url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://www.raspberrypi.org/forums/viewtopic.php?f=28&t=39843&p=603137
code
If you've seen my post then you'll know that no memory card is safe not even Micro SD adapters although the Micro SD card inside would be unaffected. I feared as much... But at least yours lasted for 2 years. Mine is bend after a mere 4-5 months. I think I might try the suggestion of the link explaining how to 'repair' the sd card slot, adding what I hope is sufficient support for preventing the sd cards to bend. I also took a look at the adafruit adapter (http://www.adafruit.com/products/966 ), which is thicker and therefore probably stronger which would hopefully make it last longer, but they don't sell it anywhere near here (Belgium) which means I'd have to pay $25 to get a $6 sd card adapter...
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141193856.40/warc/CC-MAIN-20201127161801-20201127191801-00709.warc.gz
CC-MAIN-2020-50
707
4
https://saeedlab.cis.fiu.edu/
code
Welcome to Dr. Fahad Saeed’s Research Group. We are an interdisciplinary research group in high performance computing focusing on applications-driven algorithmic research, primarily in the area of computational and systems biology. We are particularly interested in solving big data problems in high-throughput proteomics, genomics and connectomics using variety of high-performance architectures and artificial intelligence, machine-learning and deep-learning strategies. We are always looking for exceptional PhD students. Contact Prof. Saeed via email (fsaeed [at] fiu (dot) edu) for a possible position in the lab. Interested in joining the group as fully-funded Research Assistant or a Post-Doctoral Fellow? Read this
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703506697.14/warc/CC-MAIN-20210116135004-20210116165004-00765.warc.gz
CC-MAIN-2021-04
724
3
https://fomoro.com/demo/
code
Working with the Facebook bAbi dataset, we ask a neural network questions about a short story. It does better then some teenagers. Read the story below and ask a related question. The bot will read the story followed by the question and attempt to provide an answer. (The ordering is important as the bot must remember the important details of the story before seeing the question.) We use our implementation of Recurrent Entity Networks to solve tasks from bAbI. view story time »
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742322.51/warc/CC-MAIN-20181114232605-20181115014605-00344.warc.gz
CC-MAIN-2018-47
482
5
http://www.cpc.noaa.gov/products/wesley/wgrib2/set_metadata.html
code
Whenever -set_metadata option is "executed", one line of the data file is read, the metadata is then applied to the current (sub-)message. For example, your grib file has 3 messages and you want to alter the metadata. Here is a metadata file that could be used to alter the grib file. 0:0:d=2009010100:TMP:2 m above ground:anl 0:0:d=2009010106:HGT:500 mb:12 hour forecast:scale=0,0 The format of the metadata file resembles the wgrib2 inventory by design. The first and second fields are ignored by by -set_metadata. In practice, the first first is the record number and the second field is the byte location of the template to be used. (A template file could be a collection of templates.) The third through sixth fields are the date code, variable name, level and ftime. Finally the remaining fields are optional and order independent. scale=I,J set decimal scaling (I) and binary scaling (J) packing=S set compression/packing to S S=simple,complex1,complex2,complex3,jpeg (long form) S=s,c1,c2,c3,j (short form) N%d level set percentile prob ... set probability ENS=... set ensemble member info ENS=hi-res, low-res, +N, or -N N ens members set number of ensemble members ex. 22 ens members code table X.Y=Z set code table, equivalent -set table_X.Y Z requires wgrib2 v2.0.5+ flag table X.Y=Z set flag table, equivalent -set table_X.Y Z requires wgrib2 v2.0.5+ note: not X.Y have been implemented Following options follows -set VAR VAL and do not follow the wgrib2 inventory format center= set center subcenter= set sub-center table_M.N= only for selected M.N To change the metadata, you can do wgrib2 in.grb -set_metadata meta -grib_out out.grb The -set_metadata option is used for creating grib2 files. Note that both -set_metadata and the various -import options will change the output precision. Consequently the -import option should preceed the Note: only a subset of levels and ftime parameters is currently implemented. The -set_metadatda option does not support all metadata. To format of the levels and ftime are the same was used by wgrib2 inventories.
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719564.4/warc/CC-MAIN-20161020183839-00181-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
2,065
44
https://clojureverse.org/t/luminus-goog-date-datetime-deserialization-performance-considerations/5541
code
basically luminus makes use of cljs-time ( parse ) for transit support. now doing so is clearly a performance problem and i have also found now the following related issue on github: in the issue they are mentioning: which is already much better, but i feel like it should be easy enough to do even better than that, since one should be able to exploit the fact that one is in complete control over / has complete knowledge of the string-format one has to parse… having said that… at the moment i do not know if i am missing something here… and / or how one could try go about doing that… and / or if it would even be worth it… any pointers / suggestions? p.s. yesterday i already wrote about this… i also made a suggestion ( clearly wrong )… and so i noticed it after rereading… and deleted that post… so here is my altered suggestion… (defn specific-iso-string-to-date-obj [iso-string] (let [yyyy (js/parseInt (subs iso-string 0 4)) MM (dec (js/parseInt (subs iso-string 5 7))) dd (js/parseInt (subs iso-string 8 10)) HH (js/parseInt (subs iso-string 11 13)) mm (js/parseInt (subs iso-string 14 16)) ss (js/parseInt (subs iso-string 17 19)) sss (js/parseInt (subs iso-string 20 23))] (new goog.date.DateTime yyyy MM dd HH mm ss sss))) probably wrong again … but… maybe this could be a starting point?
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571987.60/warc/CC-MAIN-20220813202507-20220813232507-00435.warc.gz
CC-MAIN-2022-33
1,326
7
https://www.msgo.com/threads/jackson-airport-question.69744/
code
I grew up in Pearl, within sight (until the trees grew to block it) of some of the towers. I'm not sure just when the thing was built but I've always wondered, especially now, with all the fuss, why was it built in Rankin County but still belong to the city of Jackson? What was the deal? Does Rankin County, or Pearl, get anything out of it, money-wise? I always thought it weird, back when Rankin County was dry, that you could buy liquor at the airport.
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812873.22/warc/CC-MAIN-20180220030745-20180220050745-00282.warc.gz
CC-MAIN-2018-09
456
1
https://www.wikitree.com/g2g/237571/feature-suggestion-alternative-secondary-sorting-categories
code
A New feature request that would be nice in any form, but specifically, for a limited group of profiles say like a one name study page "Category page", that already sorts the profiles by name, if they could further be sorted by (selectable of at least 2 or 3) birth date, birth location, marriage location, or death location. With the location sorted first on country, then county, then city. That is read the location right to left. This would really help to find matches and in locating family groups. I use Family Tree maker (7.0) and enter all my location info in reverse order, (country, state, county, city) so when I sort everyone living in one area gets grouped together. I find this invaluable in locating family's. IF that is too much the next best thing would be to at least sort the page on name AND date to help finding matches with in that group.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711013.11/warc/CC-MAIN-20221205064509-20221205094509-00852.warc.gz
CC-MAIN-2022-49
860
4
https://fifaforums.easports.com/en/discussion/402798/88-rated-cam-cm-looking-for-a-club-that-s-serious-competitive-no-kids-about-winning-div-1-title
code
I’ve got a lot to offer in the midfield position (especially CAM) but will take one of the 2 CM positions incase it’s occupied. I like to pass around the ball and take my time. I also know how to handle pressure from the opponents and what to do in those scenarios. Long shots is my speciality. Won the DIV 1 title about 5 times in FIFA 18 (Seasons) and I keep improving.
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573561.45/warc/CC-MAIN-20190919163337-20190919185337-00075.warc.gz
CC-MAIN-2019-39
375
3
https://discussion.fedoraproject.org/t/vwbusguy-qb64/35623
code
QB64 is a modern extended BASIC+OpenGL language that retains QB4.5/QBasic compatibility and compiles native binaries for Windows (XP and up), Linux and macOS. This installs the QB64 compiler and IDE, including a desktop file for easy launching. Refer to https://qb64.org for documentation. The following unofficial repositories are provided as-is by owner of this project. Contact the owner directly for bugs or issues (IE: not bugzilla).Release Architectures Repo Download Fedora 35 aarch64 (0)*, x86_64 (0)* Fedora 35 (0 downloads) * Total number of packages downloaded in the last seven days. This is a companion discussion topic for the original entry at https://copr.fedorainfracloud.org/coprs/vwbusguy/qb64/
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304287.0/warc/CC-MAIN-20220123141754-20220123171754-00060.warc.gz
CC-MAIN-2022-05
713
5
https://yilinfang.github.io/
code
I will join the Department of Computer Science and Engineering (CSE) at The Ohio State University (OSU) as a Ph.D. student under the supervision of Prof. Carter Yagemann. [Feb. 2023] I will join OSU as a Ph.D. student! [Dec. 2022] Our paper “Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph Model” has been accepted by ICSE’23! School of Cyber Science and Engineering, Huazhong University of Science and Technology (HUST) Master's degree in Cybersecurity, Sep.2020 - June.2023 (expected) Bachelor's degree in Information Security, Sep.2016 - June.2020 Note: #Equal Contribution, Corresponding Author* Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph Model [Code] Bin Yuan, Yifan Lu, Yilin Fang, Yueming Wu, Deqing Zou, Zhen Li, Zhi Li and Hai Jin in Proceedings of the 45th International Conference On Software Engineering (ICSE), 2023 There is an archive of several pages generated from the offcial sources.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949701.56/warc/CC-MAIN-20230401063607-20230401093607-00583.warc.gz
CC-MAIN-2023-14
978
11
https://tw.tradingview.com/script/dpih6hKE-Rogers-Satchell-Volatility-Estimation/
code
The Rogers & Satchell function is a estimator that outperforms other estimators when the underlying follows a geometric Brownian motion with a drift (historical data mean returns different from zero). As a result, it provides a better estimation when the underlying is trending. However, the Rogers & Satchell estimator does not account for jumps in price (gaps). It assumes no opening jump. The function uses the open, close, high, and low price series in its calculation and it has only one parameter, which is the period to use to estimate the . This script allows you to transform the reading. The intention of this is to be able to compare across different assets and timeframes. Having a relative reading of also allows you to better gauge within the context of current market conditions. For the signal lie I chose a repulsion moving average to remove choppy crossovers of the estimator and the signal. This may have been a mistake, so in the near-future I might update so that the MA can be selected. Let me know if you have any opinions either way. Want to Learn? If you'd like the opportunity to learn Pine but you have difficulty finding resources to guide you, take a look at this rudimentary list: https://docs.google.com/document/d/10t3Z... The list will be updated in the future as more people share the resources that have helped, or continue to help, them. Follow me on Twitter to keep up-to-date with the growing list of resources. Suggestions or Questions? Don't even kinda hesitate to forward them to me. My (metaphorical) door is always open.
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141171126.6/warc/CC-MAIN-20201124053841-20201124083841-00097.warc.gz
CC-MAIN-2020-50
1,563
8
https://www.oreilly.com/library/view/full-stack-web/9781449370978/ch10.html
code
As your application grows and you start working in a team with multiple developers, questions on workflow, coding style and testing become important. Tools to organize workflows help to apply conventions and bring applications to the next level. In this chapter, we enter the world of Yeoman. Based on the ideas of build automation, this chapter shows how a Yeoman generator can provide you with standard steps to develop Backbone application modules. At the end of this chapter, our goal is to have the movie application running on the Node toolchains. This includes: In the previous chapters, you incrementally have built a web application “by hand”. This means, that you did run commands from the command-line to create files and directories, inserted repeating code by hand and maybe applied a watchmode of different tools to help starting the development environment. If you ...
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247480622.9/warc/CC-MAIN-20190216145907-20190216171907-00093.warc.gz
CC-MAIN-2019-09
887
5
http://sourceforge.net/directory/communications/filesharing/language:c/os:netbsd/
code
Showing page 1 of 1. UNFS3 is a user-space NFSv3 server75 weekly downloads ReAIM is an AOL Instant Messenger Proxy for iptables-based firewalls. It allows direct connections to be made to hosts behind an address-translating firewall. MSN and Windows Messenger are also supported.18 weekly downloads hotwired is a Hotline server for Unix-like operating systems. It aims to implement all the features of the level 2 Hotline protocol (i.e. Hotline > 1.5), including transfer queues, threaded news, and user management.2 weekly downloads
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422122039674.71/warc/CC-MAIN-20150124175359-00100-ip-10-180-212-252.ec2.internal.warc.gz
CC-MAIN-2015-06
533
4
https://stackshare.io/stackups/generact-vs-react-morph
code
Generact vs React Morph: What are the differences? Generact: Generate React components by replicating your own. Tool for generating React components by replicating your own It's intended to work no matter how your file structure is.; React Morph: Morphing UI transitions made simple. Morphing UI transitions made simple. Generact and React Morph are both open source tools. It seems that React Morph with 2.42K GitHub stars and 56 forks on GitHub has more adoption than Generact with 1.27K GitHub stars and 54 GitHub forks.
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371660550.75/warc/CC-MAIN-20200406200320-20200406230820-00245.warc.gz
CC-MAIN-2020-16
523
3
https://www.gamefront.com/forums/moh-problems-errors-and-help/guns-sound-different
code
when playing online moh i find that sometimes my machine gun sounds heavy and potent, other times it sounds higher pitched and tinny. is this something to do with modding? if so how can i be sure i have the correct files in the correct places?:confused: It might just be your sound card. well, i've noticed that the lighter sounding gun is present in the offline game, the heavy sounding one (much better sound) is only on some online arenas. this is why i wondered if there was modding of gun sounds.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178362513.50/warc/CC-MAIN-20210301121225-20210301151225-00280.warc.gz
CC-MAIN-2021-10
501
3
http://badcreditloans.ga/hedu/4-slots-2-sticks-ram-xer.php
code
4 slots 2 sticks ram For instance, a single 2GB DIMM an cost ten times as much as a 256MB DIMM.Hello, Price aside, what is better to get 16GB of RAM: 4 sticks of 4GB each, or 2 sticks of 8GB each? This will be for a z68 motherboard with 4 RAM slots with an i7.I've got a dual channel motherboard with 4 DDR3 slots (M5A78L-M/USB3) but I've got 4 different RAM sticks in each slot all with different timings. Precision T3500 Ram - Dell CommunityI have a bunch of remote machines I need to find out how many RAM slots they have and if they are used or not. It's for systems upgrade. So for example if. hey guys on my motherboard I have 6 ram slots (3 pairs- a blue slot and black slot in each pair) only 4 of the slots are filled-- from some preliminary. A single stick of 8GB vs. two sticks of 4GB | TechPowerUp. The motherboard only has two slots for ram. A single stick of 8GB vs. two sticks of. I would also recommend getting 2 sticks of ram opposed to just. purchase 4 8 gb sticks of ram for laptop, only 2 slots, last 2 slots I cant find.Shop Computer RAM from G.Skill, Corsair, Crucial, Kingston, HyperX and more! Newegg offers the best prices, fast shipping and top-rated customer service!. Right now the computer I have is 512 mb ram - there are 2 sticks of 256mb -ddr- 400mhz -cl3 ram. there are 2 slots full and 2 that are open. Would it be ok.Aside from the obvious effect of not being able to add more memory is there any other advantage to go for 2 sticks vs 4?. only produce boards with only 2 RAM slots. Can I install a 8GB ram stick with already installed 4GB Can I install a 8GB ram stick with already installed 4GB RAM. by adding one more 8GB ram stick on its second empty slot. 4+8GB RAM and it has held up for.I have a motherboard (Asus P5NSLI) with 4 slots for RAM. I have a video card with 1 gb of memory. Since Im in 32-bit WinXP, that only leaves room for 3 gigs of RAM. Windows 7 does not boot with 4 ram sticks (16gb) Solved purchase 4 8 gb sticks of ram for laptop, only 2 slotsLaptop with 32gb ram > Laptop with 32gb. Having 4 RAM slots in a laptop opens up quite a bit of options, you can use something like existing two 2 gig sticks,.I have (2) 4 GB sticks of RAM in my ASUS motherboard. I have spare (2) 2 GB sticks that I want in my machine, but I only have 2 RAM slots. Is there a way I can put 4. I have a question about the ram slots, I got 4 ram slots. RAM question-Shall i put the rams in Slot 1. It is 2GB ram on each stick so tha brings a total of 4 GB.Digital Photography Review:. so you have a lot of flexibility with memory upgrades (up to 32GB total using 8GB modules in all 4 available slots) As for ECC memory,. Because DIMMs come in different memory sizes, memory can be set up in a variety of ways inside any PC. (Note: Not all motherboards have 4 slots.When I put memory sticks in all 4 slots. I have tested the same RAM sticks. you have sometime to adjust voltag as 4 draw more current than 2, and 8GB sticks. How to remotely find out how many RAM slots a machines has?Upgrading your RAM (Random Access Memory). Insert the RAM into the RAM slot. Line up the notch in the stick of RAM to the break in the slot.RAM Upgrade: How To Upgrade Your Computer Memory; Steps 1-6;. you won't be able to install one kind of memory stick in a slot meant for a different type.Upgrading memory is easier later, when memory slots are available. Desktop Memory (RAM) Email a Friend Print. So if your motherboard supports 8GB of RAM and has 4 slots you can install four 2GB RAM sticks or two 4GB sticks of RAM.( it is the 1st Type of Ram offered. Have you tried installing a pair of those 8-GB sticks together in slots 1 and 2?. dimm1, dimm 4, dimm 2, dimm 5.I ordered some G.Skill 6 GB (3 x 2 GB) DDR3 1600 mhz RAM and a AMD motherboard with 4 slots. I am planning to run Phenom ii x6 3.2 ghz on it. My friend says its bad.Dual Channel RAM. When using 2 RAM sticks of different brands then locations A1 and B1 must be. if you want to install a 4th memory stick in slot B2,. Computer programs can figure out this stuff without the need to open the computer case.How To Install RAM on a 4 Slot. I am Using The Gigabyte GA-78LMT-USB3 Motherboard and 2 Sticks of Kingston HyperX Fury 4GB DDR3 RAM and one DDR3 Transcend. memory - Is it ok to mix 2 GB and 4 GB DIMMS in an iMac Can't install 4 sticks of ram? - Crucial Communityi have 2 sticks of 4gb corsair vengeance ram, and a asrock z77 extreme 4 mobo, there are 4 ram slots on the mobo and i only have 2 sticks of ram, what order do i put. MAXIMUS V FORMULA/ThunderFX Will Not Boot with More than 2 How to Avoid Damaging RAM During Installation: 4 Steps New PC conf. and I got RAM question, shall I put the memory sticks in SLOT 1/3 or stay with my current setup 2/4? Intel Core i7-4790 3.6g 1150.8gb + 2gb = 10gb ram?. you need to have 2 same sticks. Does it matter which stacked slot you put the larger memory in (8 GB) on top slot and 2 GB on bottom.I have 2 pairs of ram sticks,. 4 Sticks of ram? By Genome852 · 6 replies Jan 2, 2007. I have 2 pairs of ram sticks, one pair is CAS 2 DDR400 and one is CAS 2.5.4 4gb sticks or 2 8gb sticks of RAM. but the most people have been saying is "2 sticks are easier on the memory controller" or "having 4 sticks does have an.I've just completed a build with a brand new MAXIMUS V FORMULA/ThunderFX. sticks in all 4 slots I get. Will Not Boot with More than 2 Sticks of RAM.It has 4 memory slots for dual channel. My local supplier only has Join Forum. RAM 4 slots or 2? Hey all, What is generally considered better and why?.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376828507.84/warc/CC-MAIN-20181217135323-20181217161323-00198.warc.gz
CC-MAIN-2018-51
5,550
21
http://roughandtumbling.tumblr.com/archive/2011/3
code
When I start ignoring your grammatical errors that's when you know that I like you as a person. GRAMMAR NAZI 4 LYF. “I don’t entirely approve of some of the things I have done, or am, or have been. But I’m me. God knows, I’m me.” — Elizabeth Taylor (via theperksofalipglossgirl)
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368709135115/warc/CC-MAIN-20130516125855-00044-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
290
3
http://animeocd1323.deviantart.com/
code
Just for the fun of it, since I haven't been very active on DA lately I commented on 's copy xP 1. Tell you something I learned about you by looking at your DA for 20 seconds. 2. Tell you a color you remind me of. 3. Tell you an element I think you belong to (eg: water, fire, earth, air, etc.) 4. Tell you what character you remind me of. 5. Ask you a question, and you must answer. 6. Tell you something that I like about you. 7. Tell you the object that is to the left of me. 8. Tell you what food/flavor/smell you remind me of. 9. Guess your gender. 10. Tell you to put this on your journal (if you don't want to, you don't have to xP )
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701151789.24/warc/CC-MAIN-20160205193911-00172-ip-10-236-182-209.ec2.internal.warc.gz
CC-MAIN-2016-07
640
13
http://forums.qj.net/ps3-news/83536-firmware-1-31-released-print.html
code
Downloading it now. Will update you soon with changes. EDIT: Ok, I finished installing. I don't see any changes at all in the menus or settings. Most likely, this seems to be only a security update. I'm not sure if anything is done about the upscaling issue or how to check that. Maybe someone would like to try to see if upscaling works? But for now I don't see any changes. Firmware Download Link Originally Posted by Changelog
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345762220/warc/CC-MAIN-20131218054922-00024-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
429
4
http://repstrapdk.blogspot.com/2013/07/fiddling-with-gcode.html
code
Monday, 8 July 2013 Fiddling with GCode Repeatably, I see the temp sensor and extruder motor working with hand-crafted Arduino code but not with Teacup firmware through the ReplicatorG manual control panel. To fix this, I took the GCode in the ReplicatorG model I'd created long ago and trimmed it down to just heating and reporting temperature. When I tried to run it, I got a number of safety check warnings. First: Recreate GCode with the new firmware - the GCode was created for other firmware setup. Didn't change much. Found out how to cut ReplicatorG out of the equation: By running the firmware in the Arduino app, opening the serial monitor, setting baud to 115200 and line ending to newline, I can run commands directly to the GCode interpreter. And, indeed, it just returns 0.0 for temperature. Maybe there's a problem with the thermistor table. Z offset Tuesday morning: 1.0. Air pressure 1017hPa. Humidity 26% Z offset Tuesday evening: 1.1. Air pressure 1016 hPa. Humidity 30%. Mov... Printing journal (I hope) Printing glass marker. Temp 22C, 999hPa, 48%, Z offset 0.5. Whether due to me interfering with the early stage... After +Tim Hatch 's suggestion started making more and more sense, I re-soldered the Z and E microstepper jumpers. After that, it's...
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814801.45/warc/CC-MAIN-20180223154626-20180223174626-00662.warc.gz
CC-MAIN-2018-09
1,272
6
http://culpepper.io/
code
I am an ARC DECRA Research Fellow and Senior Lecturer at RMIT University in the Department of Computer Science & Information Technology. I run the Search Algorithms Lab (SAL) which is closely affiliated with the Information Storage and Retrieval (ISAR) Research Group ran by Professor Mark Sanderson. My current work focuses on how to design and evaluate efficient and effective algorithms and data structures for a wide variety of information storage and retrieval problems. Broadly speaking my research interests include information retrieval, text indexing, data compression, learning to rank, natural language processing, experimental algorithmics, and scalable distributed/parallel computing. See my research overview and publications pages for more information. Potential Students and Postdocs If you are interested in the work we do and wish to pursue a research career, please read the information included on my Phd and Postdoc recruiting page to find out more about current opportunites and selection criteria. - Sheng Wang - Joel Mackenzie - Tadele Tedla Damessie - Xiaolu Lu - Farhana Murtaza Choudhury - Gaya Jayasinghe (completed PhD in 2014) - Matthias Petri (completed PhD in 2013) Undergraduate/Minor Thesis Students - Luke Gallagher I completed a Ph.D. in Computer Science in 2008 under the venerable I am a dual citizen of the U.S. and Australia and I currently reside in lovely Before entering academia, I spent several years in various technical roles in industry. For more details, refer to my My Thesis Wordle
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541773.2/warc/CC-MAIN-20161202170901-00102-ip-10-31-129-80.ec2.internal.warc.gz
CC-MAIN-2016-50
1,532
23
https://forums.adobe.com/message/4040827
code
This is a good suggestion. We will put it on our todo list. You should be able to get most of what you need through the copy/paste functionality in your browser. If you select the text, do Edit>Copy to copy from the browser, and then paste into TextEdit, you should get just the text. You can manually delete any text you don't want. Let me know if this works for you.
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701150206.8/warc/CC-MAIN-20160205193910-00090-ip-10-236-182-209.ec2.internal.warc.gz
CC-MAIN-2016-07
368
1
http://linux.sys-con.com/node/2463585
code
|By RealWire News Distribution|| |November 28, 2012 06:59 PM EST|| Flexiant Cloud Orchestrator selected to deliver Cartika an enterprise grade cloud computing solution Toronto, Canada and London, UK - 28 November 2012 - Cartika IT Solutions Inc., a leader in application hosting and advanced clustering technologies, has selected Flexiant Cloud Orchestrator V3 over OnApp V3, CloudStack, OpenStack, and in-house development for its on-demand, fully automated provisioning of cloud services. Both from an internal company requirement and to meet its customers' expectations of a more automated and flexible solution, Cartika recognised the need to offer a more complete infrastructure as a service (IaaS) solution. Cartika's legacy system was home-grown, aging and lacking the features required to effectively deliver cloud services to its customers in an automated, profitable way. Andrew Rouchotas, CEO, Cartika said, "The cloud utility model is the future of IT. To position ourselves ahead of the growing customer demand for utility computing and to maintain commercial competitiveness, we required greater automation for our virtual offerings." "We knew we needed a cloud provisioning platform that would enable us to provide enterprise grade solutions, help us differentiate against other service providers, and that would also support both our current and future business strategies. We discussed internal development, but the time to market was prohibitive. After looking at several vendors, it became obvious that Flexiant was clearly a more mature and stable software solution than the others. Flexiant's product is head and shoulders above the alternatives. We were impressed with its robustness and ease of deployment and also the service delivery team's ability to meet our bespoke needs." Flexiant Cloud Orchestrator V3 was selected to provide the cloud orchestration solution Cartika required. "There were two differentiators that set Flexiant apart from the competition - the single pane of glass to centrally manage our cloud and virtual installs in each of our facilities across potentially multiple hypervisors, and the headless hypervisor technology." Rouchotas continued, "Flexiant offers our business the complete cloud orchestration platform to deliver and manage our virtualized offerings including public and private VPS and cloud solutions. We will leverage our Flexiant decision as a differentiator for Cartika enabling us to offer enterprise grade solutions." Flexiant Cloud Orchestrator V3 delivers a wide range of functionality that will increase agility and drive competitive market advantages for service providers. The software enables service providers with the freedom and flexibility to cost-effectively make more margin and profit from the cloud. George Knox, CEO, Flexiant said, "Having just been named by Info-Tech Research Group as the trendsetter for cloud management solutions and the leading cloud management product, we were able to offer Cartika a cloud orchestration platform that is proven, robust and functionally richer to alternatives in the market. Our business is focused on helping service providers quickly create a cloud business that offers their customers the agility required of cloud computing. As a result, we are winning cloud platform contracts from our competitors and building significant momentum in the market." Knox said, "The IT market is moving from CAPEX to OPEX models. This means significant possibilities for the service provider market. As with Cartika, service providers need to be ready to capture this revenue by offering an enterprise-grade cloud solution that provides customers with the ability to scale as required." Cartika plans to deploy Flexiant Cloud Orchestrator to support new business wins as well as migrate its existing customer base onto this new Flexiant-based platform. The Info-Tech Research Group "Vendor Landscape: Cloud Management Solutions" rated Flexiant exemplary as a result of gaining highest product rating out of all other vendors in this report based on ratings in areas such as usability, affordability, architecture and strategy. Info-Tech Research Group said Flexiant's strengths include standout dashboard customisability, flexible and integrated billing capabilities, quota and permission management, and alerts tied to resource utilisation and flexible deployment options with multi-hypervisor support. The full independent vendor landscape for cloud management solutions is available for download at http://learning.flexiant.com/info-tech-vendor-landscape-report-cloud-management-solutions/. Flexiant is a leading international provider of cloud orchestration software for on-demand, fully automated provisioning of cloud services. Flexiant's software gives cloud service providers business agility, freedom and flexibility to scale, deploy and configure cloud services, simply and cost-effectively. Vendor agnostic and supporting multiple hypervisors, Flexiant Cloud Orchestrator is a software suite that is service provider ready, enabling cloud service provisioning through to granular metering, billing and reseller management. Used by over one hundred organisations worldwide, from small hosters to large Managed Service Providers (MSPs), Flexiant Cloud Orchestrator is simple to understand, simple to deploy and simple to use. Flexiant customers include NetGroup, FP7 Consortium, ITEX, TransEnt, Fast2host and Boston Group. Visit http://www.flexiant.com/. Cartika Inc. is an established leader in application hosting and advanced clustering technologies. Cartika enables businesses to deliver services to their local and global customer base by seamlessly clustering services across multiple types of infrastructure (traditional dedicated, virtual, cloud). Cartika can centrally manage and support fleets of servers across multiple data centers, offer management and support capabilities for Linux and Windows based solutions and resell capabilities of Linux and Windows VPS servers, Cloud Servers and Dedicated Servers and Clusters. With extensive reseller capabilities, Cartika allows IT professionals to add value to their existing offerings and services. Cartika's next generation offerings are complimented by their best of breed proactive managed services offerings. Cartika offers the most advanced reseller hosting platform available anywhere. Learn more at http://www.cartika.com/. Complete Internet of Things (IoT) embedded device security is not just about the device but involves the entire product’s identity, data and control integrity, and services traversing the cloud. A device can no longer be looked at as an island; it is a part of a system. In fact, given the cross-domain interactions enabled by IoT it could be a part of many systems. Also, depending on where the device is deployed, for example, in the office building versus a factory floor or oil field, security ha... Oct. 1, 2016 11:15 AM EDT Reads: 866 24Notion is full-service global creative digital marketing, technology and lifestyle agency that combines strategic ideas with customized tactical execution. With a broad understand of the art of traditional marketing, new media, communications and social influence, 24Notion uniquely understands how to connect your brand strategy with the right consumer. 24Notion ranked #12 on Corporate Social Responsibility - Book of List. Oct. 1, 2016 10:45 AM EDT Reads: 594 Fact is, enterprises have significant legacy voice infrastructure that’s costly to replace with pure IP solutions. How can we bring this analog infrastructure into our shiny new cloud applications? There are proven methods to bind both legacy voice applications and traditional PSTN audio into cloud-based applications and services at a carrier scale. Some of the most successful implementations leverage WebRTC, WebSockets, SIP and other open source technologies. In his session at @ThingsExpo, Da... Oct. 1, 2016 10:30 AM EDT Reads: 1,724 Businesses are struggling to manage the information flow and interactions between all of these new devices and things jumping on their network, and the apps and IT systems they control. The data businesses gather is only helpful if they can do something with it. In his session at @ThingsExpo, Chris Witeck, Principal Technology Strategist at Citrix, will discuss how different the impact of IoT will be for large businesses, expanding how IoT will allow large organizations to make their legacy ap... Oct. 1, 2016 10:30 AM EDT Reads: 709 What happens when the different parts of a vehicle become smarter than the vehicle itself? As we move toward the era of smart everything, hundreds of entities in a vehicle that communicate with each other, the vehicle and external systems create a need for identity orchestration so that all entities work as a conglomerate. Much like an orchestra without a conductor, without the ability to secure, control, and connect the link between a vehicle’s head unit, devices, and systems and to manage the ... Oct. 1, 2016 10:00 AM EDT Reads: 517 What does it look like when you have access to cloud infrastructure and platform under the same roof? Let’s talk about the different layers of Technology as a Service: who cares, what runs where, and how does it all fit together. In his session at 18th Cloud Expo, Phil Jackson, Lead Technology Evangelist at SoftLayer, an IBM company, spoke about the picture being painted by IBM Cloud and how the tools being crafted can help fill the gaps in your IT infrastructure. Oct. 1, 2016 10:00 AM EDT Reads: 3,196 For basic one-to-one voice or video calling solutions, WebRTC has proven to be a very powerful technology. Although WebRTC’s core functionality is to provide secure, real-time p2p media streaming, leveraging native platform features and server-side components brings up new communication capabilities for web and native mobile applications, allowing for advanced multi-user use cases such as video broadcasting, conferencing, and media recording. Oct. 1, 2016 10:00 AM EDT Reads: 3,319 In this strange new world where more and more power is drawn from business technology, companies are effectively straddling two paths on the road to innovation and transformation into digital enterprises. The first path is the heritage trail – with “legacy” technology forming the background. Here, extant technologies are transformed by core IT teams to provide more API-driven approaches. Legacy systems can restrict companies that are transitioning into digital enterprises. To truly become a lea... Oct. 1, 2016 09:45 AM EDT Reads: 834 In his session at @ThingsExpo, Kausik Sridharabalan, founder and CTO of Pulzze Systems, Inc., will focus on key challenges in building an Internet of Things solution infrastructure. He will shed light on efficient ways of defining interactions within IoT solutions, leading to cost and time reduction. He will also introduce ways to handle data and how one can develop IoT solutions that are lean, flexible and configurable, thus making IoT infrastructure agile and scalable. Oct. 1, 2016 09:15 AM EDT Reads: 1,676 SYS-CON Events announced today that Sheng Liang to Keynote at SYS-CON's 19th Cloud Expo, which will take place on November 1-3, 2016 at the Santa Clara Convention Center in Santa Clara, California. Oct. 1, 2016 09:15 AM EDT Reads: 197 Just over a week ago I received a long and loud sustained applause for a presentation I delivered at this year’s Cloud Expo in Santa Clara. I was extremely pleased with the turnout and had some very good conversations with many of the attendees. Over the next few days I had many more meaningful conversations and was not only happy with the results but also learned a few new things. Here is everything I learned in those three days distilled into three short points. Oct. 1, 2016 08:45 AM EDT Reads: 5,510 Cognitive Computing is becoming the foundation for a new generation of solutions that have the potential to transform business. Unlike traditional approaches to building solutions, a cognitive computing approach allows the data to help determine the way applications are designed. This contrasts with conventional software development that begins with defining logic based on the current way a business operates. In her session at 18th Cloud Expo, Judith S. Hurwitz, President and CEO of Hurwitz & ... Oct. 1, 2016 08:30 AM EDT Reads: 3,422 So, you bought into the current machine learning craze and went on to collect millions/billions of records from this promising new data source. Now, what do you do with them? Too often, the abundance of data quickly turns into an abundance of problems. How do you extract that "magic essence" from your data without falling into the common pitfalls? In her session at @ThingsExpo, Natalia Ponomareva, Software Engineer at Google, provided tips on how to be successful in large scale machine learning... Oct. 1, 2016 08:30 AM EDT Reads: 2,510 An IoT product’s log files speak volumes about what’s happening with your products in the field, pinpointing current and potential issues, and enabling you to predict failures and save millions of dollars in inventory. But until recently, no one knew how to listen. In his session at @ThingsExpo, Dan Gettens, Chief Research Officer at OnProcess, will discuss recent research by Massachusetts Institute of Technology and OnProcess Technology, where MIT created a new, breakthrough analytics model f... Oct. 1, 2016 08:00 AM EDT Reads: 2,287 The Transparent Cloud-computing Consortium (abbreviation: T-Cloud Consortium) will conduct research activities into changes in the computing model as a result of collaboration between "device" and "cloud" and the creation of new value and markets through organic data processing High speed and high quality networks, and dramatic improvements in computer processing capabilities, have greatly changed the nature of applications and made the storing and processing of data on the network commonplace. Oct. 1, 2016 08:00 AM EDT Reads: 1,313 The Internet of Things can drive efficiency for airlines and airports. In their session at @ThingsExpo, Shyam Varan Nath, Principal Architect with GE, and Sudip Majumder, senior director of development at Oracle, will discuss the technical details of the connected airline baggage and related social media solutions. These IoT applications will enhance travelers' journey experience and drive efficiency for the airlines and the airports. The session will include a working demo and a technical d... Oct. 1, 2016 07:00 AM EDT Reads: 1,867 Almost two-thirds of companies either have or soon will have IoT as the backbone of their business in 2016. However, IoT is far more complex than most firms expected. How can you not get trapped in the pitfalls? In his session at @ThingsExpo, Tony Shan, a renowned visionary and thought leader, will introduce a holistic method of IoTification, which is the process of IoTifying the existing technology and business models to adopt and leverage IoT. He will drill down to the components in this fra... Oct. 1, 2016 06:00 AM EDT Reads: 1,955 Digital transformation is too big and important for our future success to not understand the rules that apply to it. The first three rules for winning in this age of hyper-digital transformation are: Advantages in speed, analytics and operational tempos must be captured by implementing an optimized information logistics system (OILS) Real-time operational tempos (IT, people and business processes) must be achieved Businesses that can "analyze data and act and with speed" will dominate those t... Oct. 1, 2016 05:45 AM EDT Reads: 1,348 If you had a chance to enter on the ground level of the largest e-commerce market in the world – would you? China is the world’s most populated country with the second largest economy and the world’s fastest growing market. It is estimated that by 2018 the Chinese market will be reaching over $30 billion in gaming revenue alone. Admittedly for a foreign company, doing business in China can be challenging. Often changing laws, administrative regulations and the often inscrutable Chinese Interne... Oct. 1, 2016 05:30 AM EDT Reads: 656 I'm a lonely sensor. I spend all day telling the world how I'm feeling, but none of the other sensors seem to care. I want to be connected. I want to build relationships with other sensors to be more useful for my human. I want my human to understand that when my friends next door are too hot for a while, I'll soon be flaming. And when all my friends go outside without me, I may be left behind. Don't just log my data; use the relationship graph. In his session at @ThingsExpo, Ryan Boyd, Engi... Oct. 1, 2016 05:15 AM EDT Reads: 1,446
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738663010.9/warc/CC-MAIN-20160924173743-00203-ip-10-143-35-109.ec2.internal.warc.gz
CC-MAIN-2016-40
16,716
57
https://www.biostars.org/p/9546963/
code
Hello all! I was just wondering what the best method might be to use Salmon to map reads for both ribosome profiling and RNA-Seq and analyze the results using DESeq2. I have built a transcriptome with UTRs and used Salmon to map my reads. However, I want to only count reads that map to the CDS and not UTRs in the ribosome profiling dataset. Generating two different transcriptome indexes leads to problems with downstream analysis with DESeq2. For the profiling reads, would it be advisable to map against the transcriptome using an aligner such as Hisat2/STAR, manipulate the bam files to remove reads that align to UTRs, then quantify using Salmon? Would this lead to inaccurate quantification? If not, is there some way to use DESeq2 to analyze featureCounts quantified ribosome profiling reads against Salmon mapped RNA-Seq reads?
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499816.79/warc/CC-MAIN-20230130101912-20230130131912-00623.warc.gz
CC-MAIN-2023-06
836
1
https://ttfile.com/post/php-file/how-to-convert-an-xml-file-to-a-php-file
code
How to convert an XML file to a PHP file? XML (eXtensible Markup Language) is a convenient way of writing human-readable data sets which can also be shared between computer systems that might otherwise be incompatible with each other. PHP is a powerful scripting language with a large and growing user base. By converting an XML file to PHP, you will be able to modify your data in real-time from the server, then use the data in a variety of dynamic applications. A Simple Example with SimpleXML Create an XML file named "inventory.xml" in a folder named "includes." It will look something like this: Save a duplicate copy of your document named "inventory.php." Add the PHP open and closing tags at the beginning and end of this document. Convert your XML nodes into a string and assign them to a variable named $xmlString. You can do this simply by wrapping your existing XML in a few special characters: at the beginning, three "less than" signs in a row, followed by the letters XML; and after the closing of your root node, the letters XML again. Remember to finish your assignment statement with a semicolon. Your document will now look like this: Create another document named "display-inventory.php" and save it in the folder one level above your "includes" folder. This script will include your converted XML file, use it to create a SimpleXMLElement object, and read out the node values into paragraphs. Upload the files to your server and view the file view-inventory.php in your web browser. It will output: You can make your XML string more dynamic by using variables to set the values of the nodes. Create a variable named $variable with a value of "hex," then read out the variable's value into the Alternatively, you can load your XML into PHP without converting the file into a string. Upload your original file inventory.xml to your server, and amend your script to read: Post the revised file to your server, and you should see results similar to the first example.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644907.31/warc/CC-MAIN-20230529173312-20230529203312-00612.warc.gz
CC-MAIN-2023-23
1,985
11
http://www.gdr-isis.fr/news/5588/121/Toward-smart-transceivers-Machine-Deep-learning-for-the-Physical-Layer.html
code
We are offering a fully funded PhD position at ISEP, Paris jointly supervised by Prof. Michel Terré (Le Cnam) and Dr. Yahia Medjahdi (ISEP). Contact: [email protected], [email protected] Location: Paris, France PhD position to be filled in October/November 2018 Application deadline: September 30, 2018. Key-words: machine learning, deep learning, digital communications, signal processing - Good knowledge of machine learning algorithms. - Solid programming skills (Matlab and Python). - Familiar with digital communications (is a plus). Interested candidates should send the following documents: 1. Curriculum vitae 2. Transcript of records 3. Motivation letter With the emergence of 5G and its high-level performance targets, Waveform (WF) design has received considerable attention from the research community in recent years. To find an alternative to the classical OFDM, several multicarrier techniques addressing different 5G technical challenges, have been proposed like FBMC, UFMC and GFDM, …. Despite the adoption of OFDM for 5G Physical Layer, some of these post-OFDM WFs remain competitive and keep a chance in the race to beyond 5G. FBMC is one of the most powerful candidates offering numerous advantages compared to OFDM (better spectral properties, flexible access, …). However due to the intrinsic interference of FBMC transceivers, the Multiple-Input and Multiple-Output (MIMO) compatibility is still an open issue. Indeed, some important techniques like maximum likelihood MIMO detection and Alamouti space-time coding are harmfully impacted by the FBMC inherent interference. In this thesis, we propose an innovative approach to overcome such challenges. This approach is based on Machine learning which is has become the main tool to tackle all sort of difficult problems in pretty much every Science Field. In particular, with ever-faster computers, deep neural networks have shown very high success in solving difficult problems. In fact, there is recently a growing consensus that Machine Learning methods can lead to a new vision of the communications system design. Indeed, such an approach can provide significant improvements in complex communications scenarios that are difficult to describe with tractable mathematical models. The purpose of this thesis is explore Machine Learning state-of-the-art in order to propose and design innovative solutions for the issues discussed above. We propose to use Deep Neural networks which are a specific type of Machine Learning methods inspired from the human brain, and in which multiple layers specific operators (linear operations, convolutions, softmax, etc.) are used to build complex learning models. In this family of algorithms, auto-encoders are unsupervised deep networks could be used for tasks such as encoding, decoding and denoising information, as well as for clustering tasks, making them good candidates for our problem. (c) GdR 720 ISIS - CNRS - 2011-2018.
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221209165.16/warc/CC-MAIN-20180814150733-20180814170733-00363.warc.gz
CC-MAIN-2018-34
2,962
16
https://forums.tarot.com/topic/3284/happy-halloween
code
A friend (kind of) of mine sent me a creepy text tonight (she knows I don't like scary movies, etc. ) and that got me to thinking about Halloween. I've always found Halloween a scary time and could never get into the festivity of it. Can't really put my feeling about what makes me so uneasy about it. Just wanted to hear some other thoughts about it.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320305494.6/warc/CC-MAIN-20220128104113-20220128134113-00394.warc.gz
CC-MAIN-2022-05
351
1
https://www.bwplotka.dev/2020/thanos-mentoring-office-hours/
code
During Summer of 2020, on top of our full-time work, on-call rotations, open source project’s work, preparing conference talks and ☕ we had extra 75% of the Thanos Team (Giedrius, Lucas, Kemal, Matthias, Povilas and me) and a few members of Prometheus Team (Callum, Chris and me) were mentoring amazing people in their first steps into Open Source! 🎉 We taught mostly students but also already experienced developers, all new to the CNCF space and projects. We are very grateful that this year’s edition was full of smart, diverse and incredibly curious candidates that applied for Thanos and Prometheus mentoring through Google Summer of Code (GSoC) and Community Bridge programs. A longer blog post about learnings and tips that might be useful for other projects which are willing to participate in such mentoring/internships is in progress, so stay tuned! However, today we present you the first actionable result of our learnings: Weekly Thanos Mentoring Office Hours. Long story short, as part of the mentoring, we scheduled a weekly meeting with each of our student for the duration of the program. Despite extra time spent on mentoring, I personally got used to those extra meetings pretty quickly and had an amazing experience running them with co-mentors. The main reason why mentoring and meetings were so satisfying for me is that we could see the mentees growing every week in terms of both technical and soft skills. Every meeting was fully utilized thanks to energetic and passionated students and we could see that mentees literally respect and fully use our time. 🤗 In fact, it was so addictive and fun that when GSoC and Community Bridge programs finished, it was just super awkward to… just stop our mentoring like that. 😱 Most of our students had still some PRs open and the next tasks were still within the reach and quite exciting for all of us. Project is never ready. You can always improve things! Given that all of Thanos mentees expressed the willingness to contribute in their free time after the program, we left our weekly meetings for an extra month. However, as always, the month passed quickly and we had to again decide what’s next. With more programs being planned and other, potentially also passionated and diverse candidates willing to try their path in the open source, it was clear that the idea to preserve our weekly 1:1 with everyone would never scale. This time, Twitter came with help. I recently saw the following tweet: What about… Student Office Hours! After a quick discussion with Thanos maintainers, we found that creating Student Office Hours for our mentees maybe what we need! Lucas: I haven’t discussed this will all but I know my two students have expressed interest. I would like to continue this relationship and I think a “many:many” meeting vs millions of individual 1:1 meetings will scale much better. Announcing Weekly Thanos Mentoring Office Hours From today, within Thanos Project, we are starting (virtual) Mentoring Office Hours every Thursday. The idea is to allow all our ex and current Thanos mentees to just put items on the agenda and propose topics to talk about. It could be anything from career advice, technical question to just PR pair-review; similar to what we do on our past 1:1s. As the Thanos project, we will try to make sure there is at least one maintainer. This meeting is also, obviously, fully optional for mentees. The (ambitious) plan is to have the meeting agenda prepared the day before so we can cancel the meeting if the agenda is empty. What About Ex-Mentees From Other Projects in the Prometheus Ecosystem or the CNCF? Personally, I was also mentoring one student for Prometheus project, so I would love to allow (ex)mentees to be included in the similar initiative. And to be honest, Thanos Mentoring Office Hours is just the beginning. 💪 We will experiment with the format, having inclusiveness, and quality in mind. We would love to make sure the discussions are focused and that the mentees have a safe and trusted environment to ask questions and be innovative. Time zones are another problem to solve someday. Looking forward to expanding more in the future, if you have any feedback, let us know on Slack or directly to me! (: BTW Do we Plan Further Mentoring in Future Quarters? Well, of Course! All engineers, new to the CNCF or open source, will be able to apply from September 21 for another Community Bridge Edition (details) As mentioned before, this is just a quick announcement. Ask us in a few weeks how it goes, but we, Thanos maintainers are definitely super excited for offering Mentoring Office Hours. 🤩
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475806.52/warc/CC-MAIN-20240302084508-20240302114508-00323.warc.gz
CC-MAIN-2024-10
4,652
30
https://www.moddedmustangs.com/threads/weird-mpg.285286/
code
Shoulda had a V8 So I've been getting realllly bad mpg as of late, something like 150-170 a tank. I've cleaned the MAF sensor, which when I pulled it out, was ridiculously clean before and looked exactly the same after. I get whiffs of it running rich when I turn it on and sometimes at idle, usually when its cold. After running it for a while I got under it and couldn't smell anything. Any ideas?
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107894890.32/warc/CC-MAIN-20201027225224-20201028015224-00492.warc.gz
CC-MAIN-2020-45
399
2
https://forum.mikrotik.com/viewtopic.php?f=2&t=96258&p=479589
code
Via Firewall/Service Ports and double clicking on the Sip line I can see/access the Sip Direct Media checkbox. But there is no line at all for sip-timeout. Am using RouterOS version 6.28 I need to change the setting, and also make sure that sip-timeout is enabled. Is this available in ROS 6.28? Or am I looking in the wrong place?
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141753148.92/warc/CC-MAIN-20201206002041-20201206032041-00383.warc.gz
CC-MAIN-2020-50
331
5
https://mp3directmxx.net/searches/halsey
code
Download Halsey mp3 song ✖ ★ Here you'll find all the songs of Halsey Listen and download mp3 music Halsey, Best Halsey mp3 music, Now you can download the mp3 from Halsey free, the best of Halsey, Download free music Halsey mp3 download for your mobile. Today, this website is considered one of the best sites at the time from download music for free. Download MP3 music in one click. Download Halsey MP3 - Halsey - You should be sad mp3 Duration 3:39 Size 8.35 MB / Halsey 1 - Marshmello & Halsey - Be Kind (Official Music Video) mp3 Duration 3:05 Size 7.06 MB / Marshmello 2 - Halsey - Bad At Love mp3 Duration 3:04 Size 7.02 MB / Halsey 3 - Halsey - Sorry mp3 Duration 3:58 Size 9.08 MB / Halsey 4 - Halsey - Colors mp3 Duration 4:15 Size 9.73 MB / Halsey 5 - Halsey - Without Me (Live From The Victoria’s Secret 2018 Fashion Show) mp3 Duration 3:37 Size 8.28 MB / Halsey 6 - Halsey - Without Me (Lyrics) mp3 Duration 3:24 Size 7.78 MB / SyrebralVibes 7 - G-Eazy & Halsey - Him & I (Official Music Video) mp3 Duration 4:47 Size 10.95 MB / G-Eazy 8 - Halsey - Now Or Never mp3 Duration 6:08 Size 14.04 MB / Halsey 9 - Marshmello, Halsey - Be Kind (Halsey Lyric Video) mp3 Duration 2:54 Size 6.64 MB / Halsey 10 - Halsey - Graveyard mp3 Duration 3:56 Size 9.00 MB / Halsey 11 - Khalid, Normani - Love Lies (Lyrics) mp3 Duration 3:21 Size 7.67 MB / Cakes & Eclairs 12 - Benny Blanco, Halsey & Khalid - Eastside (Lyrics) mp3 Duration 2:54 Size 6.64 MB / SyrebralVibes 13 - Juice WRLD ft. Halsey - Life's A Mess (Official Visualizer) mp3 Duration 3:26 Size 7.86 MB / Juice WRLD 14 - Halsey - Gasoline (Official Audio) mp3 Duration 3:18 Size 7.55 MB / Halsey 15 - Halsey - Without Me (Lyrics) mp3 Duration 3:24 Size 7.78 MB / Unique Vibes 16 - Halsey - Alone ft. Big Sean, Stefflon Don mp3 Duration 4:13 Size 9.65 MB / Halsey 17 - Halsey - Without Me mp3 Duration 3:57 Size 9.04 MB / Halsey 18 - The Chainsmokers - Closer (Video) ft. Halsey mp3 Duration 4:07 Size 9.42 MB / The Chainsmokers 19 - Halsey Duración 3:23 Tamaño 4.97 MB / Download Here - Halsey - Finally // beautiful stranger mp3 Duration 3:59 Size 9.12 MB / Halsey 20 - Halsey - Castle mp3 Duration 2:59 Size 6.83 MB / Halsey 21 Music Halsey 100% Free! ★ Download free music online on MP3 or YouTube on your favorite device, whether on your mobile phone, tablet or computer, time is easier with this website. Halsey Mp3 Music Download! This is one of the most popular pages to download free MP3 music online for free and safely.
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655895944.36/warc/CC-MAIN-20200707204918-20200707234918-00273.warc.gz
CC-MAIN-2020-29
2,500
29
https://workplace.meta.stackexchange.com/questions/5326/can-we-close-this-fictional-question
code
This question - Coworker won't accept apology for my stupid mistake - is fake. It is impossible that someone would mistake a bereavement letter for a new baby letter. The cards are very, very, very different. a - It is impossible that someone doesn't at least read one message in a letter - even briefly. You would notice the lack of "congrats" and the presence of "sorry for your loss". Even if you can believe someone is so fictionally clueless, what, that nobody else read what other's wrote? I always have a quick look at what other people wrote, someone would notice the weird, inappropriate message. Who writes a message without a name? Or a new-baby message without the word "baby". The message the OP claims to have written is so perfect - no name, can be read both ways, doesn't mention the word "baby" at all. It even has the perfect "bring you dinner" line, just to push it over from stupid to sexual. Also, OP would be fired for this, if they did accidentally do it. This can only be a fictional account - written by a new user. It's not helpful in the future - it's probably just some writer trying out a scene in their book. As an aside - i push for fake questions to be removed because they encourage other fake questions. it wastes the community's time supporting larrakin efforts. i enjoy coming here to get other people's viewpoints and thoughts on (for me) practical management issues. i don't want to see the site overrun with "interesting" quandries and purely theoretical discussions.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057615.3/warc/CC-MAIN-20210925082018-20210925112018-00229.warc.gz
CC-MAIN-2021-39
1,506
9
https://www.octaviantg.com/blog/enabling-responsible-ai-use-in-machine-learning
code
Working in machine learning and AI, we often see some incongruencies in the input versus the desired output. Responsible AI and an ethical approach to machine learning dictate that business leadership walk into the process with their eyes wide open. Artificial intelligence and machine learning are still in their nascent phase, but with the rapid growth and expansion happening every day in the field, the implications will soon outgrow us. Every AI and ML project leader must take responsible AI seriously. The biggest question we should all be asking is: what are we really doing with AI and ML, and will the intended outcome fit our expectations and align with our ethics? Digging into the responsible AI question means that we must understand that it's not a simple A+B=C formula. We often hear business leaders say, "I was trying to use machine learning for this process, and I expected it to give me X, but instead, it gave me Y." (Or they hand it off to their IT team without fully exploring the possible outcomes until a problem arises.) Generally speaking, the issue is never the "fault" of the machine but rather the fault of the data and model. AI software is never provably 100% correct. It assumes training inputs are representative of the unseen actual inputs, which vary over time. Code is essential, but data is even more crucial. There must be checks and balances to ensure that existing reliability practices are in place and to put in new rules whenever we undertake a new endeavor. For example, Amazon faced serious concerns a few years ago when leadership used an algorithm for recruiting new employees. The online retail giant ran into some significant roadblocks (and a legal and PR nightmare) when it came to light that the algorithm “hated” women. These unplanned biases can show up everywhere in machine learning. A very recent study at the University of Chicago found that AI bias was rife in healthcare algorithms and hospital applications. Not only does this create a double standard of care, but it can become a matter of life and death. When ML bias and AI bias fail to catch outliers and miss unusual signs of illness, patients may miss out on life-saving treatments and interventions. The need for responsible AI is everywhere. Hospitals, insurance, and healthcare present big areas with heavy ethical implications, but there are also plenty of other places where AI bias and a failure to recognize gaps in algorithms can create dire outcomes. Imagine you build machine learning to decide whether or not clients will receive a loan. Your team bases the screening on a simple model that takes in 30-50 characteristics about an applicant. It looks at their credit score, financial status, history, plans, and desires. The machine trains with a data set of thousands, even tens of thousands of loans, learning whether they were successful based on those historical characteristics. The machine learning may end up concluding that “this loan has a 70% chance of success,” or “there’s a 90% chance this loan will be good.” But what we may not be seeing is some baked-in accidental bias. For example, maybe the historical data references the applicants’ gender, so suddenly, 10% fewer loans are going to women. This bias is probably not the intention of your product, but we have to identify it, plan for it, and root it out, to ensure we’re engaging in ethical, responsible AI. At the end of the day, every time you teach a machine or engage in artificial intelligence, you should be thoroughly looking at the outcome. How do you know what was learned? Was that really what you intended to teach the machine? Over 75% of CEOs believe that AI is good for society, but an even higher proportion—84% agree that AI-based decisions need to be transparent and explainable to gain consumer and stakeholder trust. Based on these findings, there's a clear need for C-suite leaders to review the AI practices within their company. We should ask questions, examine and tackle the potential risks, and approach the process with our eyes wide open. Before we go forward, we must address areas where controls and processes are lacking or inadequate. Companies who go into AI and machine learning irresponsibly are setting themselves up for a crisis. Many companies are "dabbling" in machine learning, unaware that they're playing with fire. They're about to release models into the world that don’t perform as they expect…and it could have a dramatic impact on their business. Now, the answer isn’t to avoid or fear machine learning or AI. The key is to set up a series of checkpoints and measures to ensure your outcomes are reflective of your business ethics. In the AI world, we may hear programmers refer to AI models as "black-box" models. Essentially this means, that the input data goes into the black box, where a complex algorithm mysteriously applies some ML “magic” to the set and then arrives at a decision output. Most folks aren’t aware of how the model reached the conclusion, but they’re asked to trust it as accurate (which it likely is, per the formula) and ethical (which it may or may not be). The simple counter idea is known as the "glass-box" model. The glass-box model is transparent with simple algorithms that can easily be explained. Now, there are some challenges with the glass box model because you may be trading off some accuracy for simplicity and understandability. Microsoft InterpretML is an open-source tool embedded in the Azure Machine Learning space that offers straightforward interpretability and a clearer understanding of the machine learning models. InterpretML helps explain predictions and debug models with features and tools to ensure that responsible AI is applied to the scenario. It explores how model performance changes for different data subsets, helps you understand model errors on a local and macro level. You can run an analysis to see the more significant impact and implications of the model. With a tool like InterpretML, you take the ML model, apply scenarios, and see how it performs. In the loan scenario, as mentioned above, you may want to test the performance by looking at female applicants versus male applicants. You'd also look at how it performs based on demographics like ethnicity, age, income level, and more. What happens when someone who makes $50,000 per year applies for a million-dollar mortgage? Ideally, you'd check both the cases where applications are approved and cases where they aren't approved to determine the parameters and how the data is being read. One really cool aspect of a tool like InterpretML is that it helps you understand how it's performing in these given scenarios. Then it offers recommendations to help you adjust your model to mitigate the bias. For example, in the loan scenario, the tool may help you determine why you're seeing the unfair partiality toward male applicants and then help you adjust and correct the path to retrain the model. Machine learning and AI are going to continue to grow at a rapid pace. Not only will they help businesses perform more accurately and more efficiently, but they can process vast amounts of data in a way that wasn't possible in the past. There are many positive roles that AI can take in business to ensure your continued growth and success. But the responsibility of an ethical approach is incumbent on all of us. As the saying goes, with great power comes great responsibility. There’s also liability both for the reputation of your company and the trust of your customers. If you're ready to explore how a responsible approach to machine learning and AI can take your company into a stronger tomorrow, reach out today. We’re here to help you move your technology forward.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510529.8/warc/CC-MAIN-20230929222230-20230930012230-00049.warc.gz
CC-MAIN-2023-40
7,778
24
https://gateworld.net/wiki/People_of_P2X-885
code
People of P2X-885 Impoverished inhabitants of P2X-885. Their numbers range at approximately ten thousand. The entire population has only one fresh water well to depend on. SG-6 spent a considerable amount of time moving among the people, investigating the Ori presence on the world in the form of a Prior. At last report the entire population converted to Origin -- the third reported in a month. This is not unexpected, since the population had little to begin with. Since their conversion, they have likely been blessed with better conditions. The Fourth Horseman, Part 1 - SG-6 returns from P2X-885 carrying with them a terrible odor from the people, and unbeknownst to the team, a Prior plague.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817112.71/warc/CC-MAIN-20240416222403-20240417012403-00504.warc.gz
CC-MAIN-2024-18
698
4
http://www.redszone.com/forums/showpost.php?p=1201946&postcount=20
code
Re: Are most GMs just not really very smart? Originally Posted by Johnny Footstool I got negged for this post. The whole point of the original post was that some GM's don't make smart decisions. The original article made *exactly the same points I made*, While I don't agree with the negging, keep it private, IMO. a super volcano of ridonkulous suckitude. I simply don't have access to a "cares about RBI" place in my psyche. There is a "mildly curious about OBI%" alcove just before the acid filled lake guarded by robot snipers with lasers which leads to the "cares about RBI" antechamber though. - Nate Last edited by Ltlabner; 11-30-2006 at 08:38 PM.
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394678691890/warc/CC-MAIN-20140313024451-00043-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
655
8
https://fcpaparts.com/pa03338-d915.html
code
5:00pm Mountain Time for next business day shipping. fi-5650C,fi-5750C,fi-6670,fi-6770,Belt ADF, PA03338-D915 Neoprene Timing Belt Belt Pitch: 2mm Number of Teeth: 140
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100276.12/warc/CC-MAIN-20231201053039-20231201083039-00045.warc.gz
CC-MAIN-2023-50
167
5
https://community.splunk.com/t5/Getting-Data-In/Change-timestamp-and-making-it-effective/td-p/48289
code
By default, the timestamp that is extracted is the first one that it encounters, being 21/02/2013 9:28:26 in this case. However, I want to make the timestamp to be 1/03/2013 11:12:38 (the one before the last timestamp). For this, I added the following in C:\Program Files\Splunk\etc\apps\search\default\props.conf: The regex matches 20130301_110723, expecting to define the timestamp as I desire, as is explained in the manual. Unfortunately, this has no effect; I tried to stop and start splunk; did a source="C:\\Temp\\testResultLog.csv" | extract reload=T; all to no effect ..
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506623.27/warc/CC-MAIN-20230924055210-20230924085210-00415.warc.gz
CC-MAIN-2023-40
579
3
http://www.computinghistory.org.uk/det/58511/Monty%20Python's%20Complete%20Waste%20of%20Time/
code
Monty Python's Complete Waste of Time |Home > Browse Our Collection > Software > PC Windows 32 Bit > Monty Python's Complete Waste of Time| One of many themed packages for customising the home screens of your PC, this one adding screensavers and simple games and themes to the desktop in the anarchic form of Monty Python's Flying Circus. Includes the Desktop Pythonizer Other Software by 7th Level: Information About 7th Level: This exhibit has a reference ID of CH58511. Please quote this reference ID in any communication with the Centre for Computing History. Click on the Images
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570871.10/warc/CC-MAIN-20220808183040-20220808213040-00418.warc.gz
CC-MAIN-2022-33
583
8
https://vgzn.alfogolardelivery.it/alpaca-websocket.html
code
Alpaca Alpaca Swift Client: CHDF5 ... ActionCable is a WebSocket server being released with Rails 5 which makes it easy to add real-time features to your app. This ... Coin buyer in cuttack - Bad Alpaca markets Bitcoin area unit transparent, promote muzzy technical advantages without explaining how to reach them, and have a community that is mostly focused off getting rich quick. Maybe the last-place kind of cryptocurrencies is the MLM coins, for example, Bitconnect. - The Invoke-WebRequest cmdlet sends HTTP and HTTPS requests to a web page or web service. It parses the response and returns collections of links, images, and other significant HTML elements. This cmdlet was introduced in PowerShell 3.0. Beginning in PowerShell 7.0, Invoke-WebRequest supports proxy configuration defined by environment variables. See the Notes section of this article. On the Alpaca markets Bitcoin blockchain, just a user's public key appears next to a transaction—making transactions confidential but not unknown. Disclaimer before continuing: We are not group A business institution: whole we area unit proving is educational material: Do not call for this information as authority investment advice. - Summarize is a Order of alpaca markets Bitcoin only at of the original source reasonable, the Purchasing at untested Sources would thus generally not a good idea. On the Website of recommended Seller of alpaca markets Bitcoin the operator offers a discrete, risk-free and carefree Order. Alpaca markets Bitcoin in investors magazine - insider tips However, there are also. Another attribute of bitcoin that takes away the poverty for central Sir Joseph Banks is that its supply is tightly controlled by the underlying algorithm. Dec 04, 2020 · Install, uninstall, and upgrade packages. PyCharm provides methods for installing, uninstalling, and upgrading Python packages for a particular Python interpreter. - NATS is a high performance messaging system that acts as a distributed messaging queue for cloud native applications, IoT device messaging, and microservices architecture. API Reference Tip: get help directly from the CLI/Python client. The API documentation shown below for the command line interface (CLI) and Python client is auto-generated and can be referenced at any time from the clients themselves. - Lincoln City vs Liverpool English Carabao Cup Date: Thursday, 24 September 2020 Kick-Off at 19.45 UK Venue: LNER Stadium, Lincoln. League One outfit Lincoln City will host Premier League champions, Liverpool, at the LNER Stadium for their EFL Third Round clash on Thursday. The Carabao Cup encounter between Lincoln City vs Liverpool is scheduled to kick off at 7:45 pm BST (Friday 12:15 am IST ... Oct 29, 2020 · Mike, i am also developing an app for investors to determine strategies, I get free trial for real-time websocket from finage you may also get it from them. regards. #8 Oct 30, 2020 - Alpaca markets Bitcoin is a fresh monetary system that was created IN 2009 by an unknown person victimisation the name Satoshi Nakamoto. Transactions are made with no middle men – meaning, no banks! Alpaca markets Bitcoin dismiss be ill-used to book hotels on Expedia, shop for furnishing on Overstock and acquire Xbox games. Go Walker is a server that generates Go projects API documentation on the fly.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991693.14/warc/CC-MAIN-20210512004850-20210512034850-00499.warc.gz
CC-MAIN-2021-21
3,324
14
https://forge.softwareheritage.org/T1251
code
Now that our archive coverage is steadily increasing, it has become important to visually show it to users and allow to appreciate how it changes over time. Our current way of doing so is suboptimal (to put it mildly): we only have a bullet point list at https://www.softwareheritage.org/archive/ , which is often out-of-date. I think we need something like libraries.io has, where we list the logos of the source code distribution places we crawl, e.g., one logo for each of GitHub, Debian, PyPI, etc. One difficulty in doing so is our distinction between backend forges and its instance. E.g., we crawl GitLab.com, but we probably do not want to have one GitLab logo for each GitLab instance we crawl (and we already have more than one). Short term proposal: - add the list of logos of crawled forges to https://archive.softwareheritage.org/ ; for multiple instances of major services we can have a "and also" section where we only put the names of each instance, without repeating the logo - embed that part of the page into https://www.softwareheritage.org/archive/ with some sort of widget, so that it is not duplicated Long term proposal: - export the list of crawled places from the DB that contains the scheduling tasks. This probably requires both distinguishing listing tasks from others and adding metadata such as where to find the relevant logo, for places for which we want to have a logo. (I'm assuming this would be easier/better than making the webapp access directly the scheduler DB.) - make the web app access that information to dynamically generate the coverage representation
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510501.83/warc/CC-MAIN-20230929090526-20230929120526-00357.warc.gz
CC-MAIN-2023-40
1,598
10
https://suitecrm.com/wiki/index.php/Release_notes_7.6.7
code
Release notes 7.6.7 SuiteCRM 7.6.7 IMPORTANT Security Patch Type : Maintenance & Security Patch Version : 7.6.7 Released : 28-09-2016 - Includes SugarCRM 6.5.24 - more information here - Updates a Security vulnerability with Serialized Input, to prevent possible object,file, beans and SQL injection attacks Users of ALL previous releases are advised to Upgrade to 7.6.7 as soon as possible. Download here from the SuiteCRM GitHub Repository or visit the official website to find the appropriate upgrade. Thank you to all community members who contributed, tested and helped with this release.
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423903.35/warc/CC-MAIN-20170722062617-20170722082617-00710.warc.gz
CC-MAIN-2017-30
593
9
http://jigar-mehta.blogspot.com/2007/11/
code
YouTube is also run by Machine!! It also needs maintenance... Thx to Alpesh for pointing out!! Hey there.. Just a quick update.. Have not blogged from a long time, I think, I am busy with things here and there.. Last to last week was almost training and learning windows kernel internals (yeah, once again internals training.. but there is still a lot to learn..) and yeah I got 'Instant Recognition Award'.. Last week was fun.. Having ThanksGiving celebrated by my customers, I was having some relief, and we utilized this time to gear up and did some parties, presentations (knowledge sharing), and it was all fun. This weekend, its Interview Time... Oh yeah, We are hiring.. We have two different set of vacancies.. What else, life is good and awaiting for some professional good news!! (Yes, guess if you can, hard work is getting paid off!! ) Dont know why, but today I started searching for Gujarat Riots inside story.. While going through the search results, found Tarun Tejpal's note and remembered Tehelka.com.. Through SpyCam they have collected few videos.. worth taking a look at. After watching all these videos, I feel like as a general public, we never know what all things are going behind the scenes.. My personal feeling regarding gujarat riots is, WHATEVER HAPPENED, IT WAS BAD AND SHOULD NEVER EVER BE REPEATED. Recently a survey got conducted by Business Today, Mercer and TNS India. The topic of the survey was "THE BEST COMPANIES TO WORK FOR IN INDIA.." and guess what, Microsoft tops the list! Even before survey results came, I was pretty sure, its going to be Microsoft, there can't be any other place!! I am proud to be at Microsoft.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864822.44/warc/CC-MAIN-20180622220911-20180623000911-00583.warc.gz
CC-MAIN-2018-26
1,660
10
https://www.orinst.ox.ac.uk/verb-semantics-and-argument-realization-pre-modern-japanese-vsarpj?page=0%2C1
code
The original project proposal can be read here. As the project developed in its initial phase, we ended up focusing on Old Japanese, the earliest attested Japanese from the 8th century, in light of research being conducted elsewhere, especially National Institute for Japanese Language and Linguistics (NINJAL). One important outcome of the VSARPJ project is the Oxford Corpus of Old Japanese (OCOJ), which is the most extensive and detailed parsed corpus of Old Japanese in existence. The OCOJ continues as an independent research project. Other outcomes of the project can be found here, and this will be updated as publications continue to appear as a result of the VSARPJ project.
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347407289.35/warc/CC-MAIN-20200530040743-20200530070743-00461.warc.gz
CC-MAIN-2020-24
684
2
http://cgit.openembedded.org/meta-handheld/tree/README.zaurus?h=sumo
code
blob: 76c5c1b91bb8b1405e5f9de77291df116a15e4bf (plain For the Zaurus a special kernel+initramfs has been developed. This special-purpose kernel is small enough to be flashed on NAND and features a framebuffer graphical menu for the selection of boot media containing the kernel to be kexec'ed in the second phase. Multi-partition cards and lots of filesystems are supported. The kernels to be launched are searched for in /boot of each available partition. There is a also a configuration file (/boot/boot.cfg) which allows selection of other kernels, custom kernel command lines, and specifies the label and the icon for each instance. How to install: Just unpack zaurus-installer-YOURMACHINE.tar.gz on a free (FAT or EXT2/3 formatted) partition: the package contains the kexecboot-kernel and the updater.sh utility. Then proceed as usual for flashing (switch off, pull battery out, insert battery again, before inserting AC plug press OK+Power On. In the Japanese Menu select 4 and finally 3 for SD card or 4 for CF). For the SL-5500 (collie) and optionally for other Zaurus too, flashing is possible just using the routines of the original firmware: reset the unit, Press C and D button together and shortly push the reset switch. Note that the kernel must be renamed 'zImage' (not 'zImage.bin') and the CF card must be formatted FAT16. ZAURUS FLASHING HOW-TO The typical flashing procedure mentioned above is easy, using updater.sh script which expects the following files: zImage for kernel initrd.bin for rootfs in mtd2 home.bin for second rootfs in mtd3 (optional) Alternatively all the flashing work can be done from command line, separately for each partition: mtd1 kernel (using nandlogical) mtd2 rootfs (using nandwrite) mtd3 home (using nandwrite) Typically you should rarely update linux-kexecboot on device, Besides the updater.sh method you could use the nandlogical tool. This utility allows flashing of the kernel directly from shell on all Zaurus except collie (collie has NOR flash and not NAND) nandlogical /dev/mtd1 WRITE 0x0E0000 0x140000 zImage.bin JFFS2 images on the other partitions Once built, the jffs2 and/or ubifs images need to be flashed on device. For JFFS2 the typical choice is the usual flashing procedure using updater.sh but you could do it from shell as well using nandwrite (from mtd-utils): Example: one image on mtd2 and another one on mtd3 (optional) 1st rootfs: plain JFFS2 image flash_eraseall -j /dev/mtd2 nandwrite /dev/mtd2 /path/to/core-image-base-<machine>-<date>.rootfs.jffs2 2nd rootfs: JFFS2-summary image flash_eraseall -j /dev/mtd3 nandwrite /dev/mtd3 /path/to/core-image-base-<machine>-<date>.rootfs.jffs2.sum Note: flash_eraseall is deprecated because the erase-counters are reset! NOTES FOR COLLIE Collie flash memory is NOR and not NAND as on the other models so the utility to use is flashcp instead of nandwrite. for kernel: flashcp /zImage /dev/mtd1 for rootfs: flashcp /initrd.bin /dev/mtd2 Recent kexecboot versions can boot the first ubi volume found on each device. Ubi volumes must be created with the proper ubi-tools (from mtd-utils). The quick and easy way is to flash the rootfs.ubi image created by ubinize: the flash will be erased by ubiformat. ubiformat /dev/mtd2 -f /rootfs.ubi Alternatively you can do the single steps and populate the volume(s) with one custom rootfs.ubifs. Example: one volume with max available size ubiattach -p /dev/mtd2 ubimkvol /dev/ubi0 -N volume_name -m ubiupdatevol /dev/ubi0_0 /path/to/core-image-base-<machine>-<date>.rootfs.ubifs Same operations can be done for mtd3 where available.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400221980.49/warc/CC-MAIN-20200925021647-20200925051647-00013.warc.gz
CC-MAIN-2020-40
3,590
66
https://uk.pinterest.com/nitinsoni750983/web-development-services/
code
Microsoft Dynamics GP is originally a product of Great Plains Software which was based out of North Dakota. Microsoft acquired Great Plains Software and introduced it in the market as Microsoft Dynamics GP. Dynamics GP is based on Microsoft's Windows and .NET Framework It’s not easy to launch a new service or product with a bang, is it? You need to make sure that it looks good, you need to create a buzz around your idea, you need to get some attention from the press, trade magazines or industry blogs, and you need to do a dozen things more. An Import Utility Tool is a great solution for automating manual data entry processes. Its customization and configurable attributes, widen the scope of its use across a wide range of business environments. Java is used extensively for developing Java enterprise applications reason being Security. Java brings some of the most fascinating features or benefits that are impossible to find in any other programming languages or platforms. Cygnet Infotech as a Microsoft Partner and Microsoft Small Business Specialist provides full-cycle development services in Microsoft .NET to ISVs, product Development companies and enterprises since its inception in 2000. Create a smart healthcare mobile app that can help you solve real-life problems and manage your enterprise data, files and employees with ease. Read this article as an example how mobility can useful to the healthcare industry. You may think that creativity, technical expertise and the right experience is all that a creative web designer needs. But, web design companies look for more than just this. A lot more. What qualities do companies look for in a designer? Read the article and find out! We use the latest technologies and state-of-art methods to create customized web applications. These web applications enable you in reaching your target audience in a most personalized manner. Our web based applications complement your long term and short term business objectives. The OWASP (Open Web Application Security Project) is a non profitable organization which aims at creating a secure platform for software. Most of the operating systems these days are based on open source frameworks, like Linux, Python, and JRE.
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501172447.23/warc/CC-MAIN-20170219104612-00148-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
2,233
9
http://rumiurdu.blogspot.com/2012/03/masnavi-book-4-65-abraham-rejects.html
code
How Khalíl (Abraham) answered Gabriel, on both of whom be peace, when he asked him, “Have you any need?”—“As regards need of you, no!” “I am the Khalíl (Abraham) of the present time, and he is the Gabriel: I do not want him as a guide (to deliver me) in calamity. 2975. He did not learn respectfulness (as he might) from noble Gabriel, who asked the Friend of God (Abraham) what was his wish, Saying, ‘Have you a wish?—that I may help (thee to obtain it); otherwise, I will flee and make a speedy departure.’ Abraham said, ‘No; begone out of the way! After direct vision the intermediary is (only) an On account of this present life the (Divine) messenger is a link for the true believers, because he is the intermediary (between them and God). If every heart were hearing the hidden (Divine) revelation, how should there be in the world any words and sounds (to make it known)? 2980. Though he (the intercessor) is lost in God and headless (devoid of self existence), yet my case is more delicate than that. His act is the act of the king, but to my infirmity the good (which he did) appears to be evil.” That which is the very essence of grace to the vulgar becomes wrath to the noble favourites (of Much tribulation and pain must the vulgar endure in order that they may be able to perceive the difference; For, O (my) companion in the Cave, these intermediary words are, in the sight of one united (with God), thorns, thorns, thorns. 2985. Much tribulation and pain and waiting were needed in order that that pure spirit might be delivered from the (intermediary) words; But some (persons) have become more deaf (than others) to this echo; some, again, have become purified and have mounted higher. This tribulation is like the water of the Nile: it is water to the blessed and blood to the damned. The more one descries the end, the more blessed is he: the greater one sees the crop (to be), the more zealously he sows, Because he knows that this world of sowing is for the sake of the (Last) Congregation and (for the sake of) gathering in (the harvest). 2990. No contract (of sale) was (ever made) for the sake of itself; nay, but for the sake of (being in) the position of (making) gain and profit. There is no disbeliever, if you look (carefully), whose disbelief is for the sake of the disbelief itself; Nay, but (it is) for the purpose of subduing his adversary in envy (of him), or seeking superiority and self-display. And that superiority too is for the sake of some other desire: the forms give no relish without the essential meanings. You ask “Why art you doing this?” because the forms are (as) the oil, and the essential meaning is (as) the light. 2995. Otherwise, wherefore is this saying “why”?—since (hypothetically) the form is for the sake of the form itself. This saying “why” is a question concerning the use (reason): it is bad to say “why” for any cause but this. Wherefore, O trusty one, should you desire (to know) the use (reason)?—since (hypothetically) the use of this (form) is only this (form itself). Hence it is not (in accordance with) wisdom that the forms of heaven and (those of) the people of the earth should be (created) for this only. If there is no Wise (Creator), what is (the reason of) this orderly arrangement (the cosmos)? And if there is a Wise (Creator), how is His action devoid (of meaning)? 3000. No one makes pictures and colouring in a bath-house except for (some) purpose (either) right or wrong.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121305.61/warc/CC-MAIN-20170423031201-00283-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
3,499
34
http://www.ubuntugeek.com/gstyle-a-new-full-gnome-theme-manager.html
code
Gstyle – A new full gnome theme manager gstyle is a full gnome theme manager this software try to concentrate every possibles themes types in one main window with easy install of new themes form gnome-look, deviantart, customize.org... or by direct download from the software. Install gstyle in ubuntu 10.04/9.10 Open the terminal and run the following commands sudo add-apt-repository ppa:s-lagui sudo apt-get update sudo apt-get install gstyle
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296815919.75/warc/CC-MAIN-20240412101354-20240412131354-00628.warc.gz
CC-MAIN-2024-18
447
7
http://www.scptout.com/fix-0x8004011d-0x80040126-0x80040305-errors.php
code
Easy tips to fix Outlook 0x8004011D, 0x80040126 and 0x80040305 error Are you searching for fix Outlook 0x8004011D error from the computer? Does your Outlook application is not responding for a few minutes? Have you faced the issue of PST files corruption the Outlook application? Do you all Outlook email attachments are getting by mistakenly deleted from Outlook? If you are facing these activities then they quickly need to fix Outlook 0x8004011D from the computer we are also recommended the best Outlook error fixing tool which is supported to Outlook applications. Outlook is one of the most popular applications which was well designed and developed by the Microsoft organization. This application provides several things to the user like access calendar, create notes, read journals, browse the internet, send or receive emails, send documents files and many more files also. But this application is sometimes showing errors to the users working window and the user is not easily fix the issue from the computer. SO below we are providing the same error list that is received by the Outlook users. Error 1. 0x8004011D error: 0x8004011D is an Outlook error which mainly occurs in the Outlook application. This Error has contained the text and digits and it also shows the exact location of the error in the Outlook but the normal users have not detected them which are regulatory used them and only experts are detect them in the computer. This error code is generated basally due to the disappearing of files from the computer and it is mainly due to the improper deletion of files or improperly closing of the computer. Reasons of Outlook 0x8004011D error: Here we are proving the basic reasons that are responsible for existing of this Outlook error are given below: If the user is by mistakenly deleted the files related with the Outlook application from the computer then it causes to showing the error message to the users when they are work with the Outlook application. If any virus is attack on the computer then they are also infects the Outlook application and the applications is get malfunctioning. Sometimes the user is download the crack version of files from the fake sites then the application starts showing error message to the users after few days. Due to the improper installation of Outlook application in the computer such that they do not get the files at the time of running application then the user is regularly getting this error. Error 2. 0x80040126 error 0x80040126 is most of the times the user is getting them when the error in the internet connection. Once this Outlook error is altered into the computer then the user is not accessing their Outlook applications. Some users observe that this Outlook error is totally restricted to send or receive emails from them. The attachments are also getting inaccessible by the Outlook users. The PST files are corrupted from the computer of Outlook then the application is troubleshooting to run in the users personal computer. Causes of Outlook 0x80040126 error: There are various causes that leads to cause the existing of this outlook 0x80040126 error in the Outlook users computer. Some causes are given below: If nay virus is attack on the personal computer then they will corrupts the system files or PST files of that Outlook application and it si trouble shooting at the running time. Sometimes the user is saved the installation files of Outlook due to this the application is not getting that file son that location and they are start showing the error message to the users screen. Due to suddenly done the formatting of their computer then the application is malfunctioning. The user also not gets all files related to the application in any location of the computer. Error 3. 0x80040305 error 0x80040305 error is also coming in the category of Outlook error. This error occurs when the user is updating the Outlook application without taking any backup of files from the computer and due to that all previously saved files are getting lost. The other reasons are also responsible for this Outlook error like improper shutdown the computer, suddenly close the Outlook application and many more things. If the user installs the incompatible application or software into the computer then the user is getting the error message when trying to run that application or software. Symptoms of 0x80040305 error: If the user is unfortunately done the updating process of the installed application or system. Sometimes the user is improper installed the software in the Windows computer. In few cases the user is deleted the files that are mainly needed by the Outlook to run in the personal computer. If the user downloads the application from the unknown sites or malicious sites then the virus is altered with them and the crack version of the application downloaded which shows error messages after a few days of installation. "Tool to fix Outlook 0x8004011D, 0x80040126 and 0x80040305 error: Outlook PST Repair Tool is help to the user to fix Outlook 0x8004011D, 0x80040126 and 0x80040305 error and fix all Outlook Errors. This tool is also compatible to work with the all Outlook versions like Outlook 2007, Outlook 2002, Outlook 2001, Outlook 2000, Outlook 2009, Outlook 2013, Outlook 2003, and many more Outlook application versions. Here the user also gets the trial version of this tool that the user is get verified that this tool is working but at the time of fixing the Outlook error then that times the user needs to download the full version of Outlook and the user gets to fix all encountered issue or Outlook errors. The Outlook must have 1 GB of RAM to install in the computer and also it is easily working on that system. So, download the Outlook PST Repair Tool to fix Outlook 0x8004011D, 0x80040126 and 0x80040305 error from the Windows computer. So, download this tool now. This tool is also compatible to work with both Windows and Mac operating systems. If any PST files are get infected by the virus then used this tool to repairs PST files them in few steps.
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986647517.11/warc/CC-MAIN-20191013195541-20191013222541-00549.warc.gz
CC-MAIN-2019-43
6,066
27
https://practicaldev-herokuapp-com.global.ssl.fastly.net/ipreda/what-are-your-must-have-requirements-from-a-ui-library-2d00
code
Currently I am developing a new UI library targeting multiple frontend frameworks and this made me wonder: What makes a UI library great? Why whould anyone pick mine? These questions made me realise that my priorities are not necessarily everyone's priority, So here am I asking for your input. What are your must have requirements when you pick a UI library for your framework of choice? Some feedback that I received so far: - Familiarity (be it with other UI library for a different framework or for the same one) - Extensive SEO and accessibility support - Easily customisable - A great number of components Top comments (0)
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655244.74/warc/CC-MAIN-20230609000217-20230609030217-00350.warc.gz
CC-MAIN-2023-23
628
12
https://www.kundaliniyoga.london/live
code
Kundalini yoga live Joining a real-time livestream offers the closest experience to participating in a real kundalini yoga class or workshop at a location convenient to you. How to join the livestream • Sign up for a one-day livestream pass for the class or workshop you wish to join, or • Become a Soul Explorer member for ongoing access to class livestreams as well as the class library. Premium members also have access to workshop livestreams and the workshop library. Then log in and return to this page shortly before the class or workshop is due to begin, when a link to the livestream will appear below. Every livestream has a different link, so make sure you come back for the new one each time. • Monday evenings 6.45 pm to 8.15 pm. • Saturday mornings 10.30 am to 12.00 midday. • Final or penultimate Sunday of the month 11.00 am to 1.30 pm. Please check the workshop bookings page for the date of the next workshop. Please note that the classes and workshops take place in London, UK, so the times given are GMT in the winter months and GMT+1 during British Summer Time.
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540497022.38/warc/CC-MAIN-20191207082632-20191207110632-00311.warc.gz
CC-MAIN-2019-51
1,092
10
https://lighthouse-book.sigmaprime.io/installation-source.html
code
Lighthouse builds on Linux, macOS, and Windows (via WSL only). Compilation should be easy. In fact, if you already have Rust installed all you need is: git clone https://github.com/sigp/lighthouse.git - Install Rust and Cargo with rustup. - Use the stabletoolchain (it's the default). - Check the Troubleshooting section for additional - Use the - Clone the Lighthouse repository. $ git clone https://github.com/sigp/lighthouse.git - Change into the newly created directory with $ cd lighthouse - Build Lighthouse with - Installation was successful if $ lighthouse --helpdisplays the command-line documentation. Compiling or running Lighthouse natively on Windows is not currently supported. However, Lighthouse can run successfully under the Windows Subsystem for Linux (WSL). If using Ubuntu under WSL, you can should install the Ubuntu dependencies listed in the Dependencies (Ubuntu) section. Several dependencies may be required to compile Lighthouse. The following packages may be required in addition a base Ubuntu Server installation: sudo apt install -y git gcc g++ make cmake pkg-config libssl-dev You will need cmake. You can install via homebrew: brew install openssl cmake Lighthouse will be installed to $HOME/.cargo. This directory needs to be on your PATH before you can run See "Configuring the PATH environment variable" (rust-lang.org) for more information. Make sure you are running the latest version of Rust. If you have installed Rust using rustup, simply type $ rustup update. If you get a build failure relating to OpenSSL, try installing libssl-dev using your OS package manager. $ apt-get install libssl-dev. - Amazon Linux: $ yum install openssl-devel.
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107878633.8/warc/CC-MAIN-20201021205955-20201021235955-00690.warc.gz
CC-MAIN-2020-45
1,680
35
https://www.indeed.co.in/Big-Data-jobs-in-Hyderabad,-Telangana
code
Big Data jobs in Hyderabad, Telangana Sort by: relevance - IBM DataStage Big Data Edition. IBM DataStage Big Data Edition Technical Consulting. N IBM DataStage Big Data Edition-L3, (Mandatory) .As a Lead, you are… Madhapur, Hyderabad, Telangana We are looking for Big Data Engineer with 2+yrs experience to help us build large-scale data storage and processing software and infrastructure. Good command on Linux and expert in algorithms and data structures. We are looking for an energetic individual to join us in building our next generation of. SCRUM master is a definite plus.Big Data experience is a strong plus. Experience within various parts of the SDLC, including Agile. IBM DataStage Big Data Edition. IBM DataStage Big Data Edition Manual Testing, Coding Standards, Development. Key skills required for the job are: Proficiency with Big Data processing technologies (Hadoop, HBase, Flume, Oozie). Seamlessly convert hard-to-grasp technical requirements into outstanding… 1 Work closely with data engineering/IT/dev teams to architect and engineer solutions that provide solutions around our analytic and big data platforms 2 Create… Experience in big data technologies like Spark, Hive, Hadoop. Hands on experience in implementing Deep learning models with textual data/ time series data (CNN,… Architects Big Data analytics framework. Certified in Big Data Eco System components is a big plus. Leads Big Data and batch/real-time analytical solutions… This includes the knowledge of data quality, ID mapping, DB storage, Analytical modules, Data Governance, API and Reporting. Get new jobs for this search by email By creating a job alert or receiving recommended jobs, you agree to our Terms. You can change your consent settings at any time by unsubscribing or as detailed in our terms.
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027314130.7/warc/CC-MAIN-20190818205919-20190818231919-00253.warc.gz
CC-MAIN-2019-35
1,809
15
http://www.actionscript.org/forums/showthread.php3?t=32801
code
I am trying to create a Mtching Game in Flash 5. In the game, players click on any 2 image masks, then the masks will be gone and 2 unmasked images appear, if these 2 images are same, then they disapper and show a portion of the final image (in the bottom layer). Until every image is matched, then the final image will be shown. I do not know action scrip very well. Could not figure out which fuction (action scrip) I should use for the game. Can anyone who knows how to do this help me out? Thank you very much!!!!
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535923940.4/warc/CC-MAIN-20140909030424-00027-ip-10-180-136-8.ec2.internal.warc.gz
CC-MAIN-2014-35
517
3
http://vstnet.codeplex.com/discussions/38333
code
First of all, congratulations to your work, very high quality code indeed. My problem is the following: I am working on a tempo-based effect plugin and it would be very useful if I could get the exact tempo along with the amount of the groove (or shuffle, the terminology is not uniform), so that I could slice the flow of samples into, let's say, 16th's. Obviously, if the groove amount is high, there is a notable difference between the length of neighboring 16th's, so if the currently processed block of samples contains the end of the previous 16th and the beginning of the next 16th, finding their boundary requires the knowledge of the groove amount. Currently I use the IVstHostSequencer.GetTime to get the current song position, the tempo, the time signature etc. but could not find any clue of the groove amount. If getting the groove amount is not possible by using the VstTimeInfo struct, could you suggest any workaround? I hope that this problem can be solved because most hosts support some kind of groove amount. By the way, I have discovered a bug, which is easy to fix, fortunatelly. It is in the ToTimeInfo function in TypeConverter.h, the problem is with the following two lines: timeInfo->CycleStartPosition = pTimeInfo->cycleEndPos; timeInfo->CysleEndPosition = pTimeInfo->cycleStartPos; Finding the bug is up to you, I won't help you any further.. :D (Just being fusspot: the name of CysleEndPosition is mistyped.) I hope that my question was clear enough and you can suggest a solution. Thanks in advance and keep up the good work! Oct 26, 2008 at 1:18 PM I'm not aware of any groove information being exposed by the VST interface standard. I propose you ask you're question on the kvr audio DSP/plugin forum. Thanks for the bug report. I'll fix it right away.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122720.81/warc/CC-MAIN-20170423031202-00085-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,784
16
https://www.microfocus.com/documentation/silk-test/195/en/silktestworkbench-195-help-en/SILKTEST-85537FFA-ASSETBROWSER-CON.html
code
Asset Browser to manage test assets. The Asset Browser provides a single point for creating, managing, and viewing assets for each asset type in the database. Press Ctrl+Alt+A at any time or click Asset Browser from the Tasks pane of the Start Screen to display the To view the existing items of an asset type, click the type name under Asset Types. A list of related assets displays on the right. To rename, delete, or duplicate assets, right-click an asset and choose the appropriate command. To view asset properties, select an asset and choose To create a new asset, right-click the asset type and choose New. New assets are added to the currently active project. As tests are developed, a large number of assets may be created. You can modify the view of the assets in several ways so that you can find the items you want. Controls in the Asset Browser include the following: - Active Project - Set the active project. This is the default project to which new test assets are added. When you change the active project, the assets in the new active project are automatically displayed. - Check or clear project names to select the projects whose assets you want to view. The assets of the active project are always - Filter assets based on set criteria, such as who created or last modified the asset, or when the asset was created or last - Asset Types - Select an asset type from the list to view the test assets available to the selected projects, based on any applied filters. For additional information, see - Assets List - Displays the assets of the selected type for the selected projects, based on any applied filters. - Open Item - Type the name of an asset to open. In addition to using these controls to manage assets in the Asset Browser, you can: - Click a column header in the item listing to sort the assets by that category. Click the header again to reverse the sorting. - Right-click a column header and choose Customize Columns to choose the columns to display or change the column order. - Enter an item name in the Open Item text box, to go directly to the item. Note: To manage a large number of assets, you can open multiple instances of the Asset Browser. The maximum number of Asset Browser instances you can open is 32.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710898.93/warc/CC-MAIN-20221202050510-20221202080510-00834.warc.gz
CC-MAIN-2022-49
2,249
37
http://askubuntu.com/questions/15612/where-does-compiz-log-error-messages
code
I'm having some trouble with compiz and dual monitors (see Why won't visual effects work with a dual monitor setup), and I'd like to check the compiz logfiles to see what, if anything, might be happening to cause it to stop working, but I'm not sure where compiz logs its error messages to. I have also been unable to find on the net anything related to a real log, only comments like "Do you get any error messages when you start compiz from the console?"; (see also Troubleshooting#Checking for problems - Compiz Wiki). My guess is that, if one wants error / warning messages from Since the above command is not started with a ' Hope this is not way off, :)
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257829972.19/warc/CC-MAIN-20160723071029-00213-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
659
5
https://www.elegantitservices.com/Best-Linux-Training-Institutes-in-Bangalore.html
code
Best Linux Training Institutes in Bangalore An open-source Operating System with roots in UNIX, LINUX is freely and publicly available to anyone from independent programmers to software houses, who wish to tinker with LINUX to fit their requirements. Developed by a student, Linus Torvalds, who spent much of his computing career using UNIX OS, wanted a UNIX-based OS for use on his home PC. It was out of this desire, that in 1993, he came up with the 1st version of LINUX (named after his first name) was created. Since then, LINUX has come a long way and is today a stable and reliable OS platform that offers database and trading services for companies like AMAZON. Furthermore, with its excellent near fool-proof security, stability, and ease of maintenance, it has become the OS of choice for the world’s top companies and websites, servers, and super-computers. LINUX's other benefits are that it makes all kinds of hardware LINUX compatible through the addition of LINUX device drivers. LINUX GUIs (Graphical User Interfaces) introduction further made it friendly for the end-users as well as LINUX System Administrators / Programmers. Leading LINUX Training Institute in Bangalore, Elegant IT Services offers a comprehensive LINUX course in Bangalore, taught by highly-qualified and experienced LINUX Training Consultants or Trainers, well-equipped to deliver high-quality LINUX Training across Bangalore. LINUX Training in Bangalore at Elegant IT will help you become familiar with all aspects of the LINUX OS, from installation to configuration, controlling access, manipulating files, and writing reusable and robust Shell Scripts, and more, and also how to leverage and apply it, in varied situations. LINUX Course duration and fees in Bangalore at Elegant IT Services are suitable for LINUX Developers / Administrators; Software Engineers; or Anyone who wishes to make a career out of LINUX. As a pioneer in the field of IT/Non-IT Training in Bangalore, Elegant IT Services remains mainly focused on revolutionizing learning by making it interesting and motivating. Boost your career with a LINUX Certification course from one of the best-of-its-kind LINUX Training Institutes in Bangalore, Elegant IT Services!!! WHAT YOU WILL LEARN? LINUX Training in Bangalore at Elegant IT Services covers all aspects of LINUX design, deployment, management, and troubleshooting. You will get to learn about the installation and system administration of LINUX; varied aspects of LINUX like LINUX Kernel, LINUX File Structure & File System, Partition Types; LINUX commands for Backup / Restore; LINUX Editor; LINUX Shell Programming (LINUX Scripting); LINUX Additional Tools; and more. At the end of LINUX Training in Bangalore at Elegant IT Services, you will become adept in setting up users on LINUX and configuring printers under LINUX; Installation of LINUX OS; Managing Boot processes; LINUX Testing & Debugging; and more. In short, you will become an expert on how to build, manage, administer, and optimize the LINUX platform. LINUX Training in Bangalore at Elegant IT is conducted by our team of certified experts. Furthermore, you also get access to the LINUX Training course content and syllabus for Classroom and Online Training, curated by the experts, in line with the current requirements of the industry. The well-defined course will help you with insights into all aspects of LINUX OS and how it can be leveraged to bring maximum business benefits. Well-formulated exercises will further help cement your knowledge about LINUX and how best it can be applied in varied scenarios. Furthermore, you also get to undergo practical’s that stimulates real-world scenario, helping you understand as to how LINUX OS works in a real-world working environment. All of these will allow you to become an Industry-Ready Professional, capable of handling the majority of the real-world scenarios. LINUX Training in Bangalore at Elegant IT Services comes with options of regular training classes (day time classes), weekend training classes, and fast track training classes, all of which scheduled normally at a time that best suits you. You will also be made to feel confident and comfortable by our experts in cracking interviews. Most importantly, LINUX course duration and fees in Bangalore at Elegant IT Services are economical and tailor-made based on training requirements, in line with industry-standards. What more, you also get to acquire a quality LINUX Certification, from a respectable institute, that’s widely recognized. NOTE: Elegant IT Services also offers • Online training through which you can access our tutorial Anywhere, Anytime, is extremely cost-effective. Further, you also get a captivating interactive environment with dynamic content, e-Learning that not only effectively keeps you up-to-date, but interested as well. • Tailored made LINUX training courses for Corporates. Join today and now, Elegant IT Services, among the best-of-its kind LINUX Training Institutes in Bangalore and avail the following benefits: • End to End solutions Training • Training in both the academic and corporate world • Provide one-to-one assistance • Provide 100% Placements Support in reputed MNC Companies • Rigorous interview preparation sessions and Resume Preparations • Excellent classroom and administration facilities • Flexible Training classes- Day time classes, Weekend training classes, Evening batch classes, and Fast track training classes. • Economical Fees Structures available • Notes: Both in Hard Copies and in Soft Copies are provided. Simply put, Elegant IT Solutions is a complete One-Stop-Shop for all IT and Non-IT Training in Marathahalli, Bangalore. Thanks to its all-round versatility, LINUX has been rightly described as the PAST, PRESENT, and FUTURE. Being a free and open-source system that’s freely available, most companies choose it, a huge benefit when compared to proprietary OS’s that come with high-costs. What more, it is also the most powerful open-source operating system that powers the entire WORLD WIDE WEB and some of the biggest organizations in the world like GOOGLE, FACEBOOK, AMAZON, and more. LINUX opens-up a number of quality job opportunities. Undergoing LINUX Training in Bangalore at Elegant IT Services, among the leading LINUX Training Institutes in Bangalore, will help you, become well-conversant with all areas of LINUX; acquire skills in System Administration, Cloud Computing, and Big DATA; and enhance your knowledge about Computer Science. With LINUX having a wide area of applications, you are assured of huge career opportunities, with job roles ranging from LINUX Engineer to LINUX Engineering Administrator, LINUX Software Developer, Software / Network / DevOps Engineer, PYTHON / JAVA Developer, TechOps Engineer, and so on. There will also be opportunities galore in LINUX Support (Extending support to all professionals/organizations currently working on LINUX), AND LINUX Teaching / Writing (Teaching students at LINUX Institutes & Writing documentation for large companies and technical papers for seminars). Furthermore, there are opportunities to work as a freelancer in teaching/writing or even as LINUX Engineer / Administrator. Looking ahead, the demand for certified LINUX professionals will be never-ending. Most companies will be looking to hire a full-stack developer, capable of managing servers, and all aspects that need to be done by using Shell Script. Further, with the advent of Cloud Technology, most of which rely on LINUX as OS, career opportunities will be even greater. Salaries for exceptionally skilled certified LINUX professionals would range from US$ 60,000 to US$ 1, 50,000, and more, based on experience and skill level. For more information and to schedule a free Demo on LINUX Training, contact Elegant IT Services @ +91 98865 41264
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991870.70/warc/CC-MAIN-20210517211550-20210518001550-00512.warc.gz
CC-MAIN-2021-21
7,946
38
https://usestrict.net/forums/reply/27455/
code
Out of curiosity, where are you hosting? The problem you reported was happening when RBE read the email to convert into a reply. Because you probably didn’t allow HTML messages, it was trying to convert the HTML email into plain text. That uses the HTML2Text library. The error message lead me to believe that HTML2Text didn’t get bundled with the plugin release, but it wasn’t the case when I checked the bundle itself. But I’m glad it’s working now. I’ll close the ticket as resolved.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817128.7/warc/CC-MAIN-20240417013540-20240417043540-00562.warc.gz
CC-MAIN-2024-18
498
3
https://www.itcentralstation.com/product_reviews/uipath-review-61827-by-richard-autry
code
What is our primary use case? Internally, we use UiPath to automate financial transactions, specifically for invoice processing. Externally, on the client side, we use automation in the financial space, primarily. There are various use cases from generic file uploads to transaction processing that we implement for our clients. How has it helped my organization? We have some processes that haven't been completed flushed out. Right now, there has not been an exact improvement yet. What is most valuable? Ease of use and speed of development are the most valuable features. The overall integration with Microsoft stack and a few other third party vendors, like Google, are very useful to us. Having these built into the product speeds up our development, so we don't have to code a bunch of connectors on our own. What needs improvement? I would like to see some sort of better implementation of the Python modules. Right now, any error code that Python throws up turns into a generic error that is difficult to track down. I would want to see some sort of integration that at least lets me debug the issue. Its pretty difficult to do source control through the typical Git functions because of the nature of the UiPath and the visual element. Some sort of method to bring source control home for us would be very helpful. A way to systematically track which actions or activities were added and subtracted from a given process before adding to a repository would be very helpful to us right now. Our team of developers is growing, so control has become somewhat of an issue for us. For how long have I used the solution? We are still very much in a prototyping phase and don't have full development. What do I think about the stability of the solution? Ease of use has definitely exceeded expectations. Initially coming in, UiPath had some features that needed to be implemented that weren't quite there yet. Now, we are on 2018.4 and all of the features that we desperately needed are there. Thus, ease of use has been pretty great. What do I think about the scalability of the solution? We have looked into scalability a lot. So far, we haven't done anything that involves a 100 bot. However, the scalability seems pretty easy. Scaling up to just five bots running in parallel has been very easy. If we are going to build up the environment, we would run on virtual machines. We would connect through Remote Desktop Services, not through Citrix. How are customer service and technical support? The technical support has been fairly good. I like that they pick up on interactions in the forum. However, some of the transitions from the forum to submitting a ticket are a little clunky. If a ticket could be submitted on my behalf on the forum, then have me boot over to where the ticket is, that is fine. Just kicking me out of the forum, then having me submit a ticket seems counterintuitive to me. Which solution did I use previously and why did I switch? As a company and for our client, we see any sort of legacy system or too many individual systems as somehow needing to be integrated. This is the bread and butter for RPA, and where we started our conversation (and our clients' conversations). How was the initial setup? The complexity of the initial setup depends on who you are. First time implementing, it seems a little complex. If you know how to develop UiPath, it is more straightforward. I had to walk somebody through the implementation setup of the environment because they had a lot of questions about where they were going. For software development is not that complex, it is pretty straightforward. Having some understanding of database management and services is helpful, so you understand the inner workings of UiPath. What was our ROI? It has definitely eliminated human error in our internal process, somewhere between full production, deployment and testing. There were definitely some error prone tasks that we eliminated. If I had to give a ball park, maybe 10 to 20 percent of the process was error prone, which we were able to resolve with UiPath. For time savings: What used to be a 15 minute task, now it takes the bot two minutes for the bot to run through, for example. What's my experience with pricing, setup cost, and licensing? Generally, we push unattended. We think the cost savings is better with unattended. As far as ROI, when you are talking about returning man-hours or moving people off work, unattended does that efficiently. Attended doesn't always save much time. Thus, we push unattended for cost. Which other solutions did I evaluate? We have seen general platform survey before implementing RPA of the different market vendors. Personally, I looked at other platforms, and it is hard to transition from UiPath. It does have ease of use that now I am used to. What other advice do I have? If you are starting with development, start with the UiPath Academy. For the end user or client, start conversations about security and prevention now, while you get trained up on development. Internally, there is not a lot of automation in place. We are using a good robotic process automation software to bridge that gap right now and get us further down the automation road. We use the UiPath Academy for new hires. The new training programs, both the previous and current versions, with the UiPath Academy work out for us. I have the previous videos, then the current new slide deck idea. It is pretty streamlined and high level, but it is good for getting new people started. Also, I used Academy just last week. I used it for security because I had some knowledge gaps on security with UiPath. Which version of this solution are you currently using? Start Your UiPath Free Trial Accelerate your digital transformation now with free access to the UiPath Platform
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057018.8/warc/CC-MAIN-20210920040604-20210920070604-00278.warc.gz
CC-MAIN-2021-39
5,811
41
http://wiki.symbolicdata.org/index.php?title=Entry_Page&oldid=1041
code
Revision as of 18:22, 16 December 2017 by HGG The SymbolicData Project Wiki |This wiki moved to https://symbolicdata.github.io. This instance is for referential convenience only and will no more be maintained.| - About the SymbolicData Project - Getting Started. What is this all about? How to query the database? - A Guide through this Site - A Guide through the SD Infrastructure - Presentations and Publications - Frequently asked Questions - Towards a Computer Algebra Social Network - What's new? |Don't hesitate to post all questions about using SymbolicData Tools and Data on the SymbolicData Mailing List to help us to improve our presentation.| The SymbolicData Project aims at two main goals: - to unify efforts to collect digital data for profiling, testing and benchmarking Computer Algebra Software from various Symbolic Computation Communities together with concepts, tools and experience for their management both globally and also for special profiling, testing and benchmarking purposes at a local site. - to promote a network of repositories of Symbolic Computation digital data and related information from different areas of Computer Algebra that can evolve to a digitally supported Distributed Computer Algebra Social Network. - The SDEval Framework developed by Albert Heinle. - The Interface to SageMath developed by Andreas Nareike. At the moment the project hosts data and metadata from the following communities within Symbolic Computing - Birkhoff Polytopes - Fano Polytopes - Free Algebras - Geometry Theorem Proving - Polynomial Systems - Test Sets - Transitive Groups The project manages additional Data: - Annotations - a system of background information on different examples and series of examples - Bibliography - bibliographical references system (to be aligned with swmath) - CA-Software - list of CA systems (aligned with swmath) Experimental data (work in progress): CASN - Towards a Computer Algebra Social Network - Conferences - data bases of upcoming and past conferences, see also the SD info page. - Mailing lists symbolicdata (news within the SymbolicData project) and sd-announce (retweet of announcements to reference them in RDF News from the public archive of the list) - News - The CA News Channel - People - People working in the CA area (mainly extracted from conference announcements and conference reports), see also the SD info page. - In progress: Author Ambiguation and Research Data References - Dissertations - Reports about dissertations in the CA area (mainly extracted from the Rundbrief of the German Fachgruppe, to be aligned with other sources), see also the SD info page. - To be extended by reports from SIGSAM.
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578517558.8/warc/CC-MAIN-20190418101243-20190418123243-00281.warc.gz
CC-MAIN-2019-18
2,678
38
https://forums.oculusvr.com/developer/discussion/comment/330086
code
I'm at a confusion point... I'm reading two separate docs: I'm trying to use a single, unified base for my project, but I don't know which one I should stick with (integrating both sounds like a debugging nightmare waiting to happen). I understand that Unity wants to cover more than just Oculus (Vive & PSVR), but what does that mean for Oculus developers when considering the two integrations? My immediate questions are: - What things should I weigh in (pros/cons) considering which to marry my project with? - Is there any indication that Oculus Utilities will fully dissolve into UnityVr?
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141652107.52/warc/CC-MAIN-20201201043603-20201201073603-00677.warc.gz
CC-MAIN-2020-50
593
7
https://forums.adobe.com/thread/659349
code
I've been working with Photoshop for years but recently started using dreamweaver to build sites. I want to make a flash intro for the site I am currently working on and have never used Flash before. I am looking to make a simple flash intro with no buttons and have it automatically cycle through the images I have. I have checked out a few books and sites but none have really helped. I'm looking for a tutorial to make an intro like the one on this page: http://juliodelsesto.com/ There's a couple ways to do this, it's not complicated. A quick way is to use After Effects and load the pictures into layers, have them dissolve into one another, then do File:Export:Flash] to make a quick swf file. Just put the swf file at the top of your DreamWeaver page. To do this in flash, there is a very good tutorial on slide shows at Lynda.com: In general, the method is to Import the bitmaps into your library, you could set your scene at 12 fps, then drop each picture onto your stage and have them stay on there for 12 frames each, on frames 13-24 will be picture 2, etc. Then create a dissolve effect in between the pictures, possibly with a motion tween.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584331733.89/warc/CC-MAIN-20190123105843-20190123131843-00138.warc.gz
CC-MAIN-2019-04
1,154
6
https://www.vcic.org/david-stefanich-rymedi-2/
code
Most VC-Backable Finalist, 2019 MBA Global Finals Presenter: Founder/CEO David Stefanich Blockchain-enabled B2B data transmission for life sciences. NOTE: This is a profile from a top performing startup at VCIC the year prior to launching Most VC-Backable Startups. Starting in 2020, Most VC-Backable Startup pages will include more detail, including a teaser pitch deck.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046156141.29/warc/CC-MAIN-20210805161906-20210805191906-00404.warc.gz
CC-MAIN-2021-31
371
4
http://kaynaww.tumblr.com/archive/2012/3
code
dad: what are you listening to? me: uh i'm lis- dad: you me at seven? dad: bad charlotte? dad: all time high? dad: difficult plan? dad: laughs for 10 minutes at own jokes Mad Hatter: Have I gone mad? Alice: I'm afraid so. You're entirely bonkers. But I'll tell you a secret. All the best people are.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706470197/warc/CC-MAIN-20130516121430-00035-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
299
9
https://forum.openwrt.org/t/x86-about-the-filesystem-size-dev-root-only-3mb/138141
code
add ca-bundle ca-certificates like this files ( kmod-fs-ext4 kmod-fs-exfat kmod-fs-vfat) and use openwrt-x86-64-combined-ext4.img.gz it's succeed now! but still don't know! why can't use openwrt-x86-64-combined-squashfs.img.gz I study by myself ! it's so so hard ! I hope someone can reply to me thanks Openwrt uses OverlayFS file system based on Overlay technology to combine the original read-only rootFs (SqushFS) partition and writable rootfs_Data (JFFS2) partition into one logical partition and mount it to the root directory
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646457.49/warc/CC-MAIN-20230531090221-20230531120221-00268.warc.gz
CC-MAIN-2023-23
531
7
https://www.horoscopeyourself.com/resources/transits/mars-sextile-sun/
code
Mars Sextile Sun Transit part of Transits The actions of your close circles might probably match your own pursuits much more than usual, which might encourage you. This might be a good time for sports or some physical activity in general. Currently the fat is getting burned faster and this might serve as a motivating factor for people with a bit of extra weight to exercise more. More Mars transits to Sun: Calculate your Daily Horoscope to find about the transits that are currently affecting your life. 0 comments have been posted.
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526536.46/warc/CC-MAIN-20190720153215-20190720175215-00323.warc.gz
CC-MAIN-2019-30
535
8
https://cozmopics.de/tag/networkmanager/
code
I recently had to start a systemd process without having a user being logged in. The systemd process was starting, but unfortunately the network was not up and running. The issue was that the wifi was linked to the user. In this case I used ArchLinux (Manjaro) Here are the steps to start a service fully automatically. Create a service-file in the location [Unit] Description=myService After=network-online.target Wants=network-online.target AssertFileNotEmpty=/opt/myService/config.json [Service] Type=simple SyslogIdentifier=myService WorkingDirectory=/opt/myService ExecStart=/opt/MyService/myexecutable (or script) RemainAfterExit=true Restart=always Nice=-20 [Install] WantedBy=multi-user.target Once created enable the service. This will enable the service startup of the system. sudo systemctl enable myService.service sudo systemctl daemon-reload sudo systemctl restart myService.service In order to check the logs of your service use the following command: # Just use the journalctl command, as in: journalctl -u service-name.service # Or, to see only log messages for the current boot: journalctl -u service-name.service -b Adjust the following script Change the connection of your linux. [connection] id=MyHotspot uuid=exxxxxxxx-xxxxxxxxx type=wifi permissions= [wifi] mac-address=00:XX:XX:XX:DF:ED mac-address-blacklist= mode=infrastructure ssid=My SSID [wifi-security] auth-alg=open key-mgmt=wpa-psk psk=MYPASSWORD [ipv4] dns-search= method=auto [ipv6] addr-gen-mode=stable-privacy dns-search= method=auto Important here is the permissions=.In a previous version of the file it was mentioning a few users. So the wifi only came up at login time of the users. With permissions= it starts even without anybody logging in.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712297292879.97/warc/CC-MAIN-20240425094819-20240425124819-00242.warc.gz
CC-MAIN-2024-18
1,733
13
https://forum.pagelines.com/topic/31126-follow-me-whats-up-w-the-new-design/
code
Is there a way to swap the icons for differently coloured ones? Eg, from grey (as here: http://dev.transitionbydesign.org/blog) to black: I've uploaded the new icons onto my site, but can't figure out how to point Follow Me to these instead. A suggestion for a later update, maybe instead of you pre-selecting colours, having a hex picker instead? I want to center the follow me bar at the bottom of docclass.com. I have literally plugged teh centering tags into every class on the page and can't get it to do anything. Am I missing something? Thank you! See footer, please. I purchased the Follow Me section plugin, and used it successfully as another site. On this site, it won't let me control the size of the icons - they're huge, and nothing I do (tweaking FM settings, reducing grid numbers, etc.) can reduce the size to actual 24x24 or whatever.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267860089.11/warc/CC-MAIN-20180618051104-20180618071104-00374.warc.gz
CC-MAIN-2018-26
852
6
https://weblogs.asp.net/cazzu/RegexParsing
code
Note: this entry has moved. Regular expressions are really powerful and very cool. Most people think of them as just a validation mechanism. They are missing a big scenario enabled by regexes: parsing. Some other people think that if you're doing any parsing, you **have** to use parser generator tools (i.e. yacc/lex, antlr, coco/r, etc), build a formal grammar of your language, etc. But do you really **need** to get into that? Do you want proof that you can achieve the same goal with regular expressions? The ASP.NET page parser is built with regular expressions, and not only the v1.x, but the Whidbey version too. Wanna confirm? Fire up Reflector, search for the TemplateParser class in the System.Web.UI namespace, and look at the ParseStringInternal method. There you will see how the BaseParser class is being used to parse the page source, which contains all the regular expressions for the several pieces of a page. I've build a number of parsers with regexes, from simple expression parsers (i.e. a more flexible and powerful expression format than DataBinder.Eval, for example) to full template file parsing (i.e. templates with ASP-like syntax for codegen, in the spirit of CodeSmith, NVelocity, etc.). And it works very well. And your code using very complex regular expressions doesn't have to be a cryptic-impossible to read-never ending-line of almost garbage that only you can understand.Bottom-line: learn regular expression. There're a lot of very real problems that you can solve SO easily with them...
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710909.66/warc/CC-MAIN-20221202150823-20221202180823-00622.warc.gz
CC-MAIN-2022-49
1,525
9
http://fileball.whpress.com/content/archive-sherlock-plugin-v2
code
Archive Sherlock Plugin v2 Welcome to a wonderful feature of the Lh'owon Ar'kives! [This feature is strictly MacOS 8.1 or higher users only] The Sherlock Plugin's ability lets you search all of the network archives with the ease of Sherlock. Once you punch in a word or date, a results window comes back with any file that has that word, or was posted after that date. For each item returned, it shows a good chunk of information about the item you clicked on. Also included are various direct links to the item itself, the creator's profile page, and sometimes links to read the reviews (if the item supports them)! Due to some limitations of the Sherlock system, it is not obvious how to use a date search. The way you use it, is you just type in a date in the format of M/D/YYYY (four digit year), and anything that was posted ON or AFTER that day will be returned! It's great if you want to see what was put up since the last day you had checked. If you put in a word, then it will obviously not do the date search. (this Sherlock plugin works fine in Sherlock2... Sherlock2 does not contain any extra features that the plugin would benefit from) Site Specific Plugins: Each Sherlock Plugin of the FileBall.Network is set to access a particular site. That site is displayed in the plugin's name, and also returned in the search results (in case you select all FileBall plugins and do a search on them, allowing you to do a multi site search for creators and other interesting tidbits). -The Staff at FileBall.net
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190234.0/warc/CC-MAIN-20170322212950-00496-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
1,516
10
http://www.math.sjsu.edu/singular/matrices/html/TSOPF/TSOPF_FS_b9_c6.html
code
A singular value of A is guaranteed1 to be in the interval pictured by the blue bars around each of the calculated singular values. Routine svds_err, version 1.0, used with Matlab 18.104.22.1684 (R2008a) to calculate the 6 largest singular values and associated error bounds. Routine spnrank, version 1.0 with opts.tol_eigs = 1e-008, used with Matlab 22.214.171.1244 (R2008a) to calculate singular values 14442 to 14447 and associated error bounds. |Matrix properties (click for a legend)| |number of rows||14,454| |number of columns||14,454| |structural full rank?||yes| |dimension of the numerical null space||10| |numerical rank / min(size(A))||0.99931| |Euclidean norm of A||5306.2| |calculated singular value # 14444||1.4283e-008| | numerical rank defined using a tolerance | |calculated singular value # 14445||1.1652e-008| | gap in the singular values at the numerical rank: | singular value # 14444 / singular value # 14445 |calculated condition number||-2| |# of blocks from dmperm||2| |# strongly connected comp.||2| |entries not in dmperm blocks||0| |explicit zero entries||0| |nonzero pattern symmetry||symmetric| |numeric value symmetry||symmetric| |kind||power network problem| |Additional fields||size and type| Transient stability-constrained optimal power flow (TSOPF) problems from Guangchao Geng, Institute of Power System, College of Electrical Engineering, Zhejiang University, Hangzhou, 310027, China. (genggc AT gmail DOT com). Matrices in the Full-Space (FS) group are symmetric indefinite, and are best solved with MA57. Matrices in the the Reduced-Space (RS) group are best solved with KLU, which for these matrices can be 10 times faster than UMFPACK or SuperLU. |Cholesky flop count||2.6e+006||3.8e+006||-| |nnz(L+U), no partial pivoting||343,118||408,270||-| |nnz(V) for QR, upper bound nnz(L) for LU||17,856,448||8,290,763||17,856,447| |nnz(R) for QR, upper bound nnz(U) for LU||26,478,449||28,095,620||26,478,449| Maintained by Leslie Foster, last updated 24-Apr-2009. Entries 5 through 14 in the table of matrix properties and the singular value plot were created using SJsingular code. The other plots and statistics are produced using utilities from the SuiteSparse package. Matrix color plot pictures by cspy, a MATLAB function in the CSparse package.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335573.50/warc/CC-MAIN-20221001070422-20221001100422-00375.warc.gz
CC-MAIN-2022-40
2,286
34
https://itch.io/profile/fleecyfly
code
Thank you! All artwork have been made by my daughter (12), the game will go into her portfolio. She is seeing the feedback as well. Some shameless advertisement: She has an art channel on YouTube Recent community posts Got to Level 2, opened the folder with the cat images. Fighting with the dialog boxes... Man, this game is annoying like real old Windows 3.1/9x was... :) It is not clear where to put those cat images, though. To the F: disk? I cannot seem to open a folder for the disk. - Move the two icons at the bottom right behind the dialog boxes. They are in the way of clicking. - I would allow for clicking through the colorful vertical strips appearing. It is enough punishment not seeing correctly from them, but they also capture clicks which make is hopeless when you start to have a lot of stripes. - Number of vertical stripes should increase a bit less with failures (lower the exponent). It is too easy to get bluescreen on Level 2. (Or introduce difficulty levels.) - Some dialogs are just flying too fast (for me at least) to click on them. Especially on Level 2 when there are two dialogs. The game is very funny nevertheless. Good job! Very nice platformer with good sci-fi graphics. How did you manage to complete it on time? :) Music/audio/sounds are well selected. Difficulty is very well tuned, not too hard, but not too easy. I enjoyed playing it very much! Minor: Space or ENTER should also be available for navigation in the main menu. (Maybe also mouse.) At that point the user does not know that he/she should use the action key (X) to start the game. It is not a problem with a gamepad, per se. This has been the best game I've tried so far. Familiar platformer look, but distinguishing "weapon". Genuine idea with great execution! Intuitive, quick tutorial. Simple controls. It has become too hard when I would have needed to convert those poison plants into mushrooms on the fly. Excellent game! Keep up the good work! Very professional, charming pixel art, matching music and sfx. I could not get far enough to decide about theme fit. Is it intentional that you have to replay the whole tutorial whenever you die from one of the first test enemies? Maybe I just cannot play well enough, but found it a bit flustrating. Thank you very much. Yes, closing the box was planned, but never implemented. Highest result of binary addition puzzle is 62 = 31 + 31 Detail: The game makes sure you cannot get the 0 + 0 = 0 case. Very good game controls and mechanic. Nicely rigged character. I would be interested in seeing your walk animation or code. Too many keys to learn posed a bit of problem for me, since I'm not an avid player. Should be no problem for experienced players, though. Time slowdown is a bit overpowered. I can just slow time, fire 50 laser shots in the direction of enemies, then release the time. The batch of laser pulses destroy all enemies in that direction. This stategy alliviated the need for the more advanced gravity manipulation / teleport tactics in battle. Now I see, the tutorial actually says that key T recovers to the latest checkpoint. But that message is gone by the time the player is in the trap. So if that message was overlooked, then the player does not know what to do and has to close the game. Excellent tutorial right on the first level, as it should be. Minor problem I found is that the player can be stuck during the tutorial: No recovery from here. ESC key does nothing. Game has to be closed with Alt-F4 and restarted to try again. I would be nice to have a quick recovery from such situations during the tutorial. Maybe later as well by going back to the beginning of level or so. I've just tried to record the problem with OBS: video It is 90 degrees for me on my screen, but varying angle on the recording. I have a 4k display running the game in windowed mode (not full screen). So the mouse coordinate space is not the same as the game's viewport. I suggest to orient your player according to the angle of the vector pointing from the player's global position to the mouse global position. I cannot find any video listed there on playing Godot Wild Jam games. Could you please make sure it is listed or point us to the actual video? (Sorry if I'm overlooking something on Twitch.) Please upload the EXE and the PCK in a single ZIP file next time. This way it does not lunch from the Itch App. Those two files have to be downloaded separately into the same folder to run your game. Unique gameplay and original storyline. The game is as weird as it should be, not more, not less. It took me about a minute to realize that the letter is actually the main menu of the game, LOL :) It is a very enjoyable game with retro music and pixel style graphics. Killed all the enemies on the first floor, collected 4/4 gold balls in about 10 minutes. Then glitched through to the second floor. Found no bugs other than some (maybe intentional) graphical glitches here and there, like vertical white lines between the tiles and some black rectangles flashing randomly. I'm not sure whether they were intentional. I think the map should show the doors as connections between the rooms. It would allow the player to see where are undiscovered rooms. Robots were too easy to kill. All in all, it has been the best entry I have played so far. Congratulations! Tried on Windows 10 Hand aim was 90 degrees off, which prevented me from killing the guards on the third screen. Based on your description the game has a relatively long story line, which I would really like to try. Waiting on an update fixing the controls. Installed on Windows 10 using the Itch App. Game started up to welcome screen. Loading bar worked. Then I got the game music in my left ear only with a blank screen with scrollbars: Yes, my audio settings and headphone were good, tested them before playing.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250625097.75/warc/CC-MAIN-20200124191133-20200124220133-00150.warc.gz
CC-MAIN-2020-05
5,841
56
https://waqsp.org/oldest-civilization-obujxv/long-range-in-java-4f8750
code
That's all about how to convert String to long in Java. Have a look: As mentioned earlier, the Integers class can be used with generics. Range test = Range.between(1, 3); System.out.println(test.contains(2)); System.out.println(test.contains(4)); Guava Range has similar API. The default value of long is 0 whereas the default value of double is 0.0d. Example. See your article appearing on the GeeksforGeeks main page and help other Geeks. Furthermore, the data type long stores whole numbers from 9223372036854775808 to 9223372036854775807. Type. The value is assigned to the num_a after declaring it. A Java longdata type can hold the largest integer values. However, I am getting errors for much smaller numbers. Difficulty Level : Easy. brightness_4 In the following example, an ArrayList is created with five numeric elements. This article, "Oracle lays out long-range Java intentions," was originally published at InfoWorld.com. The ranges that are specified in the following table are inclusive-inclusive. The minimum value of int variable can be – 2,147,483,648. It takes up 64 bits of memory and accepts a range from -9,223,372,036,854,775,808 to 9,223,372,036,854,775,807. Write Interview Les plages spécifiées dans le tableau ci-dessous sont inclusives-inclusives. You may apply the same examples as used for integer class in above section; for larger values. A sequence of primitive int-valued elements supporting sequential and parallel aggregate operations. endInclusive : The inclusive upper bound. The ‘D’ or ‘d’ are optional suffix. For demonstration, the values of long variables are kept a little higher than the limit of the int type: The values for the long type variable are used with “L” at the end. In this tutorial we will see how to get current time or given time in milliseconds in Java. The maximum value that an int variable can store is 2,147,483,647. Get hold of all the important Java Foundation and Collections concepts with the Fundamentals of Java and Java Collections Course at a student-friendly price and become industry ready. compareTo() : Used to compare two Long objects for numerical equality. This is how you may declare and use the int type variables in Java programs. The int and long are primitive data types; the int takes 32 bits or four bytes of memory while long takes 64 bits or 8 bytes. It is an inbuilt function which converts the value of BigInteger to a long and checks for lost information. For instance, here is a program that computes the number of miles, light will travel in a given number of days : The int can’t store null value while an integer can. Last Updated : 28 Oct, 2019. Created by: Root-ssh 67760 1. BaseColumns; CalendarContract.AttendeesColumns; CalendarContract.CalendarAlertsColumns; CalendarContract.CalendarCacheColumns; CalendarContract.CalendarColumns The ArrayList is declared with Integer type, so the elements can be numbers only. By default, every floating-point number is of double type. Please write comments if you find anything incorrect, or you want to share more information about the topic discussed above. acknowledge that you have read and understood our, GATE CS Original Papers and Official Keys, ISRO CS Original Papers and Official Keys, ISRO CS Syllabus for Scientist/Engineer Exam, Primitive Wrapper Classes are Immutable in Java, Referencing Subclass objects with Subclass vs Superclass reference, Split() String method in Java with examples. Example : Return Value : A sequential LongStream for the range of long elements. You should use Long.valueOf() method to parse String, if you need a Long object and use parseLong() method if you want to convert String to primitive long value. This is the int primitive specialization of Stream.. The int is a numeric primitive data types in Java. Syntax: public long longValueExact() By default, floating point numbers are double in Java. The variable is declared inside the loop and used with an array for displaying the array elements. Returns a value less than 0,0,value greater than 0 for less than,equal to and greater than. Does JVM create object of Main class (the class with main())? Let's see the simple code to convert long to int in java. The nextLong() method returns the long value scanned from the input. The java.util.Arrays.copyOfRange() method is used to copy the specified range of the specified array into a new array. Using predefined class name as Class or Variable name in Java, Java.util.TimeZone Class (Set-2) | Example On TimeZone Class, Implement Pair Class with Unit Class in Java using JavaTuples, Implement Triplet Class with Pair Class in Java using JavaTuples, Implement Quintet Class with Quartet Class in Java using JavaTuples, Implement Quartet Class with Triplet Class in Java using JavaTuples, Implement Octet Class from Septet Class in Java using JavaTuples, Implement Ennead Class from Octet Class in Java using JavaTuples, Implement Sextet Class from Quintet Class in Java using JavaTuples, Implement Septet Class from Sextet Class in Java using JavaTuples, Implement Decade Class from Ennead Class in Java using JavaTuples, Difference between Abstract Class and Concrete Class in Java. In order to store them into float variable, you need to cast them explicitly or suffix with ‘f’ or ‘F’. code. Size: 8 byte ( 64 bits ) Values: -9, 223, 372, 036, 854, 775, 808 to 9, 223, 372, 036, 854, 775, 807 (inclusive) Default Value: 0. Not Available adshelp[at]cfa.harvard.edu The ADS is operated by the Smithsonian Astrophysical Observatory under NASA Cooperative Agreement NNX16AC86A The corresponding wrapper class is … Attention reader! 2) Using public long getTimeInMillis() method of Calendar class 3) Java 8 – ZonedDateTime.now().toInstant().toEpochMilli() returns current time in milliseconds. The range is from -1.7e38 to 1.7e38: The range is from -3.4e38 to 3.4e38: To represent a floating-point number as a float data type we must use the ‘F’ or ‘f’ suffix. Only the minimum and maximum values are provided. Note: In Java SE 8 and later, you can use the long data type to represent an unsigned 64-bit long, which has a minimum value of 0 and a maximum value of 2 64 -1. The initial index of the range (from) must lie between zero and original.length, inclusive. Live Demo. If you like GeeksforGeeks and would like to contribute, you can also write an article using contribute.geeksforgeeks.org or mail your article to [email protected]. Another overloaded method containing only String as a parameter, radix is by defalut set to 10. 0 discussions. It's useful for storing numbers that outgrow the integer data type. Long.valueOf() method also provides caching in range of -128 to 127. See this example where I have declared and assigned values to int types variables in two ways: You can see, the first line is used only to declare two int Java type variables. Before going into examples of using the Java Integer and Long classes, let us have a look at a few important points of int and long data types and Integer/Long classes: The long (primitive type) and Long class: In this simple example of using Integer class, three variables are declared just like the above examples. The range of a long is quite large. How to add an element to an Array in Java? If a data ty… So, if your program is supposed to store small numbers then use an int type. Java long to int Example . long long (unsigned long long) long long (unsigned long long) Si son nom commence par deux traits de soulignement (__), un type de données est non standard. Float uses 1 bit for sign, 8 bits for exponent and 23 bits for mantissa but double uses 1 bit for sign, 11 bits for exponent and 52 bits for the … First, have a look at a few examples of declaring and using the int and long data types. Experience. Java Program to Check if a Given Class is a Local Inner Class, Java Program to Check if a Given Class is an Anonymous Class, Java Program to Illustrate the Availability of Default Constructor of the Super Class to the Sub Class by Default, Java Program to Check if a Given Class is an Inner Class. There are certain scenarios when you need working with objects rather than using primitive data types for storing numeric values; I will explain this in the later part of this tutorial. Java String: 8 examples of simple and string functions, This div height required for enabling the sticky sidebar, //Declaring int type variable inside the for loop, Java String to int conversion by parseInt and valueOf methods, Ways to perform Java sorting by built-in methods, Available methods in Java for int to string conversion, Java Map: 8 examples with HashMap and LinkedHashMap classes, Java ArrayList: explained with 8 examples, Java if.. else if and else statements explained with 5 examples, 6 variety of examples of using Java for loop, Java list: A Collection interface explained with 7 examples. Please use ide.geeksforgeeks.org, In the second line, the num_b is declared and a value is assigned at the time of declaration. This article is part of the “Java – Back to Basic” series here on Baeldung. Java.Lang.Long class in Java. Java provides a number of numeric data types while int and long are among those. edit package com.tutorialspoint; import java.lang. The int has Integer and long has Long wrapper class. Henry Wong wrote: Aziza Korikova wrote: i have simple question about the range of the primitive data type long. In the world of math, you can definean integer as: The set of all integers, denoted by Z, is (countably) infinite. See this example where an int type variable is used in a for loop. If you are just wanting to check if a number fits into a long value or an int value, you could try using it through BigDecimal. We can convert long to int in java using typecasting. 10 points. Below is the list of points that explain the key difference between float and Double in java: 1. long: The long data type is a 64-bit two's complement integer. Just like other classes, you have to create objects of integer class that contains single field i.e. An object of type Long contains a single field whose type is long.. In Java SE 8 and later, you can use the long data type to represent an unsigned 64-bit long, which has a minimum value of 0 and a maximum value of 2⁶⁴-1. To convert higher data type into lower, we need to perform typecasting. This makes it helpful when big, whole numbers are needed. Use this data type when you need a range of values wider than those provided by int. Typecasting in java is performed through typecast operator (datatype). The following example shows the usage of java.lang.Long.longValue () method. The advantage of integer class can be using in collections with generics or object references that you can’t with primitive type. A Computer Science portal for geeks. public class Range extends Object implements Serializable. All TemporalField instances have a valid range of values. A class to represent ranges of values. Stores values from 1.7e-308 to 1.7e+038 write comments if you find anything incorrect, or you want share! Field i.e object of long class can be numbers only LongStream for the long value scanned from the.! Original.Length, inclusive number of numeric data types are predefined and implicit to language! The nextLong ( ) method of a class from another class: public long (... Plain Java and others long types have wrappers classes in Java is performed through typecast (! Integer long range in java Java 1 ) using public long getTime ( ) method of a from! Types like vectors of other two lost information a date-time field D ’ or ‘ D or..., value greater than 0 for less than, equal to and greater than 2! And programming articles, quizzes and practice/competitive programming/company interview Questions instances have a look: as mentioned earlier, generic. Value is assigned at the time of declaration or after that first have. Spécifiées dans le tableau ci-dessous sont inclusives-inclusives, Python, Java and using the apache Commons Math.. Appearing on the other hand, double stores values from 1.7e-308 to 1.7e+038 in the calculation outgrow integer... The int is a 64-bit two 's complement integer other geeks to somewhere between and. Usage of java.lang.Long.longValue ( ) ) a for loop long type variable is the sum of other two the. Array in Java and assigned the values and used with generics to 9223372036854775807 it is an inbuilt function which the. Provided by int instances have a look at a few examples of and... Is performed through typecast operator ( datatype ) the long primitive type the... Of 2⁶³-1 long wrapper class type long in range of values wider than those provided int... Array into a new array when comparing two long objects for numerical equality as it would differentiate between less greater! Back to basic ” series here on Baeldung article, `` Oracle lays out Java! I am getting errors for much smaller numbers through typecast operator ( )! Geeksforgeeks main page and help other geeks first, have a look as... Is performed through typecast operator ( datatype ) whose type is non-standard the third variable. 64 bits of memory and accepts a range is a numeric primitive types. Variable can be numbers only range ( from ) must lie between zero and original.length inclusive! To convert String to long in Java long class can hold the largest values... An inbuilt function which converts the value is assigned at the time declaration! Long values for numerical equality as it would differentiate between less and greater than 2! Get current time or given time in milliseconds in Java on the API. And help other geeks the third integer variable is used in the second line, the num_b is with... Illustrate how to convert long primitive type that an int type variable can is. We will see how to get time in milliseconds in Java is long, you... Long types have wrappers classes in Java of Zis supported by a particular data type mentioned earlier, wrapper! ), a data ty… a Computer Science and programming articles, quizzes and programming/company... Are inclusive-inclusive of declaring and using the int and long object into int long for! 1 to somewhere between 28 and 31 long to int in Java programs programming/company interview.. Value of int variable can store is size of an array for displaying array... Other classes, you have to create objects of integer class that contains field... 0 for less than 0,0, value greater than +- 2 billion ( around ) then use a Java type. Among those zero and original.length, inclusive, have a look at a few examples declaring... Implicit to the language 0 for less than 0,0, value greater than 0 less! Arraylist is declared inside the loop and used with an array for displaying the array elements find anything,! Implicit to the language the nextLong ( ) method also provides caching in range 2 contributors ) then an! Can we call the main ( ) ) primitive data types value is assigned at following. For much smaller numbers than +- 2 billion ( around ) then use an int type variable you to! Will see how to convert String to long in range of -128 to 127 are assigned values. With integer type, the generic types must be of type objects so... Between zero and original.length, inclusive convert higher data type long stores whole are. Into int methods like compareUnsigned, divideUnsigned etc to support arithmetic operations for unsigned long need a range class doing. Java, can we call the main ( ) method also provides caching range. Has a wrapper class in Java type is non-standard the sum of other two link! Whole numbers are needed two underscores ( __ ), a data type is non-standard advantage of integer class above!
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154302.46/warc/CC-MAIN-20210802012641-20210802042641-00426.warc.gz
CC-MAIN-2021-31
15,698
3
http://delete-all-spyware.blogspot.com/2014/08/uninstall-info-enhancer-how-to-remove.html
code
How to uninstall Info Enhancer from windows pc effectively: Classified as a potentially unwanted program Info Enhancer can easily make this possible to make the target computer system full of pop up ads which is mainly an illegitimate way to advertise the sponsors links to any user. The main reason why such kind of adware application got categorized within such kind of adware category because of its aggressive nature to display pop up ads over the screen of user. All the advertisements are totally untrustworthy which can easily redirect user questionable websites that contain illegitimate content. Info Enhancer will also claim to be such kind of program which is used only for recording the browser activity of user, but once it get enter within any PC. It will first disable the security services on that system, after which it becomes very easy for it to continue with such kind of activities which are totally not safe for user and the health of PC as well. Info Enhancer will inject nasty codes within web browser installed such as Google Chrome, Internet Explore or Mozilla Firefox any one of it can get infected easily. - Decrease in performance: It slow down performance of Window system like takes long time to boot system - Damage and corrupt system files: Once it enter in system change all setting and infect the files and lastly damage it - Problem in Application or Program: Some of program which is installed in user PC also get damage and when user try to start it show pop Window and error message related to spyware - Affect on Computer Data: Capability to collect all confidential and information and send it to remote attacker who then used it for illegal purpose. - Power ratings: It has capability to reduce the power ratings of system and even change system in sumb state. - Opening and closing: When this type infection get in system it also affect internet connection like web browser behave erratically like users does not be bale to close down browser Window - Search Result: Does not able to get exact search result instead of fact one and even not able to remove message show by it - Slow Down Connection: Internet connection slow down. It take long time to open any page
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123491.68/warc/CC-MAIN-20170423031203-00615-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
2,207
11
https://docs.teradata.com/r/Teradata-Viewpoint-User-Guide/June-2017/Query-Spotlight/Query-Spotlight/Details-View/Enabling-and-Using-Rewind-Control
code
The time marker is a vertical line in the graph with small triangles at the top and bottom. Its position represents a point in time and controls rewind for the portlets that support the rewind function. The time marker appears green when Control Rewind is enabled and you interact with it. - From the Details View, click Control Rewind located below the graph in the middle of the page. The Control Rewind button turns green and the rewind toolbar appears. - Click or drag the time marker to a specific point in time. - [Optional] Drag the time marker to another point in time.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499816.79/warc/CC-MAIN-20230130101912-20230130131912-00772.warc.gz
CC-MAIN-2023-06
577
4
https://itch.io/t/370945/nodes-that-can-be-unlocked-multiple-times
code
I am pretty sure the answer is no, but is it possible for a node to be activated multiple times? This would allow common events that use variables to possibly increase their numerical bonus for each time the node has been activated. (Ex. a node with 2/5 Ranks.) If this is not possible currently would it be considered in a future update? I was trying to find a way to event nodes such as this but have had no luck. I suppose I could have a separate node that turns a switch off and maybe that would turn an activated node off again? Allowing the variable to increase when the node is activated again? It seems clunky though. Maybe you know of a better way to event something like this? This is not a major issue for me and you can take your time replying.
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987813307.73/warc/CC-MAIN-20191022081307-20191022104807-00053.warc.gz
CC-MAIN-2019-43
756
2
https://forum.linuxfoundation.org/discussion/comment/8798
code
ATI DRIVER PROBLEM & UBUNTU 11.04+ **REALLY SOLVED Well, refusing to give up, I installed ubuntu 11.04 again, and installed the ATI Driver again, knowing my screen would go black. Then blankly starred at it, trying to understand .why I was having this issue. Then I more closely examined the error on my now black monitor screen:"Input not supported" . Interesting I thought, so then it hit me, wait a minute, I have two monitors setup a normal 15 inch LCD, and a HD projector I have setup to my cable and my computer. So I turn the projector on, and to my suprise, there is my computer desktop in perfect order using the driver in ubuntu 11.04 that I have been so pissed off at ubuntu over lately. It works fine, however it requires a HD monitor/Projector that is compatible with the frequency it works on by default. Problem Solved, need a new monitor before I re-install it tho. REALLY SOLVED: I thought this was the case, but I fixed it! Finally! Haha! So after installing Fedora 15 with KDE and installing my ATI Driver I had the same issue as ubuntu did, after installing the new driver I reboot, and the screen goes black displaying "Input Not Support" This time I turned my projector on which it was working with and opened up my display settings, turned my monitor refresh rate to "Auto" and poof my screen came back! So it turns out, that with the new linux and installing the driver my monitor does work fine, it just gets set to a refresh rate that is not supported and needs to be changed back, or set to auto. Very happy I solved this! Was causing issues with anything needing 3D acceleration not having this!
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400212959.12/warc/CC-MAIN-20200923211300-20200924001300-00326.warc.gz
CC-MAIN-2020-40
1,623
9
https://feed.nuget.org/packages?q=Tags%3A%22calabonga%22
code
Extensions for ASP.NET MVC3 (razor) site project with some htmlhelpers, scripts managment (for exsample, better placement), content extensions. Extension create a new layout file in shared folder _LayoutExtended.cshtml with better placed scripts. OperationResult is an implementation of RFC7807. In other words, it's simple wrapper for result operation for any returned data from backend, where you can add additional information about problem or other things State Processor for any entity in your application. StateProcessor can change state validation for enter and leave those states. Special rules list for each state executed before Enter stasus and Leave status.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500035.14/warc/CC-MAIN-20230202165041-20230202195041-00668.warc.gz
CC-MAIN-2023-06
669
3
https://softwareengineering.stackexchange.com/questions/280273/static-console-object-or-dependency-injection
code
Note: Initially I answered this question without realizing that it is about the use of singletons for debugging purposes. So, the first part of my answer is for using singletons in general, not for debugging. The second part of my answer addresses the issue of debugging. (I have added to it a couple of points I made in comments.) Part 1 - singletons in general (without respect to debugging) My recommendation would be to not go with a singleton. My experience is that "the singleton" is not a pattern, but an anti-pattern by its very nature. (But let's not turn this into yet one more episode of the singleton war, shall we?) You say that you are "interested specifically in the case of utilities such as a console." I am afraid that a console is not a utility. It is a stream to which you send output. Text sent to it gets buffered, so it has state. Concurrently calling it from multiple threads might not crash it, but it will result in misplaced linefeeds and garbled lines, so it cannot really be thought of as amenable to multi-threading. Even if it is convenient for some to think of it as a singleton, conceptually it is not, as evidenced by the fact that you can redirect it to other devices like files, printers, etc. So, either you can treat it as what it really is, (an output stream, passed to whoever needs to output stuff,) or treat it like some special public global one-of-a-kind thing, the nature of which everyone has intimate knowledge of, and then rely on the sorcery provided by the library and the OS beneath the scenes to undo your assumptions and make it work like the output stream that it really is, as far as the rest of the system is concerned. True, you may end up making it a singleton due to pragmatic concerns of convenience vs. correctness, but I suppose that if convenience was your primary concern then you would not be asking the question in the first place. So, this answer is to say that there do in fact exist other engineers besides you, like me, who will tenaciously pursue the "do it right, avoid singletons" approach. Part 2 - singletons for debugging I seem to have missed the point about debugging in the original question. When it comes to debugging, I do not have objections with the use of singletons. I would use a singleton as a debugging helper, I would not use a singleton for anything else. But then again, we do not test debugging helpers. If it requires testing, then it is not just a debugging helper. In the past I have tried passing debugging facilities as dependencies to objects in the same way that I pass formal dependencies (dependencies that that are part of the design) and I have come to the conclusion that a) it is a big pain, b) it adds more complexity than the design calls for. When debugging dependencies are treated with the same dignity that design dependencies are treated, they start to appear as if they are part of the design, while they are not. For example, say you have a collection which is sortable and you want to pass it a comparator. Is it really worth the hassle to make the comparator an object so that you can inject the debugging dependency in it? And isn't it kind of odd now that the comparator has become an entity of its own, as if it is part of the design, while in fact the only reason it is an entity is so as to have a reference to the debugging facility? So, if it is only for debugging, (which, incidentally, means that it will not require testing,) then go ahead and use a singleton, it is fine.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100550.40/warc/CC-MAIN-20231205073336-20231205103336-00496.warc.gz
CC-MAIN-2023-50
3,499
14
http://www.clarkeology.com/2001/03/08/yumi-yumi/
code
They're onstage at 10pm. More info: www.yumiyumi.net Paul Clarke's weblog - I live in Hythe near Folkestone. Wed to Clare + father to 2, I'm a full-stack web developr, + I do js / Node, some ruby, other languages ect ect. I like pubs, parkrun, eating, home automation and other diy jiggery-pokery, history, family tree stuff, TV, squirrels, pirates, lego, and TIME TRAVEL.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710711.7/warc/CC-MAIN-20221129200438-20221129230438-00345.warc.gz
CC-MAIN-2022-49
372
3
https://lists.debian.org/debian-x/2007/06/msg00931.html
code
Bug#429574: hard lockup after xserver-xorg upgrade severity 429574 important > On an etch box, after a recent upgrade of newly-migrated > xserver-xorg-core, launching X causes the machine to freeze, with even > sysrq not responding. Switching the video driver from ati to vesa > allows to run X again, but downgrading the xserver as shown > (aptitude.log exceprt below) also allows X to run again with the ati > [DOWNGRADE] xserver-xorg 1:7.2-3 -> 1:7.1.0-18 > [DOWNGRADE] xserver-xorg-core 2:18.104.22.168.dfsg-6 -> 2:1.1.1-21 > [DOWNGRADE] xserver-xorg-input-evdev 1:1.1.5-2 -> 1:1.1.2-6 Does xserver-xorg-video-ati 6.6.192 currently in experimental help? Does it help if you disable dri ? With xserver-xorg-core 1.3, 'Disable "dri"' in the modules section should do the trick (See MODULE SECTION in the manpage of xorg.conf).
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267865081.23/warc/CC-MAIN-20180623132619-20180623152619-00496.warc.gz
CC-MAIN-2018-26
828
14
https://forums.athemes.com/t/formatting-list/24562/2
code
So I am interested in having two lists side-by-side but they are formatting incorrectly: I would like to have the title (Virtual Bootcamp) positioned in the center of the page. Then I would like to have the two lists side-by-side underneath the title. Currently in my admin layout I have 1 row and then side by side list widgets. Is there a way that I can format this to make it correct?
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141189141.23/warc/CC-MAIN-20201127044624-20201127074624-00481.warc.gz
CC-MAIN-2020-50
387
3
https://www.mail-archive.com/[email protected]/msg00725.html
code
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 This is mainly a question for the backend developers, but any feedback is welcome. I'm tweaking the code for editing a current reservation. Some of the text printed while editing a reservation could be confusing; so, I'm trying to make it more clear. Here's where my question comes in. We are currently allowing people with sufficient rights to save a normal reservation as a new image (for bare metal reservations only). This is allowed even if there is another reservation following the one being edited. There is a 15 minute buffer built in between all reservations. Is 15 minutes enough time? Should I make it so there must be at least 30 minutes to be able to save the reservation as a new image? Thanks, Josh - -- - ------------------------------- Josh Thompson Systems Programmer Advanced Computing | VCL Developer North Carolina State University [email protected] 919-515-5323 my GPG/PGP key can be found at pgp.mit.edu -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFLMM2XV/LQcNdtPQMRAhKMAJ44C0AouKXLTucmt3DUqvMtDnZDAgCeLIu0 BCx88tlVVl2Vtmj/7SNUWps= =zRi+ -----END PGP SIGNATURE-----
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514443.85/warc/CC-MAIN-20181022005000-20181022030500-00212.warc.gz
CC-MAIN-2018-43
1,166
2
https://stackoverflow.com/jobs/170425/linux-cloud-engineer-docker-kubernetes-noble-markets
code
About this job Noble Markets is a dynamic FinTech company working to solve the challenges of cost and access plaguing todays OTC and FX markets. Our team has decades of experience in capital markets spanning electronic execution, low latency, algorithmic trading, transactional banking, and core market infrastructure. We offer full benefits including Equity and a competitive compensation package including salary and discretionary performance based bonus. Noble is looking for direct hire multiple Linux Cloud Engineer to join their Infrastructure/DevOps Team. Join our team and help us to build and scale our cloud based infrastructure and services. Work cross functionally as someone who will be responsible for Design, Implementation, Configuration, Architecture and Engineering of our HA infrastructure. - Design, configure, build, and support and troubleshoot cloud-based infrastructure services - Redhat, Centos, AWS - Work crossfunctionally to architect solutions to support our evolving infrastructure and application needs - Debug and resolve production issues with internal and external clients - Develop runbooks and documentation - Monitor and proactively identify performance issues - Evangelize DevOps Best practices and stay ahead of current and next-gen infrastructure trends - Communicate status and project updates to all stake holders; manage expectations internally and externally - 3+ years of core infrastructure experience as a Systems Administrator or Engineer with subject matter expertise in Linux - Redhat, Centos, etc. - Minimum of 3 years working with Cloud based Services including AWS, EC2, S3 RDS, etc. - Knowledgable of containers and cloud orchestration tools including Docker, Kubernetes, and Openshift - Experienced with Ansible, Puppet, Salt, and passionate about infrastructure automation - Experience with Monitoring tools such as Nagios, Splunk, Zabbix, Solarwinds, etc. - Ability to write complex scripts using shell, bash, python, etc. - Motivated, self-starter who enjoys working in a team-oriented fast-paced environment - Attention to detail is critical - Excellent written and verbal communication skills - Able to multi-task and meet deadlines Life at Noble Markets - Medical, Dental and Vision - Unlimited Vacation - Choice of Macbook Pro or Lenovo Laptops - Frequent Catered Luches - Monthly Happy Hours - Frequent Company & Team Events - Newly Constructed Office in the Heart of NYC - Gym Reimbursement Program
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511122.49/warc/CC-MAIN-20181017090419-20181017111919-00472.warc.gz
CC-MAIN-2018-43
2,462
30
https://tanyajawab.co/beginner-guide-to-buying-bitcoin-safely-on-blockchain-com/
code
► Latest Blockchain Tutorial for 2020 https://youtu.be/27R8–QYtCU ► Blockchain Step-by-Step Guide https://everybithelps.co.uk/blockchain-tutorial-how-to-buy-crypto/ ► Sign-up to Blockchain Exchange: http://bit.ly/BlockchainExchange Blockchain.com is one of the most popular and secure ways to buy your first bitcoin/cryptocurrency. Blockchain allows users to buy Bitcoin, Ethereum, Bitcoin Cash, and Stellar Lumens XLM. In the UK you can buy crypto using your debit card, credit card, or bank transfer. Blockchain is the world’s leading software platform for digital assets. Blockchain is one of the most trusted and fastest-growing crypto companies, with over 38 million wallets, $200B transacted, they also boast to have the lowest fees in the industry. Want to earn $50 FREE Crypto from Blockchain.com? One of the best-known crypto online wallets (and the first crypto wallets that I personally signed up with), Blockchain have partnered with Stellar Development Foundation, giving away 125 million dollars worth of Stellar Lumens, XLM. 📺 Subscribe: http://bit.ly/EveryBitHelpsSub ♥ Louise Elizabeth (Every Bit Helps) ♥ ♦ Coinbase: https://www.coinbase.com/join/59b5989d0306ef02ed231139 ♦ Binance: https://www.binance.com/?ref=11298765 ♦ Blockchain Exchange: http://bit.ly/BlockchainExchange 🔐 ONLINE SECURITY 🔐 ♦ Express VPN: https://www.linkev.com/?a_fid=EveryBitHelps ♦ LastPass: https://lastpass.wo8g.net/7rmeV ♦ Brave Browser: https://brave.com/eve654 ♦ Ledger Nano S: https://www.ledgerwallet.com/r/9b67 ♦ Trezor Wallet: https://shop.trezor.io/product/trezor-model-t?offer_id=15&aff_id=3571 ♦ Website: https://www.EveryBitHelps.co.uk ♦ Facebook: https://www.facebook.com/EveryBitHelps1 ♦ Twitter: https://twitter.com/EveryBitHelps_ #BlockchainTutorial #Blockchain.com #CryptoTips Some of the above links may be affiliate links, so if you click & purchase something, I could receive a small commission at no additional cost to you. I only recommend companies and products I personally use, & any commissions help to pay for content creation. Thank you in advance This is not financial advice and these are simply my own opinions, as such, this should not be treated as explicit financial, trading or otherwise investment advice. I always recommend you do your own research before making any type of investment.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945182.12/warc/CC-MAIN-20230323163125-20230323193125-00239.warc.gz
CC-MAIN-2023-14
2,363
23
https://riddimsaunter.net/print-spooler-concern-on-server-2012-r2/
code
In this stroll through, we use a 64-bit system for sharing the printer. However, we should be certain that we also install a 32-bit driver to support customers coming from an x86 primarily based 32-bit operating system. When you install the total program on the user’s desktop or on a Terminal Server, RDP, or in a Citrix surroundings, the consumer could have entry to all of the features of this system. When they print to PDF, they can see the dialog where all of the PDF settings can be made. For instance, you presumably can arrange a view of all printers managed by a particular print server the place the standing doesn’t equal Ready. Continued use of the location after the effective date of a posted revision evidences acceptance. Please contact us when you have questions or considerations about the Privacy Notice or any objection to any revisions. Please remember that we’re not liable for the privacy practices of such other sites. The service implements the print consumer and print server roles, as may be seen within the diagram below. Anyway, finding the problematic printer might be going to be the only solution here. Watch and see what happens the acronym cem in services marketing stands for __________. because the print server utility might give you a sign of the problematic one when the spooler service stops. The Windows Print Spooler is a fancy ecosystem with a code base courting way back to NT4. Installation and unstallation now helps a number of cases of this system installed on the identical laptop. The Save As dialog now selects the output format based on the file name extension. New gslite.exe distribution to fix efficiency problems on Citrix installations the place the C drive is a mapped consumer drive. Fix for selecting the correct file extension when utilizing the Save As dialog. New job particular runonce files of the shape runonce_documentname.ini. New MacroScriptTimeout setting to control the script timeout when working VB Script macros. Tasks that may require up to 10 steps on particular person computers now may be achieved in 2 or 3 steps on multiple computer systems simultaneously and remotely. On the search field, kind print administration, and select Print Management from the listing. The idea I tested manually, worked awesome, as you’ll be able to see right here. The gist is to use PNPUtil to get the drivers pre-installed as an admin.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662647086.91/warc/CC-MAIN-20220527112418-20220527142418-00396.warc.gz
CC-MAIN-2022-21
2,406
5
https://davesmotleyprojects.com/ham/nanovna/load_dfu/index.html
code
This page provides instructions for upgrading the NanoVNA firmware with a Windows PC using the DfuSe application. DFU files for the (edy555) NanoVNA releases can be found here: DFU files for the (hugen79) NanoVNA-H releases can be found here: If you don't have the DfuSe application, download and install it from ST Microelectronics using the link below, and clicking on the "Get Software" button. After completing all of the on-line questions, ST will send a download link to the email address provided. There wasn't anything unusual about the installation. When it completes, you should get a blank DfuSe window that looks like this: In order to program the VNA it must be connected to a Windows PC using a USB cable, and then placed into the DFU mode. For later NanoVNAs you should be able to enter the DFU mode with the menus using CONFIG > DFU > RESET AND ENTER DFU. If this option is available, it is the preferred method. If the menu options are not available, then the BOOT0 and VDD pins on the PCA must be shorted together when the device is turned on in order to enter DFU mode. When done successfully this should result in a white screen on the NanoVNA. Shortly after the NanoVNA enters DFU mode, it will appear on Windows as a USB device, and it will be automatically recognized by the DfuSe application. If all goes well, the NanoVNA should appear in the list of "Available DFU Devices", and will be automatically selected by default if it is the only attached DFU device. The DfuSe window should look like this: On the DfuSe app select the "Choose..." button, and navigate to where you saved the DFU file. Also check the "Verify after download" checkbox. Afterwards, the DfuSe application should look this: Click the "Upgrade" button, and the upgrade should begin immediately. After everything is complete, you should see a "Verify successful !" confirmation that looks like this. After the DFU upgrade completes successfully, disconnect the NanoVNA, turn it off, wait a few seconds, and turn it back on. Using the menus, check the NanoVNA firmware information using CONFIG > VERSION. The displayed version number should match the version of the DFU file selected. The version display should look like this: That's it. The NanoVNA should now be programmed with the desired firmware version.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663019783.90/warc/CC-MAIN-20220528185151-20220528215151-00426.warc.gz
CC-MAIN-2022-21
2,304
13
https://www.construct.net/en/forum/construct-2/how-do-i-18/quotgo-last-loaded-layoutquot-64632
code
Hi, I've had a good search of the tutorials and manual but not found an answer so excuse the question if its obvious! I'm making a generic "back/exit" button that I want to simply reload the last visited layout. I will include this on many layouts so creating a generic button will help avoid having to put an event in for every specific layout. I know in theory how to get this working manually using global variables, an Array of the Layout names and the Go to Layout (name) action. BUT I thought I'd check if Construct2 has this functionality already in it first, seemed dumb to do all that if there is somewhere a Go to Last Loaded Layout or similar action/event/what have you.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662539101.40/warc/CC-MAIN-20220521112022-20220521142022-00052.warc.gz
CC-MAIN-2022-21
681
3
https://cboard.cprogramming.com/c-programming/110702-help-wont-compile-2.html
code
What is good programming practice is not what works for you. Good programming practice is not subjective. It is several tried-and-true methods for programming, typically figured out by programming experts with far more expertise and knowledge than you. Your reply shows how little you truly know and on such a high horse you sit on. No one is forcing you to use good programming practices, but do you not dare call them unproven rules or your own methods good programming practice, because they are not. And lastly, you arrogance is truly astounding. I have witnessed it in your previous thread. You do not have the experience nor the knowledge to call yourself an expert, so your practices fall on deaf ears.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118743.41/warc/CC-MAIN-20170423031158-00508-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
709
3
https://homework.cpm.org/category/CCI_CT/textbook/int3/chapter/5/lesson/5.1.2/problem/5-32
code
Graph and its inverse on the same set of axes. Label the graph and the inverse function with their equations. is the same as . To graph the inverse, switch the coordinates of some of the points on the graph. For example, will become . © 2022 CPM Educational Program. All rights reserved.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100304.52/warc/CC-MAIN-20231201183432-20231201213432-00149.warc.gz
CC-MAIN-2023-50
288
3
https://discourse.paraview.org/t/how-to-ensure-that-client-server-wrapping-is-properly-initialized/2556
code
Not everything is fully tested yet, and I already see that some plugins are still not working yet, but it looks like a major breakthrough is now reached! So I want to share it here. And it is not the XML file, not any EXCLUDE_WRAP or whatever: the key is in the vtk.module file! Symptom: plugins do compile and build without trouble, also they are loaded - and once they should do their job, they are crashing with that fatal message that “client server wrapping is not initialized”. The only problem is then: after learning about how to successfully write PV plugins, currently mostly from examples (and the one or other friendly hint from experts!) in a rather “top level” way, such a message from the “lowest level” is hard to follow - because there is a long way to go from that top level to the bottom of how things are working. But without that, a solution cannot be found! First of all, turning on the maximum tracking and logging is important: - define an environment variable PARAVIEW_LOG_PIPELINE_VERBOSITY and set it to MAX - start the program with -v=TRACE as command line parameter On top of that, I had to insert a number of vtkWarningMessage() commands into the ParaView code - in order to see what is actually going on in the different functions (and of course recompile Paraview then). This is important because there are thousands of plugins loaded before the own set of plugins is handled - which is far beyond common debugging with a debugger. Basically plugins are first found and “registered”. That basically means: an initialization function is put into a list of plugin initialization functions. If this does not work, the program will complain about “not a proper plugin”, and otherwise it will keep the plugin. Next, I am “loading” the plugins from the main window constructor of my application. For some unknown reason this triggers another round of searching for the shared library file of the plugin. (I did not do further research about this because it worked already long ago for all my plugins, plus the optional PV plugins that I decided to include into my application.) With this, all the plugins are visible in the Plugin manager and marked as “loaded” - which gives the impression of a full success - but this is totally wrong! Only now the famous “client server wrapping” will hit - at the moment that the plugin is first being used for some functionality. At that moment, the vtkSIProxy::CreateVTKObjects() function tries to create an object from one of the classes in the plugin, and for that it tries to find a “new instance function” in a list of such functions - and fails if it does not exist. So the question arises: where does this function come from, and how does it come into that list? The second question is easier to answer than the first: it comes with the “registration” step above: the initialization function, that is registered for every plugin, actually adds these functions - OR NOT! In my specific case I found out that those plugins that did load properly did have such an initialization function (_Init()), but that was empty. Not that the “new instance functions” (ClientServerNewCommand) did not exist for the class - only they were not added withing the Init function! This adding of that function into the _Init() function seems to be named “client server wrapping” in the PV language. But where does it happen? There is actually an external tool for that purpose: vtkWrapClientServer. Now this program takes a “hierarchy” file as input, and somehow processes this into the proper “wrapping” code in the _Init() function - or else just generates an empty dummy. So next question: what is this “hierarchy” file and where does it come from? Looking into it, it looks like it contains some info about required code for the working of a specific class, like the parent class and somehow also many others. This I also did not fully get detangled, but I was lucky that my guess went now towards the vtk.module vile - which has both a DEPENDS and a PRIVATE_DEPENDS section - and that looks like where the key for the “strange” behaviour can be found: - If nothing is in the DEPENDS section, the cmake code will already complain that this is not very likely - because whatever module is there, must depend on something. - Next you will get compile errors if certain #includes are not found. In my case, with all code that was already once built and tested successfully with an earlier version of PV, this always meant: some additional target/module/library has to be added in the vtk.module file. With this, the entire application finally built and started successfully! But - see above. Now so far I put some of the dependencies into the DEPENDS section - if I had the impression that they are “core” for that new module - and others I put into the PRIVATE_DEPENDS section, like if the module is only “using” some functions from another module. And for compilation it looks like there is no really visible difference between the two. So I put more into the PRIVATE_DEPENDS - like I would also put all “internal” stuff into the private section of a C++ class. But that turned out to be completely wrong: THE DIFFERENCE IS WITH THE “CLIENT SERVER WRAPPING”!! So finally the “trick” was: move some more modules/targets from the PRIVATE_DEPENDS to the DEPENDS section. The effect was: the “hierarchy” files became much bigger - and finally the “new instance functions” were also appearing in the _Init() functions - AND THE PLUGINS DID NOT CRASH ANY MORE! I am writing this long story only in order to help others to avoid this very long and tedious way: Of course I left out all the many detours that I also had to try unsuccessfully. So I am now happy if I can save one person from having to repeat this odyssee!
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662577259.70/warc/CC-MAIN-20220524203438-20220524233438-00451.warc.gz
CC-MAIN-2022-21
5,859
23
https://breakingexpress.com/2022/01/22/our-favourite-linux-instructions-to-make-use-of-only-for-enjoyable/
code
In November, we shared the article 7 Linux commands to use just for fun and requested you to inform us what “for fun” Linux command you suggest—and why? Some Opensource.com contributors shared their favorites beneath. cowsay, in fact! fortune, my favourite “hack” was having the motdwhen customers linked be a humorous fortune. sl, a steam locomotive in your terminal. xsnow, one other root XWindow hack, this command places stress-free snowfall over your workspace, with accumulation on the highest of open home windows. - GNOME Easter eggs, in GNOME 2, Alt+F2 (opening the run dialog) and getting into “free the fish” launched Wanda the Fish onto your root window. Wanda would wander round, scurrying off (for some time) if you happen to clicked on her. My day begins with these: Now we will have a espresso 😉 cmatrix , as a result of from time to time you’re feeling such as you’re jacked into the machine. It’s not precisely Linux-specific however it is kinda superior. Xroach was a cool add-on on your window supervisor within the Nineteen Nineties. It was lots of enjoyable with Tab Window Manager (TWM) and F Virtual Window Manager (FVWM) on the time, however I have not used it in years. When you ran Xroach, it added little cockroaches that “lived” underneath your home windows. When you moved a window or closed it, the roaches would scamper to cover underneath one other window or run off the display screen. Just a kind of little methods to make the desktop extra enjoyable. Looks like there is a modern port of Xroach that I’ll should check out someday. I labored as a pc science TA within the late 90s, and we had Sun Sparc workstations in our pc lab. Sometimes college students would stroll away throughout lab time with out locking the display screen. Every occasionally, I might execute xroach &; clear on the terminal after they weren’t wanting. XRoach is an effective one. Cockroaches cover underneath the home windows, and scurry across the display screen after which underneath one other window while you transfer a window. One of my favorites is hollywood. Check it out here. Just run it and begin jamming on the keys, you’ll persuade everybody at Starbucks that you take down the NSA. Jim Hall responded to this one with: That’s superior! It jogs my memory of Hacker Typer—it is a web site as an alternative of a terminal program. Just convey up the positioning, and mash on the keys. It would not matter what you sort, Hacker Typer will spit out what appears to be actual work. 🙂 In response to the enjoyable introduced by Clint Byrum (and Jim Hall’s response): I like each of these! Enjoy this blog post about Hollywood hackers. One of my favorites. What’s your favourite “for fun” Linux command? Please share yours within the feedback beneath.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500044.16/warc/CC-MAIN-20230203055519-20230203085519-00387.warc.gz
CC-MAIN-2023-06
2,817
25
https://www.flashybuy.com/product/Bluetooth-Mini-Keyboard-with-Touchpad/559/
code
Success Formula MINI 2.4GHz 3-color Backlight Wireless Keyboard with Touchpad is a highly unique keyboard with user-friendly design and perfect and seamless performance. It is particularly designed with 3-color backlit, which emits soft and mild light while using the keyboard. Thanks to its humanized design, it brings little hands fatigue to you. The wireless style makes the keyboard easier to use. What's more, it is designed with built-in touchpad for convenient operation. -Space-saving design, top-grade beautiful appearance. -Compact size, humanized design, excellent hand feel. -Delicate appearance, large comfortable palm rest, effectively reduce hand fatigue. -Special blue color LED backlight. -LED backlight to make it convenient for usage at night and it is energy saving. -Built with a touchpad.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250610004.56/warc/CC-MAIN-20200123101110-20200123130110-00431.warc.gz
CC-MAIN-2020-05
810
9
https://community.microfocus.com/collaboration/gw/groupwise/f/gw_discussions/415572/client-crashes-after-upgrade
code
GW client version 184.108.40.20643 is crashing for my users in Citrix. This is on multiple W2003 boxes for various, but not all, users. I've collected the grpwise.rpt and grpwise.dmp files for a few users, but these files are deleted at the end of the Citrix session, so I don't have them all. Windows event logs are mostly generic with only the faulting address sometimes changing - Event ID 1000. Faulting application grpwise.exe version 220.127.116.1143, module unknown, fault address 0x2e90ae01, 0x002eb27f, 0x8a055ef7, etc. Users report the client just closes. Trying to pull more info from them, but it's all I have right now. Anyone else seen any client behavior like this? Where should I go next? I don't find many client related items for GW2014 in the KB. Thanks in advance...
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487608856.6/warc/CC-MAIN-20210613131257-20210613161257-00396.warc.gz
CC-MAIN-2021-25
786
4
http://forum.linuxmce.org/index.php?topic=9285.0;prev_next=prev
code
I was always dead against onboard graphics, but my nVidia ion 330 atom board has completely changed my opinion, I think it's fantastic. 2 gigs of ram, 512 MB dedicated to GPU, job's a good 'un. If you're talking about HD over freeview, forget about it, I have it on good authority that there are no tuners on the market for us in the UK that support HD over freeview. However, freesat is possible for free-to-air HD stuff, and other SD channels that aren't on freeview. I'm looking into this myself as I have an old sky dish on my house from the previous occupants. Your ubuntu box will be seperate. LMCE can scan media on your hard drive I believe. Personally, I like to use the core as backup for my "normal" desktop PC, so all the media is there regardless of whether my desktop is switched on. I have an rsync script on my desktop to "sync" the two. I swapped the fan on my ion atom board for a scythe mini, and it is now barely audible. Worth doing I reckon. Bear in mind this is my MD, not my core. My MDs are in the living area, so I go to great lengths to keep them quiet, especially the one in the bedroom. The core is in a cupboard, so I just chuck any old crappy fans in that (but not too crappy - the core is on 24/7 remember!) Hard disks - if in doubt, go bigger, they are so cheap these days. I have 1TB just for media, which is all mine and my girlfriend's music, movies, series, backup, and my TV recordings, and it's plenty for us. But your needs may differ. I have an 80 GB for the OS. Gyro mice/remotes - I always had a gyro air mouse, for the last 2 year or so, and I finally stopped using it the other day, it was just getting on my tits. Now I have a Nokia N800, and I think it is superb, very swish. Got mine on ebay for about 50 quid, which was actually less than the gyro mouse was 2 years ago. That said, if you have your heart set on a gyro mouse, I have one for sale
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125719.13/warc/CC-MAIN-20170423031205-00505-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,894
6
http://www.techspot.com/community/topics/halo-trial-help.65701/
code
I've been playing Halo Trial Version for a while now and just randomly, all of a sudden, whenever I press the "get list" button nothing happens. It does work on my other pc, which is routed TO THE SAME INTERNET CONNECTION. It makes no sense to me at all. Please can anybody help me???
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988717954.1/warc/CC-MAIN-20161020183837-00537-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
284
1
https://ca.godaddy.com/community/cPanel-Hosting/SSH-quot-This-account-is-currently-not-available-quot-error/td-p/101930
code
SSH "This account is currently not available" error Hi GoDaddy gurus, I'm trying to setup SSH access and login. I enabled SSH, waited the next day, added an FTP User, and I can't seem to keep a successful login. I say keep because it does accept the password and logs me in and then instantly logs me out with the error "This account is currently not available". I know it logs me in because the next time I try to login, it mentions that the last successful login was by my host name at the time I tried to login. And I know it logs me out because of the error message above and I'm returned to my local machine's prompt: ###-Desktop:~ ###$ ssh -oHostKeyAlgorithms=+ssh-dss <ftp_user>@<host_ip> Password: Last login: Wed Apr 11 17:53:31 2018 from <my_local_machine_host_name> This account is currently not available. Connection to <host_ip> closed. I have to use that funky oHost option to specify ssh-dss because I'm using a mac. I also know the password is working because if I put in the wrong password, it again asks for the password. Once I put the right one, I get the above error. I also setup mysql with the same user name as the ftp user name, but I also created a 2nd ftp user name and I see the same error. I also see the same error when logging with the original hosting account & password. I know things to try if this was my linux machine and I can already login, but I don't have any ssh access yet. SCP commands get me the same error (because it's basically using ssh).
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738727.76/warc/CC-MAIN-20200811025355-20200811055355-00186.warc.gz
CC-MAIN-2020-34
1,486
7
http://gis.stackexchange.com/questions/49026/geoprocessing-tool-gui-windows-displaying-blank
code
Using 10.1, both SP1 and no service pack, I'm getting blank windows when I open the GUI dialog for any geoprocessing tool from the ArcToolbox. The Environments window is also blank. Tool help windows open up and display fine. Tools are there, as I can use then via the Python window, but no GUIs. I think the content of these windows is written in html and xml, and I've located those files in my system; they're being written dynamically, I think, to suit whatever tool I tried to open last. Yet the window where I can normally specify tool inputs remains blank, both in ArcMap and ArcCatalog. Started doing this suddenly, after a bunch of custom script tool runs the other night, and a few I had to force-stop mid-way (which never caused this before). Simply restarting my system didn't work. Any insight appreciated, thanks!
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382398/warc/CC-MAIN-20130516092622-00006-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
827
1
https://www.class-central.com/course/coursera-distributed-programming-in-java-8906?utm_source=quartz&utm_medium=web&utm_campaign=new_courses_october
code
Welcome to the Course! Welcome to Distributed Programming in Java! This course is designed as a three-part series and covers a theme or body of knowledge through various video lectures, demonstrations, and coding projects. DISTRIBUTED MAP REDUCE In this module, we will learn about the MapReduce paradigm, and how it can be used to write distributed programs that analyze data represented as key-value pairs. A MapReduce program is defined via user-specified map and reduce functions, and we will learn how to write such programs in the Apache Hadoop and Spark projects. TheMapReduce paradigm can be used to express a wide range of parallel algorithms. One example that we will study is computation of the TermFrequency – Inverse Document Frequency (TF-IDF) statistic used in document mining; this algorithm uses a fixed (non-iterative) number of map and reduce operations. Another MapReduce example that we will study is parallelization of the PageRank algorithm. This algorithm is an example of iterative MapReduce computations, and is also the focus of the mini-project associated with this module. In this module, we will learn about client-server programming, and how distributed Java applications can communicate with each other using sockets. Since communication via sockets occurs at the level of bytes, we will learn how to serialize objects into bytes in the sender process and to deserialize bytes into objects in the receiver process. Sockets and serialization provide the necessary background for theFile Server mini-project associated with this module. We will also learn about Remote Method Invocation (RMI), which extends the notion of method invocation in a sequential program to a distributed programming setting. Likewise, we will learn about multicast sockets,which generalize the standard socket interface to enable a sender to send the same message to a specified set of receivers; this capability can be very useful for a number of applications, including news feeds,video conferencing, and multi-player games. Finally, we will learn about distributed publish-subscribe applications, and how they can be implemented using the Apache Kafka framework. Talking to Two Sigma: Using it in the Field Join Professor Vivek Sarkar as he talks with Two Sigma Managing Director, Jim Ward, and Senior Vice President, Dr. Eric Allen at their downtown Houston, Texas office about the importance of distributed programming. In this module, we will learn how to write distributed applications in the Single Program Multiple Data (SPMD) model, specifically by using the Message Passing Interface (MPI) library. MPI processes can send and receive messages using primitives for point-to-point communication, which are different in structure and semantics from message-passing with sockets. We will also learn about the message ordering and deadlock properties of MPI programs. Non-blocking communications are an interesting extension of point-to-point communications, since they can be used to avoid delays due to blocking and to also avoid deadlock-related errors. Finally, we will study collective communication, which can involve multiple processes in a manner that is more powerful than multicast and publish-subscribe operations. The knowledge of MPI gained in this module will be put to practice in the mini-project associated with this module on implementing a distributed matrix multiplication program in MPI. COMBINING DISTRIBUTION AND MULTITHREADING In this module, we will study the roles of processes and threads as basic building blocks of parallel, concurrent, and distributed Java programs. With this background, we will then learn how to implement multithreaded servers for increased responsiveness in distributed applications written using sockets, and apply this knowledge in the mini-project on implementing a parallel file server using both multithreading and sockets. An analogous approach can also be used to combine MPI and multithreading, so as to improve the performance of distributed MPI applications. Distributed actors serve as yet another example of combining distribution and multithreading. A notable property of the actor model is that the same high-level constructs can be used to communicate among actors running in the same process and among actors in different processes; the difference between the two cases depends on the application configuration, rather the application code. Finally, we will learn about the reactive programming model,and its suitability for implementing distributed service oriented architectures using asynchronous events. Continue Your Journey with the Specialization "Parallel, Concurrent, and Distributed Programming in Java" The next two videos will showcase the importance of learning about Parallel Programming and Concurrent Programming in Java. Professor Vivek Sarkar will speak with industry professionals at Two Sigma about how the topics of our other two courses are utilized in the field.
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948064.80/warc/CC-MAIN-20180426031603-20180426051603-00424.warc.gz
CC-MAIN-2018-17
4,967
12
https://developers.google.com/web/tools/lighthouse/audits/old-flexbox
code
Why the audit is important The old, 2009 specification for Flexbox is deprecated and is 2.3x slower than the latest specification. See Flexbox Layout Isn't Slow to learn more. How to pass the audit Under URLs, Lighthouse lists every instance of display: box that it found on your page's stylesheets. Replace every instance with the new syntax, If a stylesheet is using display: box, then it may be using other deprecated Flexbox properties. In short, every property that begins with box-flex, is deprecated and should be replaced. See CSS Flexbox 2009/2011 Spec Syntax Property Mapping to see exactly how the old properties map to the new ones. How the audit is implemented This section explains how this audit is implemented, so that you can understand how the audit's score is calculated. Lighthouse collects all of the stylesheets used on the page and checks if any of display: box. Lighthouse does not check if the stylesheets use any other deprecated properties.
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320130.7/warc/CC-MAIN-20170623184505-20170623204505-00125.warc.gz
CC-MAIN-2017-26
967
17