url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://www.hawes-side.co.uk/news/2020-02-04-ukulele-in-year-4
|
code
|
4S have now had 4 ukulele session with the music teacher. We have learnt about the Ukulele part and how it works. We know that the strings have different names which make different sounds. We remember this by the mnemonic Greedy Cats Always Eat (notes G,C,A,E).
We have been practicing playing the C and F chord during the sessions.
Today we moved our learning on to move between the two chords (C & F) and can now play a few songs, successfully switching between them.
It is hard, but we are resilient and are enthusiastic in our playing
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570879.37/warc/CC-MAIN-20220809003642-20220809033642-00311.warc.gz
|
CC-MAIN-2022-33
| 538 | 4 |
https://www.rapid7.com/blog/post/2014/01/16/how-to-send-log-data-via-a-proxy-server-using-rsyslog/
|
code
|
Last updated at Mon, 30 Oct 2017 13:35:01 GMT
If you have a large number of servers you may have a requirement to configure proxy servers in various parts of your network to accept messages and then forward them to a centralized logging solution or service. We regularly see this with larger customers where it makes sense to collect logs centrally before sending them on to Logentries for analysis. In some cases this can be a more stringent requirement where parts of your network may not have direct access to the public internet due to security related restrictions. If you find yourself in this situation and are wondering how to go about setting up, this post gives a primer on how to do this using Rsyslog (note most modern linux distributions ship with Rsyslog).
There are 3 main steps that you need to carry out to send data to a logging service via a proxy server as outlined below. Note in Syslog speak this is often referred to as configuring a Syslog relay.
- Step 1: Configure each host to forward logs to a centralized Syslog server
- Step 2: Create the relevant log files in your Logentries account
- Step 3: Forward log data from the centralized server to the logs you created in your Logentries account
Each step is described in more detail below. The instructions assume you already have a Logentries account. However the same instructions can be largely followed for any logging service that accepts Syslog input.
Step 1) Configure your hosts
The following is required to configure each host:
- Create an empty file “/etc/rsyslog.d/logentries.conf”, add the details below, and then save:
PROXY_IP is the IP of the remote proxy server we will set up shortly. Note this will forward all Syslog log data from the host machine to the proxy server.
- To forward data from log files other than standard Syslog log files (e.g.Websphere logs or DB2 logs) you will need to add additional details for each log file you would like to add to the “/etc/rsyslog.d/logentries.conf” file. Below is a sample logentries.conf file that contains the details you need to also forward data from (for example) websphere error and systemout logs.
#variables required for non-syslog log file forwarding – SystemErr.log
#variables required for non-syslog log file forwarding - SystemOut
#Add details for any more non-syslog log files here
#Copy the variables above for each file you want to add
Step 2) Create Log Files in Your Log Entries Account
Next, create logs in the Logentries UI where you would like the log data to be forwarded to. Generally it makes sense to have a 1:1 relationship with logs on your host machines to logs on Logentries.
When setting these up via the Logentries UI, choose to ‘add a log’, then ‘manual configuration’, give the log a name and select ‘Token TCP’.
When you save the settings the log will be created in your Logentries account and will have a TOKEN value associated with it. Note you will need to use the TOKEN values when configuring the proxy server to route data into these logs. For this example I have created the following 3 logs in my Logentries account:
Step 3) Configure your proxy server
On the Proxy server, you will need to edit “/etc/rsyslog.conf” to accept incoming data from your different hosts. To do so uncomment the following two lines:
And update the port number to 10514 as follows:
Next on the same machine, create the file “/etc/rsyslog.d/logentries.conf” and add the following template variables below. Note you will need to create a variable for each log file you create within your Logentries account in step 2. In this example we have created 3 variables as we want to map to 3 logs in the Logentries UI – i.e. the 3 log files from our host that we want to route via the proxy server (websphere’s systemout and systemerr logs as well as any Syslog events).
Each log file you create in Logentries will also have a unique TOKEN value that you will need to fill in below. The TOKEN value is used by Logentries to map the events from each of your different log files on your host to the relevant log in the Logentries UI.
$template Host1SyslogTemplate,"TOKEN %HOSTNAME% %syslogtag%%msg%\n"
$template Host1WebsphereErrorsTemplate,"TOKEN %HOSTNAME% %syslogtag%%msg%\n"
$template Host1WebsphereOutTemplate,"TOKEN %HOSTNAME% %syslogtag%%msg%\n"
After creating the template variables, add the following logic to filter the relevant events from your different host machines and to route these to the correct files within the Logentries UI. Note replace ‘HOST1’ with the name of the host forwarding the logs to the proxy server.
if $hostname == 'HOST1' and $programname == 'websphere-errors' then @@api.logentries.com:10000;Host1WebsphereErrorsTemplate
if $hostname == 'HOST1' and $programname == 'websphere-systemout' then @@api.logentries.com:10000;Host1WebpshereOutTemplate
if $hostname == 'HOST1' then @@api.logentries.com:10000;Host1SyslogTemplate
The logic above sends the different log files from your host in step 1 (e.g. Host 1 – where Host1 is the name of the host you are sending data from to the proxy server) to separate logs in your Logentries account created in step 2. More precisely it sends the standard Syslog logs, and your websphere Systemout and Systemerr logs from Host 1 to different logs in your Logentries account, via a proxy server.
As a final step you will need to restart Syslog on BOTH MACHINES with the following command for these changes to take effect:
sudo service rsyslog restart
And thats it… feel free to get in touch via our support channel if you have any questions, or if you run into any roadblocks getting this set up.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816942.33/warc/CC-MAIN-20240415045222-20240415075222-00595.warc.gz
|
CC-MAIN-2024-18
| 5,653 | 36 |
https://www.theseed.org/wiki/RAST_Tutorial
|
code
|
The RAST Server Overview
The RAST (Rapid Annotation using Subsystem Technology) Server provides high quality genome annotations for prokaryotes across the whole phylogenetic tree. It makes a SEED-quality annotation available as a service with a 48 hour turnaround time. The SEED environment and SEED data structures (most prominently FIGfams) are used to compute the automatic annotations; however data is not added into the SEED automatically. Once annotation is completed, genomes can be downloaded in a variety of formats or viewed online. The genome annotation provided does include a mapping of genes to subsystems and a metabolic reconstruction. Figure 1 provides an overview of the RAST Server and connections to the SEED Viewer.
Getting Started: Registration is required for genome submission and viewing of results. This enables us to contact users once the computation is finished and in case the users intervention is required.
Figure 1. Overview of the RAST Server navigation, features and capabilities.
Upon logging onto the server, users are directed to the “Jobs Overview” page, which as the name suggests, provides a site for job management. Jobs Overview has two main components: starting a new job and reviewing submitted/completed jobs.
Start a new job. The navigation bar (Figure 2) at the top of the page provides a pull down menu for job submission, logout, and review/edit user account information. To start a new job, users should select “Upload Genome” from the navigation bar or the link near the top of the page. The user is required to provide a valid taxonomy id+, the organism’s Genus, species, and strain, as well as a nucleotide sequence file in FASTA format. Optional parameters are suggested, but not required and include genetic code, sequencing method, coverage, number of contigs and average read length. Currently the server supports genome analysis of prokaryotes with genetic codes 4 and 11.
+Taxonomy id’s can be obtained from the NCBI taxonomy browser (http://www.ncbi.nlm.nih.gov/Taxonomy/taxonomyhome.html/). Search by organism name, and the taxonomy id is returned. For example, Escherichia coli K12 has taxonomy id 83333.
Figure 2. Jobs Overview Navigation Bar.
Reviewing submitted/completed jobs
The overall status of genome analysis can be viewed from the main portion of the Jobs Overview page. This contains information regarding a user’s personal jobs and when applicable, jobs of the user’s organization. Figure 3 shows an example account where the individual does not have any personal jobs, but has access to several for their organization. The table shows each job/genome and its status and contains information including job number, name of the user who started the job, genome id (taxonomy_id. internal_id), genome name, and annotation progress.
The table of jobs can be sorted on any column containing textual information. When the user has numerous genomes to select from, they can use the text boxes in the table header to search and refine the list of jobs.
Clicking on the bars for a given job in the annotation progress column directs the user to the “Job Details” page where the detailed job status and access to the genome analysis can be found.
Figure 3. Jobs Overview for a given account.
For a given job, the Job Details page provides the user with information regarding the status of the genome annotation progress, as well as access to the results of the analysis upon completion.
Account and job management links are found in the navigation bar at the top of the Job Details page (Figure 4) includes (1) logout, (2) upload a new genome, (3) link back to the Jobs Overview, and (4) review/edit your account information.
Figure 4. Job Details Navigation Bar.
The Job Details page has three main functions:
1. To provide access to the results of the genome analysis via the SEED Viewer,
2. Export tool that enables the user to download the annotated genome in various formats (GTF, GenBank, GFF3, or EMBL)
3. The status of their genome analysis. Information regarding the status of each major step in the analysis process is reported which includes:
- Genome upload
- Genome id and Name
- Job number
- Name of user who created the job
- Date and time of job submission
- Rapid propagation (protein function annotation)
- Quality check
- Statistics (number of features, warnings, fatal problems)
- Warnings (overlaps)
- Fatal Problems (embedded genes)
- Quality revision (users approval)
- Similarity Computation
- Bidirectional Best Hit Computation (for conserved regions and functional coupling)
- Auto Assignment (to subsystems)
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103035636.10/warc/CC-MAIN-20220625125944-20220625155944-00012.warc.gz
|
CC-MAIN-2022-27
| 4,618 | 34 |
http://ffmpeg.org/pipermail/ffmpeg-user/2011-April/000275.html
|
code
|
> Stream with vlc from the computers. On the server where you mix use > ffmpeg+mplayer to mix them (it worked for me). Thank you. I can not get VLC to work well. It works only sporadically and withvery high latency. Can someone show me a foolproof example with ffmpeg, x11grab and rtsp?
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195527907.70/warc/CC-MAIN-20190722092824-20190722114824-00148.warc.gz
|
CC-MAIN-2019-30
| 286 | 1 |
http://meta.movies.stackexchange.com/users/379/peter-grill
|
code
|
Top Network Posts
- 127Sieve of Eratosthenes in tikz
- 63When not to use \ensuremath for math macro?
- 62Remove Indentation for a Single Paragraph
- 59Tikz: use opacity for fill, yet leave draw (lines) untouched
- 57Absolute Value Symbols
- 50When is it harmful to add percent character at end of lines in a \newcommand, or similar
- 49How can I put real notes in the margin?
- View more network posts →
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-22/segments/1432207928019.82/warc/CC-MAIN-20150521113208-00273-ip-10-180-206-219.ec2.internal.warc.gz
|
CC-MAIN-2015-22
| 405 | 9 |
http://www.scotlandthemovie.com/movies/lhmoidart.html
|
code
|
One of the scenes when Mac and Oldsen travel to Ferness near the beginning of Local Hero was filmed on the A861 between Glenuig and Kinlochmoidart. The loch in the distance is Loch Moidart close to Castle Tioram.
The is just enough space to park a car on the roadside. There is no other parking closeby. As can be seen a lot of trees have grown in the 30 years since the movie was filmed mostly obscuring the view over to Loch Moidart and also making it impossible to get the same viewpoint as used in the movie.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039747024.85/warc/CC-MAIN-20181121032129-20181121054129-00086.warc.gz
|
CC-MAIN-2018-47
| 512 | 2 |
https://gitlab.gnome.org/GNOME/gtk/commit/791ac426d7cdeaee2f0bd201f1d3bfb2a2c0a71b
|
code
|
Commit 791ac426 authored by Committed by Michael Natterer
define __GDK_H_INSIDE__ around including all other headers.
2008-05-28 Michael Natterer <[email protected]> * gdk/gdk.h: define __GDK_H_INSIDE__ around including all other headers. * gdk/gdkenumtypes.h.template * gdk/gdk*.h: add single-include guards that #error out if GTK_DISABLE_SINGLE_INCLUDES is defined and any of these files is included individually. Also removed some redundant includes and did some tiny trailing whitespace removal that's not worth to commit separately. * gdk/gdkprivate.h: include <gdk/gdk.h> instead of individual files. * gdk/win32/gdkwin32.h * gdk/x11/gdkx.h: only include <gdk/gdkprivate.h> and remove all other includes. svn path=/trunk/; revision=20217
Showing with 153 additions and 28 deletions
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027317359.75/warc/CC-MAIN-20190822194105-20190822220105-00299.warc.gz
|
CC-MAIN-2019-35
| 787 | 4 |
https://forums.adobe.com/thread/1464902
|
code
|
I recently downloaded Flash Professional CC to a Windows 7 computer. It functions extremely poorly: most dialog boxes don't work and many of them cause the program to freeze, so it can only be closed with Task Manager.
I called Adobe Tech Support. They emailed me a this link:
However, that link only refers to Flash CS6 and older versions.
I have some related questions:
1 - Is there a version of that link that includes Flash CC? If there is I can't find it by searching.
2 - I went ahead and tried one method the link gave for deleting preferences. It said to hold down CTL + ALT + SHIFT while launching Flash CC. Here's a quote from the link:
I tried to follow this advice this in 2 ways:
A - I held down CTL + ALT + SHIFT while clicking on the Flash CC icon in my status bar. The icon froze and nothing launched. I rebooted.
B - I held down CTL + ALT + SHIFT while double-clicking on the Flash CC shortcut on my desktop. It caused this window to open; it looks like a generic Windows 7 properties window, and I don't see anyway to "delete and reset the preferences to the default" as Adobe instructs.
Does anyone know how to delete Flash CC preferences?
Please delete the following folders from your system and Launch Flash CC. Flash CC will now recreate a fresh preferences.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221209562.5/warc/CC-MAIN-20180814185903-20180814205903-00382.warc.gz
|
CC-MAIN-2018-34
| 1,280 | 11 |
https://en.wikipedia.org/wiki/Lepidodactylus_listeri
|
code
|
Lister's gecko is a brown lizard growing to a snout-vent length (SVL) of 5 cm (2.0 in). It has a broad, pale fawn/grey vertebral stripe which expands to cover the top of the head and matches the colour and pattern of the tail, and a whitish belly and body covered with small, smooth scales.
^Brown WC, Parker F. (1977). Lizards of the genus Lepidodactylus (Gekkonidae) from the Indo-Australian Archipelago and the islands of the Pacific, with descriptions of new species. Proceedings of the Californian Academy of Sciences (4) 41 (8): 253-265.
^Beolens B, Watkins M, Grayson M. (2011). The Eponym Dictionary of Reptiles. Baltimore: Johns Hopkins University Press. xiii + 296 pp. ISBN978-1-4214-0135-5. (Lepidodactylus listeri, p. 159).
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320593.91/warc/CC-MAIN-20170625221343-20170626001343-00403.warc.gz
|
CC-MAIN-2017-26
| 735 | 3 |
https://www.mjr19.org.uk/sw/qemu.html
|
code
|
Michael Rutter's QEMU Notes
The use of virtual machines is widespread. In TCM we started using virtual machines in 2008, and soon had our print server and licence server virtualised, with a reduction in the number of dedicated boxes littering our server room.
We chose to use KVM, the VM system integrated into the Linux kernel. It did all we needed, was free, worked well with Linux hosts and guests (which is all we wanted), and would be updated along with the kernel. We use QEMU with KVM.
We started before libvirt was in widespread use, and have never switched to using it, as it is unclear that it provides functionality which cannot be access by using QEMU directly. It may provide a more friendly and consistent interface, but when one already has a working infrastructure, why change? Its graphics performance may be poorer than some of the alternatives, but we tend to virtualise headless servers.
Paravirtualisation of eth0
(This section assumes that the guest has a single virtual ethernet adapter and uses the tap system to bridge onto the host's physical adapter. It also uses English spellings. Paravirtualise or Paravirtualize? Paravirtualisation or Paravirtualization? It seems to matter to Google, and perhaps other search engines.)
QEMU can emulate an Intel e1000 fairly efficiently. However, it can also offer a much more efficient paravirtualised network device. This is quite easy to experiment with. Indeed, arguably too easy, for even configurations which are incorrect as far as efficiency is concerned still work correctly.
Assuming your guest is running Linux, has a single network
adapter, and does not use persistent device naming for its ethernet
adapters, then switching between the e1000, other hardware which
QEMU can emulate, and the paravirtualised device, needs no changes
at all to the guest. It will automatically detect the ethernet
device when booted, load the correct drivers, call the
eth0, and all will work normally. The change is
to the qemu command line.
One might be used to QEMU networking options of the form
-net nic,macaddr=52:54:00:01:02:03 -net tap
If so, now is the time to switch to the newer syntax, for it seems impossible to obtain the full advantages of paravirtualisation with the above syntax. One needs something like
-device virtio-net-pci,netdev=net0,mac=52:54:00:01:02:03 -netdev type=tap,id=net0,vhost=on
The label net0 one is free to choose, but it must be the same on the device and netdev options, in order to link them correctly in cases where the guest has multiple network devices.
How does one check that this has worked? The guest will appear to have a very basic ethernet adapter, and the e1000 module will no longer be loaded.
guest:~$ ethtool eth0 Settings for eth0: Cannot get wake-on-lan settings: Operation not permitted Link detected: yes
But this would also happen if one had launched QEMU with an option of
-net nic,model=virtio,macaddr=52:54:00:01:02:03 -net tap
which gives negligible (or even negative) performance gains over the e1000. The check needs to be done on the host:
host:~$ ps aux | grep vhost root 5356 0.4 3.1 1496220 382116 ? Sl Mar28 10:25 /usr/bin/qemu-system-x86_64 root 5377 0.0 0.0 0 0 ? S Mar28 0:20 [vhost-5356]
A vhost kernel thread should be seen, with a number after it corresponding to the PID of the qemu process for the VM with virtualised network. The thread should also consume CPU time, though at quite a modest rate, of order 1s per GB of traffic, so this will not be immediately noticeable.
With luck one should also see a significant reduction in CPU use by the VM. For the VM above, which is a webserver most of whose files are imported via NFS, the reduction in CPU use, even after including the vhost thread, seems to be about a factor of three. A more quantitative test of
remote:~$ dd if=/dev/zero bs=1024k count=10240 | rsh guest dd of=/dev/null
gave a CPU time reduction of the qemu process as recorded on the host of just 40%, which is still worthwhile.
(Virtual) CPU Optimisation
If launching qemu with no specific CPU selection, one ends up with a generic x86_64. With QEMU version 2.0.0 and newer, this includes support for the x2apic. With earlier versions of QEMU, explicitly enabling this option is advantageous, particularly if the guest does a lot of I/O (including networking).
This should be done even if the host system does not have an x2apic. Emulating an x2apic for guests is faster than having them use the older form of APIC.
This document was written in 2016, at which time the host machines were using OpenSuSE 13.1, and the guests 13.1 or Leap 42.1.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358074.14/warc/CC-MAIN-20211126224056-20211127014056-00009.warc.gz
|
CC-MAIN-2021-49
| 4,595 | 34 |
https://imperialconflict.com/docs/guide.php
|
code
|
Welcome to the Imperial Conflict guide. We hope that it will help you in your quest for galactic domination.
Here are some recommendations:
This guide is just one of your options to get help with the game. Feel free to also check out the following:
This document is available on GitHub for editing:
Help is much appreciated!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794863972.16/warc/CC-MAIN-20180521082806-20180521102806-00433.warc.gz
|
CC-MAIN-2018-22
| 324 | 5 |
https://forums.macrumors.com/threads/powerbook-g4-powerpc-cd-dvd-drive-not-working.1140772/
|
code
|
I was in the process of doing a complete reinstall on the this machine because of a broken registry. I got the original grey PowerBook G4 Software Install and Restore CD to run and the Mac OS X Tiger to install. When I started to try and reinstall my other programs from scratch on the specific CDs for them, my CD/DVD will run like it is going to boot them a few times, never boots them on the desktop, and then spits them out without me able to use them. I am not positive that the DVD/CD drive didn't stop working after the updates were installed. When I ran Dick Utility on the computer, and tried to verify the disk,this is what it said: Verifying volume HD Checking HFS Plus volume. Checking Extents Overflow file. Checking Catalog file. Checking multi-linked files. Checking Catalog hierarchy. %) Checking Extended Attributes file. Checking volume bitmap. Checking volume information. Volume Header needs minor repair The volume HD needs to be repaired. Error: The underlying task reported failure on exit 1 HFS volume checked Volume needs repair I was recommended to use Disk Warrior to repair this problem. Does anyone else have any suggestions to the best way to get my CD/DVD drive working again?
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824338.6/warc/CC-MAIN-20181213010653-20181213032153-00637.warc.gz
|
CC-MAIN-2018-51
| 1,207 | 1 |
https://www.thecagecomplex.com/windows-server-2008-r2-hosts-file/
|
code
|
admin / August 27, 2019
Audio is not enabled by default on Windows Server 2008 R2, but it is capable of playing sound. We will learn how to enable audio on your server. Prerequisites. Administrative access; Enabling Audio on Windows Server 2008 R2. First, we need to open Services by going to Start>All Programs>Administrative Tools>Services. You can also type.
HostsMan is a freeware application that lets you manage your Hosts file with ease. No Spyware! No Adware! No Viruses! 100% Freeware! Clean & simple. HostsMan is fully compatible with Windows XP SP2,
On collecting the hardware inventory, MAP will then do a compatibility analysis, ensuring that the identified applications are going to work on the targeted operating system (in this case, Windows.
hey, i have a virtualbox with a guest install on it windows 2008 r2 server where i put my web site and i can ping both side, from main to virtual machine, and from mv to host but the problem is when.
Seo Virtual Assistant Philippines Nov 25, 2013. How to hire a virtual assistant remotely to increase productivity and. using workers overseas that ranged from $8-10 an hour in the Philippines to. Personally, I never had a problem finding people to build websites, do SEO, We have a pool of virtual assistants who are content writers, website developers, graphic designers,
Windows Server 2008 R2 is currently available in seven editions: Windows Server 2008 R2 Web;. Fax Server X X X X File Services X 2 X X x 2 X 2 Hyper-V X X X X Network Policy and Access Services X 3 X X. Host + 1 VM Host + 4 VM Unlimited Unlimited Host +.
Windows Server. media or ISO image files, as well as over the network from a network image server. I had no problems installing any of the supported versions of Windows or Linux that I tried.
If you happen to still be running Hyper-V on Windows Server 2008. V host, live migration of virtual machines without the use of failover clustering, Virtual NUMA and storage on SBM 3.0 file shares.
Whether you call it Windows Server. With Server 2008 R2, Hyper-V is now truly ready for prime time, with a number of major enhancements listed below (as well as a few that I’m not allowed to talk.
Free WordPress Hosting With Domain Therefore, WebHostingPad strives to improve wordpress web hosting in India. Offering insight into their free domain offer, the company spokesperson said, "We offer one free domain name registration to. FreeHostia offers free hosting services incl. an industry-best Control Panel & a 1- click. 5 Hosted Domain(s); 250MB Disk Space; 6GB Monthly Traffic. WordPress, PrestaShop, as
The application runs only on Windows Server 2008 R2. No, Windows Server 2008 R2 is not supported in generation 2 virtual machines The sales department in your organization needs to deploy a new web-based contact management application for them.
The introduction of Windows Server 2008 R2. server role in Windows Server 2008 R2. Windows Rights Management Services sets the framework for secured information sharing of data by encrypting.
Jun 23, 2010 · Back Up Specific Files. In Windows Server Backup in Windows Server 2008, you had to back up the entire volume. In Windows Server 2008 R2, you now can include or exclude folders or individual files. You can also exclude files based on the file types with filters. For this purpose, you will see how to modify an existing backup schedule.
SQL Server 2008 and SQL Server 2008 R2 will no longer. and Hadoop Distributed File System for a unified data platform that enables analytics and artificial intelligence (AI) over all data,
› Newbie to windows server 2008 › Modem connection to Windows server 2008 R2 › RDP Issue on Windows Server 2008 R2 Enterpris › Windows Server 2008 CALs & WGA notification › windows server versions product keys › That darn msflxgrd.ocx file › enabling.jpg thumbnail preview
We’re now even setting up Hyper-V R2 hosts and IIS Web Servers as ServerCore. supplies configuration responses, and the Windows Server 2008 R2 Install Windows Wizard copies the files and configures.
Restore the modified WIM Files to the USB Flash Drive Installer: Copy the newly modified install.wim and boot.wim files back to the sources directory of the USB Flash Drive Installer, overwriting the original files. Eject and remove the USB Flash Drive. Install Windows* Server 2008 R2: Insert the modified USB Flash Drive into the target computer.
This afternoon, Microsoft announced that it has finished the development work on Windows Server 2008 R2. The company released gold code. which allows you to move a virtual machine from one physical.
The noisiest new feature in Windows Server 2008 R2 promises to be live virtual machine migration. the first being that it now supports 32 logical CPUs (i.e., cores) on the physical host. Raising.
Pay Per Call Disconnected Numbers Our industry growth rate is about 3% to 5% per year. discussed on this call. Thank you and good bye. This concludes today’s conference call. You may disconnect your lines. Free WordPress Hosting With Domain Therefore, WebHostingPad strives to improve wordpress web hosting in India. Offering insight into their free domain offer, the company spokesperson
Windows Server 2008 là một hệ điều hành máy chủ được sản xuất bởi Microsoft. Nó được phát hành chính thức vào ngày 27 tháng 2 năm 2008. Share Thủ Thuật – Chia sẻ miễn phí không giới hạn. Mã giảm giá Hawk Host. Thủ thuật. Tất cả các Thủ thuật hay Thủ thuật office Thủ.
But there are two groups of people who will want to: enthusiasts that plan to run Server 2008 R2 as their desktop operating system, and administrators of Remote Desktop Session Host. file and.
I recently set up a new Windows Server 2008 R2 64-bit machine in a network which is predominately XP and Server 2003. After a reboot, \servername works A while later, \servername-> "Windows cannot access \servername" \192.168.1.xx works \servername.full.domain works; So, I’ve got work-arounds, but I’d still like to know why short-name resolution is failing.
Mar 25, 2014 · I have a dual-boot machine between Windows 7 (x64) and Windows Server 2008 R2 (x64). I use Server for some development work I do. I have C as the Windows 7 system drive and D as the Windows Server 2008 R2 system drive, but I also have a second 2 TB disk that has all my documents, photos, etc. on it that is "J".
The WSUS is a crucial part of a Windows server. As and when Microsoft launches the updates on its website, WSUS downloads it and distributes it across the network. 1] Users using WSUS 3.0 SP2 on.
WannaCry exploits a vulnerability in the Windows Server Message Block (SMB) protocol on ports 139 and 445 as described in a late June Redmondmag.com report. EternalBlue targeted Windows Server 2008 R2.
Server 2019 R2 Datacenter Download Microsoft has hugely simplified the adoption of Windows Server 2019 with direct in-place upgrade from Windows Server 2016 and Windows Server 2012 R2. Businesses upgrading. feature from Windows. Microsoft on Tuesday released its first service pack for Hyper-V Server 2008 R2, the company’s standalone server virtualization. Software applications run in virtual machines in a datacenter
I have a Windows Server 2008 R2 with native boot inside a VHD. It was running fine with 2 GB of RAM, and I tried to upgrade it to 6 GB. This caused a BSOD, and I haven’t been able to fix in unless I
Jan 16, 2016 · We’ll explain how to install, configure, and troubleshoot a Windows Server 2008 DNS server. Installation: Step 1: Install a DNS server from the Control Panel, follow these steps: Go to Start —> Control Panel —> Administrative Tools —> Server.
Service Pack 1 (SP1) for Windows Server 2008. file, which has been untouched since the time that the snapshot was created. Although I have not seen a direct statement from Microsoft, it seems that.
Install.msi remotely using Powershell. powershell-v2.0,windows-server-2008-r2. As a workaround (the lack of details doesnt help to daignose the problem), you could use the third party tool psexec.exe to run the installer on the remote host.
Windows Service Pack Blocker Tool is a package of a Microsoft-signed executable, a script and an ADM template (for Group Policy environment) that allows Windows XP, Windows Server 2003, Windows Vista, Windows Server 2008, Windows 7 and
branch office located in Detroit. TestKing.com domain controllers run either Microsoft Windows Server 2008 R2 or Microsoft Windows Server 2012 and Miami office client computers run Microsoft Windows 8 whilst Detroit utilizes Microsoft Windows 7. Server 2008 R2 or Microsoft Windows Server 2012 and Miami office client computers run Microsoft Windows 8
Get the skinny on the benefits and drawbacks of BrancheCache and DirectAccess, arguably the crown jewels of the Windows 7 and Windows Server 2008. R2 site. You can monitor BranchCache performance.
The disk must be initialized and formatted with an NTFS file format prior to cluster. and is why only Windows Server 2008 R2 nodes can participate in the cluster. With CSV, any node can host the.
Manual Google Penalty Negative Seo The entire SEO industry experienced a major transformation over. Your pages are not indexed You have server connectivity problems You get a manual penalty from Google If you haven’t already, According to Matt Cutts, over 400,000 manual actions are being initiated every. some bad backlinks to your website or someone has used negative SEO against
Log on to the Windows Server 2008 R2 system with an account with administrator privileges. Click Start, click All Programs, click Administrative Tools, and select Server Manager. In the tree pane, double-click the Storage node, and select Disk Management.
Learn how to use Azure Dedicated Host to deploy your Azure VMs in a dedicated environment for your organization. Windows Virtual Desktop Deliver a virtual desktop experience to any device at cloud scale; Azure SQL Database Managed, intelligent SQL in the cloud.
FILED UNDER : Website Navigation
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573284.48/warc/CC-MAIN-20190918110932-20190918132932-00237.warc.gz
|
CC-MAIN-2019-39
| 10,062 | 40 |
http://apache.sys-con.com/node/3065871
|
code
|
|By Bill Koss||
|April 21, 2014 06:00 AM EDT||
[This post is penned by Plexxi executive Bill Koss]
Two months ago I read an interesting blog post by Greg Ferro titled “Cheap Network Equipment Makes a Better Data Centre.” At Plexxi, I am the person who leads our sales team and I found the post interesting because I think there is a lot of disinformation in the market regarding the cost of procuring networks. Every week it seems I read a report or article on networking margins, port prices, market share, SDN, bare metal, leaf/spine, open source, linux, etc. When I speak to customers, there is an equal amount of confusion and in my view it perpetuates the current state in favor of the incumbents.
As a level set, when a potential client asks: what does Plexxi do? I tell them we build ethernet switches based on merchant silicon; we use Linux for an operating system, we use a photonic inter-connect fabric and distributed controller architecture. Our switches speak ethernet and IP, just like all ethernet switches, but it is the controller and photonic fabric that make our switches different. Together we believe that our technology results in a system that has transformative scale, performance, and efficiency advantages compared to legacy network architectures.
Recently we provided a proposal to a potential client regarding their network. As with Greg Ferro’s project, we provided an all in proposal that included cables, software, transceivers, switches, controllers, accessories, support costs and the fabric interconnect ports. There were two design options based around the size of the interconnect fabric, which most people refer to as the spine or core. I have condensed some of the details for reading ease, but I think this is a transparent description of the proposal regarding (i) the costs of building a Plexxi network and (ii) how it is different with the choice of two different fabric options, much like the blog post from Greg. Here is the summary table of the network design options:
|# 10G Client Ports||$ Per 10G Client Port||Fabric Size||
|Total 1 Year Cost|
In a Plexxi network, we use a controller architecture. Our controller computes efficient photonic forwarding topologies. This type of architecture, often referred to as SDN, provides a number of benefits, but it begins with a fluid pool of capacity within the fabric. The capacity in our photonic fabric can be allocated, reassigned and reconfigured. Without providing a long technical description of how our controller operates, an important concept to understand is we use 100% of the fabric and we do not implement spanning tree or block links. We compute forwarding topologies using multi-flow commodity, graph theory math; that is one of the jobs of Plexxi Control. A Plexxi fabric can be used inside your data center and the use of a photonic fabric means the fabric can be extended to campus and metro area designs. Here are a few points regarding our controller and fabric architecture:
- The photonic fabric is managed as pool of capacity
- Applications and workloads that are important can be assigned fabric capacity
- Capacities can change, evolve and forwarding topologies can be diurnal
- Controller based fabrics are deterministic as opposed to distributed state fabrics that take time to compute state, which may or may not result in an optimal design.
- Controller based fabrics can centrally compute optimal paths and provide fast convergence by pre-computing failure recovery states
The use of a controller with a photonic fabric provides a number of scaling benefits. The most obvious benefit is the linear cost curves in terms of price per client port. The following chart shows the 10G client port cost in scaling from 400 to 3400 ports.
The linearity of the Plexxi architecture in terms of client port cost can also be seen in terms of power and cooling. In a Plexxi architecture, the performance of the network benefits when the controller tries to keep packets in the photonic portion of the network as much as possible, thus limiting silicon switch hops and incurring latency. Uniformed latency and uniformed power consumption per client power are benefits of the Plexxi architecture:
A question we often get is whether a Plexxi network requires a greenfield or can it be deployed in a brownfield. The answer is there are no greenfields. Plexxi networks have been deployed in a number of variations. We have had clients deploy Plexxi in the spine, while leaving the legacy ToR and server connections in place. We have had clients deploy Plexxi as a replacement strategy for the their leaf/spine network, thus collapsing a two tier or three tier network to a single tier. We have had clients deploy Plexxi between data centers providing a single hop, load-balanced fabric between data centers. Traditionally, most Plexxi customers connect our switches to legacy routers and switches using 10G or 40G ports. We have a handful of customers who have extended the Plexxi fabric via DWDM connections to legacy optical transport platforms.
Another question I have been asked is whether or not our photonic fabric is proprietary. The way to think about our photonic fabric is to compare it to the fabric modules found in traditional core and spine switches. What we have done at Plexxi is to take the backplane capacity in spine/core switches found in multi-tier networks and distribute that capacity into each switch. When you add port capacity, you add fabric capacity. Five years ago this type of network design was not possible, only with the advent of the modern controller architecture coupled with low cost, multi-path photonic interconnects has it become possible. The design objective of a Plexxi network is to manage the network as a resource pool that can be correlated with the needs of compute and storage. We believe that networking is entering the era of plenty and that networks built with rich amounts of path diversity are building blocks of the new networks. We believe this because that has been direction of compute and storage. Compute and storage have entered the era of plenty and it is time for the network to enter the era of plenty as well. The era of plenty for networking will be built using a controller architecture because a controller architecture combined with photonics, merchant silicon and Linux, is the best means to deliver the following benefits:
- Simplicity: Single tier photonic network
- High Utilization: Load balanced L2 fabric
- Controller Architecture: Unified view of network fabric
- Uniformed Low Latency: Direct connectivity
- Faster Failure Handling: Pre-computed forward topologies that converge rapidly to target optimum
- Elastic Network Capacity: Large-scale computation and path optimization through Controller enables fluidity of network capacity
- Reduced Cabling: Simplified network element deployment and insertion
[Today's fun fact: The average American/Canadian drinks about 600 sodas a year. Of course, the American version is 72 ounces compared to Canada's 12 ounces.]
"We work in the area of Big Data analytics and Big Data analytics is a very crowded space - you have Hadoop, ETL, warehousing, visualization and there's a lot of effort trying to get these tools to talk to each other," explained Mukund Deshpande, head of the Analytics practice at Accelerite, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York City, NY.
Jul. 2, 2016 01:30 AM EDT Reads: 805
Cloud Expo, Inc. has announced today that Andi Mann returns to 'DevOps at Cloud Expo 2016' as Conference Chair The @DevOpsSummit at Cloud Expo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "DevOps is set to be one of the most profound disruptions to hit IT in decades," said Andi Mann. "It is a natural extension of cloud computing, and I have seen both firsthand and in independent research the fantastic results DevOps delivers. So I am excited t...
Jul. 2, 2016 01:00 AM EDT Reads: 677
Basho Technologies has announced the latest release of Basho Riak TS, version 1.3. Riak TS is an enterprise-grade NoSQL database optimized for Internet of Things (IoT). The open source version enables developers to download the software for free and use it in production as well as make contributions to the code and develop applications around Riak TS. Enhancements to Riak TS make it quick, easy and cost-effective to spin up an instance to test new ideas and build IoT applications. In addition to...
Jul. 1, 2016 08:30 PM EDT Reads: 793
IoT is rapidly changing the way enterprises are using data to improve business decision-making. In order to derive business value, organizations must unlock insights from the data gathered and then act on these. In their session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, and Peter Shashkin, Head of Development Department at EastBanc Technologies, discussed how one organization leveraged IoT, cloud technology and data analysis to improve customer experiences and effi...
Jul. 1, 2016 06:30 PM EDT Reads: 771
Internet of @ThingsExpo has announced today that Chris Matthieu has been named tech chair of Internet of @ThingsExpo 2016 Silicon Valley. The 6thInternet of @ThingsExpo will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Jul. 1, 2016 06:00 PM EDT Reads: 543
Presidio has received the 2015 EMC Partner Services Quality Award from EMC Corporation for achieving outstanding service excellence and customer satisfaction as measured by the EMC Partner Services Quality (PSQ) program. Presidio was also honored as the 2015 EMC Americas Marketing Excellence Partner of the Year and 2015 Mid-Market East Partner of the Year. The EMC PSQ program is a project-specific survey program designed for partners with Service Partner designations to solicit customer feedbac...
Jul. 1, 2016 05:30 PM EDT Reads: 786
The cloud promises new levels of agility and cost-savings for Big Data, data warehousing and analytics. But it’s challenging to understand all the options – from IaaS and PaaS to newer services like HaaS (Hadoop as a Service) and BDaaS (Big Data as a Service). In her session at @BigDataExpo at @ThingsExpo, Hannah Smalltree, a director at Cazena, provided an educational overview of emerging “as-a-service” options for Big Data in the cloud. This is critical background for IT and data profession...
Jul. 1, 2016 05:15 PM EDT Reads: 643
"There's a growing demand from users for things to be faster. When you think about all the transactions or interactions users will have with your product and everything that is between those transactions and interactions - what drives us at Catchpoint Systems is the idea to measure that and to analyze it," explained Leo Vasiliou, Director of Web Performance Engineering at Catchpoint Systems, in this SYS-CON.tv interview at 18th Cloud Expo, held June 7-9, 2016, at the Javits Center in New York Ci...
Jul. 1, 2016 04:15 PM EDT Reads: 249
Ask someone to architect an Internet of Things (IoT) solution and you are guaranteed to see a reference to the cloud. This would lead you to believe that IoT requires the cloud to exist. However, there are many IoT use cases where the cloud is not feasible or desirable. In his session at @ThingsExpo, Dave McCarthy, Director of Products at Bsquare Corporation, will discuss the strategies that exist to extend intelligence directly to IoT devices and sensors, freeing them from the constraints of ...
Jul. 1, 2016 03:15 PM EDT Reads: 319
Connected devices and the industrial internet are growing exponentially every year with Cisco expecting 50 billion devices to be in operation by 2020. In this period of growth, location-based insights are becoming invaluable to many businesses as they adopt new connected technologies. Knowing when and where these devices connect from is critical for a number of scenarios in supply chain management, disaster management, emergency response, M2M, location marketing and more. In his session at @Th...
Jul. 1, 2016 02:00 PM EDT Reads: 1,426
Extracting business value from Internet of Things (IoT) data doesn’t happen overnight. There are several requirements that must be satisfied, including IoT device enablement, data analysis, real-time detection of complex events and automated orchestration of actions. Unfortunately, too many companies fall short in achieving their business goals by implementing incomplete solutions or not focusing on tangible use cases. In his general session at @ThingsExpo, Dave McCarthy, Director of Products...
Jul. 1, 2016 01:15 PM EDT Reads: 349
There are several IoTs: the Industrial Internet, Consumer Wearables, Wearables and Healthcare, Supply Chains, and the movement toward Smart Grids, Cities, Regions, and Nations. There are competing communications standards every step of the way, a bewildering array of sensors and devices, and an entire world of competing data analytics platforms. To some this appears to be chaos. In this power panel at @ThingsExpo, moderated by Conference Chair Roger Strukhoff, Bradley Holt, Developer Advocate a...
Jul. 1, 2016 01:00 PM EDT Reads: 1,051
The Internet of Things will challenge the status quo of how IT and development organizations operate. Or will it? Certainly the fog layer of IoT requires special insights about data ontology, security and transactional integrity. But the developmental challenges are the same: People, Process and Platform and how we integrate our thinking to solve complicated problems. In his session at 19th Cloud Expo, Craig Sproule, CEO of Metavine, will demonstrate how to move beyond today's coding paradigm ...
Jul. 1, 2016 01:00 PM EDT Reads: 705
Apixio Inc. has raised $19.3 million in Series D venture capital funding led by SSM Partners with participation from First Analysis, Bain Capital Ventures and Apixio’s largest angel investor. Apixio will dedicate the proceeds toward advancing and scaling products powered by its cognitive computing platform, further enabling insights for optimal patient care. The Series D funding comes as Apixio experiences strong momentum and increasing demand for its HCC Profiler solution, which mines unstruc...
Jul. 1, 2016 12:30 PM EDT Reads: 689
SYS-CON Events has announced today that Roger Strukhoff has been named conference chair of Cloud Expo and @ThingsExpo 2016 Silicon Valley. The 19th Cloud Expo and 6th @ThingsExpo will take place on November 1-3, 2016, at the Santa Clara Convention Center in Santa Clara, CA. "The Internet of Things brings trillions of dollars of opportunity to developers and enterprise IT, no matter how you measure it," stated Roger Strukhoff. "More importantly, it leverages the power of devices and the Interne...
Jul. 1, 2016 12:00 PM EDT Reads: 661
In addition to all the benefits, IoT is also bringing new kind of customer experience challenges - cars that unlock themselves, thermostats turning houses into saunas and baby video monitors broadcasting over the internet. This list can only increase because while IoT services should be intuitive and simple to use, the delivery ecosystem is a myriad of potential problems as IoT explodes complexity. So finding a performance issue is like finding the proverbial needle in the haystack.
Jul. 1, 2016 10:45 AM EDT Reads: 579
Machine Learning helps make complex systems more efficient. By applying advanced Machine Learning techniques such as Cognitive Fingerprinting, wind project operators can utilize these tools to learn from collected data, detect regular patterns, and optimize their own operations. In his session at 18th Cloud Expo, Stuart Gillen, Director of Business Development at SparkCognition, discussed how research has demonstrated the value of Machine Learning in delivering next generation analytics to imp...
Jul. 1, 2016 10:30 AM EDT Reads: 1,110
Whether your IoT service is connecting cars, homes, appliances, wearable, cameras or other devices, one question hangs in the balance – how do you actually make money from this service? The ability to turn your IoT service into profit requires the ability to create a monetization strategy that is flexible, scalable and working for you in real-time. It must be a transparent, smoothly implemented strategy that all stakeholders – from customers to the board – will be able to understand and comprehe...
Jul. 1, 2016 10:00 AM EDT Reads: 535
The cloud market growth today is largely in public clouds. While there is a lot of spend in IT departments in virtualization, these aren’t yet translating into a true “cloud” experience within the enterprise. What is stopping the growth of the “private cloud” market? In his general session at 18th Cloud Expo, Nara Rajagopalan, CEO of Accelerite, explored the challenges in deploying, managing, and getting adoption for a private cloud within an enterprise. What are the key differences between wh...
Jul. 1, 2016 09:30 AM EDT Reads: 1,205
The IoT is changing the way enterprises conduct business. In his session at @ThingsExpo, Eric Hoffman, Vice President at EastBanc Technologies, discussed how businesses can gain an edge over competitors by empowering consumers to take control through IoT. He cited examples such as a Washington, D.C.-based sports club that leveraged IoT and the cloud to develop a comprehensive booking system. He also highlighted how IoT can revitalize and restore outdated business models, making them profitable ...
Jul. 1, 2016 09:00 AM EDT Reads: 705
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783408828.55/warc/CC-MAIN-20160624155008-00124-ip-10-164-35-72.ec2.internal.warc.gz
|
CC-MAIN-2016-26
| 17,528 | 66 |
https://activewidgets.com/datagrid.12481/forum-search.html
|
code
|
When I search the forum, I seem to get more results the more search terms I put in? Is it just me or is it an OR?
How can I search the forum Google-style, i.e. with AND semantics?
I'm looking for an example of the http request, when I search for "http request example" I get more results than for "http request".
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988850.21/warc/CC-MAIN-20210508061546-20210508091546-00039.warc.gz
|
CC-MAIN-2021-21
| 312 | 3 |
https://kleshko.info/2022/04/28/autocad-grading-tutorial/
|
code
|
Autocad Grading Tutorial. You can use the pedit command and yes, it does work for 3d polylines (at least in 2018) select the pline and move along the vertices to the start of the section to be straighten, enter s (straighten) and then next to move to the next vertice, If i can somehow lose th.
If i can somehow lose th. Ad join millions of learners from around the world already learning on udemy. The following tutorial sets are included with autocad civil 3d 2018:
Learn The Basics About Creating And Working With.
Ad join top engg platform. Can i remove or hide the border from a pdf underlay? If i can somehow lose th.
While Putting Several Utility Details On One Sheet, The Ocd Grid Mentality Takes Over, But Getting Them To Line Up Without Their Borders Requires A Viewport For Each One Which Takes Time.
Get started for as little as $59. Learn how to work with coordinate geometry (cogo) points, which are the basis for modeling land surfaces. Projects, job assistance & dedicated technical support.
You Can Use The Pedit Command And Yes, It Does Work For 3D Polylines (At Least In 2018) Select The Pline And Move Along The Vertices To The Start Of The Section To Be Straighten, Enter S (Straighten) And Then Next To Move To The Next Vertice,
The following tutorial sets are included with autocad civil 3d 2018: Learn about the application workspace and some important design tools and tasks. Ad learn how to use autocad online.
I Can't Even Seem To Explode It.
Ad join millions of learners from around the world already learning on udemy.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499654.54/warc/CC-MAIN-20230128184907-20230128214907-00451.warc.gz
|
CC-MAIN-2023-06
| 1,547 | 10 |
https://2410.lv/en/projects/eurobrokers/
|
code
|
Corporate website for customs broker comapny. System with a personal account for the employees, with document generation system.
- The project was implemented from scratch;
- User account design;
- A lot of functions for employees in his account;
- Data processing logic;
- Mobile version of the website;
- The concept of a call back in one click.
Website designed in the Flat Design style, so the displayed elements are flat. Pages show to the user the most important information.
Page is divided into sections, each of which responds to a particular question of the potential client. Every block is visualized by visual image.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585653.49/warc/CC-MAIN-20211023064718-20211023094718-00393.warc.gz
|
CC-MAIN-2021-43
| 628 | 9 |
https://raspberrypi.stackexchange.com/tags/audio/hot
|
code
|
The pi has no analog audio, and only digital audio out. I have also seen at least one pi hat that can add analog audio, but it was quite expensive. Cheap USB sound cards are available (with wildly varying quality) and may be able to do this task. Most of them have TRS plugs with separate plugs for line in and speaker out rather than the TRRS plugs you ...
The Raspberrypi has NO microphone input (or ANY analog capabilities).
If you want to do this on a Pi you will need some kind of audio module. There are a number available (most costing more than a Pi).
While it would be possible, the Pi is a poor choice for such a project.
Check out the PulseAudio Troubleshooting page in Arch Wiki.
What helped me was switching to interrupt-based scheduling, by editing the following line in /etc/pulse/default.pa:
I added tsched=0 to it:
load-module module-udev-detect tsched=0
Interrupt-based scheduler can be further tweaked by editing /etc/pulse/daemon.conf. ...
Depending on what you are actually trying to do, you may not need an audio device. If you end up dumping the audio stream in a file and then run some calculation on it, you might as well use a data logger connected to a microphone. Commercial data loggers can easily reach 1MHz sampling rate and typically have more than two channels. Such devices also start ...
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363134.25/warc/CC-MAIN-20211205005314-20211205035314-00298.warc.gz
|
CC-MAIN-2021-49
| 1,322 | 10 |
https://climate-cryosphere.org/polar-cordex/about/
|
code
|
Polar-CORDEX (Coordinated Regional Downscaling Experiment – Arctic and Antarctic Domains) is part of the international CORDEX initiative.
CORDEX is a WCRP-sponsored program to organize an international coordinated framework to produce an improved generation of regional climate change projections for input into impact and adaptation studies. The Polar CORDEX activities are coordinated through CliC.
- John Cassano, University of Colorado, USA
- Annette Rinke, Alfred Wegener Institute, Germany
- Andrew Orr, British Antarctic Survey, UK
- Christoph Kittel, Université de Grenoble-Alpes, France
To help facilitate communication between people interested in regional downscaling of climate models in the polar regions, we have created an email list for anyone to join. It is meant to be a a discussion platform to share ideas, progress updates, ask questions, and more.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474808.39/warc/CC-MAIN-20240229103115-20240229133115-00446.warc.gz
|
CC-MAIN-2024-10
| 872 | 7 |
http://www.legacy.com/news/celebrity-deaths/notable-deaths/article/terence-bayler-1930-2016
|
code
|
Terence Bayler (1930 - 2016)
By: Legacy Staff
1 year ago
Terence Bayler, a "Monty Python" regular who also played the Bloody Baron in "Harry Potter and the Sorcerer's Stone," died Aug. 2, according to multiple news sources. He was 86.
Born Jan. 24, 1930, in Wanganui, New Zealand, Bayler broke into acting in his home country but spent most of his career in England, performing onstage as well as on TV and in movies in several popular British franchises. Among the earliest was "Doctor Who" – Bayler played two separate characters in 1966 and 1969 episodes of the science fiction classic.
A weighty role followed in 1971 when he played Macduff in Roman Polanski's adaptation of William Shakespeare's "Macbeth." Polanski was committed enough to securing Bayler for the role that he changed the shooting schedule to accommodate another project Bayler was involved in. Among the notable moments in production was an injury Bayler received above his eye in a sword fight with Jon Finch as Macbeth, for which he needed stitches.
Bayler first became one of the "Monty Python" team's go-to auxiliary players when he appeared in Eric Idle's 1975-76 BBC sketch show, "Rutland Weekend Television." He played a variety of characters including the presenter of "Rutland Showtime."
Out of "Rutland Weekend Television" grew the 1978 cult-classic Beatles-parody mockumentary, "The Rutles: All You Need Is Cash." Bayler joined the cast as Leggy Mountbatten, the band's manager and a sendup of real-life Beatles manager Brian Epstein. In a remembrance upon hearing of Bayler's death, Idle specifically noted Bayler's performance in "The Rutles," calling his character "legendary Leggy!"
1979 saw Bayler in the Python film "The Life of Brian," in which he played Mr. Gregory and was responsible for two of the movie's most memorable lines. In a scene when a crowd is worshipping Brian and shouting, "We're all individuals," Bayler's character piped up, "I'm not." And in the film's crucifixion scene, as many convicts claim to be Brian – "I'm Brian! I'm Brian!" – Bayler delivered a laugh with the ad-libbed line, "I'm Brian, and so's my wife!"
Bayler would work with Python alum Terry Gilliam in two films, "Time Bandits" (1981) and "Brazil" (1985). Other notable films include "The Remains of the Day" (1993) and "Chemical Wedding" (2008). In 2001, he was part of the cast of the first "Harry Potter" film adaptation, playing the Bloody Baron, house ghost of Slytherin.
Bayler was twice married and is survived by Valerie, his second wife, as well as by two children.
We invite you to share condolences for Terence Bayler in our Guest Book.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676594675.66/warc/CC-MAIN-20180722233159-20180723013159-00530.warc.gz
|
CC-MAIN-2018-30
| 2,631 | 12 |
https://aboutus.com/Topsoil
|
code
|
Topsoil is a new tool that will allow you to take your old static webpages and transform them into a dynamic, informationally rooted website. If your website were a tree and you were the gardener, topsoil would be the rich loam that you could depend on to keep your tree flourishing and connected to the growing web.
The idea of a webmaster is obsolete. Webmastered sites are like vases of cut flowers: the only way to keep them fresh is to continually buy more flowers. What is the point of paying someone for flowers you can grow with less effort yourself?
Imagine instead a community garden. The joy of gardening is getting your hands dirty, working with the earth to create new life within the world that you live in. The topsoil gives you a rich base for your site to grow in, and the community provides the tools and helping hands you need to care for the plants that you love.
Unpacking the Metaphor
The idea behind topsoil is that there is grass and there are trees. Grass refers to the AboutUs commons, i.e. stuff that belongs to everyone. Trees, on the other hand, are external websites that AboutUs hosts in a special way. Users can have their websites slurped in by AboutUs so that it gets wiki-ized. A big edit button appears on every hosted page so that the user can easily edit pages the wiki way. Also, the AboutUs commons becomes available under the user's domain name and the user's branding and styling can be applied to the commons so that the look stays coherent.
- Trees (the Canopy) are websites that target a specific audience ... external websites that AboutUs hosts in a special way
- Signal to Noise ... Filter Recent Changes
- Branding ... your own url, your own skin
- Easy linking with the commons
- Grass and shrubs (the Groundcover) is the AboutUs commons ... the shared content layer
- Topsoil is the application that hosts the Canopy and Groundcover content
- A network of Bedrock servers and web browsers provide the computing platform that Topsoil runs on top of
- ElectricSheep ... wander around harvesting bits to compost
- GreenThumb ... a browser extension and Bedrock proxy that adds a user's computer into the Bedrock network
- WeNameInitiative a wiki, where (nearly) each page is accessable by a domain-name to be developed, using shared definition, action and multimedia pages. This wiki is served by a domain-registrar, such that domains can be bought and sold there. fridemar 17:00, 11 March 2008 (PDT)
Topsoil is a distributed collaboration application that runs on top of a network of Bedrock servers and web browsers.
The Topsoil Toolshed includes the following collaborative editing tools
- Spade the WYSIWYG page editor with easy linking and transclusion capabilities for collaborative document creation and WidgetTransclusion
- Kaltura movie editor
- Clippers SVG figure editor for collaborative drawing
- Plan the migration
- Linking and create page fully working
- Crawling ... ruby webspider
- Formatting buttons working
- Double click or edit button on transclusions
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107878921.41/warc/CC-MAIN-20201022053410-20201022083410-00099.warc.gz
|
CC-MAIN-2020-45
| 3,022 | 25 |
https://academy.mindlinkresources.com/welcome-to-the-mindlink-academy/
|
code
|
The Mindlink Academy is here to provide training for everyone involved with language access.
This is the go-to site for learning to use the language access collaboration tool linguistlink.net. However, you can also find other valuable training to help support all aspects of language access.
Here are some articles that might help you work with us:
What You Need to Know Working with Mindlink
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476409.38/warc/CC-MAIN-20240304002142-20240304032142-00822.warc.gz
|
CC-MAIN-2024-10
| 392 | 4 |
http://www.linuxquestions.org/questions/linux-newbie-8/hello-world-730577/
|
code
|
I'm new to the forums so I thought I'd say hello. My rig is a W7-RC/Ubuntu 9.04 dual boot with the GrUB in charge. I like volleyball, ballroom dancing, and base-16 numbers. I own two companies, neither of which are making any money right now, which explains why I'm up at 2:35AM making forum posts. I studied CS, Math, and IT in school. I love new technology, but some of the things that Microsoft does makes me nuts. I haven't owned a TV since I gave it up for my new year's resolution in 2000.
See you around the forums!
Last edited by tangoking; 06-04-2009 at 01:40 AM.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123632.58/warc/CC-MAIN-20170423031203-00513-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 572 | 3 |
https://jsesh.qenherkhopeshef.org/releases/release_2_5beta
|
code
|
This version contains minor technical fixes:
- cartouches width works correctly
- encapsulated postscript export
And lots of new signs by S. Thomas: complete A, E and F families.
Easy access to the glyphs SVG, for those who need new signs (see http://jsesh.qenherkhopeshef.org/fr/tutorials/glyphs2)
Sorry, this version is no longer available.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473598.4/warc/CC-MAIN-20240221234056-20240222024056-00077.warc.gz
|
CC-MAIN-2024-10
| 342 | 6 |
https://windowsforum.com/threads/please-help-me.220057/
|
code
|
Sounds like your Windows install is corrupt. You can try running one or more of the following commands to attempt a repair from an elevated command prompt
chkdsk /f /r t then press Y to run it at the next reboot and reboot
DISM /Online /Cleanup-Image /RestoreHealth
If neither of those resolves the issue you can do a re-install over the existing install, you will just need to download the ISO and create a bootable media
If that doesn't work, then you are looking at a clean install which will wipe out everything, so if you have data be sure to back it up.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863518.39/warc/CC-MAIN-20180620104904-20180620124904-00244.warc.gz
|
CC-MAIN-2018-26
| 559 | 5 |
https://navyaa23sharma.medium.com/network-penetration-testing-pre-connection-attacks-44a4c404bd7?readmore=1&source=---------0----------------------------
|
code
|
Nowadays whether it be a computer, a server , a company or even a website everything is connected to a network. So understanding how networks work and what could be the potential threats or vulnerabilities to a network is very important.
What is a network?
A network is a group of two or more devices that are connected to each other to share the data or share the resource. A network contains a number of different computer system that is connected by a physical or wireless connection like server or router. This router has direct access to the internet. The device can only connect to the internet through the router or access point.
Suppose the client or device connected to the network through Wi-Fi or Ethernet. If the client opens the browser and types google.com, then your computer will send a request to the router for asking google.com. The router will go to the internet and request google.com. The router will receive google.com and forward that response to the computer. Now the client can see google.com on the browser as a result.
What is Network penetration testing?
Penetration testing (or ethical hacking) is a method used to perform security testing on a network system used by a business or organizations. Pen tests involve a variety of methodologies designed to explore a network to identify potential vulnerabilities and test to ensure the vulnerabilities are real.
A pen test involves methods used to perform legal exploits on a network to prove that a security issue actually exists. A vulnerability assessment refers to the process of evaluating network systems and the services they provide for potential security problems. The main purpose of the pen test is to improve network security and provide protection for the entire network and connected devices against future attacks.
Network penetration testing is divided into 3 subsections -
- Pre-connection Attacks — Pre-connection attack is the first part of the network penetration testing. To perform this attack, we will look at the fundamentals like how to show all the networks around us, how to find the details of all the connected devices to a particular network.
- Gaining Access- Gaining access attack is the second part of the network penetration testing. To perform this attack, we will connect to the network. This will allow us to launch more powerful attacks and get more accurate information. If a network doesn’t use encryption, we can just connect to it and sniff out unencrypted data. If the network uses encryption, we can’t get anywhere unless we decrypt it. So, we will learn how to break that encryption and how to gain access to the networks whether they use WEP/WPA/WPA2.
- Post-connection attacks- Post-connection attack is the third part of the network penetration testing. These are the attacks that we can do after connecting to the network when we break through the network.
Pre-connection attack is the first part of the network penetration testing. To perform this attack, we will look at the fundamentals like how to show all the networks around us, how to find the details of all the connected devices to a particular network. Once we know about the network and connected devices to it, we can disconnect any device without knowing the password of that device.
Lets do some practical with some of the network penetration testing tools to perform pre-connection attacks-
Tools and devices we will be using-
- A wireless interface ( A wifi adaptor)- in monitor mode
- airodump-ng - to list all the network around us and display useful information about them.
- aireplay-ng - to perform de-authentication attacks
- Kali Linux installed
Firstly connect the wireless interface you are using to your computer.
using “ifconfig” command I listed all the network interfaces connected to my system. The one name “wlan0” is my external wireless interface
- Packet sniffing attack
Before starting the sniffing attack, we need to ensure to things, one that we need to change the MAC address of our wireless interface, second we need to change the mode of the wireless interface to “monitor mode”. The address written next to ether is the MAC address of my “wlan0” interface.
What is MAC address?
Each network card has a physical static address assigned by the card manufacturer called MAC address. This address is used between devices to identify each other and to transfer packets to the right place. Each packet has a source MAC and a destination MAC.
Why we need to change the MAC address?
To Increase anonymity, Impersonate other devices, Bypass filters.
Changing the MAC address of your wireless interface
My MAC address is changed now.
Changing the default mode to monitor mode
This step is used to put your wireless card into Monitor mode. In Monitor mode, your card can listen to every packets that’s around us. By default, the mode of wireless devices is set to “Managed” that means our wireless device will only capture packets that have our device’s MAC address as the destination MAC. It will only capture packets that are actually directly to my Kali machine.
But we want to capture all the packets that are within our range even if the destination MAC is not our MAC or even without knowing the password of the target device. To do this, we need to set the mode as Monitor mode. This will be helpful to perform the sniffing attack.
We can use iwconfig to see the wireless interfaces.
Before changing the mode -
It can be seen by default the mode is “Managed”. Now changing to “Monitor” mode
Now, we have switched to the monitor mode.
About the packet sniffing tool — airodump-ng
airodump-ng is used to list all the network around us and display useful information about them. It is a packet sniffer, so it is basically designed to capture all the packets around us while we are in Monitor mode. We can run it against all of the networks around us and collect useful information like the mac address, channel name, encryption type, number of clients connected to the network and then start targeting to the target network. We can also run it against certain AP(access point) so that we only capture packets from a certain Wi-Fi network.
BSSID shows the MAC address of the target network
PWR shows the signal strength of the network. Higher the number has better signal
Beacons are the frames send by the network in order to broadcast its existence
#Data, shows the number of data packets or the number of data frames
#/s shows the number of data packets that we collect in the past 10 seconds
CH shows the channel on which the network works on
ENC shows the encryption used by the network. It can be WEP, OPN, WPA, WPA2
CIPHER shows the cipher used in the network
AUTH shows the authentication used on the network
ESSID shows the name of the network
Currently, we are running airodump-ng on all the networks around us. Now we are going to target the network Error404 whose BSSID is A8:E7:05:4F:27:6A. We are going to sniff on that network only. Once we have a network to the target, it’s useful to run airodump-ng on that network only, instead of running it on all the networks around us.
- — bssid A8:E7:05:4F:27:6A is the access point MAC address. It is used to eliminate extraneous traffic.
- — channel 1 is the channel for airodump-ng to snif on.
- — write sniffdata is used to store all the data in a file named as sniffdata. It is not mandatory, you can skip this part.
- wlan0 is the interface name in Monitor mode.
After execution of this command, the following devices will be shown:
- BSSID of all the devices is same because devices are connected to the same network
- STATION shows the number of devices that are connected to this network
- PWR shows the power strength of each of the devices
- Rate shows the speed
- Lost shows the amount of data loss
- Frames show the number of frames that we have captured
Now, we have successfully sniffed all the packets and data passing through our target network which is available in the file on which we stored the sniffed packets. That file will later be used to perform attacks to gain access to a network.
2. De-authentication Attacks
These attacks are very useful. These attacks allow us to disconnect any device from any network that is within our range even if the network has encryption or uses a key.
In deauthentication attack, we are going to pretend to be client and send a deauthentication packet to the router by changing our MAC address to the MAC address of the client and tell the router that we want to disconnect from you. At the same time, we are going to pretend to be router by changing our MAC address to the router’s MAC address until the client that we are requesting to be disconnected. After this, the connection will be lost. Through this process, we can disconnect or deauthenticate any client from any network.
To do this, we will use a tool called aireplay-ng.
First of all, we will run airodump-ng on the target network, because we want to see which clients or devices are connected to it. This time, we will not need the — write option, so we are just going to remove it. After completion the run process of airodump-ng, we are going to disconnect the my device with STATION 48:A4:72:33:E3:83 using the airoplay-ng.
- -deauth is used to tell airplay-ng that we want to run a deauthentication attack and assign 100000 which is the number of packets so that it keeps sending a deauthentication packets to both the router and client and keep the client disconnected.
- -a is used to specify the MAC address of the router. A8:E7:05:4F:27:6A is the target access point.
- -c specifies the MAC address of the client. 48:A4:72:33:E3:83 is client’s MAC address.
- wlan0 is the wireless adaptor in Monitor mode.
After executing this command, my device whose STATION is 48:A4:72:33:E3:83 , lost the internet connection. We can only connect to the network again when we quit this executing command by pressing Ctrl + C.
This was about getting some experience with pre-connection network penetration attacks, in the upcoming part-2 blog, I will be talking about Gaining access attack is the second part of the network penetration testing.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038073437.35/warc/CC-MAIN-20210413152520-20210413182520-00383.warc.gz
|
CC-MAIN-2021-17
| 10,179 | 71 |
http://nickyholender.com/scala-seminterrata-bekasi-2022/
|
code
|
Scala Seminterrata bekasi 2022. Piscina fuori terra seminterrata con rivestimento in wpc , ingombro totale cm 780x330x135h. Piscina fuori terra misura ingombro 610x330x130h compreso di scala da 80 cm la piscina è a.
It allows you to safely store, send. A cool thing about scala sets — and some other scala collections — is that you can easily determine the union, intersection, and difference between two sets. The scala programming language has 50 repositories available.
Mine scala on your pc and android smart devices.
Assuming this is your first time creating a scala project with intellij, you'll need to install a scala sdk. The following examples demonstrate how. We'll begin with the core language features such as values, variables. Adding or by adding a method articles related two way.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585209.43/warc/CC-MAIN-20211018190451-20211018220451-00712.warc.gz
|
CC-MAIN-2021-43
| 801 | 4 |
https://techybuzzz.com/what-is-the-invertible-matrix/
|
code
|
Table of Contents
Let us first know what a Matrix is before discussing the invertible matrix. A matrix in Mathematics is defined as the arrangement of numbers in rows and columns in a rectangular way. For example, the matrix with 2 rows and 3 columns is referred to as two by three matrix or 2 3 matrices.
An mn matrix X is known as an invertible matrix if only there exist an mn Y matrix such that:
XY = YX = Iₙ
Here Iₙ is known as identity matrix. The matrix Y is known as the inverse matrix of X.
Inverse Matrix Application
- Inverse matrix is widely used in the different fields throughout linear algebra including similar matrices, diagonalizable matrices, and also used in the linear transformation that includes matrices.
- An invertible matrix is often used to encrypt or decrypt message codes.
- An invertible matrix is also used to explore electronic circuits, quantum mechanics, and optics.
How Does Inverse Matrix Works?
The process of determining matrix inverse is known as invertible matrices. It should be considered that all matrices are not invertible. For a matrix to be invertible, it should be multiplied by its inverse. For example, there is no such number exists that multiplies with the number 0 and obtains the value 1. There, the digit 0 has no multiplicative inverse. Also, the matrices that have a different number of rows and columns have no multiplicative inverse.
Multiplication of Matrix
As we all know matrix is an arrangement of numbers:
Consider the matrix with two 2 rows and 3 columns.
Multiplication of a 2 3 matrix by a single number, for example, “3” is quite easy.
In this case, “3” is known as a scalar. Hence, this type of matrix is known as scalar multiplication.
Multiplication of Matrix by Another Matrix
Multiplication of a matrix by another matrix, we need to do a dot product of both columns. In dot product, we multiply the rows of the first matrix with the column of the second matrix and then sum them up.
Rules For Multiplication of Matrix
- The number of columns of the first matrix must be equal to the number of rows of the second matrix.
- And the result obtained after multiplying the two matrices will have the same number of rows as the first matrix and the same number of columns as the second matrix.
Order For Multiplication of Matrix
In arithmetic, the commutative property of multiplication states that the product of two numbers remains the same regardless of their order. But this property does not hold true in the case of matrices. These properties can be understood in detail at Cuemath. When we change the order of multiplication in matrices, we get a different answer. Therefore: XY YX.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474617.27/warc/CC-MAIN-20240225135334-20240225165334-00723.warc.gz
|
CC-MAIN-2024-10
| 2,669 | 23 |
https://graphicdesign.stackexchange.com/questions/77526/how-can-i-create-an-portable-object-in-illustrator-that-will-render-anything-ben
|
code
|
I'm creating knitting charts in Illustrator CC on a Mac. Every chart has a lined grid on which I place symbols. Most of the symbols are one square high and wide, so they fit right within the black gridlines. Some symbols, however, span several columns, and the gridlines beneath them can't show through. I don't want to create symbols that have a white background that will cover the gridlines because the backgrounds for the charts are sometimes shaded and the white will show up. So I need for the multi-column-wide symbols to be able to render anything beneath them as transparent so that the gridlines don't show through the symbols.
Photo #1 shows how the gridlines are showing through the red-outlined symbol. #2 shows how I want it to look - I cut the gridlines so you could see the look I want.
How can I do this? I've tried knockout groups and zeroing out the opacity, but neither has worked, and I don't know if I'm doing something wrong. I have made it work once or twice in the past, but when I try to use the old symbols in a new chart, they don't work.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102469.83/warc/CC-MAIN-20231210123756-20231210153756-00014.warc.gz
|
CC-MAIN-2023-50
| 1,066 | 3 |
http://www.worldcat.org/title/signal-processing-in-radar-systems/oclc/466360952
|
code
|
Find a copy in the library
Finding libraries that hold this item...
|All Authors / Contributors:||
V P Tuzlukov
|Description:||xxvi, 606 p. : ill. ; 27 cm.|
|Contents:||Introduction Part I Design of Radar Digital Signal Processing and Control Algorithms Principles of Systems Approach to Design Complex Radar Systems Methodology of Systems Approach Main Requirements to Complex Radar Systems Problems of System Design for Automated Complex Radar Systems Radar Signal Processing System as an Object of Design Signal Processing by Digital Generalized Detector in Complex Radar Systems Analog to Digital Signal Conversion: Main Principles Digital Generalized Detector for Coherent Impulse Signals Convolution in Time Domain Convolution in Frequency Domain Examples of Some DGD Types Digital Interperiod Signal Processing Algorithms Digital Moving-Target Indication Algorithms DGD for Coherent Impulse Signals with Known Parameters DGD for Coherent Impulse Signals with Unknown Parameters Digital Measurers of Target Return Signal Parameters Complex Generalized Algorithms of Digital Interperiod Signal Processing Algorithms of Target Range Track Detection and Tracking Main Stages and Signal Reprocessing Operations Target Range Track Detection Using Surveillance Radar Data Target Range Tracking Using Surveillance Radar Data Filtering and Extrapolation of Target Track Parameters Based on Radar Measure Initial Conditions Process Representation in Filtering Subsystems Statistical Approach to Solution of Filtering Problems of Stochastic (Unknown) Parameters Algorithms of Linear Filtering and Extrapolation under Fixed Sample Size of Measurements Recurrent Filtering Algorithms of Undistorted Polynomial Target Track Parameters Adaptive Filtering Algorithms of Maneuvering Target Track Parameters Logical Flowchart of Complex Radar Signal Reprocessing Algorithm Principles of Control Algorithm Design for Complex Radar System Functioning at Dynamical Mode Configuration and Flowchart of Radar Control Subsystem Direct Control of Complex Radar Subsystem Parameters Scan Control in New Target Searching Mode Power Resource Control under Target Tracking Distribution of Power Resources of Complex Radar System under Combination of Target Searching and Target Tracking Modes Part II Design Principles of Computer System for Radar Digital Signal Processing and Control Algorithms Design Principles of Complex Algorithm Computational Process in Radar Systems Design Considerations Complex Algorithm Assignment Evaluation of Work Content of Complex Digital Signal Processing Algorithm Realization by Microprocessor Subsystems Paralleling of Computational Process Design Principles of Digital Signal Processing Subsystems Employed by Complex Radar System Structure and Main Engineering Data of Digital Signal Processing Subsystems Requirements for Effective Speed of Operation Requirements for RAM Size and Structure Selection of Microprocessor for Designing the Microprocessor Subsystems Structure and Elements of Digital Signal Processing and Complex Radar System Control Microprocessor Subsystems High-Performance Centralized Microprocessor Subsystem for Digital Signal Processing of Target Return Signals in Complex Radar Systems Programmable Microprocessor for Digital Signal Preprocessing of Target Return Signals in Complex Radar Systems Digital Signal Processing Subsystem Design (Example) General Statements Design of Digital Signal Processing and Control Subsystem Structure Structure of Coherent Signal Preprocessing Microprocessor Subsystem Structure of Noncoherent Signal Preprocessing Microprocessor Subsystem Signal Reprocessing Microprocessor Subsystem Specifications Structure of Digital Signal Processing Subsystem Global Digital Signal Processing System Analysis Digital Signal Processing System Design Analysis of "n - 1 - 1" MTI System Analysis of "n - n - 1" MTI System Analysis of "n - m - 1" MTI System Comparative Analysis of Target Tracking Systems Part III Stochastic Processes Measuring in Radar Systems Main Statements of Statistical Estimation Theory Main Definitions and Problem Statement Point Estimate and Its Properties Effective Estimations Loss Function and Average Risk Bayesian Estimates for Various Loss Functions Estimation of Mathematical Expectation Conditional Functional Maximum Likelihood Estimate of Mathematical Expectation Bayesian Estimate of Mathematical Expectation: Quadratic Loss Function Applied Approaches to Estimate the Mathematical Expectation Estimate of Mathematical Expectation at Stochastic Process Sampling Mathematical Expectation Estimate under Stochastic Process Amplitude Quantization Optimal Estimate of Varying Mathematical Expectation of Gaussian Stochastic Process Varying Mathematical Expectation Estimate under Stochastic Process Averaging in Time Estimate of Mathematical Expectation by Iterative Methods Estimate of Mathematical Expectation with Unknown Period Estimation of Stochastic Process Variance Optimal Variance Estimate of Gaussian Stochastic Process Stochastic Process Variance Estimate under Averaging in Time Errors under Stochastic Process Variance Estimate Estimate of Time-Varying Stochastic Process Variance Measurement of Stochastic Process Variance in Noise Estimation of Probability Distribution and Density Functions of Stochastic Process Main Estimation Regularities Characteristics of Probability Distribution Function Estimate Variance of Probability Distribution Function Estimate Characteristics of the Probability Density Function Estimate Probability Density Function Estimate Based on Expansion in Series Coefficient Estimations Measurers of Probability Distribution and Density Functions: Design Principles Estimate of Stochastic Process Frequency-Time Parameters Estimate of Correlation Function Correlation Function Estimation Based on its Expansion in Series Optimal Estimation of Gaussian Stochastic Process Correlation Function Parameter Correlation Function Estimation Methods Based on Other Principles Spectral Density Estimate of Stationary Stochastic Process Estimate of Stochastic Process Spike Parameters Mean-Square Frequency Estimate of Spectral Density Notation Index Index Chapters include a summary and discussion as well as references.|
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560283475.86/warc/CC-MAIN-20170116095123-00306-ip-10-171-10-70.ec2.internal.warc.gz
|
CC-MAIN-2017-04
| 6,249 | 6 |
https://allevents.in/austin/meetups?ref=amp-menu
|
code
|
We couldn't find Meetups in Austin at the moment. Subscribe weekly email newsletter for Austin.
|05 Dec 2020||Texas Freedom Cell Network Summit - Central Texas||Indra's Awarehouse, Austin|
|08 Dec 2020||Struggle Jennings - Come and Take it Live VIPGA ticket||Come and Take It Live, Austin|
|09 Dec 2020||Austin Speed Dating Gay Men Singles Event Lets Get Cheeky||Doc B's Fresh Kitchen, Austin|
|01 Dec 2020||Austin Lesbian Singles Event Speed Dating Lets Get Cheeky||Doc B's Fresh Kitchen, Austin|
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141191511.46/warc/CC-MAIN-20201127073750-20201127103750-00447.warc.gz
|
CC-MAIN-2020-50
| 497 | 5 |
http://www.musiml.org/past/2020/
|
code
|
Muslims In ML (MusIML) is an affinity workshop for the NeurIPS community.
We focus on both the potential for advancement and harm to Muslims and those in Muslim-majority countries who religiously identify, culturally associate, or are classified by proximity, as “Muslim”.
The workshop will run on Tuesday, December 8, 2020 from 10:30AM - 1:30PM EST.
We will feature a combination of pre-recorded and live talks, followed by a panel discussion with authors on the intersection of policy, technology, and Muslim communities.
Investigating Anti-Muslim Bias in GPT-3 through Words, Images and Stories
The Digital Enclosure of Turkic Muslims in Northwest China
Data Paucity and Low Resource Scenarios: Challenges and Opportunities
NLU Meets Islamic Religious Phrases: Highlighting the Challenges
Taking from the Hands that Give: CRA audits of Muslim-led Charities
The Intersection of Policy, Technology, and Muslims
The Intersection of Policy, Technology, and Muslims
Automatically Identifying Islamophobia in Social Media
Creating Multilingual Corpora for Arabic Characterset
Language and Speech: Many Muslim-majority groups communicate in language that use Arabic character sets, yet there is a gap in learning and machine learning tools that work well in these environments. The following invited talks consider potential solutions such as extending resources to include Arabic character sets to decrease disparity in Arabic-speaking groups.
Algorithmic Bias: These invited talks explore how technology is used to identify ways in which algorithms and models are used to discriminate against Muslim individuals and communities in different contexts.
All times in EST.
|Welcome and Opening Remarks
|Invited Talk: Investigating Anti-Muslim Bias in GPT-3 through Words, Images, & Stories - Abubakar Abid
|Language and speech
|Invited Talk: Taking from the Hands that Give: CRA audits of Muslim-led Charities - Anver Emon
|Invited Talk: Automatically Identifying Islamophobia in Social Media - Ted Pedersen
|Invited Talk: The Digital Enclosure of Turkic Muslims in Northwest China - Darren Byler
|Invited Talk: Creating Multilingual Corpora for Arabic Characterset - Nayel Shafei
|Language and speech
|Invited Talk: Data Paucity and Low Resource Scenarios: Challenges and Opportunities - Mona Diab
|Language and speech
|Invited Talk: NLU Meets Islamic Religious Phrases: Highlighting the Challenges - Samhaa El-Beltagy
|Language and speech
|Panel Discussion: The Intersection of Policy, Technology, and Muslims - Roya Pakzad and Dia Kayyali
Large language models such as GPT-3 have gained significant attention for capturing complex associations between linguistic concepts, allowing them to perform well on various natural language tasks. In this short paper, we ask: what kinds of associations (or biases) has GPT-3 captured about the concepts: Muslim and Islam? We probe OpenAI’s GPT-3 Playground in various ways to understand these biases. We find that, as expected, problematic biases have been learned by the language model. What is more surprising is how difficult it is to debias GPT-3 and how biases appear consistently in different uses of the model. We quantify the persistency and consistency of these biases and demonstrate that they are severe even relative to other religious groups. Finally, we end with a suggestion to be explored in future work – prompt modifications that debias the output of language models.
Abubakar Abid is a 5th year PhD student in machine learning at Stanford, supervised by Professor James Zou. His research interests include machine learning transparency and accessibility, generative models, and applications of machine learning to biology and medicine
In this short talk I use the conceptual framing of a digital enclosure to consider the way Uyghur and Kazakh societies in Northwest China have been enveloped by a surveillance system over the past decade. I show how novel enclosures are produced and, in turn, construct new frontiers in capital accumulation and state power. The Turkic Muslim digital enclosure system began with the construction of 3-G cellular wireless networks which provided Uyghurs and Kazakhs with interactive smart-phone enabled capabilities across time and space. But over time state authorities paid private technology companies to build a data-intensive system with a wide range of spatial scales and information analytics that came to center on “Muslim” social media assessment and ethno-racialized face recognition technology. This complex matrix of overlaid enclosures assessed and controlled the movements and behavior of Muslims in increasingly intimate ways, resulting in mass detentions in “reeducation” camps. What makes the case in Northwest China unique beyond its scale and cruelty, is that in this context rather than banishing targeted populations solely to human warehousing spaces such as peripheral ghettos, camps or prisons, the digital enclosure works to explicitly “reeducate” the population as industrial workers and implement a forced labor regime.
Darren Byler is a postdoctoral fellow at the Center for Asian Studies at the University of Colorado, Boulder. He researches the dispossession of ethno-racial Muslim minorities through forms of surveillance and digital capitalism in China and the global South. His book, Terror Capitalism: Uyghur Dispossession and Masculinity in a Chinese City (Duke University Press 2021), examines emerging forms of media, infrastructure, economics and politics in the Uyghur homeland in Chinese Central Asia. His current research considers how biotechnical surveillance systems can be tied to new forms of control both in China and in sites across the world where these technologies are exported. Prior to joining the University of Colorado he was Lecturer in Anthropology at the University of Washington in Seattle.
In an era unstructured data abundance, you would think that we have solved our data requirements for building robust systems for language processing. However, this is not the case if we think on a global scale with over 7000 languages where only a handful have digital resources. Moreover, systems at scale with good performance typically require annotated resources.The existence of a handful of resources in a some languages is a reflection of the digital disparity in various societies leading to inadvertent biases in systems. In this talk I will show some solutions for low resource scenarios, both cross domain and genres as well as cross lingually.
Professor Mona Diab conducts research in Statistical Natural Language Processing (NLP) is a rapidly growing, exciting field of research in artificial intelligence and computer science. Interdisciplinarity is inherent to NLP, drawing on the fields of computer algorithms, software engineering, statistics, machine learning, linguistics, pragmatics, information technology, etc. In NLP, researchers model language and its use, and build both analytical models and predictive ones. In Professor Diab’s NLP lab, they address problems in social media processing, building robust enabling technologies such as syntactic and semantic processing tools for written texts in different languages, information extraction tools for large data, multilingual processing, machine translation, and computational sociolinguistic processing. Professor Diab has a special interest in Arabic NLP, where the emphasis has been on investigating Arabic dialect processing where there are very few available automated resources.
Samhaa R. El-Beltagy is a Professor of Computer Science and the Dean of the School of Information Technology at Newgiza University. She’s also an NLP R&D consultant for Optomatica (a company dedicated to the development of AI solutions to real-life complex problems), as well as a co-founder of AIM Technologies (an NLP start-up), and a member of the technical board for the National Council for AI in Egypt. Prof. El-Beltagy’s primary research area is in Arabic NLP, but her research interests include AI and NLP at large.
Anver M. Emon is Professor of Law and History at the Faculty of Law and Department of History at the University of Toronto, where he also directs the University’s Institute of Islamic Studies. His research focuses on premodern and modern Islamic legal history, having written extensively on the subject. He is the author of Islamic Natural Law Theories (2010) and Religious Pluralism and Islamic Law (2014), both published by Oxford University Press. As director of the IIS, he has fostered a research lab that integrates religious studies and national security considerations in the ongoing War on Terror.
Dia Kayyali is Associate Director for Advocacy at Mnemonic, the umbrella organization for Syrian Archive, Yemeni Archive, and Sudanese Archive. In their role, Dia focuses on the real-life impact of policy decisions made by lawmakers and technology companies about content moderation and related topics. Previously, Dia served as Program Manager for tech + advocacy at WITNESS. They got their start in digital rights as an Activist at the Electronic Frontier Foundation. Dia serves as co-chair for the Advisory Network to the Christchurch Call, is a member of the Legal Frameworks and Content-sharing Algorithms, Processes, and Positive Interventions working groups of the GIFCT, and is on the Advisory Board for OnlineCensorship.org.They hold a JD from University of California Hastings College of the Law.
Roya Pakzad is the founder of Taraaz, a research and advocacy organization working at the intersection of technology and human rights. She is also an affiliated scholar at UC Berkeley’s CITRIS Policy Lab. In her work, Roya examines the human rights implications of socio-technical systems in their design, development, and deployment phases. Previously, she served as a Project Leader in Technology and Human Rights at Stanford University’s Global Digital Policy Incubator (GDPi) and was a resident fellow at the Rockefeller Foundation’s Bellagio Center. Prior to entering the human rights field, she was an electrical engineer at Advanced Micro Devices (AMD). Born and raised in Tehran, Iran, Roya holds degrees from the University of Southern California (M.Sc. in Electrical Engineering) and Columbia University (M.A. in Human Rights Studies). She lives in Santa Cruz, California.
Social media continues to grow in its scope, importance, and toxicity. Hate speech is ever-present in today’s social media, and causes or contributes to dangerous situations in the real world for those it targets. Anti-Muslim bias and hatred has escalated in both public life and social media in recent years. This talk will overview a new and ongoing project in identifying Islamophobia in social media using techniques from Natural Language Processing. I will describe our methods of data collection and annotation,and discuss some of the challenges we have encountered thus far. In addition I’ll describe some of the pitfalls that exist for any effort attempting to identify hate speech (automatically or not).
Ted Pedersen is a Professor in the Department of Computer Science at the University of Minnesota, Duluth. His research interests are in Natural Language Processing and most recently are focused on computational humor and identifying hate speech. His research has previously been supported by the National Institutes of Health (NIH) and a National Science Foundation (NSF) CAREER award.
Nayel Shafei graduated from Cairo University (BS 1981), MIT (SM ’86, PhD. ’90 in Machine learning). He has worked in CAD/CAM and telecommunication. He founded a company for Fiber-optic telecom, and established marefa.org, the largest Arabic-language encyclopedia in 2007. The website has 6.5 million visitors a month.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817158.8/warc/CC-MAIN-20240417142102-20240417172102-00326.warc.gz
|
CC-MAIN-2024-18
| 11,780 | 42 |
https://www.toolstop.co.uk/metabo-600156580-10-8v-powermaxx-bs-quick-basic-drill-driver-2-x-2-0ah-batteries-p70748/
|
code
|
FREE Delivery on orders over £99
Next Working Day Delivery
Finance Available over £150
FREE 60 Day Returns
A very light compact drill, screwdriver from Metabo with an extremely short design for versatile use. Metabo "Quick" System enables the user to quick change the chuck for flexible applications.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141188146.22/warc/CC-MAIN-20201126113736-20201126143736-00282.warc.gz
|
CC-MAIN-2020-50
| 302 | 5 |
https://gaming.stackexchange.com/questions/12199/what-to-look-for-in-a-graphics-card-for-starcraft-2
|
code
|
I recently built a half decent PC for home use, media centre and programming. It's based around an AMD Quad Core Phenom. I put a nice 700w power supply in it, 4 gigs of ram and a couple terabytes of disk space. I don't game often so I didn't bother with a graphics card. Recently, I bought starcraft 2 thinking I could while away a few hours with it on my Thinkpad T61p. That doesn't work. the game runs for 10 minutes before the NVidia quadro overheats and the laptop shuts itself down to prevent damage. So I installed it on the PC and it runs but the graphics can get choppy and gameplay is a little slow and jerky. Also, I don't get to use a decent resolution or the game slows right down.
So with a budget of £100 to £200, what should I look for in a graphics card. I know very little about this subject. I currently have one 24 inch display and might add another. I want Starcraft 2 to work the way it's supposed to but I probably won't do a whole lot more gaming than that. If I get a decent card, my son might make use of it for warcraft and stuff like that.
I have seen a XFX HD 6870 for £200 that looks nice and seems to tick all the boxes but I wonder if there are comparably priced NVidia cards that I should look at too. Maybe the Gigabyte GTX 460?
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474523.8/warc/CC-MAIN-20240224044749-20240224074749-00152.warc.gz
|
CC-MAIN-2024-10
| 1,264 | 3 |
https://jblindsay.github.io/ghrg/Whitebox/Help/DepthInSink.html
|
code
|
This tool measures the depth that each grid cell in a raster digital elevation model (DEM) lies within a sink feature (i.e. a topographic depression). A sink, or depression, is a bowl-like landscape feature, which is characterized by interior drainage and groundwater recharge. The Depth in Sink tool is implemented as a python script, which calls the Fill Depressions tool and then measures the difference between the filled DEM and the original surface model.
In addition to the names of the input DEM and the output raster, the user must specify whether the background value (i.e. the value assigned to grid cells that are not contained within sinks) should be set to the NoData value. If this is unchecked (set to 'false') then the background value will be zero.
This is an example of a Python script using this tool:
wd = pluginHost.getWorkingDirectory()
input_file = wd + "input.dep"
output_file = wd + "output.dep"
background_nodata = "true"
args = [input_file, output_file, background_nodata]
pluginHost.runPlugin("DepthInSink", args, False)
And the following is a Groovy script also using this tool:
def wd = pluginHost.getWorkingDirectory()
def inputFile = wd + "input.dep"
def outputFile = wd + "output.dep"
def background_nodata = "false"
String args = [inputFile, outputFile, background_nodata]
pluginHost.runPlugin("DepthInSink", args, false)
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304515.74/warc/CC-MAIN-20220124054039-20220124084039-00716.warc.gz
|
CC-MAIN-2022-05
| 1,356 | 16 |
https://fakeologist.com/blog/2015/08/28/undusted-donuts/?shared=email&msg=fail
|
code
|
Not everyone crawling out of the towers got the flour lady treatment. Some good finds in this video.
If you are new to this site, review the links up top. 9/11 and almost ALL major media events are HRDPAR exercises, using actors, special effects, the military, and most importantly, the entire media complex.
Read, review, converse with our audiochat.fakeologist.com experts. We will help with your recovery once you realize for yourself the enormous elephant stomping around in your TV room.
No tags for this post.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057973.90/warc/CC-MAIN-20210926205414-20210926235414-00358.warc.gz
|
CC-MAIN-2021-39
| 515 | 4 |
https://docs.microsoft.com/en-us/windows/win32/adsi/adsi-attribute-syntax
|
code
|
ADSI Attribute Syntax
Each attribute in the directory has an associated syntax. For example, integer, string, numeric, and so on. ADSI defines its own syntax that maps to the native directory syntax. This section describes the types of attribute syntaxes in ADSI.
Distinguished Name String
Syntax Type: ADSTYPE_DN_STRING
The distinguished name is useful for linking two objects together. For example, it can create a link that makes the Alice object a manager of the Bob object. If the Alice object moves to different place, the manager link between Alice and Bob is updated automatically.
The distinguished name must contain a valid distinguished name object. If the distinguished name does not correspond to a valid existing object, most servers reject the request and return a constraint violation error.
Set x = GetObject("LDAP://CN=Bob, OU=Sales,DC=Fabrikam, DC=com) x.Put "manager", "CN=Alice, OU=Sales, DC=Fabrikam, DC=COM" x.SetInfo PADS_ATTR_INFO pInfo; // .. IDirectoryObject::GetObjectAttribute printf("%S\n", pInfo->pADsValues->DNString );
Case Exact String and Case Ignore String
Syntax Types: ADSTYPE_CASE_IGNORE_STRING, ADSTYPE_CASE_EXACT_STRING.
Case Exact String is a case-sensitive string while Case Ignore String is a case-insensitive string. A large percentage of attributes in the directory use this syntax.
The directory may or may not store this as a Unicode string. However, ADSI accepts and returns Unicode strings.
Dim propList As IADsPropertyList Set propList = GetObject("LDAP://DC=Fabrikam,DC=com") Set propVal = New PropertyValue ' --- Property Value --- propVal.CaseIgnoreString = "Fabrikam, Inc - Seattle, WA" propVal.ADsType = ADSTYPE_CASE_IGNORE_STRING
Syntax Type: ADSTYPE_PRINTABLE_STRING
This syntax is used for attributes with string values where uppercase and lowercase are considered unequal for comparisons, for example, "FABRIKAM" and "Fabrikam" do not match. ADSI accepts any contents for a Printable-String; it does not attempt to verify that they are indeed printable.
Syntax Type: ADSTYPE_NUMERIC_STRING
In this syntax, strings match as in Printable String, except that all space characters are ignored in comparisons. ADSI does not perform value checking to ensure that only numerals and spaces appear in values of this syntax. Active Directory accepts any content for a numeric string; it does not verify that the characters are numeric.
Syntax Type: ADSTYPE_UTC_TIME
This syntax stores the date and time in a single string. The string format consists of three concatenated parts: (1) YYMMDD; (2) HHMM or HHMMSS (both are acceptable); and (3) "Z" to indicate that the time given is Greenwich Mean Time (GMT), or "+/-HHMM" to indicate that the time given is local time with the given differential from GMT. The differential is based on the formula: GMT=Local+differential.
The first two digits of the year are not stored in this string.
Some examples of legal values are "9101311455Z", "910131145503Z", "9101314455-0500", "910131145503+0130". This string is stored as single-byte ASCII characters, and no code page number is stored with it.
Although ordering is supported, it is done only as an ASCII case-insensitive string sort, not by properly interpreting the meaning of the strings.
Any valid string value is accepted. No attempt is made to ensure that the string contains a valid time string.
Syntax Type: ADSTYPE_UTC_TIME
If a new attribute to store time values is being defined, the GeneralizedTime syntax should be used. GeneralizedTime syntax uses four characters to represent the year instead of two as with UTCTime.
The format for the GeneralizedTime syntax is "YYYYMMDDHHMMSS.0Z". An example of an acceptable value is "20010928060000.0Z". The "Z" indicates no time differential. Active Directory stores date/time as Greenwich Mean Time (GMT). If no time differential is specified, GMT is the default.
If the time is specified in a time zone other than GMT, the differential between the time zone and GMT is appended to the string instead of "Z" in the form "YYYYMMDDHHMMSS.0[+/-]HHMM". An example of an acceptable value is "20010928060000.0+0200".
The differential is based on the formula: GMT=Local+differential.
Syntax Type: ADSTYPE_BOOLEAN
Active Directory accepts only a signed 32-bit value for this syntax. It handles zero as FALSE and all nonzero values as TRUE.
Syntax Type: ADSTYPE_INTEGER
A 32-bit signed numeric value.
Syntax Type: ADSTYPE_LARGE_INTEGER
A 64-bit signed numeric value. Large integers are actually implemented as COM objects on the IADsLargeInteger interface. The HighPart and LowPart methods are used to access the two 32-bit halves of the large integer value.
Dim x as IADsLargeInteger Set o = GetObject("LDAP://DC=Fabrikam,DC=com") Set x = o.Get("UsnCreated") Debug.Print x.HighPart Debug.Print x.LowPart
Syntax Type: ADSTYPE_OCTET_STRING
An octet string is returned as a variant array of bytes. This consists of a size count (number of octets) followed by a series of octets. An octet is an 8-bit byte, so a series of octets is a string of binary data.
Syntax Type: ADSTYPE_CASE_IGNORE_STRING
Object Class is a unique object identifier for a given schema class. The class of each object instance is identified by the objectClass attribute. When created, you can never change an object class. objectClass is a multiple valued attribute. It lists the specific class of the object, and the classes of all structural or abstract classes from which the specific class was derived. This includes Top, the class from which all other classes are ultimately derived. Active Directory does not list auxiliary classes in the objectClass attribute.
Syntax Type: ADSTYPE_NT_SECURITY_DESCRIPTOR
Access rights define what abilities a security principal has when it attempts to perform an operation on an Active Directory object. A security descriptor describes the access control information associated with an object.
The security descriptor is stored as a property of a directory object in the nTSecurityDescriptor property. When an authenticated user attempts to access a directory object, the directory server determines the access granted or denied to the user based on the object security descriptor.
The ADS_SD_CONTROL_ENUM enumeration specifies control flags for a security descriptor.
The following code example shows how to obtain a security descriptor.
' Obtain a security descriptor. Dim x as IADs Dim sd as IADsSecurityDescriptor Dim acl as IADsAccessControlList Set x = GetObject("LDAP://DC=Fabrikam, DC=com") Set sd = x.Get("nTSecurityDescriptor") Debug.Print sd.Control Debug.Print sd.Group Debug.Print sd.Owner Debug.Print sd.Revision Set acl = sd.DiscretionaryAcl Set sacl = sd.SystemAcl
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027317516.88/warc/CC-MAIN-20190822215308-20190823001308-00544.warc.gz
|
CC-MAIN-2019-35
| 6,679 | 44 |
https://www.cadillacforums.com/threads/anyone-on-wheelwell.676433/?u=720945
|
code
|
Is anyone here on Wheelwell.com?
I learned about it the other day on the SmokingTire Podcast and decided to check it out. It's a car "social network" at its core which is fine. What I really like about it is you can log all your service, modifications, tuning parameters, mileage, etc. and keep track of everything in a central location as opposed to the small notepad I keep, and then lose, in all my cars.
I'm just getting started on it but it seems pretty cool. Its not like Facebook or twitter where you can waste hours or feel like checking it regularly but its a good place for car enthusiasts to at least post mods.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654097.42/warc/CC-MAIN-20230608035801-20230608065801-00352.warc.gz
|
CC-MAIN-2023-23
| 622 | 3 |
https://fixmywp.com/blog/build-a-custom-404-page-enhance-conversions.php
|
code
|
Build a Custom 404 Page and Never Miss Out on Potential Conversions Again
How to Boost your Potential Conversions through a Custom 404 Page
Are you aware of what happens when one of your website visitors lands on a webpage that doesn't exist(or else a 404 Page)?
Do you really care?
Well, you most definitely should care, considering an error page is a surefire way to send your users away from your website. Not only that, but you may just convince some people to never come back at all.
The point is, an error page is nothing to take lightly, and the coolest part is that you can generally design a beautiful error page in a few minutes and not have to worry about it again.
The primary type of error page is the 404. It comes in all shapes and sizes and you can modify yours to guide your customers to the proper places on your website. However, if left unattended, the 404 could serve little to no purpose at all.
What Exactly is a 404 Page?
This is the first question you should ask yourself. After all, there's no reason to implement something on your site unless you truly understand how it's benefiting your blog or company.
To start, you've most likely see a 404 error page before while you've browsed around the internet.
It's a page that alerts users when they have navigated to a URL that no longer exists. It's also common when you try to type in a URL but the page never existed in the first place.
That's it. As a website owner, you're simply telling your users that they have landed on a page that is nonexistent.
As an example, here's the LEGO 404 error page.
With most WordPress websites you'll get a very basic 404 error page. Some themes you purchase may spice it up a bit, but in general the 404 error pages tell people that they are at the wrong page, or that an error occurred. These aren't all that helpful, so it's essential to spend a little time designing a page that can replace that default 404 error.
Why is it so important to replace the default 404?
Because it displays the minimal amount of information to your users, not guiding them to the next step or explaining to them what they did wrong. Sure, more and more people are starting to understand what a 404 error page is all about, but it certainly doesn't mean they won't leave your site once they see one.
How Can You Use a 404 Error Page to Keep Site Visitors Instead of Turning Them Away?
In its most basic form, a 404 error page says that the user has landed on an error page, and that's about it. This format isn't all that helpful to the user, considering it doesn't bring them anywhere else or offer assistance to find another product or blog post.
Although 404 error pages seem useless, they can actually work wonders in terms of keeping site visitors instead of turning them away.
What should you include in your 404 error page to ensure that folks aren't immediately turned away from your website?
- A logo and identification - You'll find a surprising amount of 404 error pages that don't have any logo or brand identification. This is horrible for the user, because they suddenly have no idea where they are, and it's most logical to "X" out of the page. In theory, all the navigation, header and logo items should still be located at the top of the page.
- A funny or friendly acknowledgement that something wrong happened - You must show people that they didn't do anything wrong. A simple "whoops" is a good start to showing that your company is aware of the problem and that you can guide them elsewhere in the meantime. The best 404 error pages add some humor to the mix.
- A link to navigate back to the homepage - This is one of the most important parts of a 404 page, because most customers will simply want to get back to the homepage to start from scratch.
- A potential redirect to the most relevant page - Although a redirect is risky (since it may not bring them to the most relevant page,) it's better than a white page with no navigation whatsoever.
- A search bar - The search bar often eliminates the need for a link back to the homepage. This way users type in what they were actually looking for and move away from the error page.
Awesome Examples of 404 Pages (For Your Inspiration)
Now that we've covered exactly what a 404 error page is and how it can benefit your website, it's time to explore some of the best examples of 404 error pages online. You'll notice that most of them include at least the majority of the necessities we outlined above, with hints of comedy, some visuals, links to other places and the occasional search bar.
Bluegg has one of the more famous 404 error pages online, since it reveals that the page doesn't exist, but the navigational buttons are still at the top for the user to move around the website. A link to the homepage is offered, but the best part is the looping video of a screaming goat. The page asks whether you'd like to go to the homepage or sit and listen to the screaming goat. It provides a chuckle and hopefully convinces people to stick around for a while.
Github has a core demographic of software nerds, so why not cater to what nerds like? The Github 404 page takes from one of the famous Star Wars lines, and it also includes imagery to make you wish you were watching the movies right now. What's important, however, is that a search tab is provided, along with a few other links for users to get away from the error page.
Known for its creativity, MailChimp has a visual 404 page that's simple and fun. It tells you that you're not in the right place, but it also offers a search module for moving away from the 404 page. You'll notice that if you keep the main navigation buttons at the top of the page, you generally don't have to worry about inserting links to your homepage or other more helpful pages.
Dropbox is known for simplicity, so its 404 page is no different in that respect. When you land on the page you can clearly see that you're still on the Dropbox website. Right underneath the logo you can move to several links such as the Help Center, Forum or Home.
What does the FixMyWP 404 page look like? We already have the menu navigation at the top of the page, but we also try to make it as easy as possible for users to get out of the error page and into a more helpful area such as a client testimonials page or the WordPress Support Services information page.
Bad Examples of 404 Error Pages
Not all 404 error pages are good. In fact, one could argue that the majority of them are quite terrible. Here's a look into what you should avoid for your own 404 message.
The Prime Example
This is the prime example of what most website 404 pages used to look like. What's crazy is that so many websites are still designed like this, and the messages do nothing to help out customers. Not only is it intimidating and boring, but the user has no way to navigate away from the page. Sure they could hit the Back button, but they're much more likely to exit the window and move on with their lives.
The YouTube error page is surprisingly bland, and it doesn't even have a link to the homepage. It does have a nice search bar towards the bottom, but you'd think YouTube would at least take a second to have some creative video playing when someone landed on a 404 page.
It's funny that so many Google-owned website have terrible 404 pages. The Blogger platform is the worst of them all, providing two lines of text: Not Found and Error 404. You can't search for another term or move to a different page. Every user is forced to click the Back button or completely move away from the site altogether.
AT&T wins the boringness award, because this error page looks like it's from the 90s. Yes, they have links for going back and searching for another term, but it's ugly as heck and you should make sure your 404 error page doesn't look like this.
The Digital Point forum provides navigation at the top of the page, but instead of helping people figure out how to get away from the error page, they shove an advertisement down your throat. It's not a great way to make users happy.
Finally, we have Google. Remember, this is the company that says your SEO can be affected if you don't have a quality 404 page. However , they have one of the worst out there. The branding is on-point, but it's unclear where the homepage link is (you have to click on the logo,) and no other humor or assistance is offered.
What are Some Plugins You Can Use to Build 404 Pages?
Building a 404 page use to be a pain in the butt. Most web designers went into the source code to modify what they wanted to show up. Now, all you need is a WordPress plugin. Keep reading to learn about the best solutions on the market.
Here's a free option that allows you to make your own custom 404 page without touching a single line of code. The point is to prevent that bland error page and make it somewhat creative. The plugin works with any theme you have on your website, and it helps you make a header and text from the backend of your site. Once you create your error page, publish it and never touch it again.
Some folks don't like the 404 error page at all. In that case, the 404 to Start plugin will automatically redirect people to the homepage if they land on a nonexistent webpage. Keep in mind that this may cause a little confusion, but many users actually enjoy the fact that they don't have to look at a junky error message and figure out where to go from there.
The 404Page plugin is one of our favorites, since it works with all themes and it doesn't take long to build a beautiful 404 error page without any coding knowledge. What's cool about this plugin is that it doesn't create redirects and it doesn't require additional server requests. This means that it doesn't load down your server as much, which is often the case with other 404 plugins.
The next two plugins are paid solutions, but they're certainly worth looking into considering they both have powerful tools for building creative 404 error pages. For example, this plugin is all about the visuals, so you can generate a responsive, image-based theme within a few minutes. A custom URL redirect is offered, and you gain access to a few prebuilt 404 themes so that you don't even have to put any thought into it.
The WordPress Ultimate Redirect Plugin is another favorite, since it provides a mobile redirect, and it has auto-redirects if you choose to go down that route. Import and export rules are a bonus, and the multiple devices and sources help with compatibility.
Over to You...
Now that you've had a chance to understand why it's important to build a custom 404 page in order to never miss out on possible conversions, take a look at your own website to see what your 404 page displays. In general, you can type your URL in the browser, punch in a "/" and punch in some random letters to bring up a page that doesn't exist at all.
Feel free to share links to your 404 error page in the comments below. If you have any questions or would like to get started building your 404 page, drop a line in the comment section below, or start with using one of the plugins we recommended above. Good luck!
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474526.76/warc/CC-MAIN-20240224080616-20240224110616-00685.warc.gz
|
CC-MAIN-2024-10
| 11,128 | 51 |
http://www.head-fi.org/t/723394/please-help-me-with-my-survey-about-storage/195
|
code
|
Originally Posted by TontNZ
I have about 400GB of FLAC, excluding 300 classical CD's which are yet to be ripped. I use an external 3TB USB3 (3.5 inch) hard drive for permanent storage and playback. I rip to (and use for short term storage) an internal RAID 10 array (4 x 3TB) and also copy all FLAC and video to an external RAID 5 array (5 x 3TB) used purely for backup. I also copy all FLAC to a portable (2.5 inch) 2TB external hard drive. I also have 128GB in my iBasso DX50.
Slightly OT, but a salutary lesson. As mentioned above I was running RAID 10 (4 x 3TB). RAID 10 both distributes the data over two drives (for speed) and duplicates each drive (for redundancy). I also was backing up to an external 3TB disk. About the time of the original post I started noticing errors on the backup drive. So I decided to copy all of my backup data to the RAID 10 array and swap out the faulty backup disk. So I copied the backup data back to my RAID 10 array and ran test software on backup drive to confirm that it was in fact faulty, which it was. The disk diagnostics destroyed the backup data - but no problem - it was on the RAID 10 array.
At this point my RAID 10 array lost two disks - irrecoverable read errors. They catastrophically fail all self-tests and read diagnostics. No recoverable data.
I've lost 12 years of company data and personal data (except my music which was backed up elsewhere). Completely and utterly unrecoverable.
The two RAID 10 disks that failed were purchased new and less than two years old (about 20 months of use). They were purchased at slightly different times so that all disks would not be from the same batch. My system is high end and runs incredibly cool, so disk heating is never an issue.
Sometimes when you think you've got everything covered you couldn't be more wrong.
I'm now purchasing high-end enterprise specification hard-drives. Be warned if you're running consumer spec'ed hard drives, they will fail at some time and as you can read here - some much sooner than later.
Please learn from my hubris.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1408500816424.18/warc/CC-MAIN-20140820021336-00181-ip-10-180-136-8.ec2.internal.warc.gz
|
CC-MAIN-2014-35
| 2,052 | 9 |
http://stackoverflow.com/questions/6692409/how-to-know-the-name-of-the-background-image-used-at-home-screen-android/6693317
|
code
|
How I can know the name of the image used in android home screen?
I use WallpaperInfo But it is not giving me name of wallpaper.
As far as I know you cannot. When the wallpaper is set, the
No filename is ever transferred to the
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1393999673147/warc/CC-MAIN-20140305060753-00014-ip-10-183-142-35.ec2.internal.warc.gz
|
CC-MAIN-2014-10
| 227 | 4 |
https://diversionclub.proboards.com/thread/171
|
code
|
What is the main difference between the both fixings? I've got a monolock on my bike with a 44 litre box. The sticker on the inside says not to go over about 70mph but does that mean if it has over a certain load in it or even when its empty. I must admit, keeping to 70mph is very difficult even though I just picked up 3 points.
What is the main difference between the both fixings?
Nothing with the fixings they are both the same. if you look on the Givi website it says the main difference between them is the size. Monokey usually bigger sizes available primarily designed for motorcycles, Monolock primarily designed for scooters and maxi-scooters (maybe the odd Fazer ).
You certainly seem educated enough to ask for some advise, if you wouldn't mind please teejayexc
XJ 900, XJ 600 and an XL 250 (recently restored :-) )
"The most asked question here is: "what is the difference between a MonoKey case and a MonoLock case"? Simply stated, the MonoKey series is the top of the line series with a more substantial mount, more features, and better quality construction. MonoKey mounts are sold seperately. The MonoLock cases are generally a smaller and lighter top case with a smaller mount and lock up. Consider MonoLock cases for "light duty" applications. MonoLock cases are sold with a universal mount included." Monokey Cases (E50, E460, E360, E35, E45, E36, E52 and E21) Types of cases E50 Maxia, E460, E360, E35 Traffic 2, E52,E36/E45 and E21/SIDE CASE ONLY. Can be used either as topcase or sidecase. Monolock Cases (E42, E280, E29, and E33)Monolock Cases are for scooters, small bikes. Monolock means one key to open and lock the case also allows removal and replacement of the case. Monolocks are always supplied with fitting plate. They can be mounted onto all existing racks. Can only be used as top-case.
Well I've got my 44ltr monolock on the bike and its there to stay unless it falls off one day. When I bought it, I was thinking of getting the monokey E52 but for 2 points. One - I thought it might look far too big on the 600 divvy Two - It was b....y expensive
I have a pair of Pneumant panniers on my D600. They are about the same size as Givi E21s but a more square style but fit closer to the bike than monokey Givi's and the frames are les obtrusive than monoracks. To fit the Pneumant frames I had to get the Givi monorack modified (lugs welded on), but they look good and suit the bike. BSA Regal = www.bsa-regal.co.uk/NP
I did have some digi-pix but seem to have lost them somewhere :doh:
The 600 will be for sale soon so will post pix then.
Biker since 1975. Ex engineer turned chiropractor.
Right, nice and clear so far - better than any explanation I've seen before - thanks
So, I've got a Maxia (monoKEY) and the only thing I don't like is that its so damned BIG for everyday use. Fine for touring but just HUGE for pottering about. So what's the smallest box I can get to fit on the same mounts ? Obviously I don't want to be swapping mounts every few weeks but a little box would be great for waterproofs, camera, phone, etc etc.
Any advice apreciated
The beatings will continue until morale improves !
If you make something idiot-proof, evolution will just make a better idiot !
Upload your photos to www.photobucket.com. You will have to register first but it's free. Once you have uploaded your photo just left click in one of the boxes shown below depending on if you want to copy the url to put a link in to the message or paste the photo into your message.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572089.53/warc/CC-MAIN-20220814234405-20220815024405-00285.warc.gz
|
CC-MAIN-2022-33
| 3,499 | 17 |
http://viplooters.xyz/archives/3445
|
code
|
Fantasticfiction The Cursed Prince read – Chapter 492 – Better Off Without Him zebra wonder propose-p1
The Cursed Prince
Novel–The Cursed Prince–The Cursed Prince
Chapter 492 – Better Off Without Him gate slippery
“What? Not a way!” Edgar was amazed that he or she withstood up all of a sudden. He looked over Emmelyn just like she just increased an extra head. “What exactly are you discussing, Your Elegance? Mars really likes you together with he should know you would never hurt his family members.”
“And what great would it do? If my partner couldn’t believe me to begin with, why would I supply him with an extra likelihood?” Emmelyn laughed bitterly. “I am just much better of without him.”
The Cursed Prince
“Oh yeah, Edgar.. You do not know, how much your trust in me method to me,” Emmelyn desired to weep once again. “Even my own personal spouse didn’t trust me. He thought Ellena’s lays i always destroyed his mum.”
Eventually, he could only speak weakly, “Understood, Your Sophistication.”
“So, can you trust me we was framed by Ellena?” Emmelyn inquired the person. “You recognize her long enough. Could you see her carrying out that heinous criminal activity?”
Also, it didn’t issue if Lily assumed Emmelyn was innocent because she had no actual capability to absolutely free Emmelyn and obvious her label.
“So, you may return to Mars and Harlow?” Edgar requested again to verify.
“With this box, additionally, you will locate the scarf presented to me by Raphael. He told me to simply put the scarf for the queen’s go. I am not sure in the event it can also work, in truth, but there is however no harm in trying. He performed appear to be he or she is quite effective far too…” Emmelyn launched the wooden pack on the lap and revealed the contents to Edgar. “That is it.”
If he pressured Emmelyn to go back and her everyday life was in danger, Edgar would actually feel responsible for getting her back into the lion’s den.
Emmelyn was deeply let down by her man.
“But, as soon as the queen wakes up, she could very clear your business…” Edgar was still striving.
The Suffrage Cook Book
She then closed the package and handed it up to the man. “I am trusting you using this container. Remember to provide it to my new mother-in-regulations.”
“Certainly, you can trust me on this,” Edgar replied. “But… would you like to ever go back? What is going to eventually your daughter?”
He could identify that Emmelyn was handled properly within this kingdom and her protection was assured. So, Summeria seemed like the right place on her behalf to get right now.
the future of brooklyn 99
Emmelyn bit her lip. She was so moved by Edgar’s terms. It experienced excellent to lastly have somebody acquire her aspect. It absolutely was true that Lily considered her, but she got for ages been on Emmelyn’s area right from the start.
“Oh, Your Elegance… I am so sorry that occured for your requirements,” Edgar investigated Emmelyn with pity. He could realise why she cried so much these days when she saw him.
At this document, Edgar really couldn’t say anything.
Emmelyn smiled bitterly. She considered she recognized her husband too, nevertheless the simple fact stayed, he was searching her such as an dog and didn’t assume that she was naive. Even though he have, he was very weak that they heard his father’s get to discipline Emmelyn.
“So, would you trust me i was framed by Ellena?” Emmelyn questioned the person. “You realize her for enough time. Will you see her undertaking that heinous criminal offense?”
She must have expert hell within the last month or two. Edgar could only picture.
Warm Wedding, CEO Loves Me
Section 492 – Happier Without Him
Edgar believed his upper body tightened when he acquired the solid wood pack. He really wanted to influence Emmelyn to arrive house with him, but he possessed found how she was obstinate and didn’t want to return to Draec. Aside from, he was not certain of what happened back home.
Also, it didn’t subject if Lily presumed Emmelyn was harmless because she experienced no serious power to free of charge Emmelyn and distinct her name.
“What? No chance!” Edgar was so shocked that they stood up out of the blue. He checked out Emmelyn as if she just expanded an additional mind. “Exactly what are you referring to, Your Grace? Mars adores you and also he have to understand you would not harmed his friends and family.”
“So, you can expect to come back to Mars and Harlow?” Edgar required once again to ensure.
The Cursed Prince
Finally, he could only talk weakly, “Comprehended, Your Grace.”
“Lord Edgar,” Emmelyn brought up her hands to mobility Edgar she didn’t would like to extend the argument because she thought it was useless. “With this carton, I had a message that we authored for Queen Elara. Remember to have to her when she awakens.”
Ellena was captivated with Mars and might try and do anything whatsoever to sabotage any partnerships he might have with another women.
The Cursed Prince
Having said that, Edgar was Mars’ companion, in which he also was aware Ellena from a long time ago given that they matured together with each other. So, his thoughts and opinions mattered a whole lot in this case.
“And what fantastic would it do? If my hubby couldn’t believe me initially, why would I supply him with a 2nd opportunity?” Emmelyn laughed bitterly. “I am just better of without him.”
“So, you can get back to Mars and Harlow?” Edgar requested yet again to confirm.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710801.42/warc/CC-MAIN-20221201053355-20221201083355-00878.warc.gz
|
CC-MAIN-2022-49
| 5,607 | 41 |
https://medium.com/@DelibThinks/which-tool-to-use-when-d156daa01b58?source=email-af6a5bad5db6-1519971419167-digest.weekly------1-2§ionName=author
|
code
|
Which tool to use when?
There are a near-limitless number of approaches and tools to help you at every stage of the policy-making process. As you move through a policy-making cycle, different methods will likely become more important or valuable at different phases — and each method will have an array of online services to support it.
So it’s no surprise that people sometimes feel a bit overwhelmed by the choices on offer. We see that reflected in a question we’ve been asked a fair few times recently, by a range of customers and government organisations: ‘which digital tool/response mechanism should I use in x situation?’
We always advocate a ‘horses for courses’ attitude (you’ll see in our Digital Consultation Playbook that we really emphasise the importance of appropriateness): that it’s all about finding the approach that best matches your purpose and situation, and then finding the tool that best matches that approach.
But if it’s a helpful starter for ten, here’s a really quick, top-line overview of some of the most common phases of policy-making and the type of approach we’d commonly recommend for each.
(We’ve also done a slightly more in-depth look at the difference between when to use a survey and when to use a Dialogue, which might also be useful.)
Early in the process, or when a decision is still at a formative stage, you may have opportunity to invite open-ended suggestions. Here you want to encourage imaginative and diverse thoughts (‘there’s no such thing as a bad idea’, as they say).
That’s a key part of what we built Dialogue to do. It’s great for setting a challenge and seeing what ideas people come up with in response.
Once you’ve established some initial possibilities, you might want to gather people’s general preferences and opinions. Nothing too detailed at this stage but some high level positions and principles.
You may get to a stage where there are a number of fixed proposals or options — perhaps competing for a limited resource. That’s the time to start prioritising between the choices on the table and weighing up trade-offs.
At some point in almost every policy-making process, you’ll want people to choose from several presented options and provide you with quantitative feedback. You may also need people to specify their priorities or go through a process of deciding what to include and what to omit.
When your options have been narrowed down, it’s time to think about formal surveys. These give people an opportunity to provide in-depth feedback or comment on fine-grained details of a proposal.
This is Citizen Space’s speciality. Government organisations worldwide use the platform to run formal consultations and surveys (as you can see from the 13,000+ consultations tracked on Aggregator). We’re always confident recommending it for formal policy consultation — it’s purpose-built for exactly that.
When options start to crystallise, you may want to begin building consensus among respondents. It can be helpful to create a space for dialogue, to give people exposure to other views and encourage discussion.
Perhaps unsurprisingly (the clue’s in the name), we’d recommend Dialogue here. We’ve seen it used really well for building constructive conversations amongst groups of service users or stakeholders with a common interest in a topic under discussion.
One of the most essential parts of a policy-making process is what happens after all the input has been gathered and weighed. It’s crucial to feedback to participants on your decisions and actions.
This should be possible no matter which platform you’re using (make sure to check there will be a way to show people that their involvement didn’t just fall into a black hole!) In particular, Citizen Space is a great overall system for this. You can use it to manage and report back on all of your involvement activity — online or off — and it comes packaged with things like ‘We Asked, You Said, We Did’ functionality and powerful response publishing options.
We appreciate that’s a bit of a whistle-stop tour for what can be a very involved and nuanced decision to make! We’re always happy to talk through advice in more detail, though, and consider the specifics of your situation. You can drop us a line any time if that’d be helpful to you.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591719.4/warc/CC-MAIN-20180720174340-20180720194340-00616.warc.gz
|
CC-MAIN-2018-30
| 4,355 | 18 |
https://www.blackhatworld.com/seo/jv-lets-dominate-google-play-together-im-looking-for-android-developer.535166/
|
code
|
I'm looking for a highly/semi skilled Android developer to create and monetize applications. If you already have Tier1/Tier2 traffic from Google Play applications that would fit well too. I've seen that many of you guys are just wasting your traffic for Ad Networks so I decided that we could monetize applications in a legit way. Partner task: to create/develop free Android applications. It might be fake applications, games, live wallpapers pretty much everything that could bring as many traffic as possible. My task: I will create profitable campaigns and do basic SEO and promotion for the applications. We will split earnings 50/50% rate. Skype me for discussion: redacted or PM.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589029.26/warc/CC-MAIN-20180716002413-20180716022413-00347.warc.gz
|
CC-MAIN-2018-30
| 686 | 1 |
https://podverse.fm/faq
|
code
|
Most podcast apps today limit your clips to be less than a minute long, but Podverse lets you create and share podcast clips of any length. This approach for clip sharing has a tradeoff however, as it currently does not support clips from podcasts that insert dynamic ads.
Dynamic ads are different advertisements that are rotated into the same episode, so each listener can hear a different series of advertisements. Since dynamic ads change the overall length of the episode, the timestamps of clips created from that episode may not stay accurate.
We would love to add full support for podcasts with dynamic ads some day, and we can, but for fair use / legal reasons we will need to get permission from each podcaster to do so.
AGPLv3 is the open source license under which all Podverse software is provided. The license states that anyone can download, modify, and use this software for any purposes for free, as long as they also share their changes to the code. This is also known as a "share-alike" or "copyleft" license.
Podverse software is open source so anyone can launch their own podcast app as affordably as possible. If a podcast network wants to create their own podcast app, they can use Podverse software and do it for a tiny fraction of the cost of hiring programmers to build a podcast app from scratch.
Our goal is to help level the playing field between the corporate world and independent media, so independent media has the same technological advantages as large corporations, and open source software is essential to that mission.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587767.18/warc/CC-MAIN-20211025185311-20211025215311-00524.warc.gz
|
CC-MAIN-2021-43
| 1,555 | 6 |
https://forum.bubble.io/t/filter-search-box-using-other-list/233151
|
code
|
I have difficulties getting the correct results in a search box element. My use case is as follows
- I have a list of 10 suppliers in my CRM module
- I have a project in my project management module. In this project I can add multiple suppliers (ProjectSuppliers). I add 5 suppliers (from a total of 10) I can do business with. The Searchbox for supplier on this level works. Fetching 10 results from my CRM module.
- Then I want to add project activities. For each activity I want to assign a supplier, but now I want to choose only one of the 5 suppliers I have added as ProjectSupplier. I can’t get the Searchbox being filtered to only fetch the 5 suppliers added to my project.
Looking forward to gather some insight how to be able to do this.
Thanks in advance
How are you saving the 5 selected suppliers?
It should be as simple as using those 5 as the data-source for the search box…
I was using ProjectSuplier as source on the Searchbox of Activity. But wanted to store the Supplier in a specific supplier field on the Activityist. Furthermore I als want to prefill the current value of the searchbox (ProjectSupplier) based on the value of suplier. That seems not to be possible.
So now I think I need to just link ProjectSupplier to Activity.
Any thoughts how to remove duplicates? I have managed to maintain a unique list of SelectableProjectSuppliers. Maybe I need to link that list to Activity. On the background I believe I can sync Activity.Supplier field to be able to manage the privacy rules on activity.
I will try something out and get back to this topic.
I’ve got it working, but now I would like to eliminate the duplicate results. A Supplier can be multiple times a ProjectSupplier supplying other resources.
Using a drop down I can use text as datatype and fetch the unique elements, but with a Searchbox this is not possible.
I tried to use a separate datatype SupplierSearchbox that adds (only when not present) and remove items (Supplier’s name). This works when just adding or removing a ProjectSupplier. But when modifying a ProjectSupplier thing get out of sync quite easy and I can’t get it right.
Scenario’s that are difficult to manage is:
- I have two ProjectSupplier records for Supplier A. SupplierSearchbox only consists of one record (Supplier A) When one ont ProjectSupplier records is changed to Supplier B. SupplierSearchbox should consist of both Supplier A and Supplier B
2.When I revert the change SupplierSearchbox should only contains Supplier A (removing record of scenario B)
- When I have only one ProjectSupplier record (Supplier C) and I change this to Supplier D, SupplierSearchbox should also change from Supplier C to Supplier D.
I am able to implement all three scenario’s sperately, but not all three together.
I am nog thinking to use an API workflow on a list (ProjectSupplier) unique items and flush and reffil the SupplierSearchbox list, with only unique values. But then I am in doubt I can set the security and privacy on the level I need…
Maybe to clarify and to summarize: what I want to achieve is a Searchbox with Suppliers that exists in the ProjectSuppliers list.
Update: I think I found it, Searchbox (type: supplier) source: do a search of suppliers where name in ProjectSupplier each items Suppliers name.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816977.38/warc/CC-MAIN-20240415111434-20240415141434-00521.warc.gz
|
CC-MAIN-2024-18
| 3,291 | 23 |
https://wiprodigital.com/2020/08/11/azure-ml-and-biometric-analysis-engines-to-drive-next-gen-check-processing-in-the-fintech-industry/
|
code
|
Machine learning and AI have catapulted into enterprise awareness, with use cases spanning far more than simple chatbot engagements. Azure Machine Learning (ML) services, for instance, have contributed to such wide-ranging functions as detecting business anomalies, completing marketing sentiment analyses, and conducting predictive analysis for customer relationship management (CRM) tools. Yet the banking industry has begun taking Azure ML services in an exciting new direction, combining AI with biometric analysis to automate check processing.
The finance sector is well-positioned to leverage this innovative combination. The global market for 3D facial-recognition systems is expected to grow at a CAGR more than 36% from 2018-2022. Couple this trend with consumers’ increasing comfort with biometric systems, particularly for banking, and the industry has remarkable potential to leapfrog others in its technology adoption.
AI and biometric identification have enabled digital identity for some time. However, check processing using biometric analyses such as face detection and signature detection (via pattern matching) is a trending use case in the FinTech sector’s AI/ML implementation.
As the number of users/customers for bank increases, potentially increasing the number of operations and transactions, manual check validation and processing can bog down bank IT systems, reduce efficiency, and introduce human errors. Conversely, Azure-based solutions enable large volumes of data to be processed seamlessly and accurately by automating various tasks via both real-time processing and batch processing. The three core tenets of this next-gen check processing are facial recognition, OCR API, and Azure Form Recognizer.
Two-way verification is the current check-processing approach, with the system validating signatures using a digital image stored in the user’s account by two authorizing parties of the bank. Similarly, in an Azure AI-based system, the facial-recognition program compares the users’ current appearance – taken via smartphone camera – with an image stored in the cloud and associated with the account holder.
Users are trained to upload and prepare their pictures using a mobile app, with Azure image-processing techniques accounting for distortion correction, resizing, and skew correction. After uploading five photos with different backgrounds and lighting situations, the user will have trained the model to verify his or her face with better accuracy using the Azure ML model. When performing identifications, the Face API can compute the similarity of a test face among all the faces within a group, returning the most comparable person(s) for that testing face.
Integrating ML Studio-based OCR APIs is a supervised approach in which training and manual correction on recognition accuracy is required to improve the recognition rate of extracted text. By comparison, Forms Recognizer is an unsupervised model that improves the overall efficiency of the processing rate. Combining AI, Azure ML and biometric analysis can be a powerful force next-gen check processing. Bank branches currently average 300 manually processed checks per day. This automated, AI-driven approach can process more than 4,000 per day (~8.33 checks/minute) with an average accuracy of 98%, presuming the training model has at least 40,000 models built in. That level of speed, scale, and efficiency holds great potential for the banking industry and its customers alike.
The authors would like to thank Arvind Rao (Microsoft) and Senthil Gurusamy (Microsoft) for reviewing this article.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948951.4/warc/CC-MAIN-20230329054547-20230329084547-00406.warc.gz
|
CC-MAIN-2023-14
| 3,612 | 8 |
https://selectorshub.com/why-selectorshub-what-makes-it-unique/
|
code
|
Why SelectorsHub & WHat makes it unique?
SelectorsHub is the only tool which has below features-
Shadow DOM & nested Shadow DOM support.
Nested iframe support.
Shadow DOM inside iframe support.
Selectors Error handling like proper error message for wrong XPath & Selectors.
Smart Editor for Selectors.
Only tool which gives the right information about XPath & CSS Selectors for all kinds of web elements.
Debugger feature to inspect dynamic invisible elements.
All possible selectors can be generated for multiple elements in a single shot.
Automation code and locators page can be generated in no time.
SVG elements support.
Generates all possible selectors.
Generates relative CSS Selector.
Selectors value can be saved in SelectorsHub which saves a lot of time while writing selectors.
Generates case insensitive selectors.
XPath & CSS Selectors can be generated with single quotes as well as double quotes.
Available for all browsers with similar functionality. Only for safari, it has some limitations.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320305423.58/warc/CC-MAIN-20220128074016-20220128104016-00689.warc.gz
|
CC-MAIN-2022-05
| 1,007 | 18 |
https://www.plantedtank.net/forums/8-general-planted-tank-discussion/21026-ideas-wood.html
|
code
|
I brought back some pieces of wood from mexico 3 weeks ago, (seen here: http://www.aquariumadvice.com/download.php?id=15652
) and want to use them for aquariums. They were ID'd as cactus "skeleton" in another forum ( http://www.aquariumadvice.com/viewto...=499349#499349
) but I wanted to see if anyone here has had experience with this stuff. I'd really like to use it but I've been told it will decompose waaay too fast.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141184123.9/warc/CC-MAIN-20201125183823-20201125213823-00344.warc.gz
|
CC-MAIN-2020-50
| 422 | 3 |
https://community.oracle.com/message/10317624
|
code
|
Hello I want to setup Sql Developer on our network server so people can access through citrix. users have to remote login using cirtix and access Sql developer. But some users are creating their own profiles with password daved and since it is a central location, the profiles are visible to other users.
Is there a way to create few connection profiles and disable the option to create new connections?
in my OSX box I found the connections stored in +<users_home>/.sqldeveloper/system3.1.05.97/o.jdeveloper.db.connection.184.108.40.206.37.59.43/connections.xml+
I'm sure you will find a proper file also on your host.
Just remove any write permissions on this file from the user which excutes your sqldeveloper - none will be able to store any new connections defined.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607649.26/warc/CC-MAIN-20170523183134-20170523203134-00028.warc.gz
|
CC-MAIN-2017-22
| 770 | 5 |
https://talk.openmrs.org/t/trouble-running-openmrs-3-x-docker-image-on-apple-m1-arm64/35886
|
code
|
Hi, I was trying to install openmrs 3.x using the https://github.com/openmrs/openmrs-distro-referenceapplication/blob/3.x/run/docker/docker-compose-distro.yml docker image. But for some reason, it fails to install and run the application.
When I start the containers, the backend suddenly crashes showing this error.
(The error log shows a JDK error)
The front end is running without any error, but it is extremely slow.
In the docker desktop app, I can see a warning saying that the images are built for amd64 architecture:
I am using a MacBook Pro M1 which has ARM64 architecture. So, probably that may be the reason for this error.
I think @anjisvj and @pasindur2 are also facing this issue. @ibacher could you please help us to solve this issue.
yeah I’m also having the same issue
We can try to test if an ARM-specific build will fix things. Unfortunately, I don’t have access to an M1, but if you checkout the 3.x branch of this project (
git clone -b 3.0.0-alpha.4 --single-branch [email protected]:openmrs/openmrs-distro-referenceapplication.git) and then build it
mvn clean install, you can then run the docker-compose in the
run/docker subfile of that folder which should now be an ARM build of everything… assuming ARM versions of the base images we rely on exist.
If that works, we can look into how we get ARM versions of our images built automatically for you…
Hi @ibacher, thank you for the response. I tried building it by following your instructions, but the build fails and throws an error saying that the
package.json file is missing. There’s a
package-lock.json file inside the
openmrs-distro-referenceapplication/package/ directory. But the
package.json file is missing.
Error log: ARM build - Pastebin.com
Could you try running this in a directory where there aren’t any spaces in the path?
Oh right. It works! Thank you.
After building that and running docker compose, the backend and the database are working fine.
But the SPA frontend doesn’t display anything in the login page. It shows some errors in the console:
The esm versions in the actual frontend deployment are different than the versions shown in the error. I’ll try rebuilding it and let you know if the problem doesn’t get fixed
Update 2022-03-04T18:30:00Z: It works correctly with the latest version
Just wanted to stop by and say I haven’t forgotten about this. Docker’s multi-architecture support isn’t as easy to leverage as I was hoping.
When trying to run the image the frontend container throws the following error:
./startup.sh: 8: ./startup.sh: cannot open /var/www/ui/index.html: No such file
error opening output file: No such file or directory
@ibacher did you make any progress on multi-arch builds? I could definitely build it locally and publish to dockerhub to unblock people. On CI we will need to upgrade the linux kernel on Bamboo agents to support multi-arch builds. We were awaiting that for OCL as well.
@cintiadr are there any plans to upgrade kernels in not so distant future? If not, would it be okay for me to look into upgrading bamboo agents only or does it need to happen for all our instances for consistency?
The good(ish) news on this front is that Jetstream is being retired in favour of Jetstream2; from the chat on the #infra channel on Slack, I think part of the migration will involve moving to at least Ubuntu 20.04, i.e., we’re going to have to migrate the infrastructure anyway…
It might be helpful if you could push the images out there.
Generally what happens here is that an earlier build step failed. If you look up in the log, you should see something shortly after Maven logs a message about running a long command that includes
npm exec -- openmrs@... build . When this build fails, the index.html file doesn’t get created. Under some conditions (and I’m not really sure what those are), the webpack run triggered by
openmrs build fails, but the
openmrs executable (for some reason) doesn’t catch that, so the rest of the build proceeds as if it had succeeded.
git pull to get the latest version of the 3.x branch helps, but if you could post the full build log that would also be helpful.
Thanks @ibacher !
I built it again and rebuilt the image. The front end works fine now.
The DB container failed with this error.
Then I temporarily upgraded the image to
mariadb:10.7 and it worked.
However, the backend throws the following error:
For the backend error, try delete the
lucene folder in your application data directory and then start again.
Since this is Docker, if you don’t mind losing any data you might have locally,
docker compose down -v will destroy the associated volumes which should handle both deleting the
lucene directory (as @dkayiwa suggested) and undoing whatever caused some file to be created by MariaDB 10.7 (though I don’t think there’s a good reason we couldn’t support 10.7).
Thanks, @dkayiwa and @ibacher running the down command helped!!
@raff over the next months, we should be migrating to a new jetstream, which will get us with a new a new machine and new kernel
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711417.46/warc/CC-MAIN-20221209144722-20221209174722-00646.warc.gz
|
CC-MAIN-2022-49
| 5,072 | 51 |
https://intercom.help/manifestly/en/articles/93382-using-checklists-and-receiving-notifications-within-a-slack-channel
|
code
|
Associate a Slack Channel with a Workflow
You can associate a specific Slack Channel with a Workflow. With this configuration, your team can work on the checklist within that Slack Channel and all notifications - late checklist, late step, step completed - are sent to the Slack Channel.
Another bonus is that anyone in that Slack channel can start working on the checklist without being assigned to the checklist. This lets people automate the new checklist runs, without assigning them to specific people, and then letting people in that Slack channel pick and start working on the new checklists.
How to set it up
In a workflow
When editing a workflow, you can set a Slack channel to receive all updates when people work on those checklists.
While every checklist run for a workflow inherits the workflow's settings, you can also set the channel on specific checklist runs.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363149.85/warc/CC-MAIN-20211205065810-20211205095810-00339.warc.gz
|
CC-MAIN-2021-49
| 876 | 7 |
https://math.gatech.edu/seminars-and-colloquia-by-series?series_tid=53&page=5
|
code
|
Wednesday, September 16, 2015 - 12:00 , Location: Skiles 006 , Prof. John B. Etnyre , School of Mathematics, Georgia Institute of Technology , [email protected] , Organizer:
Food and Drinks will be provided after the seminar.
In this seminar, Prof. John Etnyre will begin this talk by discussing a classical question concerning periodic motions of particles in classical physics. In trying to better understand this question we will develop the notion of a symplectic structure. This is a fundamental geometric object that provides the "right way" to think about classical mechanics, and many many other things too. We will then indicate how modern ideas can be used to give, at least partial, answers to our initial naive questions about periodic motions.
Wednesday, April 22, 2015 - 12:05 , Location: Skiles 006 , Zhiwu Lin , Georgia Tech , Organizer: Benjamin Ide
Many physical models without dissipation can be written in a Hamiltonian form. For example, nonlinear Schrodinger equation for superfluids and Bose-Einstein condensate, water waves and their model equations (KDV, BBM, KP, Boussinesq systems...), Euler equations for inviscid fluids, ideal MHD for plasmas in fusion devices, Vlasov models for collisionless plasmas and galaxies, Yang-Mills equation in gauge field theory etc. There exist coherent structures (solitons, steady states, traveling waves, standing waves etc) which play an important role on the long time dynamics of these models. First, I will describe a general framework to study linear stability (instability) when the energy functional is bounded from below. For the models with indefinite energy functional (such as full water waves), approaches to find instability criteria will be mentioned. The implication of linear instability (stability) for nonlinear dynamics will be also briefly discussed.
Wednesday, January 28, 2015 - 12:15 , Location: Skiles 005 , Dr. Molei Tao , Georgia Tech Math Department , Organizer: Alexander Hoyer
Please note the delayed start for this week only.
The main focus of this talk is a class of asymptotic methods called averaging. These methods approximate complicated differential equations that contain multiple scales by much simpler equations. Such approximations oftentimes facilitate both analysis and computation. The discussion will be motivated by simple examples such as bridge and swing, and it will remain intuitive rather than fully rigorous. If time permits, I will also mention some related projects of mine, possibly including circuits, molecules, and planets.
Wednesday, January 7, 2015 - 12:00 , Location: Skiles 005 , Allen Hoffmeyer , JP Morgan , [email protected] , Organizer: Allen Hoffmeyer
In this talk, we will discuss what entails being a front-office quant at JP Morgan in the Emerging Markets group. We discuss why Emerging Markets is viewed as its own asset class and what there is to model. We also give practical examples of things we look at on a daily basis. This talk aims to be informal and to appeal to a wide audience.
Wednesday, November 12, 2014 - 12:00 , Location: Skiles 005 , Dr. Kirsten Wickelgren , Georgia Tech Math Department , Organizer: Alexander Hoyer
We will discuss methods for solving polynomial equations with integer solutions using the loops on the space of all complex solutions to the same equations. We will then state generalizations of this method due to A. Grothendieck.
Wednesday, October 29, 2014 - 12:05 , Location: Skiles 005 , Dr. John Etnyre , Georgia Tech Math Department , Organizer: Alexander Hoyer
There is a beautiful idea that one can study spaces by studying associated geometric objects. More specifically one can associate to a manifold (that is some space) a symplectic or contact manifold (that is the geometric object). The question is how useful is this idea. We will discuss this idea and related questions for subspaces (that is immersions and embeddings) with a focus on curves in the plane and knots in three space. If time permits we will discuss powerful new tools from contact geometry that allow one use this idea to construct invariants of knots and more generally embeddings and immersions in any space.
Wednesday, October 1, 2014 - 12:00 , Location: Skiles 005 , Ionel Popescu , Georgia Tech Math Department , Organizer: Alexander Hoyer
This talk is intended to be a cocktail of many things. I will start with standard random matrices (called GUE in the slang) and formal computations which leads one to the main problem of counting planar diagrams. This was done by physicists, though the main computation of generating functions for such planar diagrams go through an analytic tools. Here I will change the topic to analysis, and get through with the help of Chebyshev polynomials and how these can be used to solve a minimization problem and then from there to compute several generating functions of planar diagrams. Then I will talk about tridiagonalization which is a main tool in matrix analysis and point out an interesting potential view on this subject.
Wednesday, September 17, 2014 - 12:00 , Location: Skiles 005 , D. Lubinsky , Georgia Tech Math Department , Organizer: Alexander Hoyer
There is a long standing asymptotic relationship in several areas of analysis, between polynomials and entire functions of exponential type. Many extremal problems for polynomials of degree n turn into analogous extremal problems for entire functions of exponential type, as the degree n approaches infinity. We discuss some of the old such as Bernstein's constant on approximation of |x|, and recent work on Plancherel-Polya and Nikolskii inequalities.
Wednesday, September 3, 2014 - 12:00 , Location: Skiles 005 , Dr. Dan Margalit , Georgia Tech Math Department , Organizer: Alexander Hoyer
Here is a classical theorem. Consider a bijection (just a set map!) from the Euclidean plane to itself that takes 0 to 0 and takes the points on an arbitrary line to the points on a (possibly different line). The theorem is that such a bijection always comes from a linear map. I'll discuss various generalizations of this theorem in geometry, topology, and algebra, ending with a discussion of some recent, related research on the topology of surfaces.
Wednesday, August 27, 2014 - 12:00 , Location: Skiles 005 , Dr. Matthew Clark , Northrop Grumman, Future Technical Leaders (FTL) Program , Organizer: Alexander Hoyer
Have you heard the urban legend that an experienced college recruiter can make an initial decision on whether or not to read your resume in less than six seconds? Would you like to see if your current resume can survive the six-second glance? Would you like to improve your chances of surviving the initial cut? Do you know what happens to your resume once you hand it to the recruiter? Should you have different resumes for online submission and handing to decision makers? How many different resumes should you prepare before you go to the career fair? Does it really take 30 revisions of your resume before it is ready to be submitted? Dr. Matthew Clark has supported college recruiting efforts for a variety of large corporations and is a master at sorting resumes in six seconds or under. Join us for a discussion of how most industry companies handle resumes, what types of follow up activities are worth-while, and, how to improve your chances of having your resume pass the “six second glance”.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221213903.82/warc/CC-MAIN-20180818232623-20180819012623-00361.warc.gz
|
CC-MAIN-2018-34
| 7,388 | 22 |
https://www.pockettactics.com/snake-games
|
code
|
Snakes are fascinating, terrifying, and adorable creatures that come in all colors and sizes, making them the perfect protagonists for a game. That’s why there are so many great snake games out there. Plus, thanks to a healthy dose of nostalgia, there’s a bunch of games like Snake on the market too for all you ex-brick phone owners.
The team at Pocket Tactics is full of animal lovers, so we have lists of animal games to suit your every need. Whether you want the best dog games, cat games, horse games, or bear games, we have the guides for you.
Let’s take a look at the best snake games and games like Snake on Switch and mobile.
Snake Pass is an adorable 3D physics puzzle platformer starring Noodle the snake and Doodle the hummingbird. Their mystical home Haven Tor has been disrupted and they must return it to its former tranquillity.
Use Noodle’s slithery body to navigate levels in a way that only a snake can!
Snake Game – Switch
Sometimes, you just wanna relive the simple joy of playing Snake on your Switch, and Snake Game provides you with just that.
Enjoy the timeless mobile game in four different modes – classic, retro, snake on steroids, and snake master, and try your best to beat the high score.
Snake It ‘Til You Make It – Switch
It’s time to unleash the snakes! Take on solo obstacle courses or fight against other raging reptiles in a snake battle royale.
Customize your snake, snack on as many apples as you can, and become the ultimate snake champion!
Slither.io – mobile
Agar.io kicked off the massive boom in .io games, where you compete against players across the world to become the biggest cell, or in the case of Slither.io, the biggest snake. Circle around smaller snakes to destroy them, absorb their remains, and become the longest snake in the arena. It’s way less gross than it sounds, we promise.
Snake ‘97 – mobile
Another pick for fans of classic Snake is Snake ‘97, a mobile game that doesn’t just emulate the game, but also emulates the brick phones we used to play on as well.
The developer came up with this idea when they had to switch back to an old phone of theirs while waiting on smartphone repairs, and realized that Snake was missing from our new devices. Experience the first two Snake games with their classic dot matrix displays and monotone sounds.
Gravity Noodle – mobile
Control your snake as it completes obstacle courses in the sky! As the name suggests, this noodle is fighting against gravity to stay firmly wrapped around the bridges and ladders in the clouds to avoid falling to its doom.
Last Command – Switch
If you’re confused by the anime girl in the artwork, just hear me out. Last Command combines the nostalgic arcade skill of classic Snake with the equally nostalgic but more niche experience of bullet hell adventures like the Touhou series.
Metal Gear Solid 3: Snake Eater – Switch
Metal Gear Solid is full of snakes – well, Snakes – and we can finally experience the first three MGS titles in high definition on the Switch thanks to the Master Collection. MGS 3: Snake Eater deserves a special mention on this list as not only do you play as Naked Snake, but you can, in fact, trap and eat snakes.
Undertake a deep-cover stealth mission as Naked Snake, set in a lush jungle crawling with dangerous enemy forces and equally dangerous natural threats. Hunt and kill animals for food, use various forms of camouflage, and show off your close-quarters combat skills against foes.
That’s it for our list of the best snake games on Switch and mobile. If all this slithering about has made you hungry, check out our list of the best cooking games. Or, see if you agree with our picks for the best Lego games and best Sonic games.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817144.49/warc/CC-MAIN-20240417044411-20240417074411-00870.warc.gz
|
CC-MAIN-2024-18
| 3,743 | 24 |
https://musiclyrics.com/coldplay/a-l-i-e-n-s-lyrics/
|
code
|
The lyrics will be available upon the song’s release. Be sure to come back real quick!
Lyrics added by Marse
- Publishing: Parlophone
- Composition: Brian Eno, Will Champion, Jonny Buckland, Guy Berryman, Chris Martin
- Vocals: Chris Martin
- Release Date: 2 June 2017
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400234232.50/warc/CC-MAIN-20200926040104-20200926070104-00197.warc.gz
|
CC-MAIN-2020-40
| 270 | 6 |
https://cloudformsblog.redhat.com/2017/02/08/setting-up-red-hat-cloudforms-with-microsoft-active-directory-video/
|
code
|
This video highlights the role-based access controls within Red Hat CloudForms and how they can be tied into Microsoft Active Directory, to leverage a company’s existing user and group structure. The goal of the video is to help customers understand how they can integrate CloudForms into their organizational structure with rather minimal setup.
Using this setup, operators can connect existing user and group structures and tie them to CloudForms roles. These roles can be customized and given granular permissions to most elements inside CloudForms.
Users can be granted access from the very top of the organization down to a specific resource (e.g. VM) and anywhere in between. Controls are used to grant users visibility into portions of the UI. For the UI they can see, controls can also be applied as to whether the user can perform the actions or simply view.
At a high level, the following areas are discussed in the video:
- How to configure the integration with Active Directory/LDAP
- How to map existing groups and users
- Walk through role-based access control hierarchy
Additional details on authentication configuration, including LDAP, can be found on the Red Hat CloudForms Documentation.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347388427.15/warc/CC-MAIN-20200525095005-20200525125005-00266.warc.gz
|
CC-MAIN-2020-24
| 1,208 | 8 |
https://status.thethings.network/
|
code
|
During this maintenance window we will upgrade The Things Network v3.15.0
We expect brief downtime of the storage integration. For other components we do not expect noticeable downtime.
Here is the changelog since the current version 3.14.2:
- RPC to query supported PHY versions for a given Band ID.
- Non-TLS LNS endpoint support.
- New config option `is.user-login.disable-credentials-login` that disables login with credentials (can be set per tenant).
- In case where only one authentication provider is configured and the config option is set to `true` the login screen redirects to provider login.
- Update to Go 1.17.
- LBS timestamp rollover threshold.
- The Application Server worker pools may now drop workers if they are idle for too long.
- Improved error page UX in the Console.
- Collaborator ID validation in gateway claiming form in the Console.
- Entity purge handling for non-admin users in the Console.
- URL field validation in webhook forms in the Console when value is not trimmed.
- Not rendering site header and footer for error pages in some situations.
- Not providing a copy button for error pages in some situations.
- Improved errors for invalid URLs.
- Limit length of search queries within tables in the Console to 50 to comply with API validation.
- External Join Server address handling in end device creation form in the Console.
- Updating `supports_class_b` field in the end device general settings page in the Console.
Sep 17, 13:42 CEST
At The Things Conference we announced that The Things Network V2 would permanently shut down in September 2021. Because of the pandemic, we later extended this date to December 2021 to give the community some more time to migrate to The Things Stack (V3).
Any updates regarding the sunset of The Things Network V2 will be posted in this maintenance announcement.
Jan 25, 14:00 CET
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056900.32/warc/CC-MAIN-20210919190128-20210919220128-00709.warc.gz
|
CC-MAIN-2021-39
| 1,856 | 24 |
https://www.stata.com/support/faqs/windows/crashes-after-starting/
|
code
|
|Explanations for crashes of Stata for Windows
|Alan Riley, StataCorp
If your copy of Stata for Windows is crashing, check to see whether or not you have a Logitech mouse.
In the [386Enh] section of C:\WINDOWS\SYSTEM.INI, Logitech places a line which reads keyboard=lvkd.386. If you replace this line with keyboard=*vkd, the crash goes away, and you still get the advanced features of your mouse.
This driver allows you to simulate mouse-clicks with your keyboard and/or set up certain keyboard/mouse-click combinations to have a special meaning to your computer. Most users do not use these features and so lose nothing by disabling the driver.
We have received reports of problems with Stata for Windows 3.1 running on some newer Toshiba laptop computers. After reading through the reports on the problem, it became apparent that the problem only occurred under Windows 3.1. Some users have had success simply by installing Windows 95.
A FAQ was posted regarding Logitech mouse drivers conflicting with Stata under Windows 3.1. It seems that some Toshiba notebooks are using the same mouse/keyboard drivers under a different name.
For those of you who are still experiencing this problem, try this solution:
By changing the above line, you will lose the ability to perform the mouse/keyboard combination "tricks", a seldom-used feature of this driver.
If you try the above and it DOES NOT solve the problem, please email a report of your Toshiba model number and operating system, along with your Stata serial number and copies of your autoexec.bat, config.sys, win.ini and system.ini files to [email protected].
Check your config.sys and make sure that the line containing himem.sys is the very first line. The second line should contain emm386.exe noems (or qemm.exe) if it is used at all. Modify the config.sys to make these changes if you have to but make sure you backup both your config.sys and autoexec.bat before modifying them!
If that does not work, you must now disable all your drivers to confirm that it is a driver problem. To do this, enter DOS and type
rename autoexec.bat autoexec.old copy config.sys config.old
Then edit your config.sys and make sure that it only contains the himem.sys line and nothing else. Restart Windows and execute Stata. If that solves your problem, then there is a device driver problem and you will basically have to add in drivers one at a time until you can narrow it down to one driver.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474744.31/warc/CC-MAIN-20240228175828-20240228205828-00378.warc.gz
|
CC-MAIN-2024-10
| 2,435 | 14 |
https://www.codeproject.com/lounge.aspx?msg=4732012
|
code
|
The Lounge is rated PG. If you're about to post something you wouldn't want your
kid sister to read then don't post it. No flame wars, no abusive conduct, no programming
questions and please don't post ads.
Yep, I tried those steps, and they worked, but, there is always a but, the LAN devices (computers, tv's,...) were not capable to get Access to LAN computers shared networks and similar, only to Internet...
"Stock up in time for Christmas (Stock up in time for Christmas)
Christmas is now just around the corner but before we get all excited
about opening the first door on our advent calendars, we have the pick
of this month’s offers to bring you! We have bargains galore in this
newsletter, with 10% off Hill’s Science Plan, great deals on James
Wellbeloved and some exciting freebies with Royal Canin. Now is the
ideal time to stock up for Christmas."
I'm seriously hoping they are just incompetent and sent it way too late...
Never underestimate the power of stupid things in large numbers --- Serious Sam
It's never too early to start stocking up for Christmas 2014!!!
Anything that is unrelated to elephants is irrelephant Anonymous ----- The problem with quotes on the internet is that you can never tell if they're genuine Winston Churchill, 1944 ----- I'd just like a chance to prove that money can't make me happy. Me, all the time
Just finish watching Brit Floyd, a Pink Floyd tribute band, on Paladia. It was...not entirely an empty performance. It's hard to describe. All the notes are there, but the soul of the sound is missing. The subtle inflections in tone, in the "story" of sound, ... is missing. It was kind of like eating celery...you know?? More energy goes into the experience than you get out of it.
Now I have to go dig up a Pink Floyd Live album to go get a fuller experience...
It's the difference between watching them live and on YouTube. Live , they feed off the audience and this gives us a richer experience. If you get the chance to go to one of their shows, I would take it.
If it's the same tribute band I think it is they already do, and have given a few shows in my area over the last few years. I'm not sure though, whoever recorded their radio adverts didn't speak clearly and I thought he was trying to say something like Rick or Bret, but Brit would fit as well.
Did you ever see history portrayed as an old man with a wise brow and pulseless heart, waging all things in the balance of reason?
Is not rather the genius of history like an eternal, imploring maiden, full of fire, with a burning heart and flaming soul, humanly warm and humanly beautiful?
Training a telescope on one’s own belly button will only reveal lint. You like that? You go right on staring at it. I prefer looking at galaxies.
-- Sarah Hoyt
I can't comment as I've never seen a tribute band of any kind. But anyone who does his bit to promote the Floyd to a wider audience deserves a pat on the back.
I just recently discovered a video on YouTube featuring Gary Moore and BB King. Bloody 'eck! To hear two guitars talking to each other like Moore's and Lucille is something special. It reminds me what we lost when Gary Moore died and it reminds me what will be lost when BB King says goodbye to Lucille.
If there is one thing more dangerous than getting between a bear and her cubs it's getting between my wife and her chocolate.
yesterday it got to 42 and a bit here.
spent much time in shopping mall (as did many others) then to the beach [^]at 5pm.
meant to be 12th nighting the xmas decs today - but its about 34 and humid, so may just pump up the air con and watch a movie.
I gather its a bit chilly in moat parts of the northern hemisphere?
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-50/segments/1480698541876.62/warc/CC-MAIN-20161202170901-00459-ip-10-31-129-80.ec2.internal.warc.gz
|
CC-MAIN-2016-50
| 3,675 | 30 |
https://blog.adnansiddiqi.me/introduction-to-technical-analysis-in-python-using-ta-lib/
|
code
|
This post is the part of trading series.
In this tutorial, I am going to discuss TA-Lib, a technical analysis library for Python apps. Before I move on and discuss how you can do technical analysis in Python, allow me to discuss what technical analysis is and how it helps to make a decision about whether you buy an asset, sell, or hold it.
What is Technical Analysis
Technical analysis is a trading discipline employed to evaluate investments and identify trading opportunities by analyzing statistical trends gathered from trading activity, such as price movement and volume.
In short, it is the study of past and current data and trying to figure out what’s going to be next. You use indicators and try to find out different patterns that help to make decisions.
On the other hand, Fundamental Analysis is all about making decisions based on a company’s financials like yearly/quarterly profits, PE Ratios, etc.
Installing the TA-Lib Python wrapper is pretty easy. All are required to execute the
pip install TA-Lib
You must install the TA-Lib library itself so that you can use it in your applications. On macOS, you may install via Homebrew:
brew install ta-lib
If you are using Linux or Windows then you may get the details here.
I am also installing the Yahoo Finance library to fetch our required data:
pip install yfinance
Alright! So everything is set up. Now before we start using this library, we must know some basics of technical analysis and how TA-Lib can help us to achieve our goals.
I am going to use Yahoo Finance to fetch data and Jupyter Notebook for this tutorial as they make it easy to write interactive code. Use
jupyter notebook command to start the IDE and create a new file Analysis Intro.ipynb.
The very first thing I am going to do is to import all required libraries:
# All Imports import yfinance as yf import talib as ta import pandas as pd
We are going to analyze Facebook shares which are already 25% decline, as the article said as millions of users quit FB in recent days.
The very first thing that we are going to check is the Simple Moving Average(SMA) of this scrip.
What is the Moving Average
If you notice the chart of a stock price, you will find it fluctuating a lot. This fluctuation could lead to generating false signals. Moving averages(MA) help to filter out the noise from the random price movements and smooth it out in order to see the average value. MAs are used to identify trends and reversals. When the price is above the MA, we say it’s an uptrend otherwise a downtrend. They are also used to identify areas of support and resistance. MAs are based on past price and is also termed as a lagging indicator. When the price crosses over the MA, it is a signal to buy, and when it crosses down under the MA, it is a signal to sell. There are two types of MAs: Simple and Exponential
- Simple Moving Average:- A simple moving average (SMA) is a calculation that takes the arithmetic mean of a given set of (closing)prices over the specific number of days in the past; for example, over the previous 15, 30, 100, or 200 days (Source: Investopedia).
- Exponential Moving Average:- Exponential moving average (EMA) is a weighted average that gives greater importance to the price of a stock in more recent days, making it an indicator that is more responsive to new information(Source: Investopedia).
If you plot both SMA and EMA on a chart, you will find that the EMA line is pretty close to the actual chart than an SMA because it’s reacting faster than an SMA. This is the reason that SMA is considered a lagging indicator. MAs are available for different time periods: 10,20,500,100,200. 10-20 for short-term trends, 50 for mid-term, and 200 for long-term trends.
Enough discussion of MA background, let’s write some code!
First, I will be fetching FB stock price data from the beginning of the year to date.
# Facebook Historial Data fb = yf.Ticker("FB") df = fb.history(start="2022-01-03") df
The data is now available in a pandas dataframe, let’s plot a graph showing data about the closing price and the SMA of the closing price
plt.style.use('fivethirtyeight') df['MA'] = ta.SMA(df['Close'],timeperiod=5) df[['Close','MA']].plot(figsize=(8,8)) plt.show()
When I execute the code in the notebook, it generates the following:
As you can see, unlike the closing chart, the SMA chart is smoother.
Let’s add an EMA chart to it.
plt.style.use('fivethirtyeight') df['MA'] = ta.SMA(df['Close'],timeperiod=5) df['EMA'] = ta.EMA(df['Close'], timeperiod = 5) df[['Close','MA','EMA']].plot(figsize=(8,8)) plt.show()
And when I run this code, the chart looks like the below:
As you can notice, the MA chart is responding slower than the EMA chart, it determines the downtrend slower than the EMA chart.
What is the Relative Strength Index(RSI)
RSI is a momentum indicator that helps to learn whether a certain share is overbought or oversold. Its value lies between 0-100. If it is under 30, it means it is oversold, and has a chance to buy it. If the value lies above 70, it means it is overbought and it is a good chance to dump your stock. Let’s calculate and chart the RSI of the FB/Meta stock. Let’s check the RSI of FB.
# RSI df['RSI'] = ta.RSI(df['Close'],14) df['RSI'].plot(figsize=(8,8),marker='o') df.tail(10)
And it produces. 14 is the default period where it is calculated.
As you can see, there was a big rally between 1 and 2 Feb and then it was dumped badly between 3 to 9 Feb and it seems it is trying to recover again.
In this tutorial, we learned how you can use TA-Lib and charts to figure out your next trading strategy. It is not possible to cover everything related to TA-Lib in this post but I hope it gives you an idea of what to do next. You may create a bot that checks RSI values and gives signals periodically. Like always, the code is available on Github.
If you are interested in knowing how to generate buy and sell signals using the RSI indicator then click here.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100551.2/warc/CC-MAIN-20231205140836-20231205170836-00894.warc.gz
|
CC-MAIN-2023-50
| 5,960 | 43 |
https://github.com/huginn/huginn/commit/1ed069871fcb8567e61b4953aa6a574274e16f74
|
code
|
Please sign in to comment.
- Loading branch information...
|@@ -9,7 +9,7 @@ Huginn is a system for building agents that perform automated tasks for you onli|
|#### This is just getting started, but here are some of the things that you can do right now with Huginn:|
|* Watch for air travel deals|
|-* List terms you care about and receive emails when their occurrence on Twitter changes drastically|
|+* List terms you care about and receive emails when their occurrence on Twitter changes drastically. (For example, want to know when something interesting has happened in the world of Machine Learning? Huginn will watch the term "machine learning" on Twitter and tell you when there is a large spike.)|
|* Track the weather and get an email when it's going to rain (or snow) tomorrow|
|* Follow your project names on Twitter and get updates when people mention them|
|* Scrape websites and receive emails when they change|
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886109470.15/warc/CC-MAIN-20170821172333-20170821192333-00649.warc.gz
|
CC-MAIN-2017-34
| 924 | 10 |
https://www.chilitechno.com/gpm/2019/5/14/virtualization-lab-with-esxi-hypervisor-650
|
code
|
This is a bit of a dated post, but I’m going to discuss virtualization lab configuration for development and experimentation using ESXi hypervisor 6.5.x. It’s particular relevant now as I’ve setup a Kubernetes cluster at home to develop some orchestration scripts and cluster architecture design for scalable applications. This is a much cheaper solution than deploying a cluster into a cloud-based provider. The only real resource cost is power which comes in at a significantly cheaper expense than the per-hour provisioning costs of a cloud provider.
The bare metal hardware config build is purely commodity, self-assembled hardware: Shuttle cube form-factor SH170 with Kaby Lake i7-7700 single socket quad-core 3.6Ghz configuration, 32GB non-ECC DDR4 memory and 1TB Crucial M.2 SATA SSD. Since this is a pure development lab with large periods of idle time, spec-ing out top tier components didn’t make a whole lot of sense. I still wanted to stick with a SSD for primary storage for fast I/O (510-530MB/s R/W), but the rest of the spec was upper-middle range. There is room to double the memory capacity to 64GB, should the need arise to provision more virtual machines.
I had initially built this on-premises vSphere ESXi host back in 2017 for virtualization to build a cluster for NLP and ML RNN text generation using a Debian 8 virtual machine connected to an NVIDIA GeForce GTX 1060 [6GB] w/ direct PCIE passthrough (this allows direct access by the virtual machine to utilize the connected GPU for CUDA functions). It should be noted that in order for this passthrough configuration to work correctly, I had to trick the virtual machine to think it wasn’t virtualized (with the added side effect that it wouldn't allow me to install VMWare Tools). Virtualized machines cannot be connected to GeForce GTX 1060 as the 1060 NVIDIA driver refuses to load in a virtualized environment because NVIDIA forces you to use their Tesla GPUs in that scenario. The only way this can work is if the guest doesn’t realize it is running virtualized. VMWare Tools are nice to have, but they aren’t strictly necessary, and having the machine have access to the GPU is more important in this situation.
vSphere ESXi made the most sense for a base-metal hypervisor for the development lab, though I did look at XenServer as one possible option, but adequate PCIE passthrough support did not exist at the time. The free version was acceptable for a non-production development lab host system.
Currently the hypervisor version is 6.5.0 (Build 4887370) but I’ll be upgrading it soon to at least 6.7.0 (Build 13006603). I just have to identify and confirm that there are no custom VIBs that would be blown away upon upgrade; probably not, as this was not like that time I installed vSphere on a 2012 MacBookPro 15” via Thunderbolt ethernet, thanks to this handy guide.
Lately I’ve been researching and investigating the possibility of using Kubernetes for application container orchestration for an ASP.NET Core + MongoDB application we have been developing here at chilitechno over the last few months. To that end, k8s looks like a great solution for scaling the application, however before launching it into the cloud, we’d like to see about running it in a local on-premises development configuration. I could use a local Minikube / Kubernetes desktop solution for testing this setup, however it doesn’t lend it self to always-on access. Installing a development Kubernetes cluster on the vSphere host seems like the way to go.
Unfortunately while it appears the Canonical Distribution for Kubernetes (CDS) supports vSphere via conjure-up, however, it’s unclear if the free version of ESXi is supported for deployments of CDS. The conjure-up vSphere documentation is sparse at best and screenshots indicate an API endpoint for accessing vSphere. The problem here is that the free version does not have API access. I would have to upgrade the lab to an ESXi Essentials license at a cost of $600USD.
That’s okay, though, I can get my hands dirty and figure out how to manually install and configure Kubernetes at a very low level on the host.
A new post with discuss details of setting up such a cluster, as you can see in the screenshot above, the guests are provisioned thusly:
1x Master: 2GB, 2 vCPU
3x Worker: 3GB, 2vCPU
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986659097.10/warc/CC-MAIN-20191015131723-20191015155223-00503.warc.gz
|
CC-MAIN-2019-43
| 4,340 | 11 |
https://cepr.org/about/people/federico-carril-caccia
|
code
|
Federico Carril‐Caccia is an assistant professor from the Department of Spanish and International Economics at the University of Granada (Spain). Moreover, he has been a PhD trainee at the European Central Bank, and a visiting researcher at the Institute for the World Economy (Kiel, Germany), Jiangxi University of Finance and Economics (Nanchang, China) and the University of Valencia (Spain). He obtained his PhD in Economics from University of Granada, in 2019. His research focuses on the drivers of tourism and migration, and the determinants and effects of foreign direct investment. His work has been published in various international journals such as International Journal of Emerging Markets, World Economy, and Empirical Economics.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100016.39/warc/CC-MAIN-20231128214805-20231129004805-00501.warc.gz
|
CC-MAIN-2023-50
| 745 | 1 |
http://www.justskins.com/forums/server-createobject-access-error-17276.html
|
code
|
I am trying to invoke the following line of code within my ASP:
Set oApp = Server.CreateObject("Word.Application")
This results in the following error:
ASP 0178 Server.CreateObject Access Error
The call to the Server.CreateObject failed while checking
Has anyone have any ideas why this is happening??
I have tried changing the file permissions on Msvbvm60.dll and
changing the security settings within "Dcomcnfg"... although i have
had no luck.
any help would be appreciated
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370519111.47/warc/CC-MAIN-20200404011558-20200404041558-00449.warc.gz
|
CC-MAIN-2020-16
| 475 | 10 |
https://www.sawtoothsoftware.com/forum/17204/rlh-to-identify-bad-respondents-for-cbc
|
code
|
We have a CBC with 8 choice tasks with 3 choice option each (5 attributes).
We believe that several of the respondents have just clicked through the survey and would like to exclude them from the analysis.
We came across the following article which describes using RLH for excluding "bad respondents" from a Max-Diff study:https://www.sawtoothsoftware.com/help/lighthouse-studio/manual/hid_web_maxdiff_badrespondents.html
We were wondering whether there are any suggestions for such a "Fit Statistic to Identify Random Responders with 95% Correct Classification" for a CBC study.
Obviously respondents below a RLH value of 0.33 should be excluded given that their value is even below the chancel model. However, we believe that respondents with a RLH value close to 0.33 (e.g. 0.4) still have respondent rather randomly.
Any advice from your side would be very much appreciated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145676.44/warc/CC-MAIN-20200222115524-20200222145524-00254.warc.gz
|
CC-MAIN-2020-10
| 878 | 6 |
https://talk.fission.codes/t/pubsub-realtime-updates-across-users-and-devices-f-e-chat-and-notifications/1228
|
code
|
We are building for the CirclesUBI currency, a wallet and marketplace with integrated chat functionality, to exchange goods and services. So we have quite a few notifications. Utilizing ipfs PubSub would be great for an app wide notification service for realtime updates of any kind, f.e. chat messages, new transactions, friend requests, new product updates and of course the chat itself.
Thanks for posting @samuelandert. We do have IPFS pub-sub enabled across webnative and the IPFS nodes we host, but don’t currently expose it directly in the webnative SDK. We do use it ourselves for web-to-web based device linking.
At the very least, we’ll take a look at getting the demo ipfs pubsub room running on fission.
Very nice, looking much forward to this.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103626162.35/warc/CC-MAIN-20220629084939-20220629114939-00491.warc.gz
|
CC-MAIN-2022-27
| 760 | 4 |
https://mono.github.io/mail-archives/mono-bugs/2003-November/008825.html
|
code
|
[Mono-bugs] [Bug 50753][Min] Changed - System.IO.Directory.CreateDirectory() does not throws an exception
Fri, 14 Nov 2003 01:11:04 -0500 (EST)
Please do not reply to this email- if you want to comment on the bug, go to the
URL shown below and enter your comments there.
Changed by [email protected].
--- shadow/50753 2003-11-09 12:43:56.000000000 -0500
+++ shadow/50753.tmp.6623 2003-11-14 01:11:04.000000000 -0500
@@ -1,14 +1,14 @@
Product: Mono/Class Libraries
@@ -19,6 +19,12 @@
The method System.IO.Directory.CreateDirectory() does not throw an
exception when creating a directory, which allready exists as a file with
the same name (tested on Linux and WinXP with Mono 0.28).
I've tested it with MS .NET 1.1, it has the same behaviour. So it seems to
be a problem there too :-).
+------- Additional Comments From [email protected] 2003-11-14 01:11 -------
+I did some investigation on this issue. I too found that .NET 1.1 and
+Mono are behaving in same way. But, .NET 1.0 throws IOException when
+you create a directory with a name by which a file already exists.
+So, it depends on which version of .NET is correct.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144979.91/warc/CC-MAIN-20200220131529-20200220161529-00430.warc.gz
|
CC-MAIN-2020-10
| 1,136 | 20 |
https://softwarerecs.stackexchange.com/questions/38822/looking-for-a-tool-like-ip-personality-to-defeat-os-fingerprinting-for-recent
|
code
|
I am looking for a way to defeat
nmap OS-fingerprinting. This article describes a few approaches and mentions the tool IP Personality, which seems quite promising because it can trick
nmap to detect a certain OS. However, the most recent version of this tool only works for the Linux 2.4 kernel.
I've been googling for a long time to find a tool that is capable of making
nmap detect a different OS for more recent Linux kernels but couldn't find any.
Does anyone know of such a tool?
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401632671.79/warc/CC-MAIN-20200929060555-20200929090555-00084.warc.gz
|
CC-MAIN-2020-40
| 484 | 6 |
http://stackoverflow.com/questions/2835091/git-how-do-i-manage-built-files-in-different-branches/3195312
|
code
|
I have been using Git for a while now. The projects that I have been working on have not been too complicated in regards to branches/tags.
I have decided to use git-svn at work. The SVN repository has many different branches. A lot of these branches are customer customized versions of the trunk.
I often work on problems for different customers at different the same time. So I switch back and forth between branches all the time. The problem is that to test the products I have to rebuild the project each time I switch between branches. A build takes > 2 hours (from scratch):(
I am assuming that there is a way to stash the build files in branch
customer_a and then checkout
customer_b, modify, build, test, commit. Then stash the build files and checkout
customer_a again and pop the
customer_a stash to get back to where I was.
This only works if the build files are tracked (i.e. added or committed). I do not want to track the build files and I definitely do not want to check them in. Is there a way to stash (or do something similar) for non-tracked files? Or a common practice that people use to achieve the same type of thing?
Note that the way our project gets built each library (of which there are thousands) gets builds the files local to the library folder i.e. they are not moved to a build folder at the root of the project. All the built files are spread out all over the place.
So based on some of the comments I think I need to give an example of my problem
Here is my folder structure.
branch1/ src/ component1/ c1.c component2/ c2.c libsrc/ library1/ lib_1.c library2/ lib_2.c branch2/ src/ component1/ c1.c component2/ c2.c libsrc/ library1/ lib_1.c library2/ lib_2.c
So the problem is that
branch2 have the same ancestry but have diverged quite a bit. So if I check out
branch1 and build it I will get binaries (e.g. lib_1.o) that I link against in my
Makefile to build the final component binaries.
If I then checkout
branch2 make a change to
c1.c and run make it tries to link to the binaries that were created by
branch1 (lib_1.o), since they still exist in the directories as built in the previous branch. To avoid this I have to do a clean build each time I switch branches (which takes hours).
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375096579.52/warc/CC-MAIN-20150627031816-00210-ip-10-179-60-89.ec2.internal.warc.gz
|
CC-MAIN-2015-27
| 2,225 | 21 |
http://biology.stackexchange.com/questions/tagged/temperature?sort=frequent&pageSize=15
|
code
|
Can anyone summarize the mechanism by which when an object of a given temperature is placed in contact with, say, the skin on a human fingertip, the average speed of the particles of the object is ...
This is a question that has been in my mind since I was a kid. I'm not a doctor, nor even a biology student, just a curious person. What is the minimum and maximum temperature a human body can stand ...
If you grow a plant from seed in your nice warm house, then plant it out in your temperate garden, it will stop growing for a while, possibly die, and if not, subsequently resume growth. Standard ...
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-06/segments/1422122080417.25/warc/CC-MAIN-20150124175440-00023-ip-10-180-212-252.ec2.internal.warc.gz
|
CC-MAIN-2015-06
| 603 | 3 |
http://superuser.com/questions/316356/how-to-restart-unity-on-ubuntu-11-04?answertab=active
|
code
|
I have Ubuntu 11.04 on my laptop. Unity sometimes crashes. How I can restart Unity using hotkeys?
This question came from our site for professional and enthusiast programmers.
Restart the X Server: Ctrl+Alt+Backspace
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
4 years ago
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398455135.96/warc/CC-MAIN-20151124205415-00291-ip-10-71-132-137.ec2.internal.warc.gz
|
CC-MAIN-2015-48
| 305 | 7 |
https://github.com/nikhilbhardwaj/path-alexa-skill
|
code
|
PATH Tracker - An Alexa Skill Kit
This is an Alexa Skill written in Java and hosted on AWS Lambda. Provides train timings for the PATH network.
The boilerplate and template for the Alexa Skill has been borrowed from this project, it is an excellet project to pick as a starting point for a Java Alexa Skill. In case you want to understand the basic structure, I would strongly recommend that you check it out before peeking in here.
After that you should check out the Intent Schema and Sample Utterances to understand how the skill works. To understand the route finding logic, check out the [GTFS specs] (https://developers.google.com/transit/gtfs/) You can find the source data from the [PATH website] (http://data.trilliumtransit.com/gtfs/path-nj-us/)
- Guice for dependency injection
- Slfj with Log4j bindings for logging
- JUnit for testing
- Gradle for building
- Immutables for cleaner POJOs
Contributions and enhancements
Here are some of the things that I'd like to improve to make this skill more usable.
- Twitter integration to report statuses from @PATHTrain
- Performance improvements in the route finding algorithm (Maybe pre-process data and move it to a SQLite DB do avoid reading from files)
- Support Connections, right now only direct routes are found (Eg if you searched from Newark to Hoboken on a weekday, it'd say no trains. You could however go from Newark to Exchange Pl and then take a train to Hoboken)
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488551052.94/warc/CC-MAIN-20210624045834-20210624075834-00151.warc.gz
|
CC-MAIN-2021-25
| 1,432 | 14 |
http://graphics.cs.cmu.edu/?p=584
|
code
|
Synthesizing Physically Realistic Human Motion in Low-Dimensional, Behavior-Specific Spaces
|Alla Safonova||Jessica K. Hodgins||Nancy S. Pollard|
ACM Transactions on Graphics / SIGGRAPH 2004 (2004)
Optimization is an appealing way to compute the motion of an animated character because it allows the user to specify the desired motion in a sparse, intuitive way. The difficulty of solving this problem for complex characters such as humans is due in part to the high dimensionality of the search space. The dimensionality is an artifact of the problem representation because most dynamic human behaviors are intrinsically low dimensional with, for example, legs and arms operating in a coordinated way. We describe a method that exploits this observation to create an optimization problem that is easier to solve. Our method utilizes an existing motion capture database to find a low-dimensional space that captures the properties of the desired behavior. We show that when the optimization problem is solved within this low-dimensional subspace, a sparse sketch can be used as an initial guess and full physics constraints can be enabled. We demonstrate the power of our approach with examples of forward, vertical, and turning jumps; with running and walking; and with several acrobatic flips.
Alla Safonova, Jessica K. Hodgins, Nancy S. Pollard (2004). Synthesizing Physically Realistic Human Motion in Low-Dimensional, Behavior-Specific Spaces. ACM Transactions on Graphics / SIGGRAPH 2004, 23(3).
author = "Alla Safonova and Jessica K. Hodgins and Nancy S. Pollard",
title = "Synthesizing Physically Realistic Human Motion in Low-Dimensional, Behavior-Specific Spaces",
year = "2004",
month = aug,
journal = "ACM Transactions on Graphics / SIGGRAPH 2004",
volume = "23",
number = "3",
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585997.77/warc/CC-MAIN-20211024111905-20211024141905-00365.warc.gz
|
CC-MAIN-2021-43
| 1,789 | 12 |
http://www.firingsquad.com/hardware/northwood/page2.asp
|
code
|
Intel NetBurst micro-architecture
Hyper-pipelined technology w/ rapid execution engine and execution trace cache
8KB L1 Data Cache, 512KB L2 advanced transfer cache
55 million transistors
0.13-micron manufacturing process w/ copper interconnects
400MHz system bus
Socket-478 form factor
1.5V core voltage
Available in clock speeds of 2.0GHz and 2.2GHz
Northwood's L2 cache
From a features perspective, the only new additions to the Northwood core are the 0.13-micron manufacturing process and the larger, 512KB L2 cache. This marks the first time a desktop processor has contained more than 256KB of cache since the older Katmai Pentium III chips and K75 Athlon cores were around, and remember, neither processor's L2 cache ran at the same clock speed as the processor. Historically doubling the amount of cache has resulted in a performance gain equivalent to one processor speed grade, so it's no surprise to see Intel move in this direction. In fact, it has been speculated for quite awhile and was accidentally supported by a leak on the ASUS website mentioning support for Pentium 4s with 512KB L2 cache.
Like its predecessor, Northwood's L2 cache features a 256-bit interface and is 8-way associative. In addition, the Pentium 4 is unique in that it transfers data on each processor clock. By doubling the amount of L2 cache, Intel has ensured that Northwood's blazing memory bandwidth keeps the processor fed with data. For instance, at 2.2GHz, Northwood's L2 cache bandwidth is 70.4GB/sec (32 bytes x 1 (data transfer per clock) x 2.2GHz = 70.4GB/sec).
Besides a bandwidth advantage, Northwood's 512K L2 cache also gives Intel the edge in onboard memory. While Athlon XP contains 128KB L1 cache and 256KB L2 cache (with an exclusive architecture) for a total of 384KB of onboard cache memory, Northwood contains a 8KB data cache (and 12K execution trace cache) and 512KB L2 cache, giving it a total of 520KB cache on-chip.
As a result of the larger L2 cache, transistor count rises from 42 million in Willamette to 55 million in Northwood, however with Northwood Intel is using a denser SRAM memory cell, effectively allowing them to get double the memory size out of the same footprint. This keeps production costs down as the die size is reduced.
Northwood's system bus remains the same at 400MHz, and provides up to 3.2GB/sec of bandwidth. But as we've mentioned previously, Intel is rumored to be hard at work on increasing the bus to 533MHz. In fact, back in September we took a look at a 533MHz Pentium 4 system running at 1.6GHz. In that article we observed a roughly 9% performance increase -- allowing our 533MHz system bus 1.6GHz system to outpace a 1.8GHz Pentium 4 system with a 400MHz bus.
With Northwood's larger cache and higher clock speeds, the gap will be even more significant if Intel does indeed move to the 533MHz bus in the future.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697232084/warc/CC-MAIN-20130516094032-00048-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 2,862 | 16 |
http://www.tradeleaks.com/leak/274/
|
code
|
Of all the internet sites out there this site must be the worst. All you have is a collection of idiots and immature people posting rubbish about absolute nothingness. I only came here after I saw it on Sunrise. What a waste of internet space. NB; If you think you can't be traced and sued for defamation, think again. All ip addresses can be recorded and traced. By law, you can subpeona the ip addresses for a court case. Anyhow, I came, I looked and all I saw on this site is a bunch of turds posting lies about stuff they know nothing about..
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164928424/warc/CC-MAIN-20131204134848-00048-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 546 | 1 |
https://mail.python.org/pipermail/python-list/2009-July/542982.html
|
code
|
Method to separate unit-test methods and data?
gagsl-py2 at yahoo.com.ar
Mon Jul 6 08:46:33 CEST 2009
En Sun, 05 Jul 2009 15:48:06 -0300, Nick Daly <nick.m.daly at gmail.com>
> none_values = ((-1, None),
> (None, -12.8))
> What I haven't yet figured out how to do though, is properly override
> the default class member values with values from the config file. The
> config file's data is loaded as a string instead of as a list, as I'd
> want. This causes all the tests to fail, as while none_values needs
> to be interpreted as a list, it is instead understood as:
> " ((-1, None),\n (None, -12.8))"
> Does anyone have any solutions for these problems?
You may use a .py file to configure it, instead of your .cfg
> First, is there a
> known and simple way to separate unit-test data and methods into
> separate files?
Just write them in separate files? I didn't quite understand the
> Secondly, if not, is there a simple way to convert
> strings into other base types, like lists, dictionaries, and so forth?
eval(), but I'd just use a .py file
People usually warns against using eval on arbitrary strings, or on
user-supplied data, but in this case it is not worse than
importing/executing the module.
> Or, am I going to have to write my own list-parsing methods? Would
> pickling help? I haven't yet had a chance to look into if or how that
> would work... If there's anything else I can clarify about this
> request, feel free to let me know.
Another alternative would be a .csv file; I use them when the test data
comes from other parties, like a manufacturer's data sheet.
I've never used a pickle to store test data - how do you generate the
pickle contents in the first place? Usually I'd just use *that* code
directly, but I think pickling the resulting objects would be OK is the
process to regenerate them takes a lot of time.
More information about the Python-list
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526237.47/warc/CC-MAIN-20190719115720-20190719141720-00062.warc.gz
|
CC-MAIN-2019-30
| 1,879 | 35 |
https://forum.qorvo.com/t/imx6ul-devkit-as-a-gateway-for-dwm1001-dev-as-bridge-node/4859/2
|
code
|
Has anyone brought up (or attempted) the DWM1001-DEV as a bridge node connecting to iMX6UL-dev kit and the system working as a Gateway? As I understand only Raspberry Pi B model is only supported. Is there any guide available to port all the daemons, brokers, applications into other platforms.
Maybe have a look at
It is theoretically possible but at the moment documentation may be short to support the porting of the kernel to another platform.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334514.38/warc/CC-MAIN-20220925035541-20220925065541-00271.warc.gz
|
CC-MAIN-2022-40
| 447 | 3 |
https://365explained.com/create-and-install-ssh-keys-on-linux/
|
code
|
Create and install SSH keys on Linux
Are you thinking of improving the security of your server? Let’s create and install SSH keys on Linux in this guide and make your server safer. SSH key is a simple yet effective way of enhancing the security of your private server. It equips a dual authentication system that prevents unwanted access and improves the overall security and utility of your server. The SSH keys are nearly impenetrable. They use a combo of public and private key to ensure optimum security for your server. In the subsequent sections, we will take you through a step by step guide to equip SSH key login authentication for your server.
- Generate RSA Key Pair
- Save the Passphrase and Key
- Copying the Public Key
- Disable Password for Root User (Optional)
- Final Words
Generate RSA Key Pair
First and foremost you need to generate a key pair on your local machine (Server). You can generate the key using the following command.
ssh – keygen -t rsa
Save the Passphrase and Key
Once you enter the above command you will be prompted with the following
Enter file in which to save the key (/home/YourUserName/ .ssh/id_rsa) :
Press enter and the passphrase file would be saved to the home location under the name of the local user. Then you would be prompted to enter the passphrase.
Enter passphrase (empty for no passphrase) :
It is entirely your discretion whether you want to set a passphrase or not. Having a passphrase has its benefits but still carries the same weaknesses as any other secret code. The passphrase should not be shared with anyone that you don’t want to have access to the server. Note that if you set a passphrase you would have to enter it every time you use the key pair.
The key generation process would look something like this:
ssh-keygen -t rsa Generating public/private rsa key pair. Enter file in which to save the key (/home/user/.ssh/id_rsa): Enter passphrase (empty for no passphrase): Enter same passphrase again: Your identification has been saved in /home/user/.ssh/id_rsa. Your public key has been saved in /home/user/.ssh/id_rsa.pub. The key fingerprint is: 5a:df:0b:d6:27:2e:3c:fd:26:48:8d:75:35:2d:92:27 user@a The key's randomart image is: +--[ RSA 2048]----+ | .oo. | | . o.E | | + . o | | . = = . | | = S = . | | o + = + | | . o + o . | | . o | | | +-----------------+
Once you have gone through the entire process outlined above you would have successfully saved the public key (/home/YourUserName/.ssh/id_rsa.pub) and the Private Key (/home/YourUserName/.ssh/id_rsa).
Copying the Public Key
Now that we have generated the key pair it is time to install the public key in the virtual server. Any one of the commands below can be used to accomplish this:
Cat ~/.ssh/if_rsa.pub |ssh YourUserName@Your_IP_Address “mkdir –p ~/.ssh && Cat >> ~/.ssh/authorized_keys”
After entering the command you would be prompted with following:
The authenticity of host '22.214.171.124 (126.96.36.199)' can't be established. RSA key fingerprint is 5a:df:0b:d6:27:2e:3c:fd:26:48:8d:75:35:2d:92:27. Are you sure you want to continue connecting (yes/no)? yes Warning: Permanently added '1.222.546.78' (RSA) to the list of known hosts. [email protected]'s password: Now try logging into the machine, with "ssh '[email protected]'", and check in: ~/.ssh/authorized_keys to make sure we haven't added extra keys that you weren't expecting.
Finally login to your user and if everything has gone correctly then you won’t be prompted for a password but you would be required to enter the passphrase if you have set one.
Disable Password for Root User (Optional)
This is an optional step if you wish to amp up the security of your server further. In this step, you would be restricting the root login so it can only be accomplished using the SSH Keys.
Use the following command to access the config file:
sudo nano /etc/ssh/sshd_config
Once the file open, find the line “PermitRootLogin” and change it so that the login is only possible through the SSH key.
Finally, reload the SSH and you are done with our tutorial on how to Create and Install SSH keys on Linux.
That’s the end of this tutorial and if you aren’t using SSH keys by now, we suggest you to start doing it to prevent hackers from accessing your server. SSH keys are always better than nothing and I see no reasons not to add it, as it only takes a few mins. Oh, and don’t forget to keep the key safe and try not to lose it as that means you will be locked out of your server.
If you are running Ubuntu 16.04, we have another tutorial with some initial security tips: Initial Configuration of Ubuntu 16.04. If you have any questions about how to Create and Install SSH keys on Linux, please let us know in the comments below!
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703514495.52/warc/CC-MAIN-20210118092350-20210118122350-00742.warc.gz
|
CC-MAIN-2021-04
| 4,760 | 33 |
http://www.avsforum.com/forum/25-hdtv-technical/381623-official-avs-antenna-related-hardware-topic-50.html
|
code
|
Originally posted by Everton66
The antenna I am currently using successfully is a Radio Shack 15-2160 and has these specs
UHF Band Chan. Average Gain:.........................................9.5 dB
Median Av. F/B Ratio:.............................................UHF 14 dB
I thought the DB4 would be an improvement on that, but the web site only lists maximum gain (13.5dB) and as you have pointed out a useful 11dB. I don't want to get much bigger than the CM4225. If I am not gaining much then I will probably leave as is and try combining two of the same.
I think Radio Shack's numbers are usually highly inflated. Knowing the 15-2160 as I do, I'd be surprised if it has 9.5 db of gain on any frequency. More likely, it's a 7-8db of "real gain."
Joining two identical antennas together in a stack will get you no more than (and probably slightly less than) 3db of gain. It will get you a hefty increase of front-to-back ratio as well as a significant decrease in beamwidth. Those are good things, no doubt about it. But they're going to be larger than 1 4228 or DB8, because you're going to have to mount them a minimum of 30" apart.
If you're pointing the antennas in different directions to receive stations in two areas, it doesn't matter if they're the same, different, red, green, blue, or coated in a special polymer. They're going to mess each other's signals up unless you use a Jointenna or similar filtering mechanism. You can get cable lengths perfect, place them perfectly, and still have them mess each other up. I've said it a million times and I'll keep saying it until I'm blue in the face: You cannot combine two antennas designed to receive the same frequency, point them in different directions, connect them via a simple splitter/combiner and *expect* to get good results.
So I guess, in the immortal words of Clint Eastwood, "Do you feel lucky?"
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323682.21/warc/CC-MAIN-20170628134734-20170628154734-00140.warc.gz
|
CC-MAIN-2017-26
| 1,870 | 9 |
http://www.lyndonperrywriter.com/2022/12/new-series-on-kindle-vella.html
|
code
|
Then you might like my historical fiction series on how Matthew the Tax Collector became a Follower of Jesus.
I've published 6 are 21 episodes with new chapters coming out every Sunday and Thursday. Click "Follow Story" (link to Amazon's Kindle Vella) to be notified when a new episode drops. Read the first 3 episodes for free. (artwork by Jacob Aybara, btw)
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818711.23/warc/CC-MAIN-20240423130552-20240423160552-00106.warc.gz
|
CC-MAIN-2024-18
| 359 | 2 |
https://www.fr.freelancer.com/projects/laravel/laravel-graphql-vue-crm/?ngsw-bypass=&w=f
|
code
|
We need similar Crm like Perfex, Salesforce Laravel CRM.
At Moment we have started with CI.
We have Laravel , vue and prepared also the GraphQL in GitHub.
We need intelligent fulltsack developer.
What we want:
Daily Commits on Github
Experience in Vue, Laravel, GraphQl
Tracking in our Board
Working: Monday to Friday in German Time from 09:00-17:00
Please send me reference in you crm projects or similar
42 freelances font une offre moyenne de 2220 € pour ce travail
Hi, I am a Full Stack developer, I use Laravel as the main framework for all recent projects. I have very good experience creating RESTful APIs in Laravel, also SDKs for that APIs using guzzle client. I have also stro Plus
Dear Hiring Manager, I am "Laravel Expert" I have 11+ years of Web Development experience with expert level knowledge of frameworks & CORE EXPERTISE in PHP / Laravel/ CI/ React JS / Wordpress, HTML, CSS, and Javasc Plus
Hi, there? I'm a professional web developer, with over 5 years' experience dealing with Laravel, Vue.js, Mix, Node.js, GraphQL I am eagerly looking forward to working for you Here are some projects I've worked on befo Plus
Hello. Thanks for your proposal. I have read your description carefully. My skill: Vue ReactJs(Redux-Saga, Redux-Thunk, Redux-Form) Angular(7,8,9) NodeJs(Express,Koa,[login to view URL]) Laravel AWS(EC2 Instance, S3 Bucket) Fire Plus
Hello. I am a professional Web developer with rich experience in web development. I have read your post carefully, and I am sure about your project. Because Laravel, CI, Vue, and React are my core skill. Also I have a Plus
Dear Client! Thanks for your job posting. I've got very interested in your project for now. I have a great expertise in PHP, Laravel, Vue.js, node, express and etc and I can make you feel satisfaction with this task. I Plus
Hi, I have read your details carefully. I am a full-stack web developer with strong skill You can check my work from this: [login to view URL] This site made of Laravel6.0&Vue. I think we can discuss for more detials Plus
Hi Mario. How are you today? I am happy to put my bid on your project. I am interested in your project because I am familiar with Vue.js as frontend and Laravel/Node/Firebase as backend. I have rich experience in Larav Plus
Hi, My git link: [login to view URL] I am a professional Laravel and Vue developer who has over 8 years of experience. I read your job description carefully and I am very interested in your job. Regar Plus
Hi, there. As a full stack developer, I have 5+ years experience with Codeigniter, Laravel and CorePHP. And I have build many project using PHP or PHP framework. Please check out my recent Laravel projects to get a rou Plus
Hello! According to your job requirements," Crm like Perfex, Salesforce Laravel CRM." I specialize in website design and development and am excited for this opportunity to work with you in accomplishing your goals. E Plus
Hello, Hope you’re fit and fine during this pandemic era! We have gone through the requirements of yours and love to say that we have already created many customized CRM solutions for my clients. In fact not only the Plus
Hi there. I am a senior full stack web developer. I am very familiar with vue, laravel, graphql and github. I am confident to provide you what you want perfectly on time. Kindly contact me. You will get to know a talen Plus
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038087714.38/warc/CC-MAIN-20210415160727-20210415190727-00353.warc.gz
|
CC-MAIN-2021-17
| 3,363 | 24 |
http://ubuntuforums.org/showthread.php?t=1273518
|
code
|
Hi I'm complete Ubuntu newbie and I would really appreciate if sombody could help me with the issue.
A loud white noise appears during some of Skype conversations. It blocks completely my voice to a callee. The Skype conversation is always ok during a call untill it is disrupted and the call disconnected (usually due to a low quality of internet connection) The noise appears ALWAYS after reestablishing a conversation.
Attempts to fix it:
A temporary solution is to log-out the Ubuntu session and log-in again. Unfortunately it works only until the first disconnection. I've searched forums but didn't find a right solution. For some people worked changing Skype settings to these:
Sound In: HDA NVidia (hw:NVidia,0)
Sound Out: pulse
Unfortunately I can't change Skype sound settings for any different than "PulseAudio server (local)" for any of the three options so the solution provided is not possible for me.
Cam: Logitech Pro9000 (with a built-in microphone)
Headset: Logitech PC headset 860
Skype version: 188.8.131.52 (beta)
Thank you in advance for any ideas that you wish to share with me.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375095270.70/warc/CC-MAIN-20150627031815-00259-ip-10-179-60-89.ec2.internal.warc.gz
|
CC-MAIN-2015-27
| 1,101 | 11 |
http://trickytripper.blogspot.com/2015/03/new-version-is-out-now.html
|
code
|
The good news is: I just released a new version of Tricky Tripper.
The bad news is: I have dropped support for devices prior Android 4.
Although I would really like to support older versions, I lack the time to do it properly. The trigger for this decision was a bug deep inside of the android support library, the one providing the backward compatibility, not likely to be fixed soon. The number of users with old phones (e.g. Android V 2.3) was/is constantly shrinking and I cannot recommend to use such old phones from the security point of view. However I feel deeply ashamed to live in such a material design smartphone throwaway society.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590169.5/warc/CC-MAIN-20180718115544-20180718135544-00249.warc.gz
|
CC-MAIN-2018-30
| 643 | 3 |
http://www.rhymneyconsulting.co.uk/links.html
|
code
|
The links provide details of where to get hold of free software and compilers for Windows and Linux.
If you have a Linux system then a full install should make available gnu C, C++ and Fortran. You will probably have to install Java separately.
The full Linux install should also make available TeX and LaTeX.
We recommend doing a complete cygwin install. Cygwin is a Linux-like environment for Windows. It consists of two parts: A DLL (cygwin1.dll) which acts as a Linux API emulation layer providing substantial Linux API functionality. A collection of tools which provide Linux look and feel.
A full install will make available the gnu compiler suite which will include C, C++ and Fortran compilers.
Microsoft make available Visual Studio Comminuty Edition for Windows. The latest version (as of February 2016) is Visual Studio 2015. The complete install will make available the Visual Studio IDE, with C++, C#, Visual Basic and F# compilers.
Visit our Fortranplus site for more details.
Java development - Linux and Windows systems
Java can be obtained from the Oracle site. Visit
for more details.
Latex for Windows
LaTeX is a document preparation system for high-quality typesetting. It is most often used for medium-to-large technical or scientific documents but it can be used for almost any form of publishing.
proTeXt - MiKTeX-based distribution for Windows
proTeXt aims to be an easy-to-install TeX distribution for Windows, based on MiKTeX. After downloading, it guides the installation via a short pdf document (available in English, French, German, and Italian), which provides clickable links to install the various components, along with explanations.
proTeXt adds a few independent tools to MiKTeX, notably TeXnicCenter and Ghostscript.
TeXnicCenter is a feature rich and easy-to-use integrated environment for creating LaTeX documents on the Windows platform.
In their words: A brief history of ACCU The C Users Group (UK) was formed in 1987 as an informal group for those who had an interest in the C language and related topics such as operating systems, language compilers and other types of work usually done in C. In 1993 the public name Association of C and C++ Users was adopted to reflect the growing interest and use of C++ by the members of the association. In the following years the interests of the members continued to grow into other languages, design, process and related subjects. In 2006 the abbreviated ACCU was adopted as the public name of the group removing the language specificity to embrace the wide range of interests of the members of the association.
If there are any problems with the links please contact us. [email protected]
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123560.51/warc/CC-MAIN-20170423031203-00011-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 2,687 | 18 |
https://forum.osmosis.zone/t/upload-persistence-liquidstakerate-contract-and-osmosis-pool-ratesync-contract-for-redemption-rates/2544
|
code
|
This proposal aims to upload two contracts– 1) LiquidStakeRate Contract and 2) Osmosis-Pool-Ratesync Contract on the Osmosis chain to ensure trustless handling of scaling factors for stkToken Stableswap pools and enhance the reliability of stkToken price oracles when integrated with platforms like Levana or Mars’ protocol within the Osmosis ecosystem.
The Persistence LiquidStakeRate Contract employs an on-chain module and interchain account (ICA) mechanism to facilitate the decentralized provision of redemption rates for Persistence’s stkTokens on the Osmosis chain.
The Osmosis-Pool-RateSync Contract leverages the functionality of the LiquidStakeRate Contract to streamline the updating process of scaling factors for stkToken Stableswap pools, including the stkATOM/ATOM pool. This automation eliminates the need for manual intervention and ensures trustless execution of updates, enhancing efficiency and reliability within the ecosystem.
The above contracts and the RateSync Module under these contracts are audited by Hexens.
Persistence’s liquid staking mechanism operates through stkTokens, representing staked tokens managed by the Persistence Core-1 chain. Users can redeem their stkTokens for a corresponding amount of the underlying token at any given time based on the stkATOM redemption rate. This redemption rate, often referred to as the c-value, liquid-stake-rate or exchange rate, signifies the ratio at which a single stkToken can be exchanged for its underlying token. For instance, on the Persistence chain, 1 stkATOM may be redeemed for 1.24 ATOMs, indicating a redemption rate of 1.24 for stkATOM.
The LiquidStakeRate Contract leverages the Persistence LiquidStakeRate Module and ICA to relay redemption rates for Persistence’s stkTokens onto the Osmosis chain, ensuring decentralized dissemination of this critical information.
Additionally, traditional Stableswap pools maintain a fixed 1:1 ratio between the two tokens, which is suitable for USD stablecoins. However, Osmosis Stableswap pools offer the flexibility of adjusting this ratio continuously through a scaling factor. This feature is particularly relevant for stkToken Stableswap pools, where stkTokens appreciate in value relative to their underlying tokens over time.
Despite fluctuations in the market price of stkATOM relative to ATOM, the true value is determined by this redemption rate. For instance, consider the current redemption rate of stkATOM to ATOM, set at 1:1.24. The LiquidStakeRate Contract would transmit this redemption rate to Osmosis, where the Osmosis-Pool-RateSync Contract would utilize it to dynamically adjust the scaling factor or concentration ratio of the stkATOM/ATOM Stableswap pool.
Presently, updates to the concentration ratios of several stkToken Stableswap pools are managed manually through a multi-sig address controlled by the Persistence Labs contributors. The introduction of the Osmosis-Pool-RateSync Contract automates this process, ensuring timely adjustments without the need for human intervention.
We kindly request the Osmosis Community feedback on this proposal before it goes on-chain.
Take community feedback into account (if any)
Submit the Osmosis governance on-chain proposal for uploading these contracts
If the contract upload proposal passes and after the contracts are successfully uploaded, submit another governance proposal for transferring the Scaling Factor Controller of the stkToken pool from the Persistence multisig to the Osmosis-Pool-RateSync Contract
Code repository: Github - GitHub - persistenceOne/ratesync-contracts
Commit hash: 93a9ca2529542654e8f2799a347083499095151f
Compiler version: cosmwasm/optimizer:0.15.0
Target on-chain proposal date: March 16th
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712297295329.99/warc/CC-MAIN-20240425130216-20240425160216-00171.warc.gz
|
CC-MAIN-2024-18
| 3,732 | 17 |
https://www.edpassociation.com/pluralsight-review/pluralsight-exploring-animation-principles-in-3ds-max/
|
code
|
Pluralsight Exploring Animation Principles In 3ds Max
When it pertains to on-line learning in the technology space, Pluralsight is among one of the most preferred systems available for finding training courses across a number of groups. And as we’ll review in the Pluralsight evaluation below, its appeal amongst technology specialists has certainly been made.
If you are an IT specialist, you understand that staying up-to-date on the most up to date technology is necessary to your success. You additionally recognize that this can be difficult, specifically if you don’t have the time or money to participate in pricey training courses.
That’s where Pluralsight can be found in.
With its huge library obviously on whatever from configuring to networking, Pluralsight is best for anyone that wants to stay ahead of the contour in the technology globe.
This Pluralsight testimonial covers every little thing you require to know about this impressive system. It’s a full guide to Pluralsight’s training courses, costs, instructors, and a lot more!
What is Pluralsight?
Pluralsight is an on-line knowing system that uses courses in different subject areas with a particular focus on tech skills.
Today, Pluralsight has over 7,000 programs in its directory, covering whatever from programming and also web advancement to service and also innovative abilities.
With a goal to equalize innovation skills, Pluralsight supplies participants with the tools they require to stay ahead of the contour in an ever-changing globe.
Pluralsight likewise offers a range of features to aid learners remain on track, including training course certificates, progression tracking, and course suggestions.
In addition, Pluralsight offers a premium subscription that gives users access to exclusive material as well as functions, such as offline viewing as well as Pluralsight IQ. Whether you’re just looking or beginning to brush up on your abilities, Pluralsight is a fantastic source for discovering new points.
Click on this link to try Pluralsight complimentary for 10 days.
Who Teaches on Pluralsight?
It’s a very essential question that everybody asks. People would like to know if the teaching has reliability. It most absolutely does when it comes to Pluralsight and also its trainers.
Pluralsight is unique in that all of its courses are taught by expert trainers that are leaders in their corresponding areas.
Because of this, Pluralsight trainees can be certain that they obtain the most up to date and most exact info possible. The teachers on Pluralsight are carefully chosen for their knowledge as well as capability to involve as well as educate learners.
On top of that, Pluralsight uses lots of methods for teachers to personalize their courses, making certain that each course is customized to the pupil’s requirements. Similarly, Pluralsight provides both live as well as recorded courses to ensure that learners can choose the discovering format that finest matches them.
Pluralsight also provides additional resources to aid learners do well, including:
- Specialist pointers
- Course Discounts
- Exceptional Support System
- An energetic neighborhood online forum
Countless students worldwide trust Pluralsight as a resource of top notch, expert-led instruction! It’s additionally transforming the way individuals learn worldwide, and it’s quickly ending up being the best area for everyone trying to improve their skills.
What Can You Learn on Pluralsight?
pluralsight training courses
Discovering a new ability isn’t hard as long as you have a great platform like Pluralsight.
And also, since Pluralsight is constantly including new training courses, you’re certain to discover something that’s right for you.
Pluralsight’s remarkable attributes make finding out easy and enjoyable, such as training course suggestions, interactive workouts, and also specialist instructors.
Several of the course categories you can check out on Pluralsight consist of:
- Architecture & building
- Organization expert
- Creative professional
- Information expert
- IT ops
- Production & design
- Details & cyber protection
- Software development
- Web advancement
With over 7,000 programs available, Pluralsight has a training course for everyone, from those simply beginning their jobs to those aiming to maintain their abilities current.
Pluralsight offers abilities evaluations and a occupation path tool to help students identify which courses will help them reach their career goals. They are additionally among the largest on-line training carriers.
Go here to try Pluralsight complimentary for 10 days.
Just How Much Does Pluralsight Cost?
Pluralsight pricing depends on the type of membership that you choose. Below’s a basic introduction of the Pluralsight plans:
The Standard Package sets you back $29 each month. If you choose to pay each year, it will certainly assist you save approximately 14%, and the rate you will certainly have to pay would be $299.
Costs Package sets you back $45 per month, or an yearly registration would certainly be $449.
Beginner: $33.25/ month.
Specialist: $48.25/ month.
Venture: $64.91/ month.
Pluralsight additionally uses terrific discounts for trainees and educators . Moreover, Pluralsight offers unbelievable discount rates on group plans for annual memberships.
Pluralsight Free Trial Details.
Pluralsight does include a complimentary test, which enables you to access every one of the training courses for 10 days. Throughout the trial duration, you can access 200 mins of Pluralsight web content.
You will certainly not be charged if you determine to terminate your registration within the 10-day test duration. If you do not cancel your registration within the 10-day test period, you will be automatically billed for the annual or month-to-month subscription, depending on which alternative you choose.
Go here to attempt Pluralsight totally free for 10 days.
Just How does Pluralsight Pricing Compare to Other Platforms?
Pluralsight is just one of one of the most preferred on-line learning systems worldwide, and what truly establishes it besides other systems is its huge focus on tech discovering.
Just how does the price of Pluralsight compare to various other preferred on the internet understanding systems? Allow’s contrast:.
- LinkedIn Learning prices– $29.99 for month-to-month or $240 for an yearly subscription.
- Masterclass prices– $180-$ 276 a year, no regular monthly plans readily available.
- Coursera rates– $59 a month or $399 a year for a Coursera Plus membership.
- Skillshare prices– $167.88 annually, which exercises to $13.99/ month balanced out.
Additionally, Pluralsight offers both specific and also company plans, making it a adaptable alternative for personal as well as expert advancement.
This makes Pluralsight an ideal platform for those who intend to gain useful experience as well as theoretical knowledge.
Overall, Pluralsight is a straightforward and also detailed learning platform ideal for individuals and also companies at budget friendly costs.
Click here to attempt Pluralsight cost-free for 10 days.
How Does Pluralsight Work?
Pluralsight is altering the way individuals learn and is aiding to make the world a better place for everybody.
Pupils can enroll in Pluralsight programs with the website and gain access to the material at their own speed.
Pluralsight training courses are separated into modules, and each module contains a collection of video clip lessons and also quizzes. Trainees can view the video clip lessons as many times as they desire and also take the quizzes as many times as they require to grasp the material.
Pluralsight likewise offers a certificate of conclusion for every program. With its adaptable knowing style and also expert-led training courses, Pluralsight is a great method to gain new abilities or enhance existing ones.
Exactly how to enroll in Pluralsight.
Signing up for Pluralsight is simple and also just takes a couple of mins.
Go to the Pluralsight web site and create an account. When you have an account, you can surf the Pluralsight library as well as pick the courses you intend to take. You can additionally look for details training courses by keyword phrase or filter by topic.
When you locate a program you intend to take, click the “Sign Up” button. You will then be triggered to enter your payment info. Pluralsight uses a selection of payment choices, consisting of charge card, PayPal, and so on!
You will be able to access your course promptly once you have picked a repayment method. Pluralsight likewise supplies a free trial so that you can try their system before committing to a paid registration. Why wait? Enroll in Pluralsight today and begin finding out something brand-new!
Visit this site to attempt Pluralsight totally free for 10 days.
How to take Pluralsight training courses.
Pluralsight courses are a great way to learn new skills and enhance existing ones. Here’s just how to get started:.
First, develop a Pluralsight account. You can do this by going to their web site as well as clicking the “Sign Up” switch. Enter your information and click on the “Create My Account” button.
When you have an account, you can browse through the programs that Pluralsight uses. Kind the topic’s name into the search bar to discover a program that intrigues you.
For example, if you’re interested in finding out about internet advancement, you would certainly type “Web Development” right into the search bar.
Once you’ve found a training course you would certainly such as to take, click on the “Enroll Now” button. Pluralsight will certainly then ask you to validate your registration. When you’ve confirmed your registration, Pluralsight will include the course to your account, and you can start taking it promptly.
Pluralsight courses are self-paced, indicating you can resolve them at your speed. They are also hands-on, with plenty of opportunities to exercise what you’re learning. They are created by market professionals, so you can be positive you’re getting the most current and also greatest details.
Whether you’re aiming to learn brand-new coding abilities or brush up on your Photoshop strategies, Pluralsight has a training course. So check them out today and see just how simple it is to discover something new.
Pluralsight Features Explained.
Training courses are expert-led as well as focus on useful skills.
Pluralsight is a excellent source for those wanting to discover new useful skills. The training courses are expert-led and focus on providing individuals the abilities they require to prosper in their area.
Pluralsight additionally offers a range of various other attributes, such as the ability to develop custom-made courses and also quizzes that make it an invaluable source for any individual aiming to improve their ability. Pluralsight is a great source for those aiming to boost their sensible skills.
A variety of payment choices are available.
The most effective aspect of Pluralsight is that it offers a range of payment alternatives to accommodate any kind of budget. You can pay by the month, year, and even purchase a lifetime subscription. Pluralsight likewise offers discount rates for trainees as well as instructors !
Settlement Options Include.
Whether you’re seeking to discover coding, internet advancement, or anything in between, Pluralsight is a wonderful choice– and also with its versatile payment choices, there’s no justification not to give it a try!
Certificate of conclusion for each and every program.
Pluralsight additionally uses a certificate of completion for each and every training course, differentiating it from various other on-line education platforms. This can be really valuable in developing your return to as well as demonstrating your skills to prospective employers.
Pluralsight is committed to helping individuals discover brand-new skills and also expand their occupations, and also the company’s mission is to make high-grade education accessible to every person. For any individual seeking to enhance their abilities or learn something brand-new, Pluralsight is a terrific alternative.
Gain brand-new skills or improve existing ones.
Pluralsight is a excellent way to get brand-new skills or boost existing ones! It provides lots of programs on different topics to learn what you need to understand for your job or your personal life.
Pluralsight’s training courses are instructed by specialists who are passionate concerning their areas and understand exactly how to involve their pupils. So discovering a brand-new ability with Pluralsight comes to be a breeze!
Find out at your own rate.
Pluralsight has the advantage of allowing you to learn at your very own rate. It has a wide range certainly offered, so you can always find something intriguing. As well as if you’re not sure concerning a certain course, Pluralsight offers free tests to try it before you acquire.
It also has constant knowing paths to track your progress and also determine your proficiency in specific skills. Whether a newbie or an professional , Pluralsight has something for every person! Why not attempt Pluralsight today and see how far you can go?
Free trial readily available.
Pluralsight offers numerous attributes to its customers, among one of the most popular being the free trial. With the Pluralsight free test, individuals can access every one of the website’s training courses and discover Pluralsight at their recreation.
The Pluralsight complimentary test is specifically advantageous for those brand-new to the site and that would like to know just how it functions prior to dedicating to a paid membership. Pluralsight has various other attributes, consisting of program rankings as well as evaluations, which can help individuals make notified choices concerning which programs to take.
So what are you waiting on? Enroll in Pluralsight today! With its expert-led programs and versatile knowing style, Pluralsight is the ideal platform for IT specialists.
Pluralsight’s ideal attribute is its gadget assistance. Pluralsight can be accessed on any tool with an internet connection, including smart devices, tablet computers, as well as laptops . This makes it very easy to discover brand-new abilities while on the move.
Pluralsight also has offline viewing, so you can continue learning even if you do not have an net link. Plus, Pluralsight supplies a 10-day complimentary test, so you can try the system prior to dedicating to a subscription. With a lot of benefits, it’s no surprise Pluralsight is just one of the leading on the internet understanding systems.
Inevitably, Pluralsight’s different offerings provide opportunities for individuals of all backgrounds to develop new abilities and progress their occupations. A fantastic attribute of Pluralsight is its area. Pluralsight has a area of programmers that share their understanding and proficiency with others.
The neighborhood is always ready to aid answer concerns, supply responses, as well as team up on projects. Pluralsight additionally provides a online forum for developers to share their code tutorials, bits, and collections . Pluralsight is an important source for programmers wanting to enhance their abilities or learn new innovations.
A significant attribute of Pluralsight’s user interface is its clarity. The Pluralsight user interface is contemporary and clean , and also very easy to browse. Pluralsight training courses are arranged right into modules, and also each component is divided right into lessons.
The Pluralsight user interface makes it simple to locate the programs you require and track your progress. Pluralsight additionally provides a range of methods to find out, consisting of video-based training courses, write-ups, and also tests. You can also make badges and also certifications as you full Pluralsight training courses.
Click on this link to attempt Pluralsight complimentary for 10 days.
Pluralsight Review FAQs.
Is Pluralsight Expensive?
While it is true that Pluralsight’s programs are not totally free, they are still extremely budget-friendly compared to various other online education and learning systems. Additionally, Pluralsight frequently runs discounts and promos , making their programs a lot more inexpensive. Thus, Pluralsight courses aren’t too costly and are extremely economical.
What is the purpose of Pluralsight?
Pluralsight is a technology discovering platform that aids services shut the abilities space and keep their workforce pertinent in an ever-changing market. Pluralsight provides on-line training courses educated by specialist instructors, permitting pupils to learn brand-new skills at their own speed.
Which one is better: Udemy or Pluralsight?
There are several options available for on-line discovering, as well as it can be difficult to pick the best system for your demands. Two of one of the most prominent platforms are Udemy and Pluralsight.
Both systems offer a wide range certainly, however there are some crucial distinctions between them. Pluralsight concentrates specifically on tech-related subjects, while Udemy provides a extra diverse choice naturally. Pluralsight also supplies a broader range of features, including the ability to tailor your knowing experience to your specific objectives.
Is Pluralsight Worth It?
Pluralsight is absolutely worth your time, specifically if you’re a tech professional (or intend to turn into one) looking to upskill.
It is an on the internet education and learning platform that offers courses in various subjects, consisting of programs, style, business, as well as extra. Pluralsight is a terrific source for any person seeking to enhance their abilities or find out brand-new ones.
The programs are properly designed and give a large amount of information. They are also fairly priced as well as featured a money-back guarantee. Pluralsight training courses are a terrific financial investment for any person aiming to boost their abilities.
While Pluralsight is not a typical college, it can still be a valuable resource for job development. The programs provided on Pluralsight cover a variety of subjects that can profit experts in any area. Pluralsight uses programs on job management, web advancement, as well as graphic style.
On top of that, Pluralsight additionally provides programs on soft skills such as management and also interaction. By making the most of the sources used by Pluralsight, you can obtain the abilities as well as knowledge you require to succeed in your profession. On the whole, Pluralsight is a affordable as well as comprehensive on-line knowing system ideal for both novices as well as experienced learners.
Begin with Pluralsight.
Making use of Pluralsight, you can create the skills you require to progress in your occupation or modification industries. And most importantly, Pluralsight provides a cost-free trial so you can try the system and also see if it’s best for you.
So why not start today? With Pluralsight, you can learn at your own speed as well as schedule. Plus, Pluralsight courses are created by industry specialists, so you know you’re obtaining top notch guideline.
Click on this link to attempt Pluralsight free for 10 days.
When it comes to Pluralsight and also its trainers, it most absolutely does.
Pluralsight uses a variety of repayment choices, consisting of credit score card, PayPal, etc!
Pluralsight courses are self-paced, implying you can work via them at your speed. Pluralsight is an invaluable resource for developers looking to enhance their abilities or discover new technologies.
[sspostsincat category=”PluralSight Review”]
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645810.57/warc/CC-MAIN-20230530131531-20230530161531-00384.warc.gz
|
CC-MAIN-2023-23
| 19,723 | 134 |
https://optimization-online.org/2006/10/1479/
|
code
|
This paper is the first of a series of two devoted to the polyhedral study of a strongly NP-hard resource-constrained scheduling problem, referred to as the process move programming problem. This problem arises in relation to the operability of certain high-availability real time distributed systems. After a brief introduction to the problem as well as a summary of previous results, we formulate it as an integer linear program using linear ordering variables. We then drop the capacity constraints and introduce the partial linear ordering polytope, defined as the convex hull of all incidence vectors of arc sets of linear orderings of a node subset of the complete digraph on n nodes (the nodes not in the subset being looped), study its basic properties as well as show several classes of inequalities to be facet-defining. The companion paper is devoted to the study of the process move program polytope which is obtained when the capacity constraints are put back into the picture.
Technical report Nortel GSM Access R&D PE/BSC/INF/017912 V01/EN. Submitted to Mathematical Programming.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819089.82/warc/CC-MAIN-20240424080812-20240424110812-00559.warc.gz
|
CC-MAIN-2024-18
| 1,094 | 2 |
https://crmug.uk/2015/02/19/crmug-reading-march-2015-agenda/
|
code
|
The next UK CRM User Group is in Reading on Wednesday 18th March. We have our usual great line-up of sessions for our business and technical focussed members to take away some great practical information and advice from peers and industry experts.
This meeting is free to attend for all CRMUG members, thanks to Microsoft’s kind and continued support of the events, providing venues and refreshments for us. You can sign up for a Basic membership of CRMUG at no cost. Don’t miss this opportunity to experience what the CRMUG has to offer you and other Dynamics CRM users!
We have slightly increased the length of breaks during this event in response to feedback to give you more opportunity to network and chat with your peers, our speakers and MVPs.
The agenda below is of course subject to change, so don’t forget to follow @CRMUGUK on twitter for updates.
Registration is open for this event at the Reading March 2015 event page on CRMUG.com
We will have two tracks for the middle part of the day, so you can choose the session that is of most interest and relevance. There are a wide range of topics for everyone from business managers and project owners through administrators and functional consultants to the most technical system customisers and developers. All details below are subject to alteration and intended as a guide only.
|09:00||Registration and coffee|
|09:30||Welcome & CRMUG News|
|09:45||What’s New in CRM 2015 and the Dynamics Roadmap
Hear all about what is coming in the Spring Release for CRM. Also find out more about related products including Social Listening, Dynamics Marketing, Parature and Unified Service Desk, and what the future roadmap looks like for the whole suite of Dynamics tools.
TBC, Microsoft UK
|10:45||Coffee and Networking|
Roundtable discussion: Convince your users to be lovers, not fighters: Increase use of your CRM system without open warfare
|12:15||5 minutes to swap rooms|
Common BI Challenges in CRM
Putting data at the heart of your CRM strategy
|13:20||Lunch and Networking|
|CRMUG Showcase – Metro Bank: Creating FANS not Customers
Metro Bank was founded on a simple precept – to offer the best customer experience, how, when and where the customer wants it. Its motto “no stupid bank rules” and its focus is on bringing back traditional retail banking, supported by flexible technology.
Find out how Metro Bank is using Microsoft Dynamics CRM, Office 365,Yammer and other cloud technologies to give its people the apps they need to support the personalized interactions that are the hallmark of its business, and be operationally flexible so that they can take a best practice from one location and implement it across all locations.
Marco Amoedo, Senior Solutions Architect and
Mario Trueba Cantero, Senior Developer / Consultant, Metro Bank
|15:20||Ask the Experts
A chance for more Q&A with today’s speakers and MVPs
This meeting will be at Microsoft’s UK HQ in Reading.
Thames Valley Park
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583509196.33/warc/CC-MAIN-20181015121848-20181015143348-00012.warc.gz
|
CC-MAIN-2018-43
| 2,973 | 26 |
https://lists.openmoko.org/pipermail/community/2007-July/006251.html
|
code
|
lalo.martins at gmail.com
Tue Jul 3 17:00:41 CEST 2007
Also spracht Hans van der Merwe (Tue, 03 Jul 2007 16:33:04 +0200):
> On Tue, 2007-07-03 at 13:53 +0000, Lalo Martins wrote:
>> ... ipkg is already installed on the moko image,
>> and comes pre-configured to download packages from the net (but the
>> repository is still empty, of course).
> Ah, great - just checking.
No, but still, you have a good point; a GUI front-end would be better.
The gpe-package project looks nice, I don't know if it needs to be
"MokoIzed" though (shouldn't be too hard if it does). Also, I haven't
actually installed it, so I don't know how good is the search facility --
which IMHO is essential for something like that.
So many of our dreams at first seem impossible,
then they seem improbable, and then, when we
summon the will, they soon become inevitable.
GNU: never give up freedom http://www.gnu.org/
More information about the community
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057158.19/warc/CC-MAIN-20210921041059-20210921071059-00264.warc.gz
|
CC-MAIN-2021-39
| 926 | 18 |
https://hci.auckland.ac.nz/labs/
|
code
|
At the University of Auckland, we have 3 labs which focus on research relating to Human Computer Interaction.
The HCI Lab
The HCI Lab is a hub for HCI research at the University of Auckland and serves HCI, computing education and graphics research groups with its specialised equipment. Drs Danielle Lottridge and Gerald Weber direct their HCI research groups through the HCI Lab. Lottridge leads the University of Auckland HCI Research Group.
Empathic Computing Lab
Empathy is about seeing with the eyes of another, listening with the ears of another and feeling with the heart of another. Empathic Computing is a research field that develops computer systems that recognise and share emotions and help people better understand one another.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233509023.57/warc/CC-MAIN-20230925151539-20230925181539-00619.warc.gz
|
CC-MAIN-2023-40
| 741 | 5 |
https://support.cacher.io/hc/en-us/community/posts/360002047011-Escape-to-exit-dialog-windows?sort_by=created_at
|
code
|
Escape to exit dialog windowsAnswered
For example, when I click the edit button, and then decide I want to discard my changes, I have to move my cursor over to the "Discard" button, when I would rather just hit Esc.
Understood. Unfortunately a lot of former GistBox users disliked this shortcut as they accidentally discarded changes quite often. We decided to leave it out for Cacher but may bring it back as an option.Comment actions
Please sign in to leave a comment.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646457.49/warc/CC-MAIN-20230531090221-20230531120221-00361.warc.gz
|
CC-MAIN-2023-23
| 470 | 4 |
https://kaleideum.org/terra-kaleideums-box-turtle/
|
code
|
Kaleideum has a box turtle named Terra. You may see box turtles in your yard or along the side of the road. These interesting creatures can also be pets. Here are five fun facts about box turtles and some additional questions in parentheses that you can research at home.
- Turtles are reptiles. They belong to the same scientific class, Reptilia, as crocodiles, alligators, and lizards. (Name three more animals that belong in this scientific class.)
- There are four species and 13 subspecies of box turtle native to North America, including Mexico. Box turtles are classified into two groups: common box turtles and ornate box turtles. (What are some of the differences between common box turtles and ornate box turtles?)
- In the wild, box turtles are sometimes the prey of animals, such as raccoons. (How does a box turtle defend itself from predators?)
- Box turtles are omnivores. They eat both insects and plant matter. (What sorts of insects make a good meal for a box turtle in the wild?)
- Box turtles have a deep connection to the location where they were born. (Should you ever relocate a wild box turtle?)
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648911.0/warc/CC-MAIN-20230603000901-20230603030901-00663.warc.gz
|
CC-MAIN-2023-23
| 1,119 | 6 |
https://forums.athemes.com/t/issue-with-the-slider/4066
|
code
|
I have been looking all 63 pages of the forum looking for a solution but could not find anything related to my problem.
I am leaving here the website URL: http://www.modalite.co/revista/
So here is the thing, I have the slider on the Homepage. But When I click on any pages the slider is still here. I would like to remove it and have my page with title, images etc. and no slider.
What am I missing here ?
Thank you for your help !
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107916776.80/warc/CC-MAIN-20201031062721-20201031092721-00595.warc.gz
|
CC-MAIN-2020-45
| 432 | 5 |
http://musclemecca.com/showthread.php/215828-The-perfect-pre-workout-meal
|
code
|
I'm was reading through the sticky, with scientific articles, and saw that a pre-workout shake with BCAA was more efficient for hypertrophy, than a post-workout shake. I have seen studies like this before, and was wondering?
Is it better to place the Post-shake before the wo? Or is a proteinbar + a piece of fruit, bread with protein (tuna etc.) better?
Similar Bodybuilding Threads:
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719136.58/warc/CC-MAIN-20161020183839-00186-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 384 | 3 |
https://developer.ingrid.com/delivery_checkout/delivery_groups/
|
code
|
This feature is currently in beta version. Reach out to our Support Team here to learn more about the group splitting logic supported in the delivery checkout API.
Delivery Checkout API supports split shipments for merchants. Additionally, it can serve marketplace platforms (also ones with per vendor configurations). Both mentioned use cases can be materialised with use of groups. Group is a set of items that can differ from other groups by having different field value or condition met, like different shipping dates.
Delivery Group concept is flexible enough to handle a myriad of situations, like shipping items from different warehouses, stores or applying custom splitting logic on integrator side to group items into sets.
If you don't want to use neither split shipment nor you are a marketplace, your integration needs to handle only one group.
Configuring split shipment logic
Splitting logic of cart items into delivery groups can be done manually by integrator. Splitting is done over the cart items based on the previously defined condition during session create and updates.
Each group will be mapped to a separate order.
Handling the split shipments manually
Splitting cart items into delivery groups can be handled manually by the integrator. In order to perform the splitting, one has to define the
cart.groups field in create/update session requests to Delivery Checkout API.
This powerful feature is a great fit for integrators wanting to have full control over the delivery groups and split shipments or wanting to keep the split shipment logic on their side.
Example create session request with cart items split into delivery groups can look as follows.
"name": "Item name 1",
"name": "Item name 2",
"header": "Delivery 1",
"header": "Delivery 2",
There are some assumptions, that should be kept in mind when using the split feature:
cart.groupsfield is provided in the request, each group defined in the request should have
cart.groupsfield is provided in the request, all cart items should be mapped to the delivery groups,
- groups cannot have the same group IDs,
- cart items are assigned to the groups by SKU,
- the same cart item cannot be shared between groups.
Manual grouping will be removed from the session, when no
groups field is provided in the subsequent
In order to preserve the manual grouping throughout the session lifecycle, one has to provide
groups field in all calls having
cart field set in the request.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499949.24/warc/CC-MAIN-20230201180036-20230201210036-00299.warc.gz
|
CC-MAIN-2023-06
| 2,451 | 27 |
https://www.bleepingcomputer.com/forums/t/362988/suddenly-slow-internet/
|
code
|
Starting with a virus scan always makes sense. If nothing is found then try the following:
Go to start>Run Type Prefetch then hit enter. A window will open, then press ctrl+A. Everything in the prefetch window should turn blue highlighted. Now Press Ctrl+D. You might get a confirmation window asking if you are sure you want to delete these xxxx items. Click yes, then after they’re all gone, close that window.
Right click the recycle bin. Select properties and then move the slider bar all the way to the left so that there is no disk space taken by it. Click Apply and then Ok.
Now go to Start>All Programs>Accesories>System Tools>Disk Cleanup. Chose the C: drive, then click yes to any warnings/Confirmations. Check all boxes when the disk cleanup window opens.
Go to The Start>Run>Msconfig>startup. Uncheck anything that’s not a firewall, anti-virus/spyware, sound drive, anything you need to run your computer properly, etc. Then click apply and close. It will ask to restart the computer. Go ahead and restart it.
When it starts booting, press F8 immediately until you get a screen that has a list of options. Select safe mode. Go to Start>All Programs>Accesories>System Tools>Disk Defragment. Then Select the C: Drive to defrag. This will take a while depending upon the size of the hard drive. Do not use the computer while it is running defrag. After it completes, restart the system like you would normally. After everything loads a window will pop up saying you have used the system config tool, check the box and click ok.
If you suspect your Internet or you think you might be broadcasting information over the Internet without your knowledge, run this packet loss
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514497.14/warc/CC-MAIN-20181022025852-20181022051352-00556.warc.gz
|
CC-MAIN-2018-43
| 1,683 | 7 |
http://atariage.com/forums/topic/266822-free-stuff-napoleon-in-russia-box/
|
code
|
Hi folks --
I have the game "Napoleon in Russia" in a box for free to a good home (just pay shipping please).
-The box is in poor condition, the contents inside are in similar condition, and includes:
- Datasoft floppy for the game - CAT no 1630
- Datasoft survey
- "6 month trail to computer entertainer / video game update" mail in card :-P
- A scale map (which opens most of the way but appears partially stuck, so i'm not opening further)
Instruction manual (same thing - cover is good, front/back pages open, middle pages appear stuck due to moisture perhaps), but otherwise the text is clear.
- Datasoft Frequency Buyer Program Coupon (save 7, 10, 14 coupons and get a valuable gift from Datasoft.. maybe that gift is pay owed to Philip Price..?)
Anyway - if someone wants it, PM me and I'll ship it. It should be cheap to ship first class (box + contents weigh ~ 7-8 oz).
Although it's in poor condition, please don't flip this on ebay or anything - I just want to make sure this goes to the right place.
P.S. If you want pics, let me know and i'll put something up on gdrive - I haven't figured out how to add stuff to 'my media' here yet..
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267867579.80/warc/CC-MAIN-20180625072642-20180625092642-00530.warc.gz
|
CC-MAIN-2018-26
| 1,148 | 12 |
https://stackoverflow.com/questions/51316840/logical-expressions-in-r-what-makes-is-nax-return-na
|
code
|
I am doing the exercises in Hadley Wickham's ggplot2 book, and I am struggling with the question here, figuring out what ? represents:
There is no doubt that the first ? represents !x, since x is marked TRUE. But, what makes is.na(x) NA? Also, I am kind of confused with the last two ?'s. If anyone could help me with these, it would be wonderful! Thanks!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583516123.97/warc/CC-MAIN-20181023090235-20181023111735-00124.warc.gz
|
CC-MAIN-2018-43
| 355 | 2 |
http://www.zillow.com/directory/Aloma-FL-32792/property-management/
|
code
|
The All-Star badge is given to top contributors of the Zillow community. These are active Zillow users who share their real estate knowledge and help others by contributing high-quality content. The more and better the contributions, the more likely an award will be granted. Users' contributions can be seen in their profiles.
Does any of the homes for rent rent by the day - 1 Answer
Me and my wife just moved in to an apartment. My wife wants to move out after 1 night of staying there. ... - 1 Answer
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1410657123274.33/warc/CC-MAIN-20140914011203-00274-ip-10-196-40-205.us-west-1.compute.internal.warc.gz
|
CC-MAIN-2014-41
| 504 | 3 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.