work with WKwebview with iOS 11 ?
Using Appium 1.7.2 server
Any update here?
We too are using latest Appium(Server 1.7.2) with iOS 11.2 for automation.
It does’nt seem to recognize html elements inside the WkWebView.
Hi Guys, Do you have any further update on this? Thanks
Have you tried with appium 1.8.1? I remember that on iOS (with Apppium 1.7.2) I couldn’t see any content in webView.
I am unable to see wkwebviews on iOS 11 with appium 1.10.0.Can any one please tell me how to make it work?
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817158.8/warc/CC-MAIN-20240417142102-20240417172102-00475.warc.gz
|
CC-MAIN-2024-18
| 1,647 | 21 |
https://managementjournal24.com/451623/global-wheat-germ-oil-market-2018-precise-outlook-connoils-henry-lamotte-oils-gmbh-viobin-and-grupo-plimon/
|
code
|
Market Research Report on “Global Wheat Germ Oil Market” Highlights– Size, Share, Growth, Trends, Opportunity, Risks & Forecast, 2018-2023.
The study provides an in-depth analysis of the Wheat Germ Oil market for the past years, and the forecast period, 2018-2023. It comprises the market size, Wheat Germ Oil market share, market dynamics, Porters study, key segments, latest trends, and Wheat Germ Oil company profiles. The information included in the Wheat Germ Oil report is a result of an comprehensive market research and important opinions from Wheat Germ Oil industry professionals. Research methodology is served in the Wheat Germ Oil analysis to focus on the methodologies used to gather and validate Wheat Germ Oil information. The report is very useful and valuable tool for Wheat Germ Oil market players, investors, and new entrants as it gives benefits to them by strengthening their place in the international Wheat Germ Oil market and conceive strategies to sustain.
The Wheat Germ Oil report offers an executive synopsis of the worldwide Wheat Germ Oil industry to guide market players, new entrants, and Wheat Germ Oil investors get an understanding of the complete Wheat Germ Oil market situation and determine strategies for Wheat Germ Oil development and supporting their businesses. Key discoveries are highlighted in the Wheat Germ Oil analysis to guide market players to evaluate Wheat Germ Oil investment feasibility. Market enticement and ongoing trends study are also silhouetted in the analysis. The Wheat Germ Oil competitive landscape is served to help leading Wheat Germ Oil industry players regulate the competitiveness persuading in the global Wheat Germ Oil industry and can make decisions to gain a competitive extremity.
Get The Sample Copy Of This Report @ http://emarkets.eu/global-wheat-germ-oil-market/#request-sample
|Manufacturer||Henan Kun Hua Technology, Agroselprom, Navchetna Kendra, Zonghoo, Anyang Jingsen, Kanta Enterprises Private Limited, Grupo Plimon, Henry Lamotte Oils GmbH , Pokonobe, ARISTA, Henan Yuanquan, Hebei Jiafeng Plant Oils, Viobin, Herbal Biosolutions and CONNOILS|
|Types||Food grade and Industrial grade|
|Applications||Application 1 and Application 2|
|Regions||Japan, China, South East Asia, Europe, India and USA|
The Wheat Germ Oil market outlook of the global industry is provided based on the Wheat Germ Oil growth drivers, constraints and threats, SWOT analysis, and Wheat Germ Oil market share study. The drivers and constraints of Wheat Germ Oil industry recognize the rise and fall of the Wheat Germ Oil market. The study is served based on the Wheat Germ Oil haggling power of buyers, haggling power of suppliers, the risk of new entrants, the risk from replacement, and Wheat Germ Oil industrial competition. This report elaborates the Wheat Germ Oil market with its key segments such as:
Influence of the Wheat Germ Oil market report:
* Comprehensive assessment of all opportunities and risk in the Wheat Germ Oil market.
* Wheat Germ Oil market recent innovations and major events.
* Detailed study of business strategies for growth of the Wheat Germ Oil market-leading players.
* Conclusive study about the growth plot of Wheat Germ Oil market for forthcoming years.
* In-depth understanding of Wheat Germ Oil market-particular drivers, constraints and major micro Wheat Germ Oil markets.
* Favourable impression inside vital technological and market latest trends striking the Wheat Germ Oil market.
Geographically, the Wheat Germ Oil market analysis includes the regions like North America, Asia-Pacific, Europe, Latin America and the Middle East & Africa. In North America, the Wheat Germ Oil market study has been done for the countries such as the U.S., Canada, and Mexico. Wheat Germ Oil market in Europe, the analysis covers the countries like Germany, France, UK, Spain, Italy, and the rest of Europe.
In Asia-Pacific Wheat Germ Oil market, the study is included for regions like India, China, Japan, Australia, South Korea, and the other parts of Asia-Pacific. In Latin America and the Middle East & Africa Wheat Germ Oil market, the study includes Brazil, Saudi Arabia, South Africa, and the other parts of LAMEA. The Wheat Germ Oil market share study for every segment is served in the analysis for the past and the Wheat Germ Oil future period.
Enquire About The Report @ http://emarkets.eu/global-wheat-germ-oil-market/#inquiry
It also provides an in-depth study of Wheat Germ Oil market dynamics which will impact market during the forecast years 2018-2023. The explicit data about an comprehend events such as Wheat Germ Oil technological development, mergers, acquisition, innovative Wheat Germ Oil business approach, new launches are provided in the Wheat Germ Oil report.
* Wheat Germ Oil and Related Manufacturing Industries
* Suppliers and Traders of Wheat Germ Oil market
* Research institutes, organizations, consulting companies and academic centers interested in Wheat Germ Oil industry
Finally, the complete analysis clarifies various queries for the Wheat Germ Oil target audiences, mainly on which market segments to target on in the upcoming years for prioritizing endeavor and investments.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823895.25/warc/CC-MAIN-20181212134123-20181212155623-00611.warc.gz
|
CC-MAIN-2018-51
| 5,207 | 24 |
https://code.djangoproject.com/ticket/3712
|
code
|
Starting other processes in a view gives me some weird results.
|Reported by:||Owned by:||Adrian Holovaty|
|Has patch:||no||Needs documentation:||no|
|Needs tests:||no||Patch needs improvement:||no|
Quick way of reproducing:
- Start a new project
- Replace urls.py with:
from django.conf.urls.defaults import * from django.http import HttpResponse import subprocess def start(request): cmdname = request['cmd'] p = subprocess.Popen([cmdname, 'start'], stdout=subprocess.PIPE) stdout, stderr = p.communicate() return HttpResponse(stdout or stderr) def stop(request): cmdname = request['cmd'] p = subprocess.Popen([cmdname, 'stop'], stdout=subprocess.PIPE) stdout, stderr = p.communicate() return HttpResponse(stdout or stderr) urlpatterns = patterns('', (r'start/$', start), (r'stop/$', stop), )
- Start the django server (
python manage.py runserver 8080)
- Access an url like: http://localhost:8080/start/?cmd=/etc/init.d/exim4, or any cmd= that starts a service (anything that daemonizes). You'll notice that the loading bar (in my firefox at least) never stops loading, even though the django web server is done with the request, and the page has been rendered.
- If you now stop the server and try to start it again, it wont be able to bind to its port:
Validating models... 0 errors found. Django version 0.96-pre, using settings 'starter.settings' Development server is running at http://127.0.0.1:8080/ Quit the server with CONTROL-C. Error: (48, 'Address already in use')
However, at this time, Im not sure whats causing this to happen. Any ideas would be appreciated.
Shutting the started service down manually, or accessing the /stop/?cmd= url before stopping the django server fixes the problem.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118950.30/warc/CC-MAIN-20170423031158-00489-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,706 | 15 |
http://veganwebby.xyz/archives/2934
|
code
|
Epicnovel Feng Yise – Chapter 2136 – A Treasure Vault subtract broken recommendation-p3
Boskerfiction Unrivaled Medicine God webnovel – Chapter 2136 – A Treasure Vault protest cast share-p3
what is the difference between onii chan and onii san
Novel–Unrivaled Medicine God–Unrivaled Medicine God
Chapter 2136 – A Treasure Vault pancake rifle
If there was no exit, the idea would really be somewhat difficult.
Unrivaled Medicine God
This monster want to ambush Ye Yuan. How could it are aware that Ye Yuan seemed to have started view at the rear of his brain, specifically annihilating it?
Dustless reported, “Possible! These abyss monsters are quite sturdy, very same rank humans are not a suit in any respect. You can even find some highly effective existences one of them which can even hop realms to battle. Ye Yuan, you have to be more very careful.”
“Abyss beast!” Dustless’s tone of voice suddenly rang out.
One time this kind of horrifying devilish atmosphere came into your system, no matter if it turned out the demon race or human being race, they could most likely struggle to withstand it and might be corroded at this devilish atmosphere right away, to become a walking corpse.
This Dragon Eye Cave is definitely a great place! With this sort of black color crystals, I can bust to Eighth Firmament Genuine G.o.d inside of a very limited time! That ancient canine pressured me to visit the Dragon Eyes Cave. But he most likely never ever dreamed this place is only a paradise to me!” Ye Yuan put away the black colored crystal and claimed that has a boisterous chuckle.
Ye Yuan’s Source Dietary supplement grew to be scaled-down and scaled-down, however the turmoil divine basis grew to be purer and purer.
The beast produced a few bizarre cries and fell to the floor, twitching a few times prior to it stopped going.
The Marshals Want to Get Divorced
When regular people today emerged in this article, they will have to revolve divine basis to push away this devilish aura.
Once the two Empyrean World guards observed this arena, their facial looks could not aid switching tremendously.
“It is just not there isn’t any. I noticed that there are some spatial rifts inside the Dragon Eyes Cave that traverses between spatial turbulent moves and the Dragon Attention Cave. But where these spatial rifts are, n.o.human body knows either. Hence … joining the Dragon Eyeball Cave is the same as spanning the Rubicon!” Long Zhi explained within a solemn speech.
The devilish vigor inside this one bit of black colored crystal was virtually comparable to a get ranked six divine tablet!
Unrivaled Medicine God
Ye Yuan could stop being stressed with him and leaped, his figure instantly plunging within the cave entry.
Nevertheless, there have been countless abyss monsters right here. It absolutely was equal to experiencing a great number of position six divine pills. This location was just a cherish vault to Ye Yuan!
It was subsequently an overseas entire world ahead of him. Our blood-green atmosphere appeared like fire ended up getting rid of inside the atmosphere incomparably somber.
The beast emitted a number of odd cries and decreased to the floor, twitching once or twice right before it quit shifting.
Ye Yuan could never be troubled with him and leaped, his number instantly plunging in the cave front door.
the devilish energy stashed inside the following is even purer when compared to the devilish energy on the surroundings!”
However, there were clearly countless abyss monsters on this page. It was subsequently similar to owning a great number of get ranked six divine drugs. This area was simply a jewel vault to Ye Yuan!
Both the people were seized with worry and eventually left the fantastic hall like soaring.
Once this specific horrifying devilish atmosphere came into the body, whether or not it had been the demon race or our competition, they might likely struggle to tolerate it and would be corroded through this devilish aura rapidly, becoming a strolling corpse.
Observing this black colored crystal, Ye Yuan’s two vision could not guide illumination up.
Swearing the Heavenly Dao Oath and getting the commitment, Lengthy Chi’s deal with finally exposed a trace of pleasure.
When others found this devilish strength, it turned out such as a rat visiting a feline. There might not even be enough time to even function.
Dustless nodded his top of your head and mentioned, “That’s right! Pursuing the Spirit Suppressing Pearl’s discovery to some divine emperor spirit prize, my thoughts did actually have somewhat retrieved. I feel very familiar with this Dragon Eyeball Cave. It seems like I’ve arrive right before after.”
The monster emitted a range of weird cries and dropped to the floor, twitching a couple of times right before it ceased relocating.
If somebody discovered this picture, their eyeb.a.l.l.s would probably drop out.
Experiencing this dark colored crystal, Ye Yuan’s two eye could not assist lighting effects up.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500294.64/warc/CC-MAIN-20230205224620-20230206014620-00409.warc.gz
|
CC-MAIN-2023-06
| 5,023 | 36 |
https://forum.dhtmlx.com/t/how-to-check-if-a-dhtmlxwindow-had-already-been-opened/13107
|
code
|
I had recently started looking at this amazing work you had done in giving all these advanced Web UI Controls. I implemented dhtmlxWindows which was attached to a underlying database table. I checked out all your blogs and also your API to find out a method to know if the dhtmlxWindow is open.
My logic is as such on click of a button on a page i was binding the window. Right now its creating a new window on further clicks. I tried out options like dhxWins.window(id), dhxWins.isWindow(id).But all the efforts in vain. Could you please let me know if there is a way to know whether that window had been open. Here is the code which i had used.
dhxWins = new dhtmlXWindows();
dhxWins.enableAutoViewport(true); dhxWins.setImagePath("dhtmlxGrid/codebase/imgs/"); w1 = dhxWins.createWindow("w1",420,300,600, 550);
I would really appreciate your help on this.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710890.97/warc/CC-MAIN-20221202014312-20221202044312-00761.warc.gz
|
CC-MAIN-2022-49
| 857 | 5 |
http://web2.sys-con.com/node/2855768
|
code
|
|By Kevin Benedict||
|November 3, 2013 05:00 PM EST||
Recent surveys point to the fact that companies are viewing enterprise mobility in an increasingly strategic manner. They see compelling mobile apps as the front lines of marketing, sales and customer service. They are providing executives and managers with business intelligence apps on their tablets to improve visibility, situational awareness and decision-making.
When strategic enterprise mobility expands to include integration with theInternet of Things entire new business models and competitive arenas will open up. Can you image a maintenance person entering a plant building and wirelessly surveying all of the equipment located there for repair and maintenance needs? The machines can wirelessly communicate their own needs using wireless embedded chips connected to sensors. All of the equipment could be connected to a command and control center on the other side of the globe!
Companies are recognizing the productivity gains enabled by mobilizing their sales, services, logistics, transportation, warehouses and manufacturing environments. In a word, enterprise mobility has become strategic. More selection and acquisition decisions on mobile platforms, mobile security and mobile applications are being made by CIOs and CEOs today. Why? These enterprise mobility solutions are needed to support mobile apps across numerous departments and processes. No one department or project is able to anticipate the needs and requirements of all others. As a result, management must look across departments and take a more enterprise wide view of their organization's mobility needs.
Today, business leaders are recognizing that the very future of their companies may depend on their ability to effectively make the digital transformation that rests on the foundation of enterprise mobility. If customers are utilizing mobile apps for purchases, then the sales department must be very focused on mobile apps. If mobile marketing is becoming more effective, then the marketing department should quickly become mobility marketing experts. You get my point!
I am very interested in how mobility vendors are addressing CIOs and CEOs in their marketing campaigns in 2013. I haven't see much content focused on business leaders yet. I guess the assumption is that the LOB (line of business) or developers are the ones creating a short list of vendors for the CIO/CEO to review. As a result webinars and marketing campaigns are still focused on development platforms, development toolkits, implementation challenges, mobile security and speed of implementation solutions. I wonder when this is going to change?
I wonder how a marketing campaign would look if it were targeting business executives? Would it emphasize the ability to increase productivity with B2E apps? Would it suggest more effective marketing campaigns and increased customer loyalty by using compelling B2C apps? Would it focus on maximizing the number of solutions that could all be supported on one platform? Would it emphasize scalability, security and a low total cost of ownership? What do you think?
What about mobile solutions focused on business leaders? Perhaps executive level solutions would show all mobile data flows, mobile security levels, mobile apps, and any solutions yet to be mobilized. Perhaps all ERPs and business solutions should be wrapped by a mobile management solution that shows all data that is accessible by mobile devices, and which is not. Perhaps any performance limitations residing in your logistics of information systems would be automatically exposed so management could determine how to remove bottlenecks and mobilize the system.
If we buy into the the notion that mobility is strategic, and if our legacy systems and enterprise application integration platforms are not supporting real-time mobile device access to mission critical data, then things must change fast.
Consumers' buying habits are changing. They use mobile devices for researching products. They compare prices on mobile devices. They ask their friends for suggestions and recommendations using social networking sites via mobile devices. They schedule their lives on their mobile calendars. They track product shipments on mobile devices. Are businesses understanding this? Are they changing their processes and technology platforms to support these industry trends? If they are not evolving at the same rate as their customers' are adopting the use of technology, then they are opening up an increasing opportunity for competitors to capture market share by delivering new or improved mobile apps and enhanced mobile experiences.
Business leaders cannot simply play around with mobility and POCs (proof of concepts) today. They must get strategic, and fast.
Kevin Benedict, Head Analyst for Social, Mobile, Analytics and Cloud (SMAC) Cognizant
***Full Disclosure: These are my personal opinions. No company is silly enough to claim them. I am a mobility and SMAC analyst, consultant and writer. I work with and have worked with many of the companies mentioned in my articles.
The 3rd International Internet of @ThingsExpo, co-located with the 16th International Cloud Expo - to be held June 9-11, 2015, at the Javits Center in New York City, NY - announces that its Call for Papers is now open. The Internet of Things (IoT) is the biggest idea since the creation of the Worldwide Web more than 20 years ago.
Nov. 28, 2014 05:00 PM EST Reads: 1,273
Cultural, regulatory, environmental, political and economic (CREPE) conditions over the past decade are creating cross-industry solution spaces that require processes and technologies from both the Internet of Things (IoT), and Data Management and Analytics (DMA). These solution spaces are evolving into Sensor Analytics Ecosystems (SAE) that represent significant new opportunities for organizations of all types. Public Utilities throughout the world, providing electricity, natural gas and water, are pursuing SmartGrid initiatives that represent one of the more mature examples of SAE. We have s...
Nov. 27, 2014 04:00 PM EST Reads: 1,352
The security devil is always in the details of the attack: the ones you've endured, the ones you prepare yourself to fend off, and the ones that, you fear, will catch you completely unaware and defenseless. The Internet of Things (IoT) is nothing if not an endless proliferation of details. It's the vision of a world in which continuous Internet connectivity and addressability is embedded into a growing range of human artifacts, into the natural world, and even into our smartphones, appliances, and physical persons. In the IoT vision, every new "thing" - sensor, actuator, data source, data con...
Nov. 27, 2014 04:00 PM EST Reads: 1,686
The Internet of Things is tied together with a thin strand that is known as time. Coincidentally, at the core of nearly all data analytics is a timestamp. When working with time series data there are a few core principles that everyone should consider, especially across datasets where time is the common boundary. In his session at Internet of @ThingsExpo, Jim Scott, Director of Enterprise Strategy & Architecture at MapR Technologies, discussed single-value, geo-spatial, and log time series data. By focusing on enterprise applications and the data center, he will use OpenTSDB as an example t...
Nov. 27, 2014 03:00 PM EST Reads: 1,506
How do APIs and IoT relate? The answer is not as simple as merely adding an API on top of a dumb device, but rather about understanding the architectural patterns for implementing an IoT fabric. There are typically two or three trends: Exposing the device to a management framework Exposing that management framework to a business centric logic Exposing that business layer and data to end users. This last trend is the IoT stack, which involves a new shift in the separation of what stuff happens, where data lives and where the interface lies. For instance, it's a mix of architectural styles ...
Nov. 27, 2014 03:00 PM EST Reads: 1,358
An entirely new security model is needed for the Internet of Things, or is it? Can we save some old and tested controls for this new and different environment? In his session at @ThingsExpo, New York's at the Javits Center, Davi Ottenheimer, EMC Senior Director of Trust, reviewed hands-on lessons with IoT devices and reveal a new risk balance you might not expect. Davi Ottenheimer, EMC Senior Director of Trust, has more than nineteen years' experience managing global security operations and assessments, including a decade of leading incident response and digital forensics. He is co-author of t...
Nov. 27, 2014 01:00 PM EST Reads: 1,700
The Internet of Things will greatly expand the opportunities for data collection and new business models driven off of that data. In her session at @ThingsExpo, Esmeralda Swartz, CMO of MetraTech, discussed how for this to be effective you not only need to have infrastructure and operational models capable of utilizing this new phenomenon, but increasingly service providers will need to convince a skeptical public to participate. Get ready to show them the money!
Nov. 27, 2014 11:00 AM EST Reads: 1,319
The Internet of Things will put IT to its ultimate test by creating infinite new opportunities to digitize products and services, generate and analyze new data to improve customer satisfaction, and discover new ways to gain a competitive advantage across nearly every industry. In order to help corporate business units to capitalize on the rapidly evolving IoT opportunities, IT must stand up to a new set of challenges. In his session at @ThingsExpo, Jeff Kaplan, Managing Director of THINKstrategies, will examine why IT must finally fulfill its role in support of its SBUs or face a new round of...
Nov. 27, 2014 10:00 AM EST Reads: 1,256
One of the biggest challenges when developing connected devices is identifying user value and delivering it through successful user experiences. In his session at Internet of @ThingsExpo, Mike Kuniavsky, Principal Scientist, Innovation Services at PARC, described an IoT-specific approach to user experience design that combines approaches from interaction design, industrial design and service design to create experiences that go beyond simple connected gadgets to create lasting, multi-device experiences grounded in people's real needs and desires.
Nov. 27, 2014 08:00 AM EST Reads: 1,280
Enthusiasm for the Internet of Things has reached an all-time high. In 2013 alone, venture capitalists spent more than $1 billion dollars investing in the IoT space. With "smart" appliances and devices, IoT covers wearable smart devices, cloud services to hardware companies. Nest, a Google company, detects temperatures inside homes and automatically adjusts it by tracking its user's habit. These technologies are quickly developing and with it come challenges such as bridging infrastructure gaps, abiding by privacy concerns and making the concept a reality. These challenges can't be addressed w...
Nov. 27, 2014 07:45 AM EST Reads: 1,556
The Domain Name Service (DNS) is one of the most important components in networking infrastructure, enabling users and services to access applications by translating URLs (names) into IP addresses (numbers). Because every icon and URL and all embedded content on a website requires a DNS lookup loading complex sites necessitates hundreds of DNS queries. In addition, as more internet-enabled ‘Things' get connected, people will rely on DNS to name and find their fridges, toasters and toilets. According to a recent IDG Research Services Survey this rate of traffic will only grow. What's driving t...
Nov. 27, 2014 07:00 AM EST Reads: 1,528
Scott Jenson leads a project called The Physical Web within the Chrome team at Google. Project members are working to take the scalability and openness of the web and use it to talk to the exponentially exploding range of smart devices. Nearly every company today working on the IoT comes up with the same basic solution: use my server and you'll be fine. But if we really believe there will be trillions of these devices, that just can't scale. We need a system that is open a scalable and by using the URL as a basic building block, we open this up and get the same resilience that the web enjoys.
Nov. 27, 2014 06:45 AM EST Reads: 1,423
Connected devices and the Internet of Things are getting significant momentum in 2014. In his session at Internet of @ThingsExpo, Jim Hunter, Chief Scientist & Technology Evangelist at Greenwave Systems, examined three key elements that together will drive mass adoption of the IoT before the end of 2015. The first element is the recent advent of robust open source protocols (like AllJoyn and WebRTC) that facilitate M2M communication. The second is broad availability of flexible, cost-effective storage designed to handle the massive surge in back-end data in a world where timely analytics is e...
Nov. 27, 2014 06:45 AM EST Reads: 1,362
We are reaching the end of the beginning with WebRTC, and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will want to use their existing identities, but these will have credentials already that are (hopefully) i...
Nov. 27, 2014 04:00 AM EST Reads: 1,268
"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Nov. 27, 2014 04:00 AM EST Reads: 1,223
P2P RTC will impact the landscape of communications, shifting from traditional telephony style communications models to OTT (Over-The-Top) cloud assisted & PaaS (Platform as a Service) communication services. The P2P shift will impact many areas of our lives, from mobile communication, human interactive web services, RTC and telephony infrastructure, user federation, security and privacy implications, business costs, and scalability. In his session at @ThingsExpo, Robin Raymond, Chief Architect at Hookflash, will walk through the shifting landscape of traditional telephone and voice services ...
Nov. 26, 2014 02:00 PM EST Reads: 1,651
Explosive growth in connected devices. Enormous amounts of data for collection and analysis. Critical use of data for split-second decision making and actionable information. All three are factors in making the Internet of Things a reality. Yet, any one factor would have an IT organization pondering its infrastructure strategy. How should your organization enhance its IT framework to enable an Internet of Things implementation? In his session at Internet of @ThingsExpo, James Kirkland, Chief Architect for the Internet of Things and Intelligent Systems at Red Hat, described how to revolutioniz...
Nov. 24, 2014 07:00 PM EST Reads: 1,743
Bit6 today issued a challenge to the technology community implementing Web Real Time Communication (WebRTC). To leap beyond WebRTC’s significant limitations and fully leverage its underlying value to accelerate innovation, application developers need to consider the entire communications ecosystem.
Nov. 24, 2014 12:00 PM EST Reads: 1,645
The definition of IoT is not new, in fact it’s been around for over a decade. What has changed is the public's awareness that the technology we use on a daily basis has caught up on the vision of an always on, always connected world. If you look into the details of what comprises the IoT, you’ll see that it includes everything from cloud computing, Big Data analytics, “Things,” Web communication, applications, network, storage, etc. It is essentially including everything connected online from hardware to software, or as we like to say, it’s an Internet of many different things. The difference ...
Nov. 24, 2014 11:00 AM EST Reads: 1,778
Cloud Expo 2014 TV commercials will feature @ThingsExpo, which was launched in June, 2014 at New York City's Javits Center as the largest 'Internet of Things' event in the world.
Nov. 24, 2014 09:00 AM EST Reads: 1,810
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931011477.80/warc/CC-MAIN-20141125155651-00195-ip-10-235-23-156.ec2.internal.warc.gz
|
CC-MAIN-2014-49
| 16,538 | 54 |
http://www.sadmansoftware.com/delphi/rac/faq2.php
|
code
|
How to display the resource name in the allocation.
Set the Options to include OwnerDrawAllocations, then insert the following code into the OnOwnerDrawAllocation event handler. Ensure that the RowHeight property is set to a large enough value for the font being used, or else no text will be shown.
procedure TMyForm.RACOwnerDraw(Sender: TObject; Resource: TssResource; Allocation: TssResourceAllocation; Canvas: TCanvas; Rct: TRect); var yb, yt, xs, xe, tw, th: integer; begin xs := Rct.Left; xe := Rct.Right; yt := Rct.Top; yb := Rct.Bottom; with Canvas do begin // for simplicity ignore the Resource.Style // and just draw blocks if xs = xe then begin MoveTo(xs, yt); LineTo(xs, yb); end else Rectangle(xs, yt, xe, yb); // don't show the description if we're // drawing the shadow if Pen.Color <> RAC.ShadowColor then begin tw := TextWidth(Resource.Name); th := TextHeight(Resource.Name); // is there room for the text in the rectangle? if (xe - xs > tw) and (yb - yt > th) then begin Brush.Style := bsClear; TextOut((xe + xs - tw) div 2, (yb + yt - th) div 2, Resource.Name); end; // else leave the block unlabelled end; end; end;
- Screen Shots
- FAQ & Getting Started
- User Comments
- Support Forum
- Change History
|What People Say|
I just wanted to let you know that I love your component! I find it extensible, easy to use, and the performance is top notch. I even think I understand much of the source. You hit a home run with this one!
Tom Kopeika, Illinois
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738663142.93/warc/CC-MAIN-20160924173743-00017-ip-10-143-35-109.ec2.internal.warc.gz
|
CC-MAIN-2016-40
| 1,470 | 11 |
http://stackoverflow.com/questions/3168042/can-i-use-non-aggregate-columns-with-group-by
|
code
|
You cannot (should not) put non-aggregates in the
SELECT line of a
GROUP BY query.
I would however like access the one of the non-aggregates associated with the max. In plain english, I want a table with the oldest id of each kind.
CREATE TABLE stuff ( id int, kind int, age int );
This query gives me the information I'm after:
SELECT kind, MAX(age) FROM stuff GROUP BY kind;
But it's not in the most useful form. I really want the
id associated with each row so I can use it in later queries.
I'm looking for something like this:
SELECT id, kind, MAX(age) FROM stuff GROUP BY kind;
That outputs this:
SELECT stuff.* FROM stuff, ( SELECT kind, MAX(age) FROM stuff GROUP BY kind) maxes WHERE stuff.kind = maxes.kind AND stuff.age = maxes.age
It really seems like there should be away to get this information without needing to join. I just need the SQL engine to remember the other columns when it's calculating the max.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783395560.69/warc/CC-MAIN-20160624154955-00071-ip-10-164-35-72.ec2.internal.warc.gz
|
CC-MAIN-2016-26
| 920 | 14 |
https://studentportalen.uu.se/portal/portal/uusp/student/student-course?uusp.portalpage=true&entityId=77752&toolMode=studentUse
|
code
|
Cryptology, 5 c
Course code:1DT075, Report code:61222, 33%, DAG, NML, week: 12 - 22 Semester: Spring 2011 - Spring 2011
This page displays some information about the course/programme.
The course book is Cryptography: Theory and Practice, third edition, by D. Stinson, see http://www.cacr.math.uwaterloo.ca/~dstinson/CTAP3/CTAP3.html.
After the course, students should be able to describe cryptographic theories, principles and techniques that can be used to achieve data security, analyze and construct these methods and reflect on their limitations and applicability with respect to legal and ethical aspects.
Department of Information Technology
Fax: +46 18 511925
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609526311.33/warc/CC-MAIN-20140416005206-00107-ip-10-147-4-33.ec2.internal.warc.gz
|
CC-MAIN-2014-15
| 666 | 7 |
https://community.canvaslms.com/t5/Question-Forum/Canvas-is-not-propogating-users-names-to-WebEx-but-it-is-a/td-p/435254
|
code
|
We had our first Canvas class that's integrated with WebEx Training Center. We had a large class of 20 students. 5 of the users the name didn't propogate into WebEx.
All five names had the label $Person.email.primary. The other 15 users worked at expected. Has anybody encountered this issue before?
Only idea I can come up with is to have the users clear the cache and cookies in the browser or try a different browser like chrome or firefox.
I'm sorry to hear that you are having trouble with getting users propagated from Canvas into WebEx. I am curious as to whether the five people that did not go through are in any way different from the 15 that did with respects to personal information? Do the five not have email addresses stored in Canvas for example?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178367183.21/warc/CC-MAIN-20210303165500-20210303195500-00493.warc.gz
|
CC-MAIN-2021-10
| 762 | 4 |
https://www.pyrat-analyzer.com/
|
code
|
PyRAT sails in to verify your neural networks
Performing formal verification of mission-critical software
Machine learning, especially through artificial neural networks, is currently undergoing an impressive expansion, penetrating fields ranging from driving assistance to legal or medical assistance. While seemingly beneficial, this revolution is causing concern as it approaches real-world application in mission-critical software, as the fragility of these learning techniques is increasingly exposed, particularly in the face of malicious disruption. Some work is already underway to adapt formal methods, used for decades in the field of critical software, to these new technologies.
This is what is envisioned with PyRAT, a neural network verification tool developed at CEA by the AISER team (which focuses on AI Safety Engineering and Research). Its development was motivated by the difficulty we found in linking some tools with our neural networks but also with the aim of facilitating the integration of verification process in the whole neural network development process. Our belief is that the main-streaming of safety practices in the development process can only be beneficial to neural network and AI systems as a whole and can increase our trust in them.
Catching the winds of abstract interpretation
Adapting state of the art approaches to tensor operations
PyRAT stands for Python Reachability Assessment Tool and is based on abstract interpretation techniques with the aim of determining whether in a given neural network a certain state can be reach by the network from some initial parameters.
To do so, it propagates different types of abstract domains along the different layers of the neural network up until the output layer. This approach will overapproximate some of the operations of the layers and thus the output space reached will always be bigger than the exact output space. If the output space reached is inside a certain space defining the property we want, then we can say that the property is verified. Otherwise, we cannot conclude.
Through plunder or pillage
What do we verify?
For all the points of a dataset, we verify their neighbourhood parametrized by a distance ε.
Here we can formally prove that for any perturbation inferior to ε the classification remains the same, i.e. the neural network is robust around this point. If a counter-example is found the neighbourhood is proven to also be unsafe.
On the other hand we can prove more general safety properties, like here on the public ACAS-XU dataset and neural networks.
In a setting of critical system of aircraft collision avoidance, we aim to prove that for certain configurations of the two planes the neural network will answer as expected.
For example, we could aim to prove:
PyRAT from bow to stern
Wide support and state of the art performances
Due to an approach tailor made to neural networks and their high dimensionality, PyRAT is able to apply abstract interpretation techniques while fully leveraging tensor operations.
A wide range of neural networks and their layers are already support in such forms in PyRAT with possibilities ranging from simple and small tabular problems and networks, to complex architectures with convolutional layers and skip connections. Thanks to this, PyRAT is able to show comparable result to state of the art verification tools and even outperforming some on certain benchmarks.
Specifying the property and visualising the result
Through its own expressive property language or the VNNLib format, PyRAT allows to specify safety properties to verify over a neural network.
Following its specification, one can visualise with PyRAT the result of an analysis with modulable precision on this property. This visualisation will show the safe, unknown and unsafe spaces corresponding to this property. In turn, this will allow to either refine the property or identify the gaps in the neural network training.
Another key aspect of PyRAT lies in the input partitioning mechanisms that it employs. For lower dimensionality inputs, PyRAT is able to use input partitioning as a mean to increase the precision of the analysis and prove a wider range of property. This partitioning is reinforced by heuristics tailored to the abstract domains we use which allows a significant boost in precision on such networks
As an example on the widely used and public benchmark ACAS-XU, PyRAT proves all the defined properties in 292s while state of the art tools such as nnenum takes 319s and neurify 1265s.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817765.59/warc/CC-MAIN-20240421101951-20240421131951-00034.warc.gz
|
CC-MAIN-2024-18
| 4,534 | 24 |
https://www.taylor-rose.co.uk/our-people/profile/hassan-butt
|
code
|
GET IN TOUCH WITH ME TODAY
Phone: 01733 972955
Prefer to send an email? Click on the featured 'contact me' box.
Hassan studied Law at Kingston University and graduated in 2006. Hassan completed his post-graduate Diploma in legal practice at the college of Law, London branch in 2007. Hassan was admitted as a solicitor in 2012.
Hassan is particularly skilled at dealing with complex Secured Lending transactions for both companies and private individuals. Hassan also has indebt knowing of advising companies and individuals on immigration issues.
Hassan is also a qualified Mediator and a Certified Islamic Arbitrator & Expert.
In his spare time Hassan enjoys playing football, cycling and traveling.
Taylor Rose MW excels in Chambers & Partners 2022
Thu 21 October 2021
Will a Claim in the Estate of Monty Python Actor, Terry Jones Succeed?
Wed 27 October 2021
TAKE A LOOK AT
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358443.87/warc/CC-MAIN-20211128013650-20211128043650-00552.warc.gz
|
CC-MAIN-2021-49
| 877 | 12 |
https://www.sencha.com/forum/showthread.php?1209-Apanta-and-YUI-Ext
|
code
|
16 Dec 2006 11:30 AM #1
Apanta and YUI-Ext
Nice!!! There's built in support in Apanta for YUI-Ext... I hope they keep the version in sync with the latest version of yui-ext that's hopefully released very often :wink: (the current release is 0.32.3.1 final)
16 Dec 2006 11:31 AM #2
That is cool. FYI, .33 final is out.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257826907.66/warc/CC-MAIN-20160723071026-00127-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 317 | 5 |
https://block64.com/services/process-implementation
|
code
|
Process Implementation (ISO 19770-1)
Comprehensive IT asset management processes require the coordination of activies and data between multiple business units that span beyond the IT organization to operations, procurement, strategic sourcing, finance and legal departments.
Is my organization effectively managing the asset lifecycle from requisition to disposition?
Is asset metadata available to the right people, when they need it?
Are we maintaining multiple un-coordinated silos of asset data?
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202889.30/warc/CC-MAIN-20190323161556-20190323183556-00000.warc.gz
|
CC-MAIN-2019-13
| 499 | 5 |
https://bugs.freedesktop.org/show_bug.cgi?id=28028
|
code
|
The video call quality with gmail users is very poor.
While in gmail <-> gmail calls the image is fluid and defined, in empathy <-> gmail the image is really very pixeled and slow
instead empathy <-> empathy calls are OK.
Does this still occur? If it does, on which OS are you using Empathy, and which GStreamer video codecs do you have?
I suspect it may have been caused by Empathy and gmail not having many video codecs they could choose between: the Google web interface currently only knows about H.263 and H.264, and until recently, Linux distributions didn't generally ship either H.263 or H.264.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496671106.83/warc/CC-MAIN-20191122014756-20191122042756-00476.warc.gz
|
CC-MAIN-2019-47
| 602 | 5 |
https://geekrewind.com/how-to-use-the-chmod-command-on-ubuntu-16-04-18-04-with-examples/
|
code
|
The chmod command defines or changes permissions or modes on files and limits access to only those allowed access.
If you’re a new user or student and want to learn how to use and manage Linux systems, the most accessible place to start might be Ubuntu Linux OS.
Ubuntu is an open-source Linux operating system that runs on desktops, laptops, servers, and other devices.
When you’re ready to learn how to use the chmod commands, follow the guide below:
About the chmod command:
The chmod command defines or changes permissions or modes on files and limits access to only those allowed access. It changes the mode of each FILE to MODE.
The chmod command stands for change mode. And it’s used to limit access to resources.
It’s the same as using your mouse to right-click a file or folder, selecting permission tabs, and defining who can access the resource. The chmod command is the way to do it on the command line.
The syntax is the rule and format of how the chmod command can be used. The syntax options can be reordered. But a straight format must be followed.,.
Below is an example syntax of how to use the chmod command.
chmod [OPTION]. MODE[,MODE]. FILE.
chmod [OPTION]. OCTAL-MODE FILE.
The command line options are switches or flags that determine how the commands are executed or controlled. They modify the behavior of the commands. They are separated by spaces and followed after the commands.
Below are some options for the chmod command:
|FILE.||Replace FILE.. with the file you want to change its permissions|
|MODE, OCTAL-MODE||Replace the MODE (rwx) or OCTAL-MODE (777) with a value to change the permission to|
|-c, –changes||Use the -c or –changes option to show verbose but report only when a change is made|
|-f, –silent, –quiet||Use them -for –silent or –quiet option to suppress most error messages|
|-R, –recursive||Use the -R or –recursive option to change files and directories recursively|
|–help||Use the –version option to display this help and exit|
|–version||Use the –version option to output version information and exit.|
Below are some examples of how to run and use the chmod on Ubuntu Linux.
If you own a file called Confidential and want to change the permissions or modes so that users can read/write and execute, group members can read and execute only, and others can only read, you will run the commands below.
sudo chmod u=rwx,g=rx,o=r Confidential
The commands above change the permission of the file called Confidential so that the user can read (r), write (w), and execute (x) it. Group members can only read (r) and execute (x), and others can only read (x) its content.
The same command above can be written using its octal permission notation.
sudo chmod 754 Confidential
If you’re not logged in as a root account, you may have to use the sudo command.
sudo chmod 754 Confidential
The digit 7 is equal, read, write, and execute. The digit 5 is similar to read and execute, and the digit 4 is equivalent to read.
- 4 = Read
- 2 = Write
- 1 = Execute
- 0 = no permission
So, 7 = 4 + 2 + 1 (rwx); 5 = 4 + 1 (RX); 4 (r)
To configure access to a file so only the user can read, write and execute and group/others can read, run the commands below.
sudo 744 Confidential
The commands below change the permissions of the Confidential file so that everyone has full access. read/write/execute
sudo 777 Confidential
When you run chmod with the –help option, you’ll see the help text below:
Usage: chmod [OPTION]. MODE[,MODE]. FILE. or: chmod [OPTION]. OCTAL-MODE FILE. or: chmod [OPTION]. --reference=RFILE FILE. Change the mode of each FILE to MODE. With --reference, change the mode of each FILE to that of RFILE
I hope you like it, and please come back soon for more Ubuntu Linux commands!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511406.34/warc/CC-MAIN-20231004184208-20231004214208-00575.warc.gz
|
CC-MAIN-2023-40
| 3,769 | 42 |
https://community.articulate.com/discussions/review-360/review-360-review-not-enabled
|
code
|
Review 360 - "Review" Not Enabled Mar 02, 2020 By Paulette Suggs I sent a link to reviewers (no password and enable comments) using Rise 360. Reviewers clicked on the "Review" text link (upper right of the screen, in Chrome) and nothing happens. Reviewers cannot comment. https://360.articulate.com/review/content/c5f755ff-1380-4f0e-98d2-4b9d233f850c/review. Thank you for your attention to resolving this issue.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494986.94/warc/CC-MAIN-20230127132641-20230127162641-00589.warc.gz
|
CC-MAIN-2023-06
| 412 | 1 |
https://github.com/apache/libcloud/pull/783
|
code
|
Join GitHub today
GitHub is home to over 50 million developers working together to host and review code, manage projects, and build software together.Sign up
Option to provision node with subnetwork #783
Option to provision node with subnetwork
This PR relates to #780, but adds the option to specify a subnetwork when creating a node.
Checklist (tick everything that applies)
Holy moly @larsla - this is awesome timing and thank you! I was just starting my day by getting ready to do this myself, but now I can watch cat videos on youtube instead!
Did you want to take a pass at adding tests for this? If not, I'm happy to do that (since I planned to do it anyway).
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400211096.40/warc/CC-MAIN-20200923144247-20200923174247-00111.warc.gz
|
CC-MAIN-2020-40
| 666 | 8 |
https://docs.propelo.ai/welcome-to-propelo/using-sei/projects-and-collections/manage-collections
|
code
|
Collections are groupings representing subdivisions of a Collection category. By default, each Collection category has one root, or All, Collection. For example, the Teams category automatically has an All Teams Collection. Under the root Collection, you can create any number of Collections and Collection levels.
For example, in the Teams category, you can have a Collection for your Engineering Teams, and then you can create a child Collection for the Front End team under the Engineering Teams Collection. The resulting hierarchy might look like this:
Teams (Collection category)
All Teams (Root Collection)
Engineering teams (Parent Collection)
Front End team (Child Collection)
Other Engineering teams...
Inheritance flows down the Collection levels. For example, Collection categories and Collections inherit integrations from the associated project, and child Collections inherit Insights associations from their ancestor Collections. For more information about the relationship between projects, Collection categories, and Collections, go to Collection hierarchies.
Type of Collections
Depending upon how Insights should be driven across teams for your organization Collections can be configured in two distinct approaches:
Asset-based Collections are defined based on digital assets, primarily utilizing Jira projects (or any other Issue Management Platform) and GitHub (or any other SCM) repositories, and other integrations as their foundational elements.
These teams are organized based on digital assets and code repositories, with the flexibility to apply additional filters as per the requirements.
Asset-based Collections are centered around specific Jira (Issue Management) projects and GitHub (SCM) repositories, which serve as their primary assets.
All Insights and Metrics in this type of Collection are aligned with the assets defined for each team. For example, if a team defines its focus on a particular Project, all metrics and dashboards will correspond to that particular project.
Configure an Asset Based Collection
The Collection Definition section allows you to configure the Collection as either a people-based or asset-based Collection. Asset-based collections are defined based on a specific asset.
To define a collection based on a specific asset, you will have to add the respective integration and associated integration filters in the Collection definition settings. This enables you to define the criteria that determine how contributors will be associated with the collection.
People-based Collections are created based on individual members who belong to a definition that can be considered as a logical unit. These people-based Collections take into account the members' associations with tools such as Jira, Bitbucket, and others.
People-based Collections are defined based on the individuals within the team and their interactions with tools like Jira and Bitbucket. SEI establishes this connection through the individual’s identifiers as provided and generates the team's insights and metrics.
It is recommended to use Trellis exclusively with People-Based Teams. Example: If a team member contributes to three different projects, the metrics and insights from all three projects are considered when evaluating that team member’s performance and contributions.
This user-centric approach allows for a comprehensive assessment of an individual’s impact across multiple projects.
Configure a People-Based Collection
People-Based Collections are defined based on the Contributor data. To define a people-based Collection you can add the respective contributor-level filters on the custom attributes in the Collection Definition settings or add contributor data manually or import the data using a CSV.
Collection categories are shown as tabs on the Collection Settings page.
Select a Category tab to view the Collections under that category. This page shows only Collection categories and Collections relevant to the current project. Switch projects to view Collection categories and Collections for other projects.
The Flat List view shows a summary of the Collections in the Collection category. The Path is the Collection's hierarchical position in the Collection category.
Select a Collection's Name to view or edit it.
Select Tree View to switch to a hierarchical outline view. Use the arrow icons to expand and collapse Collections levels.
Options for editing Collections are only available on the Flat List view.
The Path column shows the hierarchical position of a Collection
The Root Collection is readily accessible for viewing/editing by choosing the Root Collection link at the top of the Collection
Add and edit Collections
Select the tab for the Collection category where you want to add or edit a Collection. This page shows only Collection categories and Collections relevant to the current project. Make sure you are in the correct project before creating or editing Collections.
To edit an existing Collection, select the Collection in the Name column. To add a Collection, select + [Collection Category]. For example, in the Teams category, select + Teams.
In the Basic Info settings, you can:
Enter a Name, Description, and Tags. Collection names must be unique within each project.
Specify users who can manage this Collection.
Change the associated Collection Category.
Change the Collection's position in the hierarchy by changing the Parent Collection.
Use the Insights settings to manage Insights associations. By default, child Collections automatically inherit Insights associations from their ancestor Collections.
Use the Definition settings to define integrations associated with the Collection. By default, if you don't specify any integrations, the Collection automatically inherits integrations from the associated project.
Follow the steps to define a People-Based Collection. To learn more, go to People Based Collections.
In the Collection Definition settings, Select the Configure Attribute option under the Collections section.
Add Filters using the custom attributes to define the criteria to associate contributors with the Collection.
Once you’ve configured the Collection definition, click on Save to save the collection.
Collection in a Project must have a unique name.
To move an existing Collection under a different Collection category, use the Collection Category dropdown to select a category.
To move an existing Collection under a specific Collection, use the Parent Collection dropdown to select a Collection.
Manage Insight associations
All Insights (previously Dashboards) must be associated with at least one Collection. You can configure these associations through Collection settings or when creating or editing Insights. For information about creating and editing Insights, go to Insights.
By default, a child Collection automatically inherits Insights associations from its ancestor Collections. Inherited associations can't be removed from child Collections.
Adding an Insight association to a Collection also adds that association to any descendant Collections.
Adding an Insight association to a Collection category applies the association to all Collections under that category.
To view or edit a Collection's Insights associations:
Follow the steps to add and edit Collections, and go to the Collection's Insights settings.
Select Insights on the Available Insights list and use the left and right arrows to move them to the Associated Insights list.
Use the up and down arrows on the Associated Insights list to change the order in which the Insights are presented when viewing Insights on the Insights list or the All Insights dropdown menu on the Insights header.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817128.7/warc/CC-MAIN-20240417013540-20240417043540-00453.warc.gz
|
CC-MAIN-2024-18
| 7,680 | 57 |
https://psofthefuture.wordpress.com/2011/09/10/internal-trust/
|
code
|
I was struck by Nick’s most recent post on the idea of trust in our organizations and how there seems to be an inherent lack of trust. People perform certain actions to cover their own behinds, in the event that you fail to perform the task to which you have agreed. I’ve touched on the idea before, stating that we need to generally assume good faith in our interactions with each other. Nick hits the nail on the head when he says:
We need to build trust with other people. Trust is like the secret sauce and it is what is lacking in our organizations like nothing else. No one trusts anyone.
I agree that it’s a major issue, and certainly is crucial to getting stuff done in any organization (government or not). However, just like I talked about earlier about how government departments are complex adaptive systems, relationships are equally (if not more) complex. We should start working with each other under the assumption of good faith, but what’s the appropriate follow-up if that faith is broken? Too often, we go the wrong way and start to trust no one.
What we do need to explore, though, is how we handle the rebuilding of trust between people. Certainly, we’ve all been in situations (professionally and/or personally) where someone has broken our trust. Maybe it was intentional, but more than likely it was not. The issue is that if it’s intentional, at least the other party knew what they were doing (and so understand the concept of trust). If someone unintentionally breaks your trust, that has implications for what they can be trusted with in the future. If a colleague forgets to do something that has implications for my ability to carry out my job, I’m unlikely to rely on them in the future (which has implications for sharing information, etc).
So, how do we go about rebuilding trust? Often times, there is the temptation to either:
- Simply not rely on the person at all in the future; or,
- Assume that time will just fix things, and you’ll be able to trust the person again (without ever talking to them about what went wrong).
Almost in no cases do people actually talk about what happened, or how someone’s oversight broke your trust in them. Maybe that person failing to do their task, or provide you with needed information, prevented you from doing your job (which, in turn, has a large impact on your own relationships with your other colleagues).
They can be tough conversations. People get offended, and discussing whether or not you trust someone (with that person) can often come across as offensive and/or rude — we all like to believe that we can be trusted, and so to have someone tell you that you are not trusted is awkward at the best of times, and can lead to considerable damage to a relationship at the worst of times. We are not automatons on our professional lives — having these conversations is not ever easy.
But without those tough conversations, we end up hoping that situations will magically resolve. In our organizations, especially in government where we work largely in a knowledge economy where we need to share information and trust our colleagues more than ever, we need to make sure that not only do we start from a positions of assuming trust, but that we also have the courage to address our professional relationships if that trust is broken.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676594675.66/warc/CC-MAIN-20180722233159-20180723013159-00595.warc.gz
|
CC-MAIN-2018-30
| 3,334 | 10 |
http://webmasters.stackexchange.com/questions/tagged/static+redirects
|
code
|
to customize your list.
more stack exchange communities
Start here for a quick overview of the site
Detailed answers to any questions you might have
Discuss the workings and policies of this site
Rebuilt website from static html to CMS need to redirect indexed links
I have rebuilt a website which was all created with static html pages, it has now been rebuilt using a CMS system. I need to find a way of redirecting all the existing links to there new ...
Sep 6 '12 at 19:01
newest static redirects questions feed
Hot Network Questions
How does David Lightman in WarGames manage to hack a computer by dialing a number?
some containers in stl don't have find function
How can I move the objects in a single direction?
Can Cryptolocker (Or Other Ransomware) Encrypt Files That Are Already Encrypted?
What is the advantage of the two-part rudder and how does it work?
During a phase change in matter, why doesn't the temperature change?
interpolating function over dates
The Definition of "Strong Type Systems"
Single word for "more than once"
Are wide angle adapters bad?
Asked to use CCTV to check fellow employee's hours
How many OpenGL programs should I use to render multiple objects?
What is the physical/electronical limit of audio quality?
How to find a position of a character using grep?
Why is an image called an "image"?
Is there a downside to throwing Greater Rift time trials?
Removing all google data except the play store
What is the difference between monitors and (loud)speakers in technical terms?
Replace "o" with "0" in large wordlist and save the original word?
Unix execute permission can be easily bypassed. Is it superfluous, or what's the intention behind it?
why is c++ std::max_element so slow?
Is there a word for someone who you've not physically met but know well?
How can I draw circled integers with the same size by TikZ?
Smart Target 2014 installation issue
more hot questions
Life / Arts
Culture / Recreation
TeX - LaTeX
Unix & Linux
Ask Different (Apple)
Geographic Information Systems
Science Fiction & Fantasy
Seasoned Advice (cooking)
Personal Finance & Money
English Language & Usage
Mi Yodeya (Judaism)
Cross Validated (stats)
Theoretical Computer Science
Meta Stack Exchange
Stack Overflow Careers
site design / logo © 2014 stack exchange inc; user contributions licensed under
cc by-sa 3.0
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535923940.4/warc/CC-MAIN-20140909040754-00470-ip-10-180-136-8.ec2.internal.warc.gz
|
CC-MAIN-2014-35
| 2,333 | 52 |
https://www.alexseifert.com/about/
|
code
|
About This Website
Next.js & React
The frameworks responsible for the single-page application and static page generation.
Used throughout the entire project for better stability.
Used without any libraries.
I have created a few HTML5 canvas-based drawings for this website.
The timeline is an HTML5 canvas element that automatically generates a random series of years and scrolls through them.
The Music Staff
The music staff element draws the lines, inserts the bass clef and automatically composes a random song comprising whole, half and quarter notes.
The Spider Web
The spider web is mathematically generated and is not only adaptable to the size of the canvas element, but can also have any number of branches.
The grid can have any number of x and y axes and is also adatpable to the size of the canvas element.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473360.9/warc/CC-MAIN-20240221002544-20240221032544-00859.warc.gz
|
CC-MAIN-2024-10
| 818 | 12 |
https://cheaplicense.net/product/office-2016-professional-plus-product-key-for-1pc/
|
code
|
Buy Office 2016 with Instant Delivery at Software Planet
Microsoft Office Professional Plus 2016 brings you the classic productivity tools that you already know, but with a twist, this time including new and practical features like the ability to manipulate your files directly in the cloud from your desktop. At SoftwarePlanet, we support tight budgets, so you can buy an Office 2016 key for cheap which still comes with Microsoft support.
Another cool feature that has been incorporated is called Insights. This feature provides you with contextual information from the web, thanks to Microsoft Bing.
This version is also the first you can purchase that provides native support for the SVG vector graphics format.
Unfortunatelly, Office 2016 cannot coexist with 2013 apps. In case it’s needed, you will be prompted to remove any existing installation from Office 2013 during the setup process to continue.
Windows 7 is the minimum system requirement to run this suite, that is also available on 102 languages.
On PC, it was released in five flavours: Home & Student, Home & Business, Standard, Professional, and Pro+. At SoftwarePlanet, we only sell Pro Plus, which is the most complete release available. Cheap Office 2016 keys usually don’t support account binding, but the keys we sell here are simply the best available on the market, so after you make the purchase, you can claim your product key directly on Microsoft’s website.
What are the most groundbreaking features included in Office 2016?
Now, with Microsoft Word, you can edit in real time your documents at the same time with another person. You can allow two or more people to access your document and see the changes that are made into it. This is a feature that has been for a while in Google Docs, but now you can enjoy it when you buy Office 2016. Thanks to cloud storage, this is possible in a way we couldn’t think years ago. No more mess while keeping track of the modifications being done within a document. This is a pretty good feature that could convince you to buy an Office 2016 license.
Powerpoint this time doesn’t come with a great overhaul compared to previous releases, but they introduced a new presentation application called “Sway”. What is Sway?. We know that Powerpoint is meant to create linear presentations. You can put a slideshow between them to make look them more fancy, and you end with a pretty nice slideshow. Including Sway, you can make presentations with more flare. You can include Photos, Youtube videos, Twitter and FB items. But the real benefit here is how this tool formats the content you put in there. It saves you a lot of time of creation so you can spend that time on planning what you need to share to your audience. You should give it a try after you buy Office 2016!
Outlook, in the other hand, is probably the app with the most interesting overhaul of the package. Mainly in features that have to do with collaboration. Microsoft has been studying and deducted that collaboration features are a must have today. The cloud allows this in a way we didn’t expected to see some years ago. Outlook now has the ability to directly insert links from Onedrive, or Onedrive for Business. There’s no need to attach the file this time. In relation to the way you receive emails, you can find the new Clutter feature. Lower priority items are moved out from your Inbox to a distinct folder where you can take a look to them later. This feature learns about your usage habits, it has AI incorporated, that’s great!. So it can prioritize, based on your personal behaviour, what items to show the first time you open the app. If you are subscribed to newsletters, but you don’t open them so often, the AI will notice it and accordingly to this they will be sent to a separate folder, making your inbox less clutery we would say, and leaving space for the things that you prefer to get your attention.
In Excel 2016, the big change is the area related with “business inteligence”. We talk about the tools and processes to help you recover data from sources that differ. You can process them into intuitive information that could help you on taking better decissions related to business projects. I.e Power Query is a tool that allows you to pull data from a range of external sources. You can pull data from sites like Wikipedia, Twitter, Facebook, or database types like MySql, Azure, Oracle, Sybase, and the list goes on.. The possibility to merge all this data into spreadsheets is a nice way to help you at taking better decisions.
The user interface you can find it’s pretty similar to it’s predecessor, so most of the stuff is unchanged. It keeps the ‘Metro’ design language with which we are already quite familiar.
Do you still remember the old days of Clippy, the animated virtual assistant which appeared first in Office 97? Well, although MS decided to cut if off long time ago, now we have a feature that’s called ‘Tell Me’ which is basically a search bar that allows us to ask for suggestions if we are lost trying to complete some tasks or actions.
A more developed explanation about the changes and features that Microsoft applied in Office 2016 can be found at Microsoft’s website.
Be aware after purchasing: Cannot be used on Mac OS.
The key will be instantly sent to your eMail after checkout is completed. Download links will be provided in English and Spanish. Please check the spam or junk mail folder too.
If you prefer to bind this product key to your account follow these steps
Step 1: Navigate to www.office.com/setup
Step 2: Sign in with your Microsoft account, or create one if you don’t have one. Be sure to remember this account so that you can install or reinstall Office 2016 later, without a product key.
Step 3: Enter your Office product key, without hyphens.
Step 4: Follow the prompts to finish the redemption process.
Note: If you still have issues while activating, just try at www.microsoft.com/redeem
In case you need to install specific apps instead of the entire full package, we wrote a tutorial for our customers and for all interested users. You can go directly to it by clicking on this link.
If you’re having issues while activating your Office copy, please download and run «Microsoft Office 2016 & 2019 Activation Troubleshooter».
These are the minimum official system requirements to run the suite:
- 2GB of RAM available
- At least 1Ghz CPU
- At least 3GB of HDD/SSD space
- The screen resolution should be minimum 1280 x 800 (HD)
- OS Required: Windows 7 SP1 or above
- Also, the browsers should be updated to the latest version
- At least, Net Framework 3.5 should be installed, but the prefered one is 4.5
- A Microsoft account, for activation purposes. You can create one for free. If you registered an Outlook Webmail account, you already have a MS account.
A more extensive explanation can be found at Office 2016 System Requirements
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304600.9/warc/CC-MAIN-20220124185733-20220124215733-00335.warc.gz
|
CC-MAIN-2022-05
| 6,940 | 35 |
https://lists.gnupg.org/pipermail/gnutls-devel/2016-December/008273.html
|
code
|
[gnutls-devel] Proposal for the ASN.1 form of TPM1.2 and TPM2 keys
James.Bottomley at HansenPartnership.com
Mon Dec 26 19:13:40 CET 2016
On Mon, 2016-12-26 at 08:18 +0100, Nikos Mavrogianopoulos wrote:
> I'd like both backwards and forward compatibility actually, exactly
> like x509. If an informational field is added like the key usage that
> I mentioned, I doubt you'd like all the previous consumers
OK, so there's a fundamental difference between a v3 X509 certificate
and a TPM key: An X509 certificate is a signature over a set of v1 TBS
data, a public key and a bundle of attributes. To verify the
certificate or extract the key, you don't need to know what the
attributes are, so you can still "use" the certificate in that form.
However, you can't get the v1 tool to obey the v3 constraints on the
certificate because it doesn't understand them.
The ASN.1 description of a TPM key contains the actual binary
representation of the key plus a set of information which explains to
the consuming code how to use the key. Since I can't think of a way of
making use of the key without understanding all of the information
about how to use it, I think it is beneficial that v1 consumers don't
try to use v2 key information because the resulting failure will excite
the TPM's dictionary attack protection.
I gave an example of one such extension: policy authorisations, but
they're definitely of the "if you don't understand these, you can't use
the key" variety. Perhaps if you can give an example of a potentially
compatible extensions it would help me to see your point and give us a
means of moving forwards.
> For other extensions which make the structure totally incompatible
> you can use the critical flag. Anyway even the original struct is OK,
> it is exactly like any other key structs we have.
More information about the Gnutls-devel
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100146.5/warc/CC-MAIN-20231129204528-20231129234528-00305.warc.gz
|
CC-MAIN-2023-50
| 1,848 | 30 |
http://www.pcmag.com/article2/0,2817,1641359,00.asp
|
code
|
- Two Connections Are Better than One
- Prepackaged Solutions
The theft of network cards from a Verizon office last May caused many Manhattan businesses to lose Internet service for nearly a day. Outages such as this convey to all businessesnot just the affected oneshow dependent they have become on Internet access and how vulnerable they are to disruptions. A few hours of downtimeeven outside normal business hourscould mean thousands of dollars in missed opportunities and lost customers. But how can you ensure you'll have an unbroken connection?
A growing number of professionals, as well as companies of all sizes, are buying redundant connectivity: multiple paths to the Internet. If cable modem service, DSL, and/or wireless broadband are available in your area, you may want to subscribe to at least two of these services. (Few, if any, ISPs provide connections "for backup only." While some will let you use a conventional modem if your connection fails, this is so slow that it is of limited use as a backup.)
But how do you configure your equipment to shift quickly and seamlessly to another connection? Most computers and SOHO routers cannot do this, so unless you have the right hardware or software, you have to reconfigure manually.
What's more, if you're paying for multiple connections, you should be able to use the extra bandwidth in nonemergency situations. You should be able to exploit all your links simultaneously (load sharing) to get more bandwidth than you could from any one of them. There should also be a way to shift loads when one of your connections is slowed through congestion. You may even want to steer users accessing your servers to the "closest" connection, Internet-wise, to them. But how do you do all this? You're not likely to find any help in the documentation for your operating system or small router/firewall.
Unfortunately, it's hard for a small company or an individual to exploit the protocols that implement load sharing and redundancy on the Internet. For example, the Border Gateway Protocol, or BGP (RFC 1771), lets a host or a network "advertise" to the Internet how it can be reachedand to change that information if a connection goes down. But because the BGP assumes you're a large entity that has a big network and its own block of Internet addresses, using BGP to help with redundancy isn't practical even for moderate-sized companies, let alone SOHO users.
The Open Shortest Path First, or OSPF (RFC 2328) protocol, is good at managing redundant connections inside a network that you control. But OSPF won't help you manage multiple ISP connections unless they're all to the same ISP, which has agreed to help you use OSPF for this. (Most ISPs won't do that.)
If you're a typical small-business user, you'll need to find a way to get these features without the help of your ISP(s) or special protocols. Fortunately, engineers have begun to cook up hardware and software to let you do this.
The tricks used by these multihoming appliances can be divided into two categories: those for incoming connections (such as hits on your Web server) and those for outgoing traffic (your own browsing). The best-known are the ones that handle incoming traffic. Nearly all such products can create a server pool, which divides incoming requests among your servers and ensures that a client is matched to the same server throughout a Web transaction.
Most server appliances use domain name service (DNS) to route incoming traffic over a particular link. As most URLs include a domain name, it's possible to control which link a client uses to reach your server by changing the IP address that's returned when the client looks up a domain name.
These appliances have built-in DNS servers that respond to changing conditions. First, the appliance performs a periodic check on each Internet connection and stops furnishing IP addresses associated with a connection that goes down. (The standard protocols that domain name servers use already let them have multiple IP addresses, so a client automatically tries to reach the DNS server via a different link if one is down.)
If multiple links are up, the DNS server may choose the IP address to return to a particular client by considering the loading and capacity of each of your links. It may also try to do a proximity test to choose the link that leads most directly to the client. Since the appliance can't know how much data each client will request, it can't always balance loads optimally, but it should at least let you take some advantage of all of your working links. Once the traffic gets inside your network, the device may also use a specialized form of Network Address Translation (NAT)sometimes called smart NATto pair each client with a particular server, dividing the load so that none of your servers is saturated.
Even if your office doesn't host anything that you think of as a serverfor example, your Web siteserver redundancy features are still important in the event of an outage. Why? Because many of the applications you may use every dayVoIP, peer-to-peer, remote-control programs (like LapLink), VPN, file-sharing programs, and morecause your system to accept data connections from the outside world and thus act like a server. If machines in the outside world can't "find" you, you may lose functionality, so any solution that provides good redundancy must divert all incoming traffic (usually via DNS) to the connection(s) that are still working.
Load balancing and redundancy for clients connecting outward to the Internet are relatively new areas, for which far fewer products are available, and techniques vary widely. Some split up outgoing traffic packet by packet, feeding each to the least congested upstream link. This technique is especially useful because many Internet connections are asymmetricalwith less upstream bandwidth than downstream. Unfortunately, allocating bandwidth packet by packet between multiple connections doesn't always work. To help thwart Internet worms, some ISPs use egress filtering: They won't let you send packets with a return address that belongs to a different ISP. So, a load balancer that wants to spread a connection among multiple physical links needs to be able to senseor be toldthat a particular link can be used to send only packets with certain source addresses.
Other appliances pick one link to use exclusively for each session, or connection, with a remote server. However, the router may not always correctly determine the best link to use. (Some products try to start every outgoing connection on several links simultaneously; the one that responds first is used, even if a random delay skewed the outcome.) Also, not all products can correctly balance loads on an asymmetrical Internet connection, such as ADSL. Finally, the appliance must be able to check the health of each link.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670448.67/warc/CC-MAIN-20191120033221-20191120061221-00380.warc.gz
|
CC-MAIN-2019-47
| 6,863 | 16 |
https://links.danrigby.com/2018/07/app-developer-links-2018-07-02/
|
code
|
The latest news and resources for .NET app developers.
Powered by Dan Rigby and the .NET developer community.
Satisfy your link cravings on Twitter at @DotNetAppDev and @DanRigby.
This site and it's content is not affiliated with Microsoft.
18 New Tools and Extensions for Visual Studio
A Deep Dive into World's First TreeView Control for Xamarin
Distribute Android Apps Faster with Visual Studio App Center
Windows Command-Line: The Evolution of the Windows Command-Line
Xamarin Preview Release: Xcode 10 Beta
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506045.12/warc/CC-MAIN-20230921210007-20230922000007-00745.warc.gz
|
CC-MAIN-2023-40
| 510 | 9 |
https://www.maxplanckflorida.org/our-science/our-scientists/kuo-sheng-lee/
|
code
|
Kuo Lee joined the Fitzpatrick Lab in May 2014 as a PhD student. His research focuses on using multiple optical imaging techniques and reverse correlation methods to investigate the receptive field structure among the developing neural maps in primary visual cortex. This work will refine our knowledge about how the high-level mammalian builds a well-organized cortical circuit to process visual information.
In 2016, Kuo was awarded the Celia Lipton Farris and Victor W. Farris Foundation Ph.D. fellowship. The fellowship is intended to support a Graduate Student within the IMPRS international graduate program.
- Lee, K.-S., Vandemark, K., Mezey, D., Shultz, N., and Fitzpatrick, D. (2019). Functional Synaptic Architecture of Callosal Inputs in Mouse Primary Visual Cortex. Neuron, Online Publication.
- Lee, K-S., Huang, X., Fitzpatrick, D. (2016) Topology of ON and OFF inputs in visual cortex enables an invariant columnar architecture. Nature 533, 90–94.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256887.36/warc/CC-MAIN-20190522163302-20190522185302-00444.warc.gz
|
CC-MAIN-2019-22
| 965 | 4 |
https://docs.jboss.org/infinispan/9.4/apidocs/org/infinispan/marshall/exts/EnumSetExternalizer.html
|
code
|
- All Implemented Interfaces:
@Immutable public class EnumSetExternalizer extends org.infinispan.commons.marshall.AbstractExternalizer<Set>
- Galder Zamarreño
- See Also:
- Serialized Form
Constructors Constructor Description
All Methods Instance Methods Concrete Methods Modifier and Type Method Description
getId()Returns an integer that identifies the externalizer type.
Set<Class<? extends Set>>
getTypeClasses()Returns a collection of Class instances representing the types that this AdvancedExternalizer can marshall.
readObject(ObjectInput input)Read an instance from the stream.
writeObject(ObjectOutput output, Set set)Write the object reference to the stream.
public void writeObject(ObjectOutput output, Set set) throws IOExceptionDescription copied from interface:
org.infinispan.commons.marshall.ExternalizerWrite the object reference to the stream.
output- the object output to write to
set- the object reference to write
IOException- if an I/O error occurs
public Set readObject(ObjectInput input) throws IOException, ClassNotFoundExceptionDescription copied from interface:
org.infinispan.commons.marshall.ExternalizerRead an instance from the stream. The instance will have been written by the
Externalizer.writeObject(ObjectOutput, Object)method. Implementations are free to create instances of the object read from the stream in any way that they feel like. This could be via constructor, factory or reflection.
public Integer getId()Description copied from interface:
org.infinispan.commons.marshall.AdvancedExternalizerReturns an integer that identifies the externalizer type. This is used at read time to figure out which
AdvancedExternalizershould read the contents of the incoming buffer. Using a positive integer allows for very efficient variable length encoding of numbers, and it's much more efficient than shipping
AdvancedExternalizerimplementation class information around. Negative values are not allowed. Implementers of this interface can use any positive integer as long as it does not clash with any other identifier in the system. You can find information on the pre-assigned identifier ranges in here. It's highly recommended that maintaining of these identifiers is done in a centralized way and you can do so by making annotations reference a set of statically defined identifiers in a separate class or interface. Such class/interface gives a global view of the identifiers in use and so can make it easier to assign new ids. Implementors can optionally avoid giving a meaningful implementation to this method (i.e. return null) and instead rely on XML or programmatic configuration to provide the AdvancedExternalizer id. If no id can be determined via the implementation or XML/programmatic configuration, an error will be reported. If an id has been defined both via the implementation and XML/programmatic configuration, the value defined via XML/programmatic configuration will be used ignoring the other.
getTypeClassesDescription copied from interface:
org.infinispan.commons.marshall.AdvancedExternalizerReturns a collection of Class instances representing the types that this AdvancedExternalizer can marshall. Clearly, empty sets are not allowed. The externalizer framework currently requires all individual types to be listed since it does not make assumptions based on super classes or interfaces.
- A set containing the Class instances that can be marshalled.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816863.40/warc/CC-MAIN-20240414002233-20240414032233-00347.warc.gz
|
CC-MAIN-2024-18
| 3,414 | 27 |
http://poker.stackexchange.com/questions/tagged/betting-strategy?page=2&sort=votes&pagesize=30
|
code
|
Is it as simple as picking two cards out of the four that would make a decent Hold Em starting hand or is the playable range completely different?
I host a local texas hold'em games at my house every friday. However, I always lose money while my friends are usually win some/lose some. How can I increase my odds of winning? I don't know much ...
From the small blind on a 1-2nl cash game, hero calls ($1) with Ax3x. About half the table has called so there is about $10 in the pot. Everyone checks on the flop and turn. The river is a 3x so now ...
Is there a formula to calculate every possible betting/checking outcome in Heads Up situations at a given depth (stack/BB)?
I heard about some players will bet without considering the cards they hold in poker. Can this be true? That is, can they soundly bet against their opponents' cards if they sense weakness and still ...
When playing AA to maximize the potential return, I tend to bet a lot pre flop but that often leads to just stealing the blinds. Given this fact, should I limp and reraise if I can, given that I've ...
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-11/segments/1424936459513.8/warc/CC-MAIN-20150226074059-00150-ip-10-28-5-156.ec2.internal.warc.gz
|
CC-MAIN-2015-11
| 1,077 | 6 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.