url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://forum.linuxfoundation.org/discussion/comment/6963
code
Random files being created on Web server I have a website that is running CRE Loaded 6.3. Some random files of zero or 1 byte length started to show up in the websites base directory. They are a random sequence of letters and numbers and the files contain nothing. These files get created at the rate of about 5 a minute. The rate seems to vary with traffic. The file permissions all seem to be in order and checks for hacks have turned up nothing. None of the CRE Loaded files seem to have been modified as the date stamps remain. This website is being hosted on Hostmonster and their support hasn't been helpful. They simply say it's probably been hacked. I asked them if there is a way to find out what process is creating the files and they didn't know. Is there a way I can figure out what application or process is creating these files? This directory does not have write permissions for the web user. I'm looking for any guidance or help tracking down this problem. It could be some added module such as a web visit counter or something else that has developed a problem. Any help would be appreciated. By the way, the web site still functions just fine and shows no evidence of anything wrong. Virus/malware checks run by the hosting company have turned up nothing.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988775.80/warc/CC-MAIN-20210507090724-20210507120724-00488.warc.gz
CC-MAIN-2021-21
1,273
3
https://lab.civicrm.org/dev/core/-/issues/2400
code
APIv4 explorer, search kit - entity reference fields tricky if you know the id One of my annoyances with apiv4 explorer is now in search kit too. Quite often I know the id of the contact but not other details - in order to prevent leaking information we only pass around the id. While it makes sense in most use cases to use the entity reference look up that lookup is hard to use if you just know the id as you still need to enter 'something' to make it search. With search kit this could impact when making the initial search and exposing in the dashlet (I would expect we will be quickly asked for some 'search by id afflets' as well as wanting entity references in other cases. I note the afflet currently renders contact id as an integer field - which is probably better than an entity reference for our current use cases but I think that we will want to be able to have more control (ie choose between an integer or entity reference field). I can see a case for making entity reference field better support entering the contact id - but I think we need to be mindful that when people are working with contact ids they are often doing data-entry type stuff that requires them to be able to enter the id & click go without many extra steps
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334871.54/warc/CC-MAIN-20220926113251-20220926143251-00548.warc.gz
CC-MAIN-2022-40
1,243
3
http://selinebuttner.com/ux-portfolio/tactile-sound-scape/
code
Tactile sound scape Installation . Sound . Electronics Tactile sound scape is an ongoing research in e-textiles. I’m interested in the relation between the physical and digital. Now a days things become more and more digital and abstract. I think it is important to not lose the focus on the importance of physical interactions in the time where things become more and more digital. When the patches are touched they create sounds, each of them create a different sound.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649741.26/warc/CC-MAIN-20230604093242-20230604123242-00054.warc.gz
CC-MAIN-2023-23
472
4
https://forum.babylonjs.com/t/physics-runtimeerror-memory-access-out-of-bounds/44080
code
The exception below is triggered when I blow up a wall with v2 physics. The exception started to occur after I added the new rigid-body-gltf-extension (glTF + Physics + Babylon) and loaded in a rigid body mesh (created in Blender). Uncaught RuntimeError: memory access out of bounds at Object.HP_World_Step (eval at new_ (HavokPhysics_umd.js:9:22462), <anonymous>:9:10) at e.executeStep (Babylon.min.js:1:4167677) $func447 @ HavokPhysics.wasm:0x2bb47 $func457 @ HavokPhysics.wasm:0x2c403 $func157 @ HavokPhysics.wasm:0x1f1b3 $func1811 @ HavokPhysics.wasm:0x12a461 $func1805 @ HavokPhysics.wasm:0x128ebf $func1978 @ HavokPhysics.wasm:0x181c71 $HP_World_Step @ HavokPhysics.wasm:0x1c697 $func278 @ HavokPhysics.wasm:0x23c04 HP_World_Step @ VM2879:9 e.executeStep @ Babylon.min.js:1 e._step @ Babylon.min.js:1 xr._advancePhysicsEngineStep @ Babylon.min.js:1 t.animate @ Babylon.min.js:1 t.render @ Babylon.min.js:1 update @ TacticalGame.js:1001 <--render loop I can reproduce the exception - but not very reliably! That means I go to the same tile, shoot at the ragdoll and in maybe 70% of trials the exception occurs. I cannot trigger the exception when not loading the ragdoll mesh; just gave it 10 more trials. Also there was no such exception in the weeks before. Anyway, huge problem is if I disable a subsystem I do not know whether it was the disabling or whether the exception did just not occur So, to be fair, the exception may not be caused by the rigid-body-gltf-extension at all! Unfortuntely, so far I failed to reproduce the exception in a playground. I guess I now have to assemble a playground bit by bit and hope for the exception to occur. But maybe someone can make sense of the call stack above? Any hint would be very welcome. Good news! yes it does Did you share your reproduction? Please, see edit of first post for the time being. What version of @babylonjs/havok are you using? That’ll help me get some extra info from your callstack. Obviously, a repro would be great, but (making a guess) I wonder if the objects you’re exploding have PhysicsShapeType.MESH shape types? Your description of the scenario makes me think that in the plugin, we’re trying to allocate a lot of memory, which fast moving, complex meshes using continuous collision detection can do. It might be that we’re asking for more memory than the browser is willing to give us… Still working on the repro I am bouncing between playground, project code and in-game testing. @eoin I am using the wasm from https://cdn.babylonjs.com/havok/HavokPhysics.wasm last update from 9-Sep-2023. I could not find a version number so I uploaded a copy here: GitHub - Joe-Kerr/tempBabylonHavok During the entire destruction process I only use PhysicsShapeType.BOX for level geometry and PhysicsShapeType.SPHERE for the projectile collider. @eoin Upgraded to latest version. Same callstack (lines, addresses). Some progress. Found a significant crash influencer. A gltf root node slipped through and ended up in the array of the cell fracture meshes. (The ones that get blown to pieces.) Since I have filtered out the root node, no crashes during the automatic reproduction steps. That means under “normal” crash condition, I was able to reproduce the crash in about <2 game starts on average. I am at 10 game starts w/o crash. The reproduction steps are automated and the only source of variability, I think, should be the ragdoll which wiggles around a bit. Unfortunately, if I then start shooting at other walls, the crash still occurs. I still cannot reproduce the error in a playground: https://playground.babylonjs.com/#88CB6A#134 edit: After 30 trials, the automated crash script trigger the crash. After the crash there is no mesh of class ‘Mesh’ with empty geometry and set physicsBody. Oh dear
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506632.31/warc/CC-MAIN-20230924091344-20230924121344-00507.warc.gz
CC-MAIN-2023-40
3,797
37
https://www.oreilly.com/library/view/argument-mining/9781786303035/c05.xhtml
code
Argument mining is still in an early stage of development. It raises much more complex challenges than information retrieval or question answering. Answering Why-questions in question answering could be the closest related challenge, if we consider that its main aim is to retrieve justifications to a claim. In contrast with information retrieval and question answering, mining attacks or supports to a claim cannot, in most cases, be based solely on linguistic cues, as shown in Chapter 4, since they are not very frequent or central. When linguistic cues exist, they can be ambiguous and may introduce, for example, causes or factual information, besides attacks or supports. Argument delimitation is also a real challenge. Argumentation is a very complex phenomenon, and argument mining is just an approximation or a simplification of some aspects of argumentation analysis in order to extract prototypical arguments or parts of them with a reasonably good accuracy. Argument mining also depends on the goal that is pursued, for example, detecting fallacies, finding arguments, detecting argumentation strategies, finding claims, finding support or attack for a given stance, among others. 5.1. Some facets of argument mining Due to these complexities, most of the projects aiming at automatically detecting arguments in text focus on argument annotations in various manners. Reliable, stable annotation from experts is required to build automatic systems. ...
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038088264.43/warc/CC-MAIN-20210415222106-20210416012106-00212.warc.gz
CC-MAIN-2021-17
1,464
4
https://flylib.com/books/en/3.417.1.34/1/
code
|< Day Day Up >| You can create a ticket from anywhere in RT; the top of every page has a small form with a button labeled New Ticket in and a drop-down menu listing the queues you can access. Select the queue in which you want to create a new ticket, and click the New Ticket in button. It will take you to the new ticket form shown in Figure 3-3. Figure 3-3. Create a new ticket (basic) The two most important fields in this basic form are the subject of the ticket and an entry box for a description; these are the first items that people see when they look at your ticket. The subject is displayed on the main page with no context, so you should make sure that it is clear and concise. The description field is the primary explanation for what the ticket is about, so you should take care to include all the relevant information. Also keep in mind how the description will be used. For example, tickets created in an Emergency queue outside of business hours might send a message to the on-call operator's SMS device. A ticket that does not get to the point within the SMS character limit will be pretty frustrating for everyone involved. Fill in all the appropriate details, click the Create button, and you'll have a new ticket. Congratulations! There is a quick ticket creation box at the bottom of the home page that instantly creates a new ticket with an empty description. Tickets are identified by number. On a fresh install, the first ticket you create is numbered 1. Every new ticket after that gets a number one higher than the previous ticket. If your RT instance is configured to send mail when a ticket is created (as it is by default), then you should get an email message shortly with a summary of the ticket you created. This message tells you the number that was assigned to the new ticket and provides a URL to the ticket display form. Keep this URL, as you'll need it shortly. When a new ticket is created, RT may run some user-defined actions called scrips. These scrips can do almost anything, but the most common type of scrip sends mail to the queue's watchers informing them of the new ticket. Other scrips might send a notification to an alphanumeric pager, post a message to an IRC channel, or even print the ticket's info to a local line printer. You can read more about scrips in Chapter 5. |< Day Day Up >|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243992514.37/warc/CC-MAIN-20210513204127-20210513234127-00089.warc.gz
CC-MAIN-2021-21
2,339
9
https://www.loadtestingtool.com/blog/wapt-usage/how-to-analyze-load-test-report-errors/
code
If you see any errors after executing a load test, first of all you should check if this is a test design problem. I wrote about the most typical problems of that kind here. Now let’s suppose that the test was designed correctly and any errors we see in the report are related to the load you created in the test. In other words, I would like to talk about errors that appear because of performance problems, not anything else. If you are not sure why an error takes place, try running the test with same profiles and a smaller number of users, and see if the same problem appears. First of all I should note that there are different types of errors. - HTTP errors. They are identified by the response code provided inside each HTTP response. Most requests are replied with the “200 OK” code, which means success. There are other codes requiring additional action from the client and codes that report errors. - Network errors. Any errors occurring on the socket level. Such errors appear in case of connectivity issues. For example, if you unplug the network cable during a test, this will produce network errors. When the tested server receives a high load that it cannot stand, it can start dropping connections producing network errors. - Timeouts. If the client does not receive any data from the server during a certain time period (120 seconds by default in WAPT), the corresponding request completes with a timeout error. Note that timeout can also occur as a network error, if the client cannot establish connection to the server because it does not respond. Such timeouts are detected by the system on the socket level. Both cases are very common in case of web site overload. - Validation errors. These are custom errors specified in your test. You can validate server response by certain keyword that it should (or should not) contain. Sometimes when a server receives a high load, it can reject requests with a user-friendly message like “The server is busy, please return later.” Such messages should be treated as errors in a load test. In the HTML report produced by WAPT you can find the “Response codes” table. It contains information on different types of errors occurred in the test. For each code it provides the list of requests for which this code was produced at least one time. The numbers in the right columns are the numbers of pages and hits returned with the code for the request during the test. For example, let’s take a look at the following line: This means that “Profile1.page_1:…” request produced “200 OK” code one time for the page request itself and 32 times for all page elements of that request together with the page request. So, the table includes information about responses to page elements. For this reason it may list same request several times with different codes. For example, if a page request completed successfully, but its page element was not found on the server, it will be listed for 200 and 404 codes. Note that response codes starting with “3” (like 302) are not errors. These are HTTP redirects that are processed by WAPT automatically. If you see the 404 code, you should check if the same code was returned when you originally recorded the profile. You can do this on the “Response processing” tab for the corresponding request. If you find same problem there, your site contains a broken link. To get more information on each error you should take a look at the logs. Integrated log viewer provides the detailed information on all requests, responses, and errors appeared during the test run. This information is structured with help of a tree view that includes profiles, virtual users, sessions and requests. Expand the “Logs” folder in the left view and select a session. In the upper right view you will see the log lines of different types. - Page requests. Successful ones are painted green. Requests completed with errors are painted red. - Requests to page elements in grey color with indent under each page request. You can expand and collapse them. - “Values of variables” lines that provide information on the values of all variables used in the next request. You can select any line and see the details in the lower part of the view. For each request you can switch between different tabs containing request and response headers and bodies. This way you can analyze what exactly was sent to the server and received in response. For network errors you can get exact error code for each case. There is a special toolbar under the left view that lets you navigate through the log. For example, you can get to the next error in the log by clicking a button. Note that by default logging is disabled for efficiency reasons. So, if you want to get logs after a test run, you should enable this feature on the “Log and Report Settings” page. If you see that errors take place occasionally and there is no specific reason for each one except the stressing load, you can analyze how severe the problem is. For this purpose you may want to check error rate for different test phases. HTML report contains special tables for this purpose. This data is also provided on graphs. When you analyze this information you should remember few important things. WAPT reports all error rates in percentage. For example, if error rate is equal to 50, this means that every second request completed with error. Error rates are provided for page requests (pages) and pages together with page elements (hits). So, for example, if a page contains 9 images as page elements and 5 of them produce errors, error rate on hits will be 50% whereas error rate on page can be 0% provided that the page itself always loads successfully. In practice there can be any other ratio between these values. You only need to know that error rate on hits and on pages are two different values, you should interpret the results accordingly. If you see that with the growing load all hits start producing more errors (growing error rate on hits), this probably means that web server or network capacity is insufficient. If you see that error rate on hits stays more or less the same, but error rate on pages grows, probably the bottleneck is somewhere in the application server and/or database. Error rate is provided separately for each type of errors, but there is also a table with summarized values. This is also useful to see what the exact problem is. Finally, different requests may have significantly different error rates. This is also very important information that can be used to identify bottlenecks. For example, you may see that error rate for the login request gets higher with the load, whereas all other requests produce same percentage of errors. This will give you a clue on which part of your web application requires improvements.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662587158.57/warc/CC-MAIN-20220525120449-20220525150449-00596.warc.gz
CC-MAIN-2022-21
6,826
25
https://www.dr-farfar.com/hex-rays-ida-pro-advanced-and-decompiler-full-activated/
code
Hex-Rays IDA Professional Advanced And Decompiler Full Activated x86, x64, ARM64 The best-of-breed binary code analysis tool, an indispensable item in the toolbox of world-class software analysts, reverse engineers, malware analysts, and cybersecurity professionals. A powerful disassembler and a versatile debugger IDA Pro is a disassembler is capable of creating maps of their execution to show the binary instructions that are actually executed by the processor in a symbolic representation (assembly language). Advanced techniques have been implemented into IDA Pro so that it can generate assembly language source code from machine-executable code and make this complex code more human-readable. The debugging feature augmented IDA with the dynamic analysis. It supports multiple debugging targets and can handle remote applications. Its cross-platform debugging capability enables instant debugging, easy connection to both local and remote processes, and support for 64-bit systems and new connection possibilities. IDA Pro has become the de-facto Standard for the analysis of hostile code, vulnerability research and commercial off-the-shelf validation Advantages of the Decompiler In comparison to low-level assembly language, high-level language representation in the Decompiler has several advantages: - concise: requires less time to read it; - structured: program logic is more obvious; - dynamic: variable names and types can be changed on the fly; - familiar: no need to learn the assembly language; The pseudocode text is generated on the fly. Our technology is fast enough to analyze 99% of functions within a couple of seconds. Currently, the decompiler supports compiler-generated code for the x86, x64, ARM32, ARM64, and PowerPC processors. We plan to port it to other platforms in the future. The programmatic API allows our customers to improve the decompiler output. Vulnerability search, software validation, coverage analysis are the directions that immediately come to mind. The decompiler runs on MS Windows, Linux, and Mac OS X. The GUI and text IDA versions are supported. IDA PRO 7.7.220118 (SP1) (x86, x64, ARM64) Full Activated - improve return value recognition in golang functions - improved the analysis speed of arrays filled with 0xFF bytes - BUGFIX: ARM Mac debugger could fail to launch a universal binary when run in instant debugging mode - BUGFIX: decompiler: fix decompilation of switches when the switch register is reused between range check and indirect jump - BUGFIX: decompiler: fixed multiple interrs - BUGFIX: decompiler: fixed wrong warning about lvar allocation failure for functions with scattered return value - BUGFIX: golang: fix annotation of rtype methods in 64 bit binaries - BUGFIX: launching the Mac debugger with an empty database could cause the debugged application to behave erratically - BUGFIX: Local ARM Mac OS debugger was missing from the Run/Attach menus when starting IDA with an empty idb - BUGFIX: MACHO: IDA would fail to properly load modules from some iOS15 dyldcaches (iPhone X and earlier) - BUGFIX: PC: movdir64b with wrong operands would be erroneously decoded and cause a crash - BUGFIX: the Debugger menu could disappear when using IDA Home - BUGFIX: ui/qt: IDA could fail to display certain unicode codepoints correctly - BUGFIX: UI: filter dropdown in “Modify filters” dialog could grow too wide if long filter strings were added - BUGFIX: Windbg: breakpoints were not restored correctly in databases created from DMP files - BUGFIX: windbg: IDA could loop infinitely when debugging Windows startup on machine with multiple processors - BUGFIX: XTENSA: label operands for loop instructions were decoded as immediate
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499845.10/warc/CC-MAIN-20230131055533-20230131085533-00731.warc.gz
CC-MAIN-2023-06
3,704
36
http://www.2013zone.com/applications/919524-flying-meat-acorn-5.5.0-mac-os-x.html
code
Flying Meat Acorn 5.5.0 (Mac OS X) | 12MB Everyone needs to edit photos at some point, but not everyone has the time to learn complicated super pricey photo editing software. This is why we created Acorn. Add text and shapes to your digital pictures. Combine images together to create a photo collage. Work with layers to touch up your favorite photos or make something entirely new from scratch. Do all this and more with Acorn! Powerful Image Editing Use curves and levels, non-destructive filters, layer masks, and selections to touch up your images or make something entirely new. Stars, arrows, bezier curves, boolean operations, and text tools are just a few of the vector features awaiting you. Custom Brushes & More Acorn includes a built-in brush designer, multi-stop gradients, web export, retina canvas support, and is scriptable and automatable. Acorn 4 is a lot faster than its predecessors. From applying selections and filters to large images to using Instant Alpha, everything is faster. Layer styles and filters are now merged together into a happy new UI. Chain filters together to create endless combinations of unique effects knowing you can always change your mind later on. Adjust the tonal response and even the individual color channels to perfect the midtones, shadows, highlights, and contrast in your images. Multiple Layer Selection You can now select multiple layers and move, delete, or reposition them all at once. What's New in Version 5.5 # New Things * New color picker! Hold down the option key (while in the canvas) when using the brush, pencil, gradient, or fill tools, and you'll get a fancy new loupe to select a color from anywhere on the screen (just click to pick your color). You can also scroll in and out with your scroll wheel (with shift+option down) to change how far in the loupe zooms. And finally if you'd like to get finer control when choosing your color, click and drag the mouse and let up when you've chosen your color. (You can also use the arrow keys to move it by single pixel increments). This is amazing. And if your hands are on the keyboard instead of mouse, you can use the keyboard shortcut Control-C to pick a color out. * Two new dithering filters under Color Adjustment: "1Bit" which will turn your layer in a (seemingly) one bit, black and white image. As well as "Dither", which is a filter which lets you choose from four different types of dithers: Atkinson (old school Mac OS), Floyd Steinberg, Gaussian Blue, and Ordered Reproducible. * Color profile, bit depth, and DPI of an image are now listed in the Metadata window. * New "Spacing" option in the "Arrange Shapes in a Circle" shape processor. A setting of 0 will mean shapes are auto-spaced around the circle evenly. Any other value between 1-360 is the distance (as an angle) between shapes. This means that shapes can either not make it all the way around the circle, or even go around multiple times. Bonus- combine this with the Translate shape process to make shapes do a loop across your canvas. * Layer alignment options: Select multiple layers, and use the various options under Layer ▸ Rotate and Transform ▸ Align to have edges line up or center in canvas, or so on. Hold down the option key for more menu items. * The Layer ▸ Rotate and Transform ▸ Rotate 90° layer menu items now work on a selection. * Tightened up some colorspace issues when using the system color loupe from the color panel. * The return of no working pixel processing profile (WPPP for short?) as default. As part of the color profile overhaul, Acorn 5.4 changed the default WPPP to Linear Light and in while this is awesome for doing things with brushes and most other alpha blending scenarios, it probably wasn't the right choice for general webby use and setting colors in general. It also didn't match what most other image editors did as well. So in Acorn 5.5, we're changing it back. * Rolled back the bits from 5.4 where shape layers would draw in a linear RGB colorspace if your document was set to run pixels through a linear colorspace as well. * Removed the View ▸ Select Color menu item, in favor of the Edit ▸ Pick Color menu item. Why didn't anyone notice that we had two different menu items for the same thing till now? * New code for matching your image's color space to the display color space. It's fancy. * Changed the minimum radius of the "Arrange Shapes in a Circle" processor to 0. You can now use this processor to stack all your shapes into a single pile. * The "Monitor Resolution" preset now does the right thing for retina displays. * QOL improvements for the gradient palette: Single click to select and change the color of a color stop. Better drawing and handling of the gradient palette color handles. In addition, if a color handle has the focus of the color palette, it will now draw a little highlight on top of the handle letting you know this. * It is no longer to move layers into or out of locked group layers via the layers list. * Pressing the fx button in the tool palette will now toggle showing the filter sheet if there aren't already filters on the current layer. # Bug fixes * Fixed some snapping issues when moving selected pixels around the canvas. * We ran out of room for the full list. Visit the release notes on our website for everything! Requires OS X 10.8 & 10.9 or later Home Page - http://www.flyingmeat.com/acorn/
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118707.23/warc/CC-MAIN-20170423031158-00015-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
5,398
35
http://unix.stackexchange.com/questions/27622/routing-wget-recursive-to-stdout-as-in-o-rather-than-a-file
code
I want to "scan" a website content, recursively, and pipe it to another program. When I run: wget -r -O - $SITE WARNING: combining -O with -r or -p will mean that all downloaded content will be placed in the single file you specified. Then, "download" process starts, but hangs after the first page is done. By "hangs" I mean, nothing seems to be going on, nor do I get back the command prompt until I hit I would prefer avoiding the option outputting wget to a temporary folder and scan file by file, as well as writing my own scrapper which seems to be the most redundant act one can think of at the end of 2012.
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257823670.44/warc/CC-MAIN-20160723071023-00166-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
614
7
http://forum.duelingnetwork.com/index.php?/topic/31231-anti-afk-button/
code
I was dueling today and my opponent was bad sport and went afk on me after he lost. I had to w8 for an Admin intervention for about 20min to give me the win. Then this idea came to my mind. How does it work ? Either players can use the AFK button. This function have 60seconds delay, it cannot be spammed. Once the button is clicked, the other party will be prompted to prove his presence. A pop-up message will appear asking to confirm his/her presence "Are you there ?". The player must click on "YES" if not he/she will be kicked withing 90 seconds. And 10 Seconds for Rock/Paper/Scissors game. Save us a lots of time. Also Admins will have one less boring task to do... Misusing this button is also punishable. Edited by ! ! FFXlll Lightning, 18 August 2012 - 11:35 AM.
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609533121.28/warc/CC-MAIN-20140416005213-00432-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
773
8
https://workoutroutinewarehouse.com/bicep-workouts.html
code
Welcome to our Bicep Workouts main page! Here we’ve linked to all of our weight training routines that focus on your biceps. So, you’re in the right spot if you’re goal is to build big arms, pipes, pythons, guns, or whatever else you call those things. If your goal is to tone your arms, I recommend viewing our fat loss workouts as you can’t target your fat loss to a specific area (see weight loss myths). How to Get Big Arms In conjunction with our bicep workouts below, we recommend you check out our “Building Big Arms” how to article for some insight on our thought process with working your biceps and triceps. We also recommend viewing our chosen best bicep exercises and best tricep exercise list. In general, we recommend: - Focusing on Compound Exercises - Don’t overtrain – consider your Chest and Back Workouts and how you’re already hitting your biceps and triceps - Remember that your Triceps are two times larger than your biceps All Bicep Workouts Heavy Pull Back and Bicep Workout: Build big biceps and a thick back with this heavy pull routine that focuses on some of the best back exercises that emphasize your biceps. Final Related Pages - Bicep Exercises and Best Bicep Exercises - “Building Big Arms” – A How To Article - Tricep Exercises and Best Tricep Exercise List
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499804.60/warc/CC-MAIN-20230130070411-20230130100411-00493.warc.gz
CC-MAIN-2023-06
1,315
16
https://robineko.com/how-to-transfer-domain-ownership-hostgator/
code
How To Transfer Domain Ownership Hostgator In 2002, HostGator was founded by Brent Oxley in his dormitory at Florida Atlantic University. The business has expanded tremendously ever since as well as remains to do so, every year. Their logo design is “We consume the competitors.”How To Transfer Domain Ownership Hostgator Today, HostGator has headquarters in both Austin and also Houston, Texas, after growing out of numerous other sites. In 2007, their Brazil workplace was opened. HostGator has won great deals of awards for support and organizing solutions. An EIG Owned Environment-friendly Host In June 2012 HostGator was gotten by the Stamina International Group (a firm that likewise has various other organizing providers aside from HostGator). Nonetheless, it remains to trade under the HostGator name. HostGator is an environment-friendly power business. The business gets Green-e accredited Renewable Energy Credit histories (RECs) from a wind farm in Texas. 130% environment-friendly energy cools down and also powers all shared and also reseller web servers. We may make a commission– at no added expense to you– if you determine to acquire any of the products, software application or services we refer to as well as advertise on our website. The viewpoints expressed are of our very own independent customers & writing team, commissioned to supply handy reviews & their unbiased point of view. You should assume that every external link that you click our website is an associate web link that brings about us being paid by a partner of ours. Summary of HostGator’s Leading Functions Whenever there’s a discussion concerning web hosts, the name HostGator is bound to come up, and also with great factor. How To Transfer Domain Ownership Hostgator Having actually been around for more than a decade, HostGator can be said to be among one of the most relied on as well as identified web hosts. It masters several areas consisting of customer assistance, hosting flexibility, uptime, shared organizing, plus so much a lot more. This excellence in numerous facets of web hosting paired with the business’s experience, selection of features, and performance makes HostGator a clever option for any type of internet site owner. What Advantage Do You Get? HostGator supplies a range of strategies. If you’re struggling to choose on which strategy to choose, take into consideration these attributes, which we’ll discuss listed below: - You handle your account utilizing cPanel, the industry-standard user interface - To maintain your account protected, you obtain a free Secure Sockets Layer (SSL) certification - If you want to boost safety and malware scanning, you will certainly have to get SiteLock - Also the entry-level common holding strategy features assistance for unlimited email accounts - Regular monthly invoicing options are available - One-click installs, even from the fundamental strategyHow To Transfer Domain Ownership Hostgator - Accessibility to the web site builder– at an expense - A Content Delivery Network (CDN) maintains your site fast - Numerous assistance options including real-time chat With all the other host suppliers that are available, why choose HostGator? Well, the fact is that no solitary host is perfect. So, whether you’re a newbie webmaster or are wanting to alter webhosting, right here’s a peek at the excellent and also the negative of HostGator to aid you make the right decision. HostGator’s Hosting Packages Among the best functions of HostGator is the reality that the firm offers flexible bundles that leave users (both big and little businesses/blogs) with a lot of room to expand. The most fundamental of the packages, the “Hatchling Strategy,” includes assistance for one domain, limitless bandwidth, disk area, databases, shared SSL certification, plenty of email addresses, and also support for third-party applications like material administration systems. Other shared holding strategies improve this Hatchling plan by including additional functions such as limitless domain names, personal SSL certificate, and also a toll-free telephone number (simply among others.). VPS and also Dedicated Hosting Plans. Alternatively, if you require even more power, or have particular needs that shared servers can not meet, there’s the alternative of advanced bundles such as VPS and also Devoted web server plans. The highest possible rate VPS package supplies 8GB RAM, 240GB storage, and regular monthly data transfers topped at 3TB. Devoted server packages, on the other hand, can be personalized with approximately 16GB of RAM, 25TB of regular monthly information transfers, and an excellent 1TB of storage space. HostGator additionally provides Cloud and WordPress holding, which we go into below. You can always go to HostGator’s official web page to find one of the most upgraded hosting plans on offer as well as their specifics. The firm additionally offers WordPress holding with the most affordable plan allowing one site with up to 100,000 visitors every month. The most inexpensive WordPress plan likewise consists of 1GB back-ups. Higher-end strategies allow for approximately 3 sites as well as as much as 500,000 visitors every month. On the other hand, the leading WordPress hosting plan also permits up to 3GB in back-ups.How To Transfer Domain Ownership Hostgator Plenty Ahead of The Competition All WordPress holding strategies consist of optimized cloud style, low-density servers, CDN, and several caching layers which indicate that sites load up to a claimed 2.5 times faster than rivals. HostGator specialists are also handy to offer a totally free migration solution as well as premium support in case anything breaks. What Regarding Performance and Uptime? HostGator assures a 99.9% uptime and has the sources to back it up. Powered by Thousands of International Web Servers. Among the largest and most preferred web hosts, HostGator has countless web servers under its management. HostGator web servers are checked 24/7 by on-site technological team. Shielded Infrastructure for Continuity of Service. Along with being strategically situated throughout the world, these web servers utilize top-notchweb server equipment as well as are housed in advanced information facilities that take all the essential actions (UPS battery backup systems, top-tier A/C systems, constant infrastructure monitoring, fire security systems, etc.) to make sure efficiency stays perfect and also continuous. Thanks to these world-class data centers and their tactical places, HostGator offers reliable, high quality performance that never ever disappoints. Uptime and Speed HostGator has an over 90% consumer satisfaction (from a June 2008 client complete satisfaction survey). HostGator preserves an average of 99.9% uptime. And also in addition to the reliable uptime, HostGator likewise supplies acceptable load times with speeds ranging from 22 to 940ms depending upon the web browser’s location. How Great is HostGator’s Client Support? When it comes to consumer support, very couple of web hosts can take on HostGator’s customer service. The firm also has awards to prove this reality. For general inquiries and issues, you can use HostGator’s e-mail support, which is constantly readily available, social media assistance on Facebook, Twitter, Google+. When you register for a HostGator strategy, you can request a cost-free internet site transfer. Or seek solutions from the firm’s substantial knowledgebase, which has plenty of Frequently asked questions, handy articles, and video tutorials that stroll you with a few of the controls. HostGator also offers a discussion forum where you can ask questions and also answer those posed by other individuals of the webhosting. Alternatively, if you require a bit a lot more immediate help, or are experiencing a problem that needs unique focus, HostGator has customer support agents on standby 24/7/365 prepared to assist you with whatever inquiries you may have. These representatives can be gotten to by phone or live chat.How To Transfer Domain Ownership Hostgator Exists a Money-Back Warranty? No locked-in agreements and a 45-day money-back assurance. Implying if you determine to terminate within the first 45 days of joining, you get a full refund, no doubt asked. Further making HostGator a good catch is the reality that the host includes a few extra attributes with their various holding plans. As an example, each holding plan comes with numerous free offers. You obtain a free internet site builder and also internet site structure tools, limitless transmission capacity as well as disk area, over 4,000 internet site layouts, free domain name transfers, as well as unrestricted MySQL databases. Various other extras that you can eagerly anticipate with HostGator include:. - $ 150 well worth of Google Adwords or Bing/Yahoo advertising and marketing credit scores. - Free site transfers when you intend to move your site from another host to HostGator. As well as the best part is that your web site can be updated during the transfer at no charge. Nevertheless, the claimed movement has to be done within one month from the day you sign up. - A free domain for the initial term when you transfer and set up a new account. - 1-click mounts offered for all significant open-source projects such as WordPress, Magento, and also Joomla. - A 45-day money-back guarantee for all HostGator hosting strategies. The majority of host business only offer you a 30-day home window to terminate your account and obtain your refund. - A getting-started e-mail with web links to every one of the resources you will certainly require to construct your website as well as get it up and also running. What are the Pros and Cons of HostGator? So, is HostGator the ideal host for you? Well, given the truth that HostGator offers you a basic method to build and also handle your site, supplies you with all the sources you’ll need to supply top-level services on your site, uses a number of feature-packed holding bundles, as well as brings a lots of experience to the table, it can be a perfect webhosting for anyone with a web site. A Lot Of Pros HostGator supplies numerous advantages consisting of:. - Trustworthy uptime as well as rapid response times. - Economical holding strategies. - Lots of space for development. - The alternative of cloud organizing. - Versatile email administration. - Free shared or private SSL certificate on all holding packages. - Generous 45-day money-back guarantee that offers clients peace of mind. - Comprehensive Knowledgebase. - No restriction on transmission capacity, disk room, as well as e-mails. - Rock-solid protection. - Free Weebly site builder. - A fantastic control panel with a ton of functions varying from an online file supervisor to more advanced features such as cron jobs, photo manager, error logs, and apache handlers. Additionally, HostGator has a big data base with answers to virtually any kind of inquiry you could have ranging from the most basic to the most sophisticated. So, when the customer assistance group takes also long to address, you can seek out the service to your issue from this knowledgebase. What Are the Cons? As for the downsides of the company, you’ll only have to take care of the problem of weekly back-ups, slow-moving client response times (according to several of the host’s individuals), a sophisticated cPanel that calls for some obtaining used to, and also no one-stop WordPress import.How To Transfer Domain Ownership Hostgator Try Without Dedication Considered that HostGator has a whole lot to like and also very few things to dislike, you ought to most definitely try the business if you have a web site or plan to construct one. If the web host does not make a good fit for your web site, the 45-day money-back guarantee available will permit you to leave without shedding cash.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585305.53/warc/CC-MAIN-20211020090145-20211020120145-00055.warc.gz
CC-MAIN-2021-43
11,938
84
https://forum.dstra.io/threads/exciting-news-dstra-exchange-listing.895/page-2
code
Today I bring you exciting news where many of you waited on: We have paid the listing fees to be listed on Crex24 (DSTRA/BTC)! After being processed and reviewed by the exchange, I hope we are listed soon. Meanwhile testing the V2 wallet is in progress, and so far only a few bugs have been found. Last but not least we have send the remaining AD4 rewards for everybody who didn't receive them yet. We also expect to send AD5 shortly!
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221216724.69/warc/CC-MAIN-20180820180043-20180820200043-00718.warc.gz
CC-MAIN-2018-34
434
5
https://www.telerik.com/blogs/visual-studio-2008-where-is-the-new-asp-net-ajax-enabled-web-site-template
code
UPDATE: Visual Studio 2010 does not have the Ajax-Enabled Web Site template as well. It always creates an ajax enabled web sites/applications, so what you need to do is just check if the ScriptManager is on your page. If you use RadControls for ASP.NET Ajax with Visual Studio 2005 you should be familiar with the Add New > ASP.NET Ajax-Enabled Web Site template. This is the option that you often choose in the add New Web Site dialog: Selecting this template gives you two benefits: 1. Your web.config file is automatically configured to use ASP.NET Ajax so you do not have to do anything manually. 2. The default page comes with the ScriptManager control on it so you do not have to add it manually. Unfortunately, this template is no longer available in Visual Studio 2008: The reason is that Visual Studio 2008 by default creates a .NET 3.5 application. Since ASP.NET Ajax is included in the framework – this template is missing. So, when you create a new ASP.NET Web Site with Visual Studio 2008 all you get is a pre-configured web.config file. The default page is lacking the ScriptManager so you have to add it manually. Fortunately, you can add a new Ajax Web Form as shown below: Now your page will have the ScriptManager automatically added on it. Furthermore, it will contain the pageLoad() method declaration in the <head> tag. Note that if you are going to use code blocks (i.e. <% ... %>) in the pageLoad() method you need to move it out of the <head> tag to prevent the exception: Error message “The Controls collection cannot be modified because the control contains code blocks" Fortunately, you can download the Microsoft ASP.NET 2.0 AJAX Templates for Visual Studio 2008 from here. After installing them you will be able to choose again your favorite option in Visual Studio 2008 – Ajax 1.0-Enabled ASP.NET 2.0 Web Site: Note that selecting this option will create a .NET 2.0 web site using the Ajax Extensions 1.0 (despite the .NET version in the dropdown is 3.5). I hope you will find this information useful. Iana Tsolova is Product Manager at Telerik’s DevTools division. She joined the company back in the beginning of 2008 as a Support Officer and has since occupied various positions at Telerik, including Senior Support Officer, Team Lead at one of the ASP.NET AJAX teams and Technical Support Director. Iana’s main interests are web development, reading articles related to geography, wild nature and latest renewable energy technologies. Subscribe to be the first to get our expert-written articles and tutorials for developers! All fields are required
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818374.84/warc/CC-MAIN-20240422211055-20240423001055-00313.warc.gz
CC-MAIN-2024-18
2,592
16
http://www.linuxquestions.org/questions/linux-general-1/lamp-how-775072/
code
Linux - GeneralThis Linux forum is for general Linux questions and discussion. If it is Linux Related and doesn't seem to fit in any other forum then this is the place. Welcome to LinuxQuestions.org, a friendly and active Linux Community. You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today! Note that registered members see fewer ads, and ContentLink is completely disabled once you log in. If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here. Having a problem logging in? Please visit this page to clear all LQ-related cookies. Introduction to Linux - A Hands on Guide This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter. For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own. Click Here to receive this Complete Guide absolutely free. this is what i tell EVERYONE for the first 12 apache,mysql,php,... installs build EVERYTHING from the source .This way YOU WILL LEARN how to install and configure it do not use any prebuilt rpm's,.deb's or other. for this reason -- they will only save you about 30 min. on install time AFTER you DO know what you are doing . 1. Need an idea of a nice platform to work with install RHEL 5.4 or CentOS 5.4 or suse-enterprise you want a LONG life like 5 years of support I personally prefer Slackware for LAMP solutions. For me they have always worked out of the box. Only recently I have encountered a missing option in MySql that will require building it from scratch if I ever need that option. During the install, do not enable mysqld to be started automatically! You first have to configure it using a script (how to do that is described in the /etc/rc.d/rc.mysqld script).
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917127681.84/warc/CC-MAIN-20170423031207-00079-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
2,478
21
http://olivieris.fr/news-page-5.html
code
Pages : 1 2 3 4 [ 5 ] 6 After learning at school and on the Internet ,what more natural than to share in turn? Passionate about the web and technology in general, I like to share my skills and my findings with people who have the same passion as me! : You.
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158633.40/warc/CC-MAIN-20180922182020-20180922202420-00082.warc.gz
CC-MAIN-2018-39
256
4
https://usinglight.com/2017/07/08/the-basics-you-should-know-about-gdpr-for-your-next-app/
code
Next year the European Union’s new privacy guidelines GDPR (General Data Protection Regulation) will roll out and cover the handling of personal data. So these are the items to consider for your backlog. Please note that most areas are already covered in the EU data protection directive. The GDPR adds a little bit on top of that and clarifies details. - The consent for the use of private data.The GDPR rules consent as specific, informed and unambiguous. You could identify that as explicit opt-in. - Control over personal dataSometimes coined as the right to be forgotten, the control over personal data is to an extent that the user must be able to delete the data about his person. - Information on personal dataIndividuals have the right to be informed on how the collected data is used and also which persons have access to their data. The GDPR mentions and encourages the following techniques as possibilities. - Pseudonymisation (for example through the use of tokens) How does this influence app developers? The importance of the GDPR goes far beyond the checkbox for consent. You have to consider it for analytics, APIs for accessing or exporting data and user hierarchies. Setting the groundwork for GDPR compliance is not an option. May 2018 will show how the law will be executed.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645089.3/warc/CC-MAIN-20230530032334-20230530062334-00142.warc.gz
CC-MAIN-2023-23
1,297
10
https://devdocs.interactions-nexus.io/testnet/testnet
code
A place where you will find all the information needed to run testnets The Interactions arm, developer support team is running a full fledged testnet for the developer community. This testnet mimics the mainnet with three channel consensus and also mines testnet coins. The testnet only supports tritium chain and legacy support has been removed. we also provide a single multiuser node for testing and can ramp up if anyone has specific requirements We will also be providing testnet coins to developers to test their applications. Please contact the Interactions, developer support team for testnet coins or any help related to the testnet on telegram https://t.me/NexusDevelopers We recommend application developers to join the testnet with their own nodes which will give them full control on the node, and access to a full fledged managed testnet The developers can even run their own separate testnet, but it will require a lot of resources . This testnet uses the merging branch and you may come across some bugs.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946535.82/warc/CC-MAIN-20230326204136-20230326234136-00587.warc.gz
CC-MAIN-2023-14
1,020
7
https://attend.gailborden.info/event/7699684?registration=true
code
Overview of Social Security’s programs & internet services. Learn how to use my Social Security online account and other online services. Please Register for Zoom link. We encourage you to go to www.socialsecurity.gov/myaccount to create a my Social Security account and review your Social Security Statement before attending the workshop. AGE GROUP: | Adults | EVENT TYPE: | Virtual | Older Adult Interest | Business & Finance | Adult Programs | We're open 9:00AM to 9:00PM |Mon, Jun 05||9:00AM to 9:00PM| |Tue, Jun 06||9:00AM to 9:00PM| |Wed, Jun 07||9:00AM to 9:00PM| |Thu, Jun 08||9:00AM to 9:00PM| |Fri, Jun 09||9:00AM to 6:00PM| |Sat, Jun 10||9:00AM to 6:00PM| |Sun, Jun 11||12:00PM to 5:00PM|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224655027.51/warc/CC-MAIN-20230608135911-20230608165911-00021.warc.gz
CC-MAIN-2023-23
701
12
http://www.brokencontrollers.com/faq/11742849.shtml
code
Python Convert fraction to decimal I want to convert 1/2 in python so that when i say print x (where x = 1/2) it returns 0.5 I am looking for the most basic way of doing this, without using any split functions, loops or maps I have tried float(1/2) but I get 0... can someone explain me why and how to fix it? Is it possible to do this without modifying the variable x= 1/2 ?? in python 3.x any division returns a float; >>> 1/2 0.5 to achieve that in python 2.x, you have to force float conversion: >>> 1.0/2 0.5 or to import the division from the "future" >>> from __future__ import division >>> 1/2 0.5 An extra: there is no a built-in fraction type, but there is in the official library: >>> from fractions import Fraction >>> a = Fraction(1, 2) #or Fraction('1/2') >>> a Fraction(1, 2) >>> print a 1/2 >>> float(a) 0.5 and so on... You're probably using Python 2. You can "fix" division by using: from __future__ import division at the start of your script (before any other imports). By default in Python 2, the / operator performs integer division when using integer operands, which discards fractional parts of the result. This has been changed in Python 3 so that / is always floating point division. The new // operator performs integer division. Alternatively, you can force floating point division by specifying a decimal or by multiplying by 1.0. For instance (from inside the python interpreter): >>> print 1/2 0 >>> print 1./2 0.5 >>> x = 1/2 >>> print x 0 >>> x = 1./2 >>> print x 0.5 >>> x = 1.0 * 1/2 >>> print x 0.5 EDIT: Looks like I was beaten to the punch in the time it took to type up my response :) If the input is a string,then you could use Fraction directly on the input: from fractions import Fraction x='1/2' x=Fraction(x) #change the type of x from string to Fraction x=float(x) #change the type of x from Fraction to float print x There is no quantity 1/2 anywhere. Python does not represent rational numbers with a built-in type - just integers and floating-point numbers. 1 is divided by 2 - following the integer division rules - resulting in 0. float(0) is 0.
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541307797.77/warc/CC-MAIN-20191215070636-20191215094636-00355.warc.gz
CC-MAIN-2019-51
2,095
24
https://www.commonsense.org/education/website/khan-academy-algebra-2
code
Khan Academy's Algebra 2 content might be best used as solid, at-home practice to support kids who struggle. The tutorials and instructional videos are clearly labeled with the topics commonly used in Algebra 2 classrooms. As with much of the site, the videos have a spur-of-the-moment feel. Some kids might enjoy the spontaneity of Sal's conversational tone, and it's probably best utilized to liven up at-home practice and review. However, many videos lack the organization expected of a well-articulated in-class lesson. Whether you're using the Missions or pointing students directly to specific tutorials, be sure to carefully screen content beforehand to make sure it aligns with your in-class instruction. If using the Algebra 2 Mission, students will enjoy moving through the curriculum at their own pace as well as the immediate feedback on quizzes. This can be helpful for kids who need to catch up with a lot of material over a short time. Advanced students may not find the problems challenging enough; nevertheless, this could be useful practice for those looking to test out of the class. Advanced students could also go to the Community Questions section and earn badges by answering other students’ questions. - The Community Question section does a great job of encouraging kids to teach each other. - Some videos, like “Introduction to conic sections,” lack organization and may be hard to follow. - “Trolls, Tolls, and Systems of Equations” presents a creative way to introduce this concept. Full Disclosure: Khan Academy and Common Sense Education share funders; however, those relationships do not impact Common Sense Education's editorial independence and this learning rating.Continue reading Show less Key Standards Supported Arithmetic With Polynomials And Rational Expressions Rewrite simple rational expressions in different forms; write a(x)/b(x) in the form q(x) + r(x)/b(x), where a(x), b(x), q(x), and r(x) are polynomials with the degree of r(x) less than the degree of b(x), using inspection, long division, or, for the more complicated examples, a computer algebra system. (+) Understand that rational expressions form a system analogous to the rational numbers, closed under addition, subtraction, multiplication, and division by a nonzero rational expression; add, subtract, multiply, and divide rational expressions. Prove polynomial identities and use them to describe numerical relationships. For example, the polynomial identity (x2 + y2)2 = (x2 – y2)2 + (2xy)2 can be used to generate Pythagorean triples. (+) Know and apply the Binomial Theorem for the expansion of (x + y)n in powers of x and y for a positive integer n, where x and y are any numbers, with coefficients determined for example by Pascal’s Triangle.1 Write a function that describes a relationship between two quantities. Determine an explicit expression, a recursive process, or steps for calculation from a context. (+) Compose functions. For example, if T(y) is the temperature in the atmosphere as a function of height, and h(t) is the height of a weather balloon as a function of time, then T(h(t)) is the temperature at the location of the weather balloon as a function of time. Write arithmetic and geometric sequences both recursively and with an explicit formula, use them to model situations, and translate between the two forms. Identify the effect on the graph of replacing f(x) by f(x) + k, k f(x), f(kx), and f(x + k) for specific values of k (both positive and negative); find the value of k given the graphs. Experiment with cases and illustrate an explanation of the effects on the graph using technology. Include recognizing even and odd functions from their graphs and algebraic expressions for them. Find inverse functions. (+) Understand the inverse relationship between exponents and logarithms and use this relationship to solve problems involving logarithms and exponents. Create equations and inequalities in one variable and use them to solve problems. Include equations arising from linear and quadratic functions, and simple rational and exponential functions. Create equations in two or more variables to represent relationships between quantities; graph equations on coordinate axes with labels and scales. Represent constraints by equations or inequalities, and by systems of equations and/or inequalities, and interpret solutions as viable or non- viable options in a modeling context. For example, represent inequalities describing nutritional and cost constraints on combinations of different foods. Rearrange formulas to highlight a quantity of interest, using the same reasoning as in solving equations. For example, rearrange Ohm’s law V = IR to highlight resistance R. Graph functions expressed symbolically and show key features of the graph, by hand in simple cases and using technology for more complicated cases. Graph linear and quadratic functions and show intercepts, maxima, and minima. Graph square root, cube root, and piecewise-defined functions, including step functions and absolute value functions. Graph polynomial functions, identifying zeros when suitable factorizations are available, and showing end behavior. (+) Graph rational functions, identifying zeros and asymptotes when suitable factorizations are available, and showing end behavior. Graph exponential and logarithmic functions, showing intercepts and end behavior, and trigonometric functions, showing period, midline, and amplitude. Write a function defined by an expression in different but equivalent forms to reveal and explain different properties of the function. Use the process of factoring and completing the square in a quadratic function to show zeros, extreme values, and symmetry of the graph, and interpret these in terms of a context. Compare properties of two functions each represented in a different way (algebraically, graphically, numerically in tables, or by verbal descriptions). For example, given a graph of one quadratic function and an algebraic expression for another, say which has the larger maximum. For a function that models a relationship between two quantities, interpret key features of graphs and tables in terms of the quantities, and sketch graphs showing key features given a verbal description of the relationship. Key features include: intercepts; intervals where the function is increasing, decreasing, positive, or negative; relative maximums and minimums; symmetries; end behavior; and periodicity. Relate the domain of a function to its graph and, where applicable, to the quantitative relationship it describes. For example, if the function h(n) gives the number of person-hours it takes to assemble n engines in a factory, then the positive integers would be an appropriate domain for the function. Calculate and interpret the average rate of change of a function (presented symbolically or as a table) over a specified interval. Estimate the rate of change from a graph. Understand that a function from one set (called the domain) to another set (called the range) assigns to each element of the domain exactly one element of the range. If f is a function and x is an element of its domain, then f(x) denotes the output of f corresponding to the input x. The graph of f is the graph of the equation y = f(x). Use function notation, evaluate functions for inputs in their domains, and interpret statements that use function notation in terms of a context. Recognize that sequences are functions, sometimes defined recursively, whose domain is a subset of the integers. For example, the Fibonacci sequence is defined recursively by f(0) = f(1) = 1, f(n+1) = f(n) + f(n-1) for n ≥ 1. Linear, Quadratic, And Exponential Models Distinguish between situations that can be modeled with linear functions and with exponential functions. Construct linear and exponential functions, including arithmetic and geometric sequences, given a graph, a description of a relationship, or two input-output pairs (include reading these from a table). Observe using graphs and tables that a quantity increasing exponentially eventually exceeds a quantity increasing linearly, quadratically, or (more generally) as a polynomial function. For exponential models, express as a logarithm the solution to abct =dwherea,c,anddarenumbersandthebasebis2,10,ore; evaluate the logarithm using technology. Interpret the parameters in a linear or exponential function in terms of a context. Reasoning With Equations And Inequalities Understand that the graph of an equation in two variables is the set of all its solutions plotted in the coordinate plane, often forming a curve (which could be a line). Explain why the x-coordinates of the points where the graphs of the equations y = f(x) and y = g(x) intersect are the solutions of the equation f(x) = g(x); find the solutions approximately, e.g., using technology to graph the functions, make tables of values, or find successive approximations. Include cases where f(x) and/or g(x) are linear, polynomial, rational, absolute value, exponential, and logarithmic functions. Graph the solutions to a linear inequality in two variables as a half- plane (excluding the boundary in the case of a strict inequality), and graph the solution set to a system of linear inequalities in two variables as the intersection of the corresponding half-planes. Solve linear equations and inequalities in one variable, including equations with coefficients represented by letters. Solve quadratic equations in one variable. Use the method of completing the square to transform any quadratic equation in x into an equation of the form (x – p)2 = q that has the same solutions. Derive the quadratic formula from this form. Solve quadratic equations by inspection (e.g., for x2 = 49), taking square roots, completing the square, the quadratic formula and factoring, as appropriate to the initial form of the equation. Recognize when the quadratic formula gives complex solutions and write them as a ± bi for real numbers a and b. Prove that, given a system of two equations in two variables, replacing one equation by the sum of that equation and a multiple of the other produces a system with the same solutions. Solve systems of linear equations exactly and approximately (e.g., with graphs), focusing on pairs of linear equations in two variables. Solve a simple system consisting of a linear equation and a quadratic equation in two variables algebraically and graphically. For example, find the points of intersection between the line y = –3x and the circle x2 + y2 = 3. (+) Represent a system of linear equations as a single matrix equation in a vector variable. (+) Find the inverse of a matrix if it exists and use it to solve systems of linear equations (using technology for matrices of dimension 3 × 3 or greater). Explain each step in solving a simple equation as following from the equality of numbers asserted at the previous step, starting from the assumption that the original equation has a solution. Construct a viable argument to justify a solution method. Solve simple rational and radical equations in one variable, and give examples showing how extraneous solutions may arise. Understand radian measure of an angle as the length of the arc on the unit circle subtended by the angle. Explain how the unit circle in the coordinate plane enables the extension of trigonometric functions to all real numbers, interpreted as radian measures of angles traversed counterclockwise around the unit circle. (+) Use special triangles to determine geometrically the values of sine, cosine, tangent for π/3, π/4 and π/6, and use the unit circle to express the values of sine, cosine, and tangent for π–x, π+x, and 2π–x in terms of their values for x, where x is any real number. (+) Use the unit circle to explain symmetry (odd and even) and periodicity of trigonometric functions. Choose trigonometric functions to model periodic phenomena with specified amplitude, frequency, and midline. (+) Understand that restricting a trigonometric function to a domain on which it is always increasing or always decreasing allows its inverse to be constructed. (+) Use inverse functions to solve trigonometric equations that arise in modeling contexts; evaluate the solutions using technology, and interpret them in terms of the context. Prove the Pythagorean identity sin2(θ) + cos2(θ) = 1 and use it to calculate trigonometric ratios. (+) Prove the addition and subtraction formulas for sine, cosine, and tangent and use them to solve problems. No one has reviewed this tool yet. Be the first to share your thoughts.Add your rating
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304287.0/warc/CC-MAIN-20220123141754-20220123171754-00593.warc.gz
CC-MAIN-2022-05
12,639
69
https://www.bartlett-engineering.com/corrosion
code
Corrosion Evaluation & Corrosion Control Solving corrosion problems begins with an understanding of the chemical processes at work. Corrosion in liquids that contain water involves the electrochemical concept of half cell reactions. Understanding the reactions present puts you closer to developing a solution. Corrosion has many forms and they can often work together with other mechanisms (e.g. mechanical) to create damage worse than would be due to either mechanism working alone.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474653.81/warc/CC-MAIN-20240226062606-20240226092606-00471.warc.gz
CC-MAIN-2024-10
484
3
https://software.rtcm-ntrip.org/
code
Welcome to Open Source Software development for Ntrip This webpage is the central development platform for It is the bug-tracker for And it provides addition information like Access to sources is possible using command svn checkout --username guest --password guest https://software.rtcm-ntrip.org/svn/trunk. Released versions of the software can be found at BKG ntrip download pages.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816879.25/warc/CC-MAIN-20240414095752-20240414125752-00356.warc.gz
CC-MAIN-2024-18
384
7
http://ryrych.pl/resume/
code
I have worked with Wojciech for a short period because only one month but it was a good time. Wojtek has joined to a team as remote co-worker and faced a complicated vue.js powered Website editor which handle as expected. He has introduced few average level features and suggestions how to make project better. Also had nice ideas for increasing team efficiency - in future I would be glad if could work with him again and learn new stuff. Wojtek is a man with Getting Things Done approach in the DNA. From the very beginning, he was making significant progress as a software engineer. And he never stopped polishing the software craftsmanship. A very dedicated and focused on the job person. He is also eager to teach others by delivering presentations during local meetups, writing articles on the company blog and dedicating his time to the local and global open source community. Wojtek has very good interpersonal and soft skills. Together with his positive attitude and being an effective team member, a project I was a Scrum Master on became successful. I can recommend Wojtek both as a developer and a good team player. Wojtek has been working for me over the last 3 years. Wojtek is a highly effective developer, always looking for alternatives to make the solution even better. I’ve always appreciated his perseverance and creativity. Wojtek played a key role in growing 9teams to the mature solution it is now. I strongly recommend Wojtek. I worked with Wojtek for almost 2 years. Wojtek is a great asset in the team. His EmberJS insights that he had collected from the beginnings of the framework, supported us in the smooth transition between each version of this tool. He always tried to deeply analyse the problem from a business perspective, before starting to work on it, which helped to eliminate waste from our production process. I’ve been working in the IT industry since 2013, building and developing business solutions. I’ve worked in small and medium teams of developers, both for software houses and product companies. During my career, I learned that my holistic point of view, empathy, and general interest in people’s behavior, positions me in a user experience designer role than a software developer. With a technical background, keen interest in typography, paying attention to details, feeling the people’s needs, I embarked on the journey to becoming a designer. Working with people, clear and transparent communication, and strong company culture is what I value most. - Front-end developer - Audits and optimizations Key technology: Adobe XD, Vue.js, CSS. Helping older people with overcoming digital exclusion - Building back end and client-side application - Building internal tools - Creating and maintaining the database for Conzentio Monitoring Dashboard - Investigating online threats and data leakages Key technology: Vue.js, node.js, PosgreSQL, AWS Elastic Beanstalk, AWS S3. - Working as a remote developer for international projects - Developing and maintaining the company’s website Key technology: Ruby on Rails, React.js, Docker, CSS/SASS - Developing back end and client side application - Taking part in the full cycle of the product: from planning to development - Presenting features to the share holders and co-workers at the end of a sprint Key technology: Ruby on Rails, React.js, CSS, Vagrant - Taking part in the building of a coding school - Preparing educational materials for git course - Running a git course - Participating in the full life cycle of projects from initial requirement gathering, through planning to development - Working within agile development processes - Developing back end and client side applications - Designing clear and user-friendly interfaces - Ensuring cross-browse experience Key technology: Ember.js, Ruby on Rails, SASS/CSS, React.js - A holistic point of view - Listening to people - Presentational skills - Understanding the beauty of typography - Paying attention to language in products - Understanding the marketing and the production :-) - Writing & blogging - Great sense of humour
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875141396.22/warc/CC-MAIN-20200216182139-20200216212139-00473.warc.gz
CC-MAIN-2020-10
4,093
41
https://community.justinguitar.com/t/phone-app-or-browser-password-question/3949
code
Tried to find any sort of app to access the “Community” and found none for my phone at Google Play. In using the android phone browser, I got the log on page up, but trying to log on did not work, probably due to the password. I was still logged into my PC desktop machine so I thought I would set a new password and try that on the phone. But the community ‘preferences’ area had no place that I could see where you could enter a new password. I am left to assume the Community password is controlled or set on the main justinguitar website? (NO, for the moment at least - See EDIT below). EDIT - After more research and messing around, I ran into the " DiscourseHub" for Android phones. Upon install of that I was able to get to the new community. Being an old fart, I forgot we had a custom password and login name. So my next stop is to input that and give it a go! I think with those login credentials all will work ok. If not I will be back and document what I find. EDIT 2 - I indeed was able to access the community the “DiscourseHub” app. Though I am pretty sure a browser does nearly the same thing. At any rate, once logged in I was asked if I wanted to install the Justing Guitar Community App. I did that and it works good. I am assuming that same prompt would come up in a browser session as well. MODS - Is there a plan to put the Justing Guitar Community App on Google Play and the IOS Pay/play site as well?
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571097.39/warc/CC-MAIN-20220810010059-20220810040059-00575.warc.gz
CC-MAIN-2022-33
1,436
4
https://news.ycombinator.com/item?id=15673430
code
No, it does not. The point of RSS is that you subscribe all your interests which you consciously come into contact with. You then have a steady stream of content waiting at your fingertip. The solution for "1000 unread articles" is to have a shift of perspective in your mind, that it is okay if you cannot get to all the knowledge and information in the world. This is, as long as you have prioritized your reading lists properly. Content not wrapped in ads, isn't good for business. Period. The creativity unleashed by hackers with unfettered access to Twitter's RSS payload was legendary. I loved RSS. I still do. I still use Shaun Inman's Fever RSS every day. It is really unfortunate that he has discontinued it, the guy is an artist at the highest level, but I get it. RSS would be all but dead today if it wasn't for Wordpress's universal support of it. Major props to Matt Mullenweg and everything he stands for. It should have become the backbone of the web and Dave Winer and Aaron Swartz more celebrated for it. Instead it is just a footnote. A story of a time before everything digital was wrapped in glorious, money making ads and companies discovered charging for API calls as a business model. Because reading from an RSS source required you to have an RSS reader of sorts and there was some configuration required on the users' part - Install a client/setup an online tool, this was an extra (rather complicated) step as compared to say, simply going to Facebook and subscribing to a page you like with the click of a button. Now, I'm not discounting the possibility it may have been killed strategically by the internet giants, because it's not in their interest, but I do believe Google Adsense (at that time) did allow you to publish ads into your RSS feeds somehow. So, maybe they killed it because of poor adoption rates and the configuration required to setup one? It could have taken another direction. We increasingly saw the embedding of the page Like button as we saw the decline of "Subscribe" button for RSS. So we moved from an open protocol and an ecosystem of "readers" to a propietary "protocol" and fenced-off news feeds. I don't think the lack of incorporating ads in an RSS feed was a reason either. I think google just passively responded to the rise of blogs/rss with tools like Reader/feedburner/adsense-in-feeds, they didn't push for the greater vision that RSS implied. I think open protocols need time, and we didn't get the time we needed before Facebook arrived... Up until a few years ago Safari supported RSS natively: there was a button you could click and a native RSS url would open in your browser that you could read and filter and everything. Nowadays the alternative in Safari is "reader" mode, which removes all the website styling and leaves just the main content and also the notifications API, which allows you to subscribe to a site (if they support it) and get notified of new content without even opening your browser. I didn't really use RSS and don't use the replacements either. I really like the idea of RSS and I think it's worth implementing for people who like it, but I never found it useful for myself. >I still use Shaun Inman's Fever RSS every day Preciseness of language. The reports of RSS demise are greatly exaggerated. Most sites, even those NOT using Wordpress, still publish RSS. This includes every major platform that I can think of. Shopify, Magento, Blogger...The list goes on... Every website I've tried to subscribe to has had a feed of some sort that Feedly can pick up. I don't think RSS is dead at all. RSS is actually a great, sustainable way for independent bloggers to deliver targeted ads to their readers. Daring Fireball comes to mind, but there are many other examples. Is there some inherent value in having isolated the point of $thing, for all or even a majority of users, that makes it so desirable and common in discussions? Is the author's experience with RSS improved if they read your comment? Both of you have identified a workflow that works for you; it seems useful to share "I've found that subscribing to too many feeds means if I'm not careful, I'm overwhelmed by the number of unread articles", or "I solve this by prioritizing what I read from my RSS feed and by accepting I won't get to all of it". But when the pitch is ~"you're using $tool wrong, what you need is a shift of perspective in your mind," it comes off as far more combative than I suspect you intend to be. By never letting you know what is coming next, _the endless feed_ never makes you feel bad about your current information processing potential, relative to last week when you subscribed to 12 obscure blogs. Information not interesting? Scroll. Information feeding your insatiable hunger? Scroll. You’ll never know how much there is, or how much there was. I'm feeling this kind of intentional obtuseness going on in this thread. Like, this solution for RSS has been solved a very long time ago. Now we're talking about it being a bug? Good digest would only exist on aggregating technologies like RSS. Now, if you haven't found any free alternatives that are as good, you've likely subscribed to some emails to keep up, go to the website often to check if anything is new, keep up on twitter/fb if there is a page/profile or just don't bother anymore with content you would actually have been interested in if it was easier to get. The most reliable reader I've found on Linux is liferea, and it works, but I wish it had pluggable sorting mechanisms, based on how popular an entry is. Subscribing information via email is atrocious. Newsletter subscription via email is okay. I still don't know how people follow any kind of information (while keeping their sanity) via Twitter (tit for tat feuds) and/or Facebook (my friends and family do not generate good information for me to consume - sorry). This is why I went with Newsblur.com, which is open source: https://github.com/samuelclay/NewsBlur In the worse case I just run my own instance. Personally, I think it's a big loss that we have moved away from the RSS format specifically, and the open web generally. Facebook has an aardvark-shaped graph: Android is on decline: But Instagram is still in ascendance: https://trends.google.com/trends/explore?date=all&q=instagra... I wonder if you can really draw conclusions from any of this? Anyone have a better source for actual RSS usage? The best alternative that I've found is Feedly, which can show ads inline. It sucks that the content producer doesn't get any ad revenue, but it also sucks that the only way they can get paid involves tracking me and building a profile despite my wishes. On the other hand, I've found that non-profits / independently-funded researchers produce most of the best RSS feeds, and I happily donate to the non-profits. It has always been like that for some websites, and I haven't seen an increase of these kind of RSS feeds. The RSS feed is the guestbook of web 2.0, it comes along for the ride with the shitty page generator. Choosing between evils, Google seems a better bet then Facebook, ofcourse, but these actions they've taken will backfire for them eventually. The more "open" and "accessible" web, should be in their benefit, long term thinking. But what I see, what they're busy with is self driving cars, google glasses, augmented reality and all of that: GREAT. But supporting some basic, easy, cheap, webstandards, they're just completely neglecting and they might up being the next AT&T, or IBM. They do have some charm offensives going ("Google News Lab") and, well, basically any big tech corp looks better then Facebook -- if you care about the internet in it's current form, Google is really screwing us over. I really am convinced Google is completely losing it's way. There's no real good quick adequate alternative that I can think of, but they could've just done things so much better, and it would've costed them, quite literally, nothing. We are treating these companies as if they are sports teams. No, we don't have to choose between evils. > The more "open" and "accessible" web, should be in their benefit, long term thinking. An open Internet is only in the benefit of small and medium companies and startups. Companies like Google have virtually unlimited resources at their disposal. All doors are open for them, all possible loopholes are within reach. When all else fails they can just drop a couple of billion $ and nobody can say no to that. > We are treating these companies as if they are sports teams. No, we don't have to choose between evils. This is very very slightly OT but I've asked this exact question within HN comments before and never really received any satisfactory answers... Yes, I fully agree that it shouldn't and doesn't need to be a choice between the two sports teams, but even in a hypothetical world where it was, how on earth is anyone presuming that the infinitely pervasive Google is somehow more ok than the very opt-outable facebook? Everything you've said is true, but not really relevant to this particular discussion I think? Not that I think either company is actually evil obviously. i.e. I might choose evil that offers me value if I thought the trade off was worthwhile. Yes, you can opt out from getting an account and using their applications; the worse part is all of the "shadow profiles" and third-party tracking which is pretty much everywhere these days :( In contrast, opting out of Google is a largely unviable feat for most. - Google provides a geolocation service for applications to locate you by triangulating you relative to nearby wifi hardware. This sends data to Google about your devices wifi hardware and the ssids it detects. This isn't an in website feature, so normal content blocking doesn't help, it will be an application setting. Firefox and Safari both used to use this (Mozilla have now created a competing service). - Google provides suspicious site screening services ("safe browsing" advisories) to many applications, including browsers. - Google hosts most of the CT logs. I'm actually not 100% sure how the mechanism works here in detail, so this may eb a red herring, but it seems to be that browsers may periodically send a list of https sites you visited to these log servers to audit the certs for those sites - Google provides free fast DNS which sends all of your DNS traffic to their servers. This may be set by the administrator of the network you're connecting through. - Google analytics is used by many non-browser applications, and also in areas of the browser not covered by content blockers, e.g. Firefox's add-ons settings page. - Many sites use Google js cdns and ajax apis for required functionality, so a content blocker will need to set whitelists to get the site to work. - there are more such things, these are just examples Facebook does none of the above. Something like Decentraleyes will help with the cdns and a custom firewall, hosts file, filtering proxy or things like Little Snitch can help with some of the others but none of these are trivial. For example like many people here I have multiple acquired domains — for personal projects, plus I also devised a scheme for my online safety — I prefer for each online account I make to have its own email address. FastMail does sub-domain aliasing by default, so if you have domain.com, you can make an email alias like [email protected] and then you can use [email protected], [email protected], etc. For one this allows you to keep spam in check and track its source. People say that Gmail's spam filters are really good, but that's not true. Gmail's spam filters are at the same time overly aggressive, with legitimate email ending up in the Spam folder far too often and doesn't do a good job at detecting optimized spam. E.g. when I was on Google Apps, my address was bombarded with email from "SEO specialists" that wanted to "optimize my website for HTML5" or other such crap. This is because I made the mistake of not protecting my domain with PrivacyGuard. Another reason for unique email addresses are that they make the accounts more secure. If you find the email address that I use for Twitter, you won't necessarily know the email address I use for Facebook. It's like with passwords, the emails I use being in my 1Password (although due to the scheme used I remember them). FastMail makes this very easy and natural. You can't do it with free Gmail obviously (it does plus aliasing, but that's shit). You can do it by configuring GSuite with complex email routing rules. But then the Gmail client itself will fight you, because you cannot configure a dynamic "From" address. Also Gmail on mobile is polished and good, but not their website. If you ever find yourself on a device without a configured client on it, then FastMail's web client on mobile actually works and is very good. And on iOS FastMail has been doing push notifications for some time. Don't know what deal they did with Apple, but you can use iOS's Mail client with push notifications via FastMail. I heard a rumor that iOS 11 finally fixed the Gmail integration to do push notifications. I have two work Gmail accounts on my phone and have seen no such evidence. Don't get me wrong, I like Google's products, but their superiority is overblown. I like FastMail more than I like Gmail and I use them both on a daily basis. And Dropbox is superior to Google Drive. Google Drive is simply shit that doesn't work and that I cannot trust with my files. A lot of people here use Chrome. Well, I'm using Firefox and I think Firefox Quantum is now the superior browser. I've been an Android user for a long time and I like Android's openness. However Android is really bad at privacy. I simply don't trust applications on Android, unless they are open source or from a very well known brand. Android also doesn't do Caldav and Carddav by default, you have to install apps from the Play store for it. But I find that to be unacceptable. Google Docs is really good for collaborative editing, the best actually, however their spreadsheets quickly show their limits with big documents. Google Hangouts is shit, nobody uses it and I'll never forgive them for killing their XMPP service in preference for the current Hangouts. Google Maps is good, but don't go through Bulgaria with it because the coverage there is piss poor and you'll find yourself on really bad roads in the middle of nowhere. I noticed OpenStreetMaps is better in many parts of Europe. Overall they fare well in quality, but superior they are not. Except for their search engine. - Facebook is tracking you over the whole web, building shadow profiles on everybody - Facebook is known to have conducted illegal and unethical experiments on manipulating people's emotions via the timeline. Let that sink in for a moment - Facebook is known to have had a partnership with Disqus for tracking users - Facebook is buying and aggregating user data from data brokers - Facebook already knows your friends because it knows their address book - Facebook's tracking through Like buttons all across the web is violating EU law - Any of your friends can give Facebook access to your data We can go on btw, the web is filled with details of their past transgressions. I have no doubts about this — Facebook is one of the most immoral companies to have ever existed and time will prove me right. And yes, Google has a lot of potential for abuse, but they haven't fucked up so badly yet. We don't need to guess how they compare, the evidence is right there. Again, I'm not defending Facebook. I'm only stating that Google is worse terms of pervasive unavoidable tracking. What each of them do with that data (e.g. emotional manipulation) is an important, but slightly separate topic. To address some of your references: 3 and 4 are real problems and probably the only thing you can never really opt out of with any provider. 8 is actually an old article on a feature since (thankfully) removed. However, even when it was there, it still only involved sharing data you had already volunteered to Facebook. 6 is aggregating data on who you are but not explicitly tracking, unless/until it's actually cross-referenced with 3 and 4, so isn't a problem in isolation The rest are trivially blockable with any content blocker (some of which even come built in to some browsers these days) And yes, I do think for any company out there crawling the web, RSS feeds are a good indicator. Ofcourse, Google algorithms got to the point that they don't really need RSS feeds anymore, but that's perhaps also the reason why quite often their search results kind of suck, as soon as you dive deeper. The real problem, for all of us out here - is that no-one even bothers making a search engine anymore. Everyone has given up. And Google can just do whatever they want. And that's exactly what they do. Sure their search has improved too, but it's pull instead of the push model that RSS is. The social networks are no substitutes, though Twitter comes closer than FB because it doesn't have to deal with my other network posts when trying to surface content I would be interested in. One may hope. FeedBurner is horrible. It wasn't great even when it was new, and Google's neglect of it coupled with the standard Google non-support black hole if anything breaks (as it regularly does) hasn't exactly made things better. Hey guys, just because you don't think about or use RSS anymore doesn't mean the entire platform is dead and no one uses it, haha. Jesus the hubris in this thread is insane. I have been using RSS via Feedly uninterrupted for 4 years and counting. No problems, haven't paid a dime, works great. Yes, not as popular. Apparently losing mindshare these days is akin to actually not existing. Now let me check my Alexa ranking. Oh man, we can be friends. Except I actually just have Twitter via a RSS feed. I wrote some code that generates RSS from Twitter lists and I consume it and filter it just the same as any other RSS feeds. Part of me relishes that I no longer have that distraction, but another part of me feels guilty for eliminating that personal cost at the expense of reduced interaction with loved ones. (Our personal relationships have been co-opted for ad revenue -- what a time to be alive.) I would love to just get an email once a week with a digest of stuff I've configured it to care about. I am apparently in the vast minority as there seems to be no decent mobile app supporting lists effectively. I'm not sure if it's even possible given Twitter's token policies, and unfortunately they killed off TweetDeck's mobile ambitions an eternity ago. TLDR I would love a mobile app that embraces Twitter lists as much as Tweetdeck does on the desktop. Try as I might, I just don't spend enough time actively using Twitter to make it all that interactive, but I'd still like the ability to catch up in a read-only manner. I often wish for the Open-Social equivalent of email. Anyone can host it, I can subscribe to people on different hosts. And if I don't like the way my feed is aggregating I can choose another. This is a pretty good description of the Mastodon social-network model, there are several nodes, and your account on one node can subscribe to accounts on others. It's distributed in a kind of nntp-like way. In my world, it made a pretty big splash about a year ago, but I've drifted away from it. But there are two big problems. First, it doesn't add ads, as others have mentioned. Second, it's really easy to unsubscribe. This is why so-called "newsletters" are sent as spam emails. RSS could do the job just fine. If the recipient really wanted the newsletter. The first time a "newsletter" sends out "NEW OFFER BIG SALE...", the recipient clicks "unsubscribe". They're unsubscribed then and there, will never read another item, and the sender can't do a thing about it. The sender doesn't even know they're gone. RSS doesn't disempower the end user. Modern web technologies are designed to keep the user firmly under the thumb of advertisers. That's the problem with RSS. I think this is more a problem of scale. Simple, text-based ads could work if the audience is very specific. For instance, you could start each item with a one or two line message by a sponsor. Ads could be purchased for a fixed amount or even on a pay-per-click basis if the url is a referral. This could work brilliantly on a regional level I think. For instance, a local news paper could draw attention to a new restaurant that will open up soon, a sale at a mom&pop store and so on... 1. You have to get users to clickthrough to get your ad revenue, but you also need enough content in the RSS to encourage them to click at all. It feels like you put effort into this thing that prevents users from spot checking your website, which reduces your revenue. And you're hosting the RSS feed, too, so it costs bandwidth! 2. Twitter is easier to use (for you and your audience), is where the audience is, and is "good enough". Twitter has advantages beyond just the links being shared - the tweets themselves are often interesting to me, and the list of people I follow has been carefully built over time to the point it would be annoying for me to switch again now. I'm sure these are great options for others though, but I don't think I'm alone in using Twitter as a kind of curated RSS replacement. I intended to have it track all links from people you follow too, to give a curated list of links, but Twitter was aggressively making changes to restrict their API so this became impossible. Protocols and an open web over walled gardens. Personally, I think the main reason RSS failed to get bigger adoption was a UX problem. Clicking on RSS and getting a page of code is just too confronting for most people. Thus it never managed to get the same adoption as other republishing buttons like Pin, Like or Share. The related UX problem is that major browsers didn't have a built-in reader, so there is nothing with which to discover RSS. To use RSS, you have to get some add-on like Brief for FireFox, or third-party app for Android. Or else use some website like Google Reader (I think that's dead now?). Before you do that, in the first place, you have to know what the heck RSS is, and what are the benefits: why should you be installing this additional stuff for interacting with some hidden aspect of the web. Browsers need to make it discoverable by alerting users, like by bringing up a bubble: "Hey, user! This web page's updating listings are available in a condensed RSS feed [learn more.] You can register the feed into my built-in feed reader, and then not only browse the items conveniently, but be alerted of new ones, search through the items, and delete ones you don't want."* When we were recently looking, on Craigslist, for a bunch of different types of items simultaneously, I showed my wife RSS. From the beginning: how it is the condensed version of a web-site, and how you need a program to deal with it (went through an installation of Brief on Firefox). Then how you add feeds to the reader, and go look at them through the Brief toolbar button, etc. Then configuration: explaining how Brief just surfs the RSS periodically the same way that a human being refreshes a web page, and that the frequency can be configured, as well as how long the items are stored. So after that she was using it daily, no problem, and mostly liking the convenience of just checking the feeds for what has dripped in, and being able to erase the duds, as if it were an e-mail inbox. I think the button for RSS was shown by default in the past, but now you have to add it to the browser UI manually (presumably, it was hidden because no one used it). I think the problem is in monetization, that's why FB and Twitter stopped offering them, and Google killed GReader too. It's not a coincidence that Twitter is having trouble monetizing, when it's the new way to get news. As a publisher and as a reader RSS makes perfect sense, but how do you build a generic infrastructure in between the two as a utility? This is essentially the question. I suspect that most sites that have RSS feeds don't expose them intentionally. They just used some framework which automatically creates it. If they knew, they'd put an end to it. "What, someone can grab a list of our items without seeing the main page at all? Turn that shit off!" Even though the items do contain links that beckon the user to that site, it still minimizes their interaction. Even if you're ad-supported, I'm more likely to visit you if you have an RSS feed. Not to mention any non-profit or academic website could let people follow new developments easier. How is going to a 3rd party site like Google Reader (yes, it's dead and damn Google for killing it) any less discoverable than going to WaPo or Facebook? I make a conscience effort to go consume these sites. I made a conscience decision to consume my information from Google Reader. Or it's replacement. RSS buttons are (were?) right along side Facebook, Twitter, Google+ buttons 10 years ago. Not that difficult. If Facebook suddenly announced an RSS component to their service, people would use it. I know when Google reader dropped their Google Reader service, there was a hue and cry about it. Google said the usage numbers were flat. I suspect in great part because Google's lessor products come and go all the damn time. If the product is not integrated into Gmail or YouTube, 99.9% of their user base does not know of the service's existence. Facebook is discoverable because people invite you there, sites link to it, and you're often prompted to "log in with your Facebook account" into every damn thing you visit. People talk about Facebook; you hear it on the news, etc. Facebook per se isn't discoverable. If Zuck had just registered "facebook.com", the domain, and put a server there and waited without promoting it, there would be no Facebook. I still hold massive butthurt towards Google for abandoning Reader. It marked a pivot away from open technology platforms. Perhaps people don't know about RSS because Google / FB / Twitter prefer you not use it? These giants encourage passive consumption and discourage DIY curation of content. If I can currate my own content lists, I bypass their ad revenue generating framework, picking and choosing only those things I want to read. They receive no information about why I choose that specific article to read. I've made it a priority to trim my usage of Google to the extent possible. I dream of someday abandoning Gmail. Good article from back in the day about the whys and wherefores of Google Reader's demise. I used to use this A LOT back in the day, often finding it preferable to many site's native UIs. What killed it for me personally though wasn’t the slow death of widespread RSS, but weirdly Twitter. Twitter can be a great news link replacement for RSS if you used RSS the way I did, as the links the people you follow share have been curated by those people themselves. I started to find a much better “hit rate” for content I wanted to read by seeing what influencers in industries I have an interest in share, rather than the hosepipe of stories that RSS was providing. I found I was still getting all the content I wanted without having to wade through all the noise, at which point I just stopped using RSS altogether. I do however agree it is another sad indicator of a dying open web though. Sure, it's XML. And had I been the one to design it from the start, I would have gone with JSON. But come on. RSS has been losing ground because, deep down, people love the algorithms. I personally hate how algorithms artificially mangle content that I would have seen anyway if my "timeline" was chronological; it's annoying to me to have stories from hours or days prior to appear near the top of my feed because everyone has already seen the same thing by now and new comments are worthless/unseen after a givens tory is ~1.5 hours old. and the XML wraps html-formatted articles, so unless you hate yourself, you'll need to be embedding a browser for rendering, which means bundling a browser too (even on certain browser embed providing platforms like win32, since it still uses IE11 as its browser embed) of course its easy to generate RSS. - - - and thats nevermind the whole impossibility of getting all articles without a daemon on a separate server, especially for high-volume feeds of course its easy to generate RSS He didn't say that - just that people find JSON exciting. There are many things that have been rewritten in JSON just to become popular again, or things people have done long before but are exciting because they're now JSON. What are some examples of concepts written for JSON that became more successful than their predecessor? From RSS reader developer perspective (I'm author of BazQux Reader https://bazqux.com) problem with RSS/Atom is that there are many feed generators (and even handwritten feeds) each with its own understanding of standard or without understanding at all. And good feed reader need to handle many quirky issues to support all kinds of feeds. With new feed format there will still be old bugs and problems (duplicating IDs, missing IDs, new IDs for the same posts, duplicated posts, misconfigured web servers, servers down and so on). And new format needs to duplicated efforts like MediaRSS for extended information about podcasts (which JSON Feed is missing). Problem with RSS is not a format (end users won't read XML/JSON anyway) but needs of average user, time to setup, vogue, no profit for big players and so on. People, not tech problem. This lets me focus in on my 1000s of other feeds, which have something interesting and valuable to say. After Google Reader went "tits up" I switched to Inoreader (a web-based reader). Still using it quite happily. Yes, the case of the disappearing feeds is something I wrote about recently - I believe it's all part of a plot to control the web... And you could write your own little client program in like 100 lines of C#. That would aggregate all the various feeds. And download just the MP3 files overnight. Providing you with a tasty gigabyte-sized bouquet of rare bootlegs, unreleased demos, forgotten imports, and much more every morning. Spotify playlists have supplanted that particular use case. But the design favors promotion. Pushing overlooked talent to the fore. And bubbling up gems that may have been subsumed in the volume of noise. To find rarities, such as this classic R.E.M. set from the Paradise Theater in Boston, Summer '83 (where they opened for The Replacements). You have to stumble on it via Youtube. Or find a friend with an actual collection of old vinyl ;) I wish he would've named even a handful of examples that prove the point. Even Medium offers RSS feeds for users, publications, and tags. And also, RSS is also at the center of the enormous and growing medium of podcasting, which nearly a quarter of Americans enjoy every month. RSS is the one way I keep track of the things I want and the speed I can follow, differently from Twitter. At peak Google Reader I suffered from "inbox zero" syndrome and recall zapping through hundreds of posts a day (being full time student in dorms help with having free time). But something rss, email and social media have thought me is that you'll never see it all. So I never pay much attention to the vast majority of the dress I subscribe to. I certainly look forward to more decentralized systems like rss in the future. I still hold on to customizable aggregator protopage.com, though I wish iGoogle hadn't gone away. Also regularly check the fixed-selection aggregators like alltop and popurls, though the latter seems to have been abandoned. Posts like this encouraging desktop clients are fine, but where is the slickly designed web client for RSS feeds? Until I find it, I'll stick with protopage. We haven't officially launched yet, but we'd love to have you take a look and tell us what you think! You may hit a few snags here and there as we prep for a more robust launch; in the meantime feel free to reach out either to me personally (contact in profile) or through support at frontpage dot to. Hope you like it! If so, that makes me sad, I rather like it. I am currently on my fourth iteration of building an RSS reader with a web UI, using a Bayes network to distinguish between interesting and boring articles. It is not very sophisticated, but it works well enough in filtering out the items I do not want to see. Needless to say, this thing relies on RSS to fetch news items. Kind of what it was made for, as far as I could gather. I'm speaking from our own experience running a little startup, Feedity - https://feedity.com, that helps create custom RSS feeds for any webpage. Edit: Another big win, not needing yet another account to be tracked and targeted through just to get at a feed. Best example being YouTube. I never earned anything from ads anyway (can't remember if I even activated them). Anyone else would like to try? As long as it isn't about "building an audience" and monetizing we could have blogrolls, links to post by other programmers and forget all about SEO nofollow etc etc. I publish my Caller ID info from my landline to an RSS feed, and Feed Notifier was one of the only ones that would allow me to get updates almost realtime. The popups strike a good balance between useful amount if info and too obtrusive, and I like how it uses the site favicon to let you know which feed you're looking at at a glance. I tried lots of methods on ios to get timely prompts, but 15 minutes seems to be about the best any of the apps I have found can do, and yes, they mostly seem to be bloated garbage with limited configuration options. The other good option on Windows is, surprisingly, Outlook. The RSS feeds in there are quite good. Sure today people are mostly focused on corporate run social media like Twitter or Facebook but nobody really likes them. Everyone is constantly bitching about their practices. And you can't really make money on Social Media, which means corporate run social media is going to die some day, when they all realize there's no cash in that expensive cluster of cows. RSS is free, and everyone can use it, no matter what blogging software you use. Operating your own blog gives you more control over content and presentation, as well as smaller details such as how your commenting system works. It's the superior choice. It's free. That's important. Nobody controls RSS. Anyone can write an RSS reader. Anyone can write a blog app that publishes RSS. This ensures it will be around to survive the rise and fall of social software trends. When the smoke clears and people emerge from the rubble of the corporate landscape, RSS will be there, welcoming them home. footnote: I saw this article in my "Hacker News" RSS feed.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988837.67/warc/CC-MAIN-20210508031423-20210508061423-00363.warc.gz
CC-MAIN-2021-21
35,022
192
https://community.nodebb.org/topic/2121/search-500-errors-here/2
code
Definitely seems like cache issue with the record for express-session. try sudo npm cache clean? After that try manually clearing the cache files? Search 500 errors here. In a strange twist of fate, I tried searching to see if someone had reported that the search wasn't working, but the search wasn't working. Reloads the page you were on rather than going to the results. Trying to load the search directly offers a 500 error. Should be fixed now. Updated the solr plugin to latest.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585518.54/warc/CC-MAIN-20211022181017-20211022211017-00391.warc.gz
CC-MAIN-2021-43
484
5
https://bestology.bestrobotics.org/index.php/2022/04/18/2022-bestology-week-7/
code
2022 bESTology-Week 7 Week 7-Where Are My Arms? - Path Orientation Students will understand how sensors and planning are used to orient an autonomous robot. Robotic engineers plan the moves to meet a robot’s purpose and function. When it comes to autonomous mode, planning includes programming sensors that provide the autonomy for the robot. After all they are machines and sensors that provide the orientation needed to perform their functions. Research/Reflect/Brainstorm – Time to think and expand your knowledge! Grab your BEST Journal, notebook or online doc for notes to document your learning. Use various sources such as books, magazines, and websites from below to learn more about energy, forms of energy, consequences, and possibilities. Use various sources such as the links and videos below, textbooks, magazines etc. to answer the - What are the different types of sensors? - What are some of the considerations needed regarding the use of sensors with a robot? - How do sensors support the function and purpose of automation? Online Resources – list all links to material useful for research about the lesson topic - Making Sense of AMR Robots - Types of Sensors in Robotics - Robotic Sensors - Path Planning and Guidance Techniques - Estimating the Position and Orientation - Autonomous Robot Navigation and Charging - Autonomous Systems-Video - How To Get Your Robot from A to B-Video - Autonomous Map Navigation-Video - Go To Goal & Obstacle Avoidance-Video - Control of Mobil Robots-Video Activity – In small collaborative groups or individually share your learning with your team and school or community. Creation instructions for the different activities are accessed by the links. BEST Connection – make connection(s) between the lesson and BEST Robotics program - Create an entry for your Engineering Notebook sharing what you learned from your research and how it will help your team. - Create an infographic or poster sharing information about the different sensors for your Engineering Notebook - Create a short informational movie about the use of sensors in robotics to be used in the BEST Marketing competition Community Connection – make connection(s) between the lesson and your community - Create a Public Service Announcement about the sensors used in autonomous machines and uses - Create a short documentary movie about the sensors used in robotic automation for your school community to learn about sensors and autonomy - Conduct a short interview with a warehouse or fulfillment center about the types of sensors used in their autonomous robots in your community - Be sure to cite the sources and resources you used for your learning and projects by creating a Bibliography page in your project with the name of the websites and URL addresses - Be sure to include the sources and resources used in your Engineering Notebook by adding the name of the websites, books etc. and the URL address Remember-content vocabulary: autonomic, autonomous, human interaction, order picking, zones, fulfillment, warehouse, Understand-research to learn more about automation and autonomous Apply-taking notes and synthesizing meaning from resources to build their knowledge Analyze-determine the pros and cons of automation and autonomous Evaluate-resources used for research to answer questions and develop notebook entry Create-Engineering Notebook entry, Activity/Project completed and shared Critical Thinking, Analyzing and Evaluating information, Creating, Writing, Research, Communication, Problem Solving, Collaboration Automatic, autonomous, quality, controlled, human interaction, sensors strategies, methods, design, function, orientation, mapping, navigation
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818732.46/warc/CC-MAIN-20240423162023-20240423192023-00876.warc.gz
CC-MAIN-2024-18
3,704
43
http://n64devkit.square7.ch/n64man/os/osPfsReSizeFile.htm
code
Changes the capacity reserved for game notes This function was removed from the N64 operating system OS2.0I or later. s32 osPfsReSizeFile(OSPfs *pfs, u16 company_code, u32 game_code, u8 *game_name, u8 *ext_name, int length); osPfsReSizeFile increases and decreases the size of existing game notes. However, since attempting to change the number of pages during a game may confuse the game user, use of this function should be minimized. Information specified for game notes is the company code (company_code), game code (game_code), game name (game_name), extension (ext_name), and the new note size (length). Although the size is expressed in bytes, it must actually be allocated as a number of pages, so it should be specified as a multiple of 256. When game note size is decreased, the area that is removed can no longer be read. When the size is increased, the area that is added is set to 0x00. If the function is successful, 0 is returned; otherwise, the following error codes are returned. - Either the Controller Pak is not inserted into the specified Controller or the Controller is not properly connected. To determine which is the case, use osContStartQuery or osContGetQuery. - A different Controller Pak has been inserted. To use the inserted Controller Pak, initialize it by calling osPfsInitPak. - There is a problem in the file system's management area. Usually this error does not occur because osPfsChecker is called internally when you initialize the file system by calling osPfsInitPak. If this error is returned, either the Controller Pak is not connected properly, or the Controller Pak itself is damaged. - Data transfer to or from the Controller has failed. If a transfer error occurs, up to three tries will be done internally. Therefore, it is rather rare to see this error. If this error has returned, it is possible that either the Controller is not connected properly, or the Controller Pak or Controller Socket is damaged. - If this error is returned, an incorrect argument was specified when this function was called, the specified game note does not exist, or the Pfs function has been called without being initialized using osPfsInitPak. This error should rarely occur. osContInit, osContStartQuery, osContGetQuery, osPfsAllocateFile, osPfsChecker, osPfsDeleteFile, osPfsFileState, osPfsFindFile, osPfsFreeBlocks, osPfsInitPak, osPfsIsPlug, and osPfsReadWriteFile
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986676227.57/warc/CC-MAIN-20191017200101-20191017223601-00030.warc.gz
CC-MAIN-2019-43
2,396
14
https://docs.azuro.org/azuroprotocol/betting-with-azuro/how-to-start-betting
code
How to start betting To start betting on apps powered by Azuro protocol one will only need to have a Web 3.0 crypto wallet such as Metamask or others alike. Bets on the front-end operator's platform will initially be available in stablecoins. The user will need to connect his wallet to the web app of any front-end operator to start interacting. All activities like betting or liquidity provision are on-chain just like on other DeFi applications. To place a bet a user will need to choose among events available on the front-end operators platform. Betting will be very easy as one will only need to adjust the amount he wants to place a bet with and tap on the outcome of the event he has chosen to bet on. A confirmation slip will pop up that will summarise the bet after which the bettor will need to confirm the transaction in his wallet.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500041.2/warc/CC-MAIN-20230202232251-20230203022251-00701.warc.gz
CC-MAIN-2023-06
844
3
https://cryptonewsbtc.org/2022/06/21/israel-cb-says-smart-contracts-may-need-oversight/
code
A report Monday (June 20) from Israel’s central financial institution steered that decentralized finance (DeFi) sensible contracts might require oversight to stop “malicious” acts, Bloomberg wrote. Researchers from the Financial institution of Israel conducting the financial institution’s first experiment in a central financial institution digital forex (CBDC) reported that sensible contracts might be written on the Ethereum blockchain in “malicious” ways in which would result in the lack of cryptocurrency. “An necessary query … is who writes the sensible contract,” the report mentioned, based on Bloomberg. “Permitting anybody who wished to to write down the sensible contract on the blockchain might pose a major threat to all the system.” The central financial institution ran exams on the Ethereum blockchain to see how transfers are made between digital wallets, how transactions are accomplished and the extent of privateness. Israel is amongst about 100 nations which have both issued a CBDC or are contemplating one. On Friday, U.S. Federal Reserve Chairman Jerome Powell said a digital greenback would increase the long-term power of the greenback. In the meantime, within the U.S., a bipartisan invoice making a regulatory framework for cryptocurrency would classify digital property as commodities relatively than securities, PYMNTS wrote final week. This is able to put crypto largely underneath the rule of the Commodity Futures Buying and selling Fee (CFTC) as a substitute of the Securities and Change Fee (SEC). The business anticipates the CFTC would rule with a lighter hand than the SEC, whose chairman, Gary Gensler, has described the crypto business because the “Wild West of finance.” See additionally: Bill Giving CFTC Regulatory Control Would Reshape Crypto
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104512702.80/warc/CC-MAIN-20220705022909-20220705052909-00685.warc.gz
CC-MAIN-2022-27
1,814
8
http://edpeur.blogspot.com/2009/02/duplicate-action-detection-and-correct.html
code
To prevent any action from being duplicated due to communication errors at the first try it is needed to identify the first communication with an id that the server has to verify to not duplicate the action. The common case is like this: A client sends a communication to a server requesting a new order. The communication has an orderid. The server gets all the info and performs the action. But that communication fails to get a response because of a network problem like loss of connectivity. Since the client is not sure the communication was totally OK the client must retry back the communication. Since the communication has an orderid there is no problem in sending it again (no risk of duplication). Since the server already performed the action, this second time the response code should be either just the same as the first case "OK - accepted" (for simplicity) or "OK - already accepted". It is critical this response be understood by the client as OK, otherwise the client will retry forever. I am explaining this because I have had problems trying to make understand people about this problems that made some orders, although correctly sent to the server, never marked as OK on the client system and thus retried forever making the user unhappy since his order was like not being sent.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583659063.33/warc/CC-MAIN-20190117184304-20190117210304-00401.warc.gz
CC-MAIN-2019-04
1,299
4
http://maartenlambrechts.com/2019/11/01/my-30daymapchallenge.html
code
Announcing #30DayMapChallenge in November 2019! Create a map each day of the month with the following themes 🌍🌎🌏— Topi Tjukanov (@tjukanov) October 25, 2019 No restriction on tools. All maps should be created by you. Doing less than 30 maps is fine. #gischat #geography #cartography #dataviz pic.twitter.com/6Go4VFWcJB I’m just going to have a go at this. I’ll probably wont make one each day, but it is a nice occasion to publish some half baked ideas I have lingering on my computer, to learn a thing are two, and most of all, just have some mapping fun :) So whenever I make a new map for the challenge, it will be added to this page. Challenge 30: home Data: Adresses I lived at Tools: I used geojson.io for quick geocoding and composing a geojson file, QGIS for making the map Goal: I realised already long ago that the places I lived at throughout my life were somehow connected to the Demer river (blue) and the E314 highway (pink). It was finally time to map my homes (circles)s How I did it: Layer composing in QGIS, with DEM hillshading and pseudocolor, building outlines, and neon layers for the river and highway Challenge 29: experimental Data: Belgian municipalities boundary data Tools: R and the sf package How I did it: I calculated the centroid of each municipality and then subtracted the centroid coordinates from the polygon coordinates. Then I plotted all the municipalities on top of each other, with varying opacities and different orderings. Challenge 28: funny Data: EU country boundaries and capital locations Goal: Change the way you look at Austria, Vienna and Bratislava How I did it: I made the map and a reader notified me about the Austrian worm. Challenge 27: resources Tools: R and the eurostat, sf and ggplot2 packagas Goal: Show regional distribution of different crops accross Europe, similar to The Herds of Europe How I did it: Similar to this tutorial Challenge 26: hydrology Tools: QGIS and Illustrator Goal: Show European ocean drainage basins (that is probably not the official term) and practice my Text-on-path skills How I did it: Colored all the river catchment according to what sea they are flowing to, and added a little outer glow to these. The sea is a very light blue, and land area with no data is shown in light grey (this data comes from Natural Earth). The colors are my Tintin palette. I exported the map from QGIS to Illustrator and added the names of the seas with the Text on path tool. Challenge 25: climate Goal: Showing both the differences in per capita CO2 emissions and the total population of countries (but I’ll use any excuse to make cartograms) How I did it: The hardest part was matching the country names in the EDGAR data to the names in Datawrapper. The values in the legend are the quartile values Challenge 24: statistics Tools: R, with packages SDMTools, ggplot2 and patchwork Goal: Make a classic “population by longitude and lattitude” map, but for individual countries instead of the whole world. How I did it: I used the asc2dataframe() to convert the source files into something I could work with. The source files also contain data about to which country each cell in the population grid belongs, so I used that to filter the data by country. Then I calculated the total population for each row and column in the filtered data, made barcharts with these numbers in ggplot and finally glued the map and the 2 bar charts together with the patchwork package. Challenge 23: population Data: nationalities by neighbourhood from Wijkmonitoring.brussels Tools: R, with packages sf, ggplot2 and tricolore Goal: Make my first ternary map How I did it: Apart from some data preparation, I basically followed this vignette, changing the Tricolore function to the TricoloreSextant function. Challenge 22: built environment Data: 3D GRB, a dataset containing the outline and height of every building in Flanders. I also reused the 5 meter DEM from challenge 11. Tools: QGIS and the Qgis2threejs plugin Goal: Make something cool in 3D ;) How I did it: The base layer is the DEM with both hillshading and mapping elevation to color. The height of the buildings is the maximum heights of the buildings. Static (the buildings heights are exaggerated here, but I love how you can see the Citadel towering above the city. And my new house is somewhere in here!): See the interactive version here (be warned: this is a heavy page :) Challenge 21: environment Data: Biologische waarderingskaart 2018, a dataset assigning an ecological value to all non-built up plot in Flanders. I’ve always wondered how they construct and update this data set Goal: I wanted to recreate the official color legend for this data. In the end, I changed it considerably, but I learned a lot about making hased textures in QGIS. How I did it: Like in challenge 20, I used an inverted polygon to mask out everything outside of my municipality. After that, it was all about configuring the color and the hashing. I also added a building outline layer to give some context. Challenge 20: rural Data: Agricultural plots in Flanders, a dataset I worked a lot with in my early carreer as an agricultural economist. The most recent publicly available data set seems to date from 2013. Goal: Just a quick map of the different crops on the fields in my own municipality How I did it: One of the tricks I learned during the #30DayMapChallenge is that you can invert polygons in QGIS. So I used that to mask the plots outside of my municipality. Challenge 19: urban Data: I had no inspiration for this challenge, so I want strolling through the “data” folder on my computer and stumbled accross “data/cities”. It contained some Excel files I had forgotten about, containing the population and location of cities world wide between 1500 and 2000, in 50 year intervals. I need to look up the source of this data. Tools: R to process the data, ggplot for making the maps, GIMP for making the gif Goal: Show the growth of cities worldwide over time How I did it: The map is a simple ggplot with a geom_point() layer and coord_map(). I generated 1 map for each year in the data, opened them as layers in GIMP and exported the layers as an animated gif, with 800 milliseconds between the frames. Challenge 18: globe Data: Detailed air passenger transport by reporting country and routes from Eurostat. The data with the locations of the airports was already on my hard drive, don’t remember where I got it from… Tools: R to get and process the data, Flourish to visualise it Goal: Show how European airports are connected How I did it: I downloaded all the country data files with the eurostat R package and combined everything into one file. Then I uploaded the route data and the airport locations to the Flourish Connections Globe template and configured the map in there. Challenge 17: zones Goal: Show the crowded area the Doel nuclear power plant is located How I did it: I took the location of the power plant from Wikipedia and quickly made geojson file from it in geojson.io. Opened the file in QGIS and generated a 10 km and 20 km buffer around it. Then I added the population grid and styled the grid cells with a white outline and made sure that only the ones containing more than 500 people are visible. Lastly, I added the building outlines to show built up areas. Challenge 16: places Data: Natural Earth administrative boundaries Goal: Show all the countries I haven’t visited yet How I did it: Just deleted all the countries I visited from the Natural Earth data set Challenge 15: names Tool: Some R for data preparation, QGIS for the maps Goal: Show geographical distributions of first names in Belgium, both for new borns as for total population How I did it: I calculated the most common first names for each municipality in R, exported this data as csv, loaded it into QGIS and then joined it to the municipal boundaries. The first name labels on the map have a buffer (so they stand out), and some labels are not displayed to ensure no overlapping labels. I didn’t add titles, but I guess you can identify male versus female names and new born versus total :) Challenge 14: boundaries Data: Municipal boundaries of Belgium, and a self drawn line Goal: Showing the complexity of the boundaries of the municipality of Baarle-Hertog Challenge 13: tracks Data: My own Runkeeper tracked runs Goal: Show my running habits over the (almost) last 5 years How I did it: I downloaded my data from Runkeeper and generated the small multiple tracks from it with the Strava package and ggplot, based on this script (I set the colors to represent the distance ran). I imported the generated png file in Adobe Illustrator and added all the annotions (browsing my running history was a lot of fun!). Then I used AI2html to generate the image with the annotations overlayed as html and css. See the full piece here (zoom your browser if the font is too small, sorry for that) Challenge 12: movement Data: TravelTime Platform Tool: TravelTime Platform app Goal: comparing how far I can travel in 1 hour by 3 modes of transport, starting from my local train station How I did it: I just used the nice TravelTime Platform app (which has a very nice UI, I think) Challenge 11: elevation Goal: Showing one of the most spectacular geographical features of my region: the Flemish spoil tips How I did it: The terrain is a digital elevation model with a resolution of 1 meter, which I used to create the hillshade in QGIS. A duplicate of the layer is used for the colors, which maps the elevation to the PuOr diverging color scale. The contour lines are generated from a dem with a 5 meter resolution, with the Raster => Extraction => Contour tool in QGIS. I removed all contour lines not directly on the spoil tips, and labelled them with their elevation. The titles were added in Illustrator. Challenge 10: black and white Goal: Comparing streets layout and built up area in cities of which the names start with a ‘B’ How I did it: Just search the map, center it, and select a circle radius. I used 2km for all the maps. Challenge 9: yellow Goal: Make a yellow map of the Belgian municipality of Geel, which name means “yellow” in Dutch Challenge 8: green Goal: Finally making one of those c̶l̶i̶c̶h̶é̶ classic tree maps How I did it: The geo portal serving the data had a little difficulty giving me the data, so I reached out to the people managing the Antwerp geoportal. They sent me this wonderfull data set over email. I’ll probably make a proper interactive ‘Trees of Antwerp’ map later. Here - each shade of green is different genus of trees - size of the tree crowns are proportional to stem diameters - I added some shadow under the trees to make them stand out Challenge 7: red Goal: Make a Hovmöller diagram of average global temperature over time, by longitude and latitude How I did it: The hardes part was converting the source data into something to work with. After that, I used ggplot’s geom_tile() to make the plots, and geom_vline() and geom_hline() to add the prime meridian and the equator Challenge 6: blue Goal: Showing the Flemish hydrography, in a blue fashion. (Yes, Flemish: notice the hole that is Brussels on the map. For many of the government data in my country, you need to consult 3 different government agencies (Flemish, Brussels and Walloon), and the data will most likely not be comparable, if it exist at all) How I did it: A digital elevation model with a blue color gradient, with dark blue meaning lower elevation, underneath the waterways, of which the thickness is scaled to their importance. You can find a higher resolution version of the map here. Challenge 5: raster I’m cheating a little bit with this challenge: this is something that was published over a week ago :) Goal: Comparing aerial imagery from almost 50 years ago to today’s. The map was part of a series of articles by Flemish newspaper De Standaard on the poor spatial planning in Flanders. How I did it: read all about it in the making of post Challenge 4: hexagons Tool: R/ggplot2, GIMP to make the animated gif Goal: show the shifting front and the intensification of allied bombings during World War II How I did it: Natural Earth data for the background map, geom_hexbin for the hexagons. I made one map for every month, loaded all the maps in GIMP and exported it as an animated gif. Challenge 3: polygons Tool: QGIS + Illustrator Goal: show the big city that Flanders actually is How I did it: Very basic styling of polygon shapefiles, with some inner glow and drop shadow. Challenge 2: lines Tool: R + ggplot2 Goal: see how Belgian airports are connected to foreign airports How I did it: I used the eurostat R package to get data about the number of commercial flights between Belgian and foreign airports. The hardest part was then to geocode all the airports to their actual location. After that, I used the rnaturalearthdata package to get the baselayer data, and plotted everything on the map with ggplot (with geom_sf() for the countries, geom_segment() for the lines, and geom_point() for the airports). These are the connections for all Belgian airports, units are total number of commercial flights between both cities, in 2018. A zoomed in version, to better see the European connections: Because this is all in script, it is very easy to do for other countries: If you have a request for any European country, just let me know! Challenge 1: points Goal: map all power plants in Europe, by source of fuel Inspiration: Mapping how the United States generates its electricity by The Washington Post How I did it: I took the data from the Global Power Plant Database and with a little R script, I filtered out the plants in European countries. I uploaded the data to the Projection map - Europe (countries) template in Flourish. Then it was just a matter of styling the map a little bit. Notice that Russia is not part of the country layer in this Flourish map template. But I’m going to leave it at that. One powerful thing that you can do with Flourish is creating stories: slide decks that you can use to highlight different aspects of your data. In the map template, the color legend serves as filter, so creating the following little story was quite easy: So challenge 1: done!
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100705.19/warc/CC-MAIN-20231207221604-20231208011604-00780.warc.gz
CC-MAIN-2023-50
14,302
134
http://www.covidcops902.com/
code
This website is a community tool to track policing during the COVID-19 epidemic. This tool was started by community members so that we can see what is happening on the ground and hold police accountable. To record an incident that you witnessed, please enter your information into the form below. We remind you to not give names or details that could identify the victims of policing in your description. The form asks for location, what you witnessed, any details of the incident you can provide (number of police, the nature of the response, whether there was violence, behavior of bystanders, etc.) We are also tracking factors like race, if it was a mental health call, if the person was a member of a marginalized group, etc. When your submission is approved, it will appear on the map located here. The map shows us where incidents are taking place. When you click on a pin, it shows the details of the incident that were submitted. All submissions will be approved by the moderators of the group. You can submit incidents during this pandemic that you observed before this tool was created.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100164.87/warc/CC-MAIN-20231130031610-20231130061610-00121.warc.gz
CC-MAIN-2023-50
1,097
6
https://oceanhub.com/feeds/post/58541
code
User can add emojis to a post to make it more expressive as well as attractive. Let's see how. - Open the compose box just by clicking on post something. - When the compose box is open you will be able to see a emoji icon at the top right corner of compose box. - Click on it. - Emoji pop up will open and select any one of the emoticons you want to select. - Wherever your cursor is emoticon will be placed at the point only. - Open the compose box just by tapping on the pencil icon at the bottom right corner - When the compose box is open you will be able to add the emoji icons or emoticons from your mobile keyboard you are using. - Add the desired emoji from mobile keyboard and it will appear in your post.
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154432.2/warc/CC-MAIN-20210803061431-20210803091431-00127.warc.gz
CC-MAIN-2021-31
714
9
https://www.cisecurity.org/advisory/multiple-vulnerabilities-in-mozilla-firefox-could-allow-for-arbitrary-code-execution_2020-034/
code
Multiple Vulnerabilities in Mozilla Firefox Could Allow for Arbitrary Code Execution MS-ISAC ADVISORY NUMBER:2020-034 Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet. Mozilla Firefox ESR is a version of the web browser intended to be deployed in large organizations. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. There are currently no reports of these vulnerabilities being exploited in the wild. - Firefox versions prior to 74 - Firefox ESR versions prior to 68.6 - Large and medium government entities: HIGH - Small government entities: MEDIUM - Large and medium business entities: HIGH - Small business entities: MEDIUM Multiple vulnerabilities have been discovered in Mozilla Firefox and Firefox Extended Support Release (ESR), the most severe of which could allow for arbitrary code execution. Details of the vulnerabilities are as follows: - Multiple memory and script safety bugs could allow for arbitrary code execution. (CVE-2020-6815) - Multiple memory safety bugs could allow for arbitrary code execution. (CVE-2020-6814) - When a Web Extension had the all-urls permission and made a fetch request with a mode set to 'same-origin', it was possible for the Web Extension to read local files. (CVE-2020-6809) - After a website had entered fullscreen mode, it could have used a previously opened popup to obscure the notification that indicates the browser is in fullscreen mode. Combined with spoofing the browser chrome, this could have led to confusing the user about the current origin of the page and credential theft or other attacks. (CVE-2020-6810) - When protecting CSS blocks with the nonce feature of Content Security Policy, the @import statement in the CSS block could allow an attacker to inject arbitrary styles, bypassing the intent of the Content Security Policy. (CVE-2020-6813) - By carefully crafting promise resolutions, it was possible to cause an out-of-bounds read off the end of an array resized during script execution. This could have led to memory corruption and a potentially exploitable crash. (CVE-2020-6806) - The first time AirPods are connected to an iPhone, they become named after the user's name by default (e.g. Jane Doe's AirPods.) Websites with camera or microphone permission are able to enumerate device names, disclosing the user's name. To resolve this issue, Firefox added a special case that renames devices containing the substring 'AirPods' to simply 'AirPods'. (CVE-2020-6812) - The inputs to sctp_load_addresses_from_init are verified by sctp_arethere_unrecognized_parameters; however, the two functions handled parameter bounds differently, resulting in out of bounds reads when parameters are partially outside a chunk. (CVE-2019-20503) - When a device was changed while a stream was about to be destroyed, the stream-reinit task may have been executed after the stream was destroyed, causing a use-after-free and a potentially exploitable crash. (CVE-2020-6807) - When removing data about an origin whose tab was recently closed, a use-after-free could occur in the Quota manager, resulting in a potentially exploitable crash. (CVE-2020-6805) - The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as Curl' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution. (CVE-2020-6811) Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights. We recommend the following actions be taken: - Apply appropriate updates provided by Mozilla to vulnerable systems, immediately after appropriate testing. - Run all software as a non-privileged user (one without administrative privileges) to diminish the effects of a successful attack. - Remind users not to visit un-trusted websites or follow links provided by unknown or un-trusted sources. - Inform and educate users regarding the threats posed by hypertext links contained in emails or attachments especially from un-trusted sources. - Apply the Principle of Least Privilege to all systems and services.
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737178.6/warc/CC-MAIN-20200807113613-20200807143613-00442.warc.gz
CC-MAIN-2020-34
5,050
29
http://www.linuxhomenetworking.com/forums/showthread.php/5294-Don-t-make-me-crank-up-another-box
code
I'll do it!! I won't say any names but someone has passed me in crunching!!! Joining our clan of number is cool but when I am getting passed up I need to bring more hardware on line.... That was pretty slick .....Joining our clan of *number is cool but when I am getting passed up I need to bring more hardware on line.... THAT DOES IT!!! okay - humm - how to ask. i have a debian box which does not seem to want to run this. it complains about noy having glibc 2.2 . this is woody (2.2) - do i need to move to potato?Members of team LinuxJunior_dot_org_Genome: jcrowe 4550.32 units 305 genes pbharris 4512.79 units 311 genes I have potato and it works fine. I guess the problem is with glibc. So either you install ( or deinstall ) to glibc 2.2, I would guess the best move is to install potato stable. I think Lovechild have Woody and seems to be working fine.it complains about noy having glibc 2.2 . *this is woody (2.2) *- do i need to move to potato? I swear... I was just thinking about NGene for 5 secs....I think Lovechild has a Woody.. Jokes aside, f@h runs completely fine on my Testing/Unstable box... Well... first place was nice while it lastedTHAT DOES IT!!! hey! i have not even had time to crank it up yet. i figured for sure i would be behind right about now.
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443736672328.14/warc/CC-MAIN-20151001215752-00291-ip-10-137-6-227.ec2.internal.warc.gz
CC-MAIN-2015-40
1,277
11
http://www.andreas-ersson.de/index.php/kindle/groovy-and-grails-recipes-recipes-a-problem-solution-approach
code
By Bashar Abdul-Jawad Groovy and Grails Recipes is decided to be first ebook to give sensible, real-life, operating examples of ways to accomplish universal programming initiatives utilizing the Groovy language and Grails framework, for Java and net developers.. The booklet can have a cookbook type to it and may concentrate on code snippets instead of theoretical causes. it is going to be the 1st booklet to hide Grails model 1.0 and Groovy 1.5. Groovy and Grails Recipes is the busy builders’ advisor for constructing purposes in Groovy and Grails. instead of uninteresting the person with theoretical wisdom of “yet one other language/framework” it is going to delve immediately into fixing real-life difficulties in Groovy and Grails utilizing effortless to appreciate, good defined code snippets. through the use of studying by means of instance, clients should be capable of choose up on Groovy and Grails fast and use the booklet as a vital reference while constructing functions. Read Online or Download Groovy and Grails Recipes (Recipes: a Problem-Solution Approach) PDF Best object-oriented software design books With the XML ''buzz'' nonetheless dominating speak between net builders, there is a actual have to tips on how to minimize throughout the hype and positioned XML to paintings. Java & XML exhibits how one can use the APIs, instruments, and methods of XML to construct real-world purposes. the result's code and knowledge which are moveable. This moment version provides chapters on complicated SAX and complex DOM, new chapters on cleaning soap and knowledge binding, and new examples all through. Because the starting of the seventies machine is obtainable to take advantage of programmable desktops for numerous projects. in the course of the nineties the has built from the large major frames to non-public workstations. these days it isn't merely the that is even more robust, yet workstations can do even more paintings than a prime body, in comparison to the seventies. The second one version of this textbook comprises revisions in response to the suggestions at the first variation. In a brand new bankruptcy the authors supply a concise advent to the rest of UML diagrams, adopting an analogous holistic process because the first version. utilizing a case-study-based strategy for supplying a finished advent to the rules of object-oriented layout, it includes:A sound footing on object-oriented recommendations equivalent to periods, items, interfaces, inheritance, polymorphism, dynamic linking, and so forth. - The Object-Z Specification Language - Simply Java: An Introduction to Java Programming (Programming Series) - Building Web Applications with ADO.NET and XML Web Services (Gearhead Press--In the Trenches) - BiLBIQ: A Biologically Inspired Robot with Walking and Rolling Locomotion - Remoting patterns : foundations of enterprise, Internet and realtime distributed object middleware - Objects First with Java: A Practical Introduction Using BlueJ Extra resources for Groovy and Grails Recipes (Recipes: a Problem-Solution Approach) However, they are entirely optional, and as you get more comfortable with Groovy, you will learn how to leave out most of those optional elements. The rest of this recipe is dedicated to illustrating the differences between Java and Groovy. I introduce only the basics of such differences, and most of the topics covered in this recipe are elaborated throughout the rest of this book. Optional Syntax Elements Groovy achieves its brevity by leaving out a lot of the syntax elements that are always required in Java. How Do I Integrate Groovy with Java? In many scenarios, Groovy is ideal for the task at hand—such as in rapid prototyping or when building modular applications that can be extended with macros or plug-ins. Such extensions can be built with Groovy and seamlessly embedded in your application without requiring a long and tedious development and deployment cycle. These applications can benefit greatly from Groovy’s expressiveness, brevity, and powerful features. In other situations, however, Groovy might not be the best solution. Looping structures include sdeha and bkn loops. This chapter covers, by example, all of Groovy’s supported data types and control structures. 3-1. What Are the Different Kinds of Strings in Groovy and How Do I Use Them? Groovy supports two kinds of strings: regular Java strings, which are an instance of f]r]* h]jc*Opnejc; and GStrings, which are an instance of cnkkru*h]jc*COpnejc and allow placeholders to be included in the text. GStrings are not a subclass of Opnejc because the Opnejc class is final and can’t be extended.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446708046.99/warc/CC-MAIN-20221126180719-20221126210719-00794.warc.gz
CC-MAIN-2022-49
4,668
17
http://www.outlooktechnicalhelp.com/outlook-account-backup-and-restore
code
Huge amount of data is exchanged through emails. Many of them are important to be kept stored. So every email user wants a back up of his account so that he can check the emails later. Back up is also required in case if account is blocked or hacked or damaged. Outlook account is the email client application where many accounts can be configured. User can take the back up of the account and the contacts by importing or exporting the account information. - Open Outlook. - Click on File, from the above menu bar. - From the options box, select and click on Import/Export. - A wizard will open. - Choose the option "Export to a file "from the list and click Next. - Now select the Outlook Data File(.pst ), and again click Next. - Select the account for which you want to get the back up. - Check the check box saying "include all sub folders". - Click Next. - Browse to select the location , where user wants to save the .pst file. Click OK. - User can also make the .pst file password protected. For any technical problem or query, just contact an Outlook expert through email or phone and get the instant outlook technical support.
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251688806.91/warc/CC-MAIN-20200126104828-20200126134828-00112.warc.gz
CC-MAIN-2020-05
1,136
13
https://www.training.nttdataph.com/copy-rvc-old
code
Ranger Virtual Classes Across industries and sectors, the COVID-19 pandemic has changed the nature of what work and learning look like. NTT DATA continues to provide in-depth, technical training solutions tailored to meet your personal and organizational learning objectives with content created by Microsoft and delivered by Microsoft Certified Trainers. Furthermore, we can help you assess, plan, deploy and manage IT solutions to help businesses continue to operate during crisis. Enroll and pay in one of our Ranger Virtual Classes today:
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500273.30/warc/CC-MAIN-20230205161658-20230205191658-00874.warc.gz
CC-MAIN-2023-06
542
5
https://aravis-project.discourse.group/t/fake-camera-packet-size-negotiation/189
code
Does the fake camera support packet size negotiation using SCPS0 register (firing test packets)? Unfortunately, this feature is not implemented in the fake camera. Any patch to add this feature is welcome ! It should be relatively easy… Thanks for the answer. I would gladly do it. But I am not a hardware developer so my software skills are not that good. I’ll try though.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662588661.65/warc/CC-MAIN-20220525151311-20220525181311-00379.warc.gz
CC-MAIN-2022-21
377
4
https://lists.riot-os.org/pipermail/notifications/2020-November/220317.html
code
[riot-notifications] [RIOT-OS/RIOT] gnrc_netif_pkq: fix pktbuf leak (#15435) notifications at github.com Thu Nov 12 22:36:31 CET 2020 @benpicco commented on this pull request. > @@ -1521,6 +1521,9 @@ static void _send(gnrc_netif_t *netif, gnrc_pktsnip_t *pkt, bool push_back) LOG_ERROR("gnrc_netif: can't queue packet for sending\n"); + /* If we got here, it means the device was busy and the pkt queue + * was full. The packet should be dropped here anyway */ It's unfortunate that we can't report this error to the upper layer You are receiving this because you are subscribed to this thread. Reply to this email directly or view it on GitHub: -------------- next part -------------- An HTML attachment was scrubbed... More information about the notifications
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704803308.89/warc/CC-MAIN-20210126170854-20210126200854-00028.warc.gz
CC-MAIN-2021-04
761
14
https://www.amember.com/forum/threads/wordpress-integration.23567/
code
Hello, I currently use aMember on one domain and I am wanting to integrate that with a wordpress install on another domain I have. I see that there is a wordpress integration plugin but I am not concerned about protecting pages on the wordpress side. My goal is to have the users that are created in the aMember DB get sent to the Wordpress database. With that, if a user creates an account on the domain where aMember is running and protecting, they would automatically have an account on the domain running wordpress. Is this possible with the standard plugin or is there an additional plugin available for this?
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107876768.45/warc/CC-MAIN-20201021151342-20201021181342-00196.warc.gz
CC-MAIN-2020-45
614
1
http://www.elitepvpers.com/forum/general-gaming-discussion/106134-help-getting-newest-beta-client.html
code
Help getting newest beta client I was playing in the warhammer online beta before it shutdown. Unfortunately, I wasn't the original person accepted. A guy in my dorms got into the beta and stopped playing it so he let me take the account over. Unfortunately, with beta reopening the links and passwords to download the client don't work and you can't just upgrade the client through the patcher. I assume they have sent out new download passwords (they are different than the PWs you use to login), and the links are different. Unfortunately, the guy I got the account from graduated a couple of weeks ago and I have no idea how to go about contacting him to get the download info. He never gave me the beta forum info because it too uses a different username and password (one he didn't want to share). So, if anyone in beta could send me a PM to help me out I'd really appreciate it.
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718426.35/warc/CC-MAIN-20161020183838-00373-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
885
3
https://www.randomfix.com/2005/12/15/msn-messenger-8-beta/
code
I was selected to participate in the MSN Messenger 8 beta test. I received the downlink link two nights ago. So far, I don’t have many contacts to talk to over MSN as I am a regular AIM user. However, the interface is quite nice and here is a screen shot of the login screen. I’m really digging the user interface that’s for sure. As time goes by and I have more things to test, I’ll keep you guys updated.
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648198.55/warc/CC-MAIN-20180323063710-20180323083710-00371.warc.gz
CC-MAIN-2018-13
414
2
https://sketchyphysics.fandom.com/wiki/Collisionmesh
code
The collisionmesh is a shape's collision behaviors. Example: The collisionmesh of a box or shape is the blue bounding box that appears when you select it. These vary with the shape, and can be altered via the context click/right click menu. (Right click>Sketchyphysics>Shape>(shape goes here.) How do I view it? By debugging the shape or by ShowCollision. - If a Convexhull or a Staticmesh is resized, the collisionmesh will glitch up. Example:You make a convexhull. You resize it. You play the simulation. When your default hits the convexhull, it passes through. This is because of a glitch with the collisionmesh. - The convex hull collision mesh is restricted to shapes that are entirely convex. This means that the surface may not have any concave portions, only flat or convex if it is to react correctly. If the convex hull state is applied to a shape with any concave areas it will not interact with another shape during a collision. The image shown is an example of a shape that is not a convex hull since the interior of the torus is concave. An example of a true convex hull is a sphere which is the simplest form. If you were to push a dent in the sphere it would no longer be a convex hull. - If you need to make a shape with concave surfaces react to a collision then it must be broken up into smaller parts, each of which is entirely convex.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662520817.27/warc/CC-MAIN-20220517194243-20220517224243-00521.warc.gz
CC-MAIN-2022-21
1,356
6
https://community.spiceworks.com/topic/2113138-what-license-need-for-windows-iis-deployment
code
It looks like each host has 4 sockets and 8 cores per socket. Under the Microsoft licensing currently available, you have to license each core of the host that the VM will run on, with the minimum being 16 cores if the physical cores are less than 16. By my math, the host has 32 cores, which means that the host has twice the minimum number of cores, which will double the Microsoft server licensing cost. Windows Server licenses come in 2 core packs. You will need 16 * 2 core pack licenses to license a new Windows Server VM on the hardware. This will give you licensing for a second Windows Server 2016 (or lower) VM on the SAME host. You will need to lock down the VM to the one host, as if it moves over to the other host, then the other host will also need to the same licensing. Licenses generally cannot be moved more frequently than 90 days between hosts. In addition, every user that accesses the system in any way will need a Windows User CAL. You might already have them in your organization. The User CAL needs to be for the same version or higher of the version of Windows Server that you are using. Was this post helpful?
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647810.28/warc/CC-MAIN-20230601110845-20230601140845-00698.warc.gz
CC-MAIN-2023-23
1,137
3
http://snakerack.blogspot.com/2011/03/i-threw-away-my-snake.html
code
I had just returned from doing six reptile presentations at two schools in as many days—this is in addition to my day job as a freelance graphic designer—so I was pretty tired. Before I moved all the snakes back into their cages I figured it would be a good time to clean all the cages in my collection. So I started switching out dirty tubs for clean ones. For water bowls and hides I use empty plastic food containers and empty food boxes, respectively. So when I clean cages I remove the snake, place it in a clean tub and dump the entire contents of the old tub in my trash can outside. Nice and easy assembly-line style. Except when it's breeding season and you forget which snakes are together. Before the shows I had placed a male Honduran with one of the females and totally forgot he was in there. My faulty memory told me he was still in shed in his own tub. Wrong! So I opened the female's tub and put her in the clean one, dumped the dirty tub and moved on. About an hour later I made it to the male's cage and he wasn't there! My tubs are pretty tight, so I was reasonably sure he hadn't escaped. Checking my notebook, I saw that he was supposed to be with the female. I panicked. The thoughts whizzing through my head included primarily guilt over a.) dumping my snake in a trash can; b.) letting loose a snake that could potentially breed with a local species and taint the gene pool; and the fact that this guy was supposed to breed two females for me this season and I don't have a backup. I ran outside and started tearing through boxes and whipped topping containers and newsprint—all covered with snake poop—and there he was, still coiled in the taco shell hide box. At least there was a happy ending. I snatched him from the trash, muttered something to the effect of "Sorry dude," and went back inside. I'm not really an idiot, but I play one on the internet.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267863119.34/warc/CC-MAIN-20180619193031-20180619213031-00551.warc.gz
CC-MAIN-2018-26
1,889
5
https://dynamicpress.ticksy.com/ticket/1119350/
code
I am unable to find the Visual Composer Button on the top of Add New Slides' page. I selected Content Slide from the slide settings section. I am trying create new slides for the testimonial and link partners Most probably you have slide post type not added to VC powered post types array. Please go to Vvisual Composer -> Role Manager , set Post types to custom. You will see checkboxes for different post types used in theme. Check slide and save. Now you should be able to use VC in slides too. DynamicPress Support Team Thank you very much Kris. It really worked. Do you have any comprehensive tutorial on this theme? I would love to be fluent on this multi functional theme. Theme documentation in HTML format is included in full theme package in foder /documentation. Online is available here http://www.dynamicpress.eu/documentation/evolve/doc/ Some instructional videos for theme you find here: https://www.youtube.com/playlist?list=PLVp0ipQ1wx4JV-jR5NyxmIPqZYxdGN-mn More complete documentation for included third part plugins (Revolution Slider, Essential Grid and Visual Composer is available here: Thank you very much for the prompt reply and support.
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912201707.53/warc/CC-MAIN-20190318211849-20190318233849-00317.warc.gz
CC-MAIN-2019-13
1,163
13
https://desatelbu.github.io/videos/watch/inside-shocking-news-massive-gains-incoming
code
|INSIDE SHOCKING NEWS ! MASSIVE GAINS INCOMING SOONER THAN YOU THINK||WATCH SHIBA INU SECRET PLAN REVEALED Today in this video we’re gonna talk about everything Shiba Inu Coin, Shiba Inu Coin Prediction, Shiba Inu, Shiba Coin, Shib, Shiba Inu Coin News today, Shibaswap and MORE! The crypto space is always surprising us, so try to keep up with the cryptocurrency news! SHIB has continued to find exchanges wanting to add them and thus increasing their exposure. The most recent has been their addition this week to Bitcoin Mercado, the largest digital asset and crypto exchange in Brazil. #ShibaInuCoin #Shiba #Shib Hope you guys enjoy this! 🚀 If you enjoy this video, please like it and share it. 🚀 Don’t forget to subscribe to this channel for more updates. 🚀 Subscribe now @SHIBA INU COIN 1. SHOCKING DOCUMENT REVEALED! NEW Famous Exchange is Going to list SHIBA INU COIN |SHIBA INU COIN||https://youtu.be/FFXxx3guC0k 2. SECRET DATA REVEALED! CRAZY SHIBA INU COINS Burned in LAST 24 HOURS |SHIBA INU COIN NEWS TODAY||https://youtu.be/Xj7PGLxGzFY 3. SHIBA INU COIN ADOPTION! HUGE INSTITUTIONS SECRET PLANS FOR SHIBA INU COIN REVEALED! SHIBA INU COIN Tags: shiba inu,shiba inu token,shiba inu coin,shiba inu crypto,shiba,crypto,binance,cryptocurrency,shiba coin,shib,crypto news,altcoins,shiba inu coin prediction,shib coin, shiba token,best altcoins,shiba inu price prediction,how to buy shiba inu,cryptocurrency news,shiba inu live,how to buy shiba,shiba swap,india,covid 19, coinbase, coin, base, exchange, burning, burn, shib dev, shiba inu army, visa, alibaba, china, amc, graham stephan , shytoshi, robinhood, binanace, michael burry, joe biden, elon musk, robert kiyosaki, michael burry, metaverse, bybit, ryoshi, wolf of wall street, jordan belfort, mark zuckerberg ► Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for "fair use" for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational, or personal use tips the balance in favor of fair use.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662545548.56/warc/CC-MAIN-20220522125835-20220522155835-00300.warc.gz
CC-MAIN-2022-21
2,150
15
https://www.ditii.com/sharepoint-2010-virtualisation-planning-and-technet-webcast-deep-dive-microsoft-virtualization-best-practices-for-sharepoint-2010-level-300/41264/
code
If you’re thinking about virtualising SharePoint 2010, whether it’s on Hyper-V, or otherwise, Microsoft have released a number of useful pieces of documentation to aid you through the process. It covers a number of key sections: - Virtualization support and licensing (SharePoint Server 2010) - Hyper-V virtualization requirements (SharePoint Server 2010) - Plan virtual architectures (SharePoint Server 2010) - Plan for virtualization (SharePoint Server 2010) - Capacity management and high availability in a virtual environment (SharePoint Server 2010) Also, there’s a webcast delivered by TechNet team, on the same topics, so if you’d rather hear/see it, than read it, here are all the details: TechNet Webcast: Deep Dive – Microsoft Virtualization Best Practices for SharePoint 2010 (Level 300): Audience(s): IT Generalist. Duration: 60 Minutes Start Date: June 15, 2010 7:00 PM GMT – Registration
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583879117.74/warc/CC-MAIN-20190123003356-20190123025356-00251.warc.gz
CC-MAIN-2019-04
913
11
https://apithedocs.org/new-york-2023/sandra-illi-villarreal
code
Sandra Illi Villarreal Mindset Refactor: Scaling Slack Developer Success About the talk: This talk will cover the various ways teams at Slack adopted a beginner’s mindset in order to scale both internal and external developer success with the new modular Slack Platform About the speaker: Sandra is a Developer Advocate at Slack. She's building out a career that combines her interest in people and enhances her technical skills.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817699.6/warc/CC-MAIN-20240421005612-20240421035612-00259.warc.gz
CC-MAIN-2024-18
431
6
https://learn.microsoft.com/fr-fr/previous-versions/windows/it-pro/windows-10/security/threat-protection/security-policy-settings/restore-files-and-directories
code
Restore files and directories - security policy setting - Windows 11 - Windows 10 Describes the best practices, location, values, policy management, and security considerations for the Restore files and directories security policy setting. This security setting determines which users can bypass file, directory, registry, and other persistent object permissions when they restore backed up files and directories, and it determines which users can set valid security principals as the owner of an object. Granting this user right to an account is similar to granting the account the following permissions to all files and folders on the system: - Traverse folder / execute file - User-defined list of accounts - Not Defined - Users with this user right can overwrite registry settings, hide data, and gain ownership of system objects, so only assign this user right to trusted users. Computer Configuration\Windows Settings\Security Settings\Local Policies\User Rights Assignment By default, this right is granted to the Administrators, Backup Operators, and Server Operators groups on domain controllers, and to the Administrators and Backup Operators groups on stand-alone servers. The following table lists the actual and effective default policy values. Default values are also listed on the policy’s property page. |Server type or Group Policy Object (GPO) |Default Domain Policy |Default Domain Controller Policy |Stand-Alone Server Default Settings |Domain Controller Effective Default Settings |Member Server Effective Default Settings |Client Computer Effective Default Settings This section describes features, tools, and guidance to help you manage this policy. A restart of the computer is not required for this policy setting to be effective. Any change to the user rights assignment for an account becomes effective the next time the owner of the account logs on. Settings are applied in the following order through a Group Policy Object, which will overwrite settings on the local computer at the next Group Policy update: - Local policy settings - Site policy settings - Domain policy settings - OU policy settings When a local setting is greyed out, it indicates that a GPO currently controls that setting. This section describes how an attacker might exploit a feature or its configuration, how to implement the countermeasure, and the possible negative consequences of countermeasure implementation. An attacker with the Restore files and directories user right could restore sensitive data to a computer and overwrite data that is more recent, which could lead to loss of important data, data corruption, or a denial-of-service condition. Attackers could overwrite executable files that are used by legitimate administrators or system services with versions that include malicious software to grant themselves elevated privileges, compromise data, or install programs that provide continued access to the device Note: Even if the following countermeasure is configured, an attacker could restore data to a computer in a domain that is controlled by the attacker. Therefore, it is critical that organizations carefully protect the media that are used to back up data. Ensure that only the local Administrators group is assigned the Restore files and directories user right unless your organization has clearly defined roles for backup and for restore personnel. If you remove the Restore files and directories user right from the Backup Operators group and other accounts, users who aren't members of the local Administrators group can't load data backups. If restoring backups is delegated to a subset of IT staff in your organization, you should verify that this change does not negatively affect the ability of your organization's personnel to do their jobs.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817442.65/warc/CC-MAIN-20240419172411-20240419202411-00726.warc.gz
CC-MAIN-2024-18
3,782
34
https://www.hipointfirearmsforums.com/threads/linux-discussion.312381/
code
When XP was retired, my old 32 bit laptop couldn't run the 64 bit Windows 8, so I installed Ubuntu. But Ubuntu is heavy and ran real slow. So I tried Puppy, and it brought new life to the old machine. Faster than anything I've had on it. So I thought I'd try it on my Gateway. Well, I can't get it to run from DVD or Flash Drive. So I read about getting around the UEFI. So I follow the procedure, but it just takes me into the old BIOS and those settings don't help. I've tried disabling Secured Boot and everything else, but no go. I've read a little about how some manufacturers block the ability to run any other os than the one shipped. But that procedure that supposedly bypasses the old BIOS, but doesn't work. I'm stumped. I'm thinking Gateway and Microsoft conspired to prevent anything else ever running on this POS. Any suggestions?
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400212959.12/warc/CC-MAIN-20200923211300-20200924001300-00773.warc.gz
CC-MAIN-2020-40
843
1
https://bugsfixing.com/solved-c-program-using-biosdisk-function-for-a-removable-disk-attached-with-system-check-whether-it-is-ready-for-access-or-not-read-the-drive-parameters/
code
Write C language program to complete the following three tasks using BIOSDISK function. Suppose one removable disk is attached with your system. Check whether it is ready for access or not. Show appropriate messages in either case. Read the drive parameters of the first removable disk of the system. (The drive parameters will be returned in the buffer that is passed as a parameter). After reading, write the contents of the buffer in a file. Format Track number 1 and set the bad-sector Flags (if bad-sectors are present) of first removable disk of your system. The remaining parameters should be as follows: Head number = 0, Sector number = 1, Total number of sectors (nSect) = 1 biosdisk(int command No, int drive No, int head No, int track No, int sector No, void *buffer); Drive is a number that specifies which disk drive is to be used: 0 for the first floppy disk drive, 1 for the second floppy disk drive, 2 for the third, and so on. For hard disk drives, a drive value of 0x80 specifies the first drive, 0x81 specifies the second, 0x82 the third, and so forth. Answered By – Abdul Qayyum Answer Checked By – Terry (BugsFixing Volunteer)
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948756.99/warc/CC-MAIN-20230328011555-20230328041555-00508.warc.gz
CC-MAIN-2023-14
1,151
10
https://archivescatalog.library.louisville.edu/repositories/2/accessions/578
code
Includes correspondence (1977-1978); summer programs files (1974- 1977); and conference records (1968-1977). University records more than 25 years old are generally open; however, some records may be restricted by statute or federal law. - University of Louisville. International Center (Creator, Organization) 7.5 linear feet (6 records center boxes)
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506479.32/warc/CC-MAIN-20230923030601-20230923060601-00602.warc.gz
CC-MAIN-2023-40
351
4
https://pubmed.ncbi.nlm.nih.gov/30666298/
code
Quantitative characterization of the tumor microenvironment, including its immuno-architecture, is important for developing quantitative diagnostic and predictive biomarkers, matching patients to the most appropriate treatments for precision medicine, and for providing quantitative data for building systems biology computational models able to predict tumor dynamics in the context of immune checkpoint blockade therapies. The intra- and inter-tumoral spatial heterogeneities are potentially key to the understanding of the dose-response relationships, but they also bring challenges to properly parameterizing and validating such models. In this study, we developed a workflow to detect CD8+ T cells from whole slide imaging data, and quantify the spatial heterogeneity using multiple metrics by applying spatial point pattern analysis and morphometric analysis. The results indicate a higher intra-tumoral heterogeneity compared with the heterogeneity across patients. By comparing the baseline metrics with PD-1 blockade treatment outcome, our results indicate that the number of high-density T cell clusters of both circular and elongated shapes are higher in patients who responded to the treatment. This methodology can be applied to quantitatively characterize the tumor microenvironment, including immuno-architecture, and its heterogeneity for different cancer types. Keywords: digital pathology; immuno-architecture; spatial patterns; spatial statistics; systems biology.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571472.69/warc/CC-MAIN-20220811133823-20220811163823-00563.warc.gz
CC-MAIN-2022-33
1,483
2
https://community.nethserver.org/t/waiting-for-ns-7-final-release/4876
code
Currently using pfsense and ready to upgrade to a UTM. I am hoping NS 7 will be released by end of this year so that I can do the upgrade over the holidays. Having just installed an OPNsense perimeter firewall I am toying with the idea of doing a complete re-install of NS 7 when it’s released, as opposed to an upgrade. Has anybody any thoughts on this, or is this being a little to pedantic… It all depents on your situation. It’s not completely clear, but I read through the lines that you currently use NS7rc1. In that case I would just do the updates through software center and you end up with a fully functional NS7 server as soon the final is released. (they will have the same repositories) If you have NS6.8, it might be good to do a fresh install. However, ‘our’ devs will do their best to create a rock solid upgrade path. Sorry Robb, I didn’t make that too clear…yes i am on 6.8 which makes me feel / think that a fresh install would be a better proposition…I’m also using OwnCloud so the fresh install would be replaced by nextCloud, which seems to be everybody’s favourite just now. Also clear out any rubbish that may well have been left behind by me. The RC1 is pretty good already… RC2 maybe the final release i must say, memory usage droped about 30% and all services are up and running! Happy to read this, your waiting is ending
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038067400.24/warc/CC-MAIN-20210412113508-20210412143508-00619.warc.gz
CC-MAIN-2021-17
1,371
8
https://www.net-film.ru/en/film-18445/
code
City of Moscow. The grand meeting at the Central House of Cinema, devoted to the 50 th anniversary of the Central Documentary Film Studio (TSSDF). Present: I. Bessarabov, LN Derbysheva, AI Medvedkin, I. Geleyn, N. Ya Sychev, M. Oshurkov, V. Mikosha, S. Kogan, S. Gerasimov, L. Kulidzhanov, S. Pumpyansky, T. Opryshko, D. Rymar, B. Sher, S. Kiselev, V. Lavrov, A. Shchekutyev, Gusev, I. Bgantsev and others. Speakers: Chairman of the USSR State Committee for Cinematography FT Ermash, director TSSDF E. Kozyrev, director AI Medvedkin. Participants of the meeting inspect a photo exhibition in the foyer of the Cinema House.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662675072.99/warc/CC-MAIN-20220527174336-20220527204336-00061.warc.gz
CC-MAIN-2022-21
622
1
https://sharepoint.stackexchange.com/questions/2849/custom-application-development-choices-on-sharepoint-2010
code
I'm about to start developing a custom business application on top of Sharepoint 2010. I haven't done anything on this product but client insists on it so I don't have a choice. I have to build a complex business application that will use its own DB on MS SQL 2008 R2. Authentication will be done using client certificates and will connect to AD FS on the server side, but as this app will run under Sharepoint all this will be done by it. I won't have to handle authentication/authorisation. Application will run processor intensive business processes and it will support three different user access levels (admins, managers and users). Every business process will have at least one screen, but most probably more than just one. For instance I will have something similar to master/detail views, and I guess each of these should be a separate screen/webpart/whatever. Application will display custom controls that will support business processes. These controls will be custom made, because they're not used in usual applications. Application should be client rich, so I would like to use client libraries like jQuery or even better ExtJS if at all possible. It should be asynchronous using Ajax functionality. - I can't decide whether to go with Visual web parts or Silverlight? I know there are other possibilities as well (like running separate Asp.net MVC applications inside Sharepoint), but I wouldn't want to do it that way even though it would be much easier for me to develop such applications, because I'm primarily hardcore Asp.net MVC developer. Which one will make itpossible to create a rich user interface? - Develop on Sharepoint Foundation 2010 or Sharepoint Server 2010? I've seen differences in services they support, but since I don't have any development experience in Sharepoint I can't really say which ones are going to be imperative for my application. I would like to do it on Foundation, because I can re-sell the app without additional costs that Server brings with its licensing. - Which services will most probably be used? I will most probably use Business Connectivity Service, but what about others like Managed Metadata Service, Secure Store Service etc? - Should I provide a service layer API? I've read I could also provide my own WCF/Web service that would be my entry point to my business layer processes. Much can be done on the BCS level within Sharepoint then, but I'd still need my rich custom controls, that would display data in unusual ways. - What about sandboxed solutions? Is this something I should use or not? Will it be too restrictive for actual use? I don't like inventing water so I'd like to ask you guys that've already done this kind of stuff and know which one is better/faster/easier/performant/etc.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100800.25/warc/CC-MAIN-20231209040008-20231209070008-00037.warc.gz
CC-MAIN-2023-50
2,759
16
https://www.healthimpact.studio/event/10579/
code
Using Data To Drive Educational Content Design We create games and VR simulations to improve health and healthcare, relying heavily on formative assessment during the design process. The presentation focuses on usability data and how stakeholder input drives product development. The talk will provide examples of how data from usability changes the content creation software, game format, and feature set to help us meet the challenges of creating educational software in the fast-paced world of technology. Reference: Metcalf M, Stokes K. Using Data To Drive Educational Content Design. UX Y’all 2020; 2020 September 25; Raleigh, North Carolina, United States. More info on the authors: Mary Metcalf and Katie Stokes
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948609.41/warc/CC-MAIN-20230327060940-20230327090940-00480.warc.gz
CC-MAIN-2023-14
720
4
http://wingware.com/pipermail/wingide-users/2008-November/006044.html
code
[wingide-users] Autocomplete python more liberally peter at fry-it.com Mon Nov 24 03:18:07 MST 2008 Is it possible to configure wing to autocomplete words that aren't necessarily defined variables, functions or methods. I'm from Emacs/Jed land where M-. autocompletes the word you're cursor is on if the word has been written anywhere before in the buffer. I often find that I'm typing words that have been written before in things like comments or inside python strings. In fact I'd be happy to separate the functionality from the usual autocomplete which pops up as a list. More information about the wingide-users
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084892699.72/warc/CC-MAIN-20180123211127-20180123231127-00765.warc.gz
CC-MAIN-2018-05
616
12
https://wppluginsplus.com/downloads/pods-module-for-divi/
code
Pods Module for Divi Current Version: 2.1PHP Version Required : 8.0 +WP Version Required : 6.2 + **********Fully Compatible with Visual Builder********** Pods is a great (and FREE) way of getting custom post types and custom fields into your WordPress site. It comes with a whole raft of templating options and components to do a number of things in a really clever way. However, what it doesn’t do well is integrate into the Divi Builder. You need to use shortcodes or custom templating and it can get confusing and messy really easy. In this plugin, the Pods module for Divi, you get two Divi Builder modules to add both a single item or a table of items. The table module allows you to select which fields you want and it will show them in a nicely styled way. This works well for general text, numbers, dates, website addresses etc. The single field module is, as it sounds, a module to output one of the fields only. This is especially good for images, files and relationship fields. Every field type you will find in the Pods list is supported by this plugin including relationships which provides a linked list of related items. The video shows in more detail how to use the plugin and what it can output. The styling options on each module also allow you to tune the content to suit both your brand and the context in which you are showing the fields. How to use Install and Activate the plugin Create some fields against a post type using the Pods plugin Visit a page using the Divi builder (one that had the Pods fields present) and click ‘Add Module’ You’ll see two modules there, “Pods Single Item” and “Pods Items”, select the one you want and then select the Pods field to output Save the layout/page and view it. You may install this product on any number of websites that you build for yourself or your clients. You will receive 6 months support and updates, after which you may have to purchase a support contract in 6 month packages. * V1.1 * - Initial version * - Works in conjunction with Pods, a free and popular plugin for WordPress - https://en-gb.wordpress.org/plugins/pods/ * * V1.2 - 16/02/2018 * - fixed picking a single item in the relationship field or the image field as both were showing the wrong info. * *V2.0 - 21/06/2021 *- Added visual builder support to Pods Single Item and Pod Items Modules *- Fixed initially empty field value for Pods Single Item and Pod Items Modules *- Fixed styling option of Pod Items Module * V2.1 - 09/12/2022 * - Added compatibilty with php 8.1.2 *
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476532.70/warc/CC-MAIN-20240304200958-20240304230958-00670.warc.gz
CC-MAIN-2024-10
2,529
17
http://www.tomshardware.com/forum/261776-32-external-hard-drive-installation-problems-inspiron-600m
code
What Operating System are you using? right click "my computer" left click "manage" computer management windows should open on the left side of the window click "disk management" the right side of the window should populate in there you should be able to find your external drive listed make sure it has a letter assigned to it if it does make sure it doesn't match another device (hdd, cd-rom, etc) if no letter is assigned to it right click on the drive and click "change letter" if it is new you might need to click format first
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647777.59/warc/CC-MAIN-20180322053608-20180322073608-00046.warc.gz
CC-MAIN-2018-13
530
12
https://github.com/JoaquimLey/transport-eta
code
An utility app using an SMS based service (or the web) to request a more precise ETA of a publc-transport (Bus, Metro etc.) to a specific station, currently implementing for Lisbon Some of the cool stuff I'll be integrating in this project: - Multi module Clean architecture - Android Architecture Components - Firebase Suite (I'll integrate as much services as possible) Since I'm always working on some side-projects, I decided to document the development on a live coding stream, this way I'll force myself into finishing more often, and maybe giving something back, or get some feedback from the community. Come and say Hi 👋, join me on stream twitch.tv/joaquimley: watch, help, and learn as I develop, make mistakes developing on this project About the author Hi, my name is Joaquim Ley, I'm a Software Engineer (Android). The easiest way to contact me is through: You can also follow me on: Coming from the medium blog? It would take substantially more time to setup this project without this reference projects Contributions are always welcome! Follow the "fork-and-pull" Git workflow. Fell free to open a new issue. Follow the ISSUE_TEMPLATE.MD Prevent code-style related changes (at least run Ctrl+⌥+O, ⌥+⌘+L) before commiting. Copyright © 2018 Joaquim Ley Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License.
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267158001.44/warc/CC-MAIN-20180922005340-20180922025740-00548.warc.gz
CC-MAIN-2018-39
1,793
18
https://civicrm.stackexchange.com/questions/17950/how-to-fix-new-mailing-that-only-has-initializing-and-edit-boxes-that-wait-f
code
One of my Civi installs has a problem where clicking 'New mailing' has 'Initializing' but nothing more, and edit boxes on the summary screen have a continuously circling triangle if an item is edited. I've been through this forum help and looking at the browser console I can see 'HTTP/1.1 500 Internal Server Error 54ms'. I have removed extensions, and upgraded to the latest 4.6.27 CiviCRM release but no change. I really don't know what to do next, so very grateful for any help. CMS is Drupal 7.52 and PHP 5.6 (Added) The full message in the above browser console is: 'https://www.myapp.com/civicrm/ajax/angular-modules HTTP/1.1 500 Internal Server Error 34ms' This problem turns out to be a mis-configuration on the shared server. We were also getting Internal Error 500 messages just on signing in today, but the hosting company (vidahost.com) fixed the problem & Civi is working fine now. So not a problem with Civi, but a problem on the shared server, now fixed. No wonder I couldn't find anything wrong with Civi..
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703518201.29/warc/CC-MAIN-20210119072933-20210119102933-00246.warc.gz
CC-MAIN-2021-04
1,023
2
https://www.ekstrandneurolab.ca/lab-news
code
The Ekstrand Neuroimaging Lab takes OHBM 2023! Recently, the Ekstrand Neuroimaging lab had the opportunity to attend the renowned Organization for Human Brain Mapping (OHBM) conference in Montreal, QC. The conference promised to be an informative and enriching experience, offering us the chance to present our research, learn from leading experts, and engage in scientific discussions about the intricacies of brain mapping. We returned with new knowledge and inspiration to advance our research in the ever-evolving field of human brain mapping. Chelsea presented her new work focused on 4D spatiotemporal clustering as a new technique for analyzing functional magnetic resonance imaging data, while Keva, Josh, and KiAnna all sought to examine how personality traits such as psychological wellbeing, stress, and positive affect, modulate neural synchrony during audiovisual movie watching. Christina examined differences in neural synchrony across a complex narrative to identify regions of the brain involved in episodic memory formation at a larger timescale. We can't wait to be back! Congratulations to Andres Jimenez! A huge congratulations to Andres for his acceptance into medical school at Western University! Wishing him all the best in his new endeavour! Congratulations to Piper Shamanski! A big congratulations to previous Ekstrand Lab member, Piper Shamanski, for her acceptance to the Audiology and Speech-language Pathology programs at Dalhousie University! Piper's passion for language research ultimately led her to accept her dream offer to begin her Master's in Speech-language Pathology. Wishing you the best of luck, Piper! Happy brain awareness week! Josh and Keva represented The Ekstrand Lab at the University of Lethbridge Open House. Visitors got to learn about the human brain and MRI and explore MRI images themselves. Big congrats to Ekstrand Lab Master's student, Keva Klamer, for receiving an Alberta Graduate Excellence Scholarship! Congratulations to incoming graduate student KiAnna Sullivan for submitting the first manuscript of her Honours thesis work for publication! Fingers crossed for good news! The Ekstrand Neuroimaging Lab is officially one year old! It has been an incredibly exciting and unique year to build a lab, but we are so happy with the awesome team we are building. Stay tuned from the awesome research we've been working on! The Ekstrand Neuroimaging Lab received its first NSERC Discovery Grant for our project entitled "Mapping perception and emotion in the human brain with functional magnetic resonance imaging and diffusion tensor imaging using naturalistic stimuli". We can't wait to share some of this exciting new research with you! The Ekstrand Lab is growing! KiAnna, Bhadra, Madi, Tina, Amber, and Matthew all joined the lab officially on January 11th. Welcome all! Chelsea submits her first NSERC research grants. Fingers crossed!
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476399.55/warc/CC-MAIN-20240303210414-20240304000414-00295.warc.gz
CC-MAIN-2024-10
2,901
13
https://www.flashweb.fr/Template%20-%20Flashweb/Asher/2014/02/01/operating-systems/index.html
code
Themes are often used to change the look and feel of a wide range of things at once, which makes them much less granular than allowing the user to set each option individually. For example, you might want the window-borders from a particular theme, but installing it would also alter your desktop background. One method for dealing with this is to allow the user to select which parts of the theme they want to load, for example in Windows 98, you could load the background and screensaver from a theme, but leave your icons and sounds untouched. Microsoft Windows supported themes since Windows 98. This operating system and its successor, Windows ME, came with themes that customized desktop backgrounds, icons, user interface colors, Windows sounds and mouse cursors. A separate application package called Plus! for Windows 95 added the same features to Windows 95. Windows XP themes expanded Windows theme support by customizing the visual style of the user interface. This feature was carried over to Windows Vista, which added Windows Aero, but was removed again withWindows 8. Third-party apps such as Window Blinds, TuneUp Utilities and Desktop Architect enhance theme capabilities.Linux operating systems may support themes depending on their window managers and desktop environments. IceWM uses themes to customize its taskbar, window borders, and time format. WindowMaker can store colors for icons, menus, and window-borders in a theme, but this is independent of the wallpaper settings. GNOME and KDE use two independent sets of themes: one to alter the appearance of user interface elements (such as buttons, scroll bars or list elements), and another theme to customize the appearance of windows (such as, window borders and title bars).Mac OS is does not natively support themes. Third-party apps such as Kaleidoscope and ShapeShifter may add this.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817674.12/warc/CC-MAIN-20240420184033-20240420214033-00461.warc.gz
CC-MAIN-2024-18
1,864
3
http://diy.stackexchange.com/questions/tagged/laminate-floor+water-damage
code
Home Improvement Meta to customize your list. more stack exchange communities Start here for a quick overview of the site Detailed answers to any questions you might have Discuss the workings and policies of this site What can I do about mild water/moisture damage to laminate wooden flooring? Yesterday, I accidentally left the window open while it was raining heavily. Some rain poured in for a while (maybe a half-hour or so) before I noticed. After I had wiped off the floor, some dark ... Jul 29 '12 at 16:07 newest laminate-floor water-damage questions feed Hot Network Questions Is this FizzBuzz Swift-y? Converting and rescaling a lot of png images to jpeg Are there English equivalents to a Japanese old saying, “Be the mouth of cock rather than remaining as the tail of ox”? How to create circles and or sections of a circle when the centre is inaccessible Get surface area of a mesh? How can I make a guard move out of the way? How to show characters learning something in a non-boring way? Should I let a user know they have entered an unknown username or email address? How do I configure RAID 5, especially stripe size, with 24 x 1.2 TB drives for CentOS 6? How to address a knighted academic? Draw with your CPU LinkedIn logo in Latex How to [politely?] tell software vendor they don't know what they're talking about Entry to U.S with criminal record Why do rockets separate from both its strap-on booster cores simultaneously instead of one at a time? (Delta IV Heavy, Falcon Heavy, Angara) Question about resistors and LEDs Is the Voyager episode "Threshold" considered canon? What is the source of help? Free Wi-Fi to end users using hotspot paid ISP line What are the standard colors for plots in Mathematica 10? Write a true self-reflective statement about the digits from 0 to 9 (or prove it can't be done) Good Versus Evil 12 Prisoners demonstrate first steam locomotive Am I too new to try DMing once? more hot questions Life / Arts Culture / Recreation TeX - LaTeX Unix & Linux Ask Different (Apple) Geographic Information Systems Science Fiction & Fantasy Seasoned Advice (cooking) Personal Finance & Money English Language & Usage Mi Yodeya (Judaism) Cross Validated (stats) Theoretical Computer Science Meta Stack Exchange Stack Overflow Careers site design / logo © 2014 stack exchange inc; user contributions licensed under cc by-sa 3.0
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1404776432874.14/warc/CC-MAIN-20140707234032-00079-ip-10-180-212-248.ec2.internal.warc.gz
CC-MAIN-2014-23
2,371
53
http://windows7themes.net/en-us/windows-7-hosts-file-access-denied/
code
Some people might have problem to edit their hosts file on Windows 7. A very common problem is that the error message “access denied” pops up. To solve this little problem, here’s a brief instruction how to take ownership of that file and edit it. If you are on Windows 8 and receive this error, you should also read this guide UPDATE: The fastest way to modify the hosts file in Windows 7 if you get the access denied error is this: 1. Step Open an elevated command prompt as described here: Elevated cmd.exe 2. Step Enter cd \windows\system32\drivers\etc 3. Step Enter notepad hosts – Or simply open an elevated notepad instance. If you are not familiar with the command prompt, you can follow the old slow tips below. Hosts File: Access Denied Error Messages Here are the error messages you may receive: Make sure that the path and file name are correct. Windows 7 does not give the average user access to many system files. The hosts file is one of those system files. What can you do about it? First of all, you should know that the default account is not *the* admin account. Therefore, I’d recommend to activate the administrator account to modify system files. 1. Quick workaround to edit the hosts file You can also simply create a copy of the hosts file. Right-click – “Copy here” and then modify it. Then delete the real hosts file and rename the copy that we just created to “hosts”. 2. Activate Hidden Admin Account Goto “Start” and enter “cmd” into the search field. Hold CTRL + Shift and hit Enter to run cmd.exe as an administrator. Enter the following line: net user administrator /active:yes 3. Take Ownership of the hosts file Instead of activating the admin account, you can simply add a little option “take ownership of this file” to the context menu. Simply download the following zip file that includes two registry files. One to add this option to the contect menu and one to remove it. Alternatively, you can simply copy and paste the following text into a text file and rename the extension to “.reg” (for registry) and then execute it. @="cmd.exe /c takeown /f \"%1\" && icacls \"%1\" /grant administrators:F" "IsolatedCommand"="cmd.exe /c takeown /f \"%1\" && icacls \"%1\" /grant administrators:F" @="cmd.exe /c takeown /f \"%1\" /r /d y && icacls \"%1\" /grant administrators:F /t" "IsolatedCommand"="cmd.exe /c takeown /f \"%1\" /r /d y && icacls \"%1\" /grant administrators:F /t" Trending On Windows Themes .Net
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440644065828.38/warc/CC-MAIN-20150827025425-00041-ip-10-171-96-226.ec2.internal.warc.gz
CC-MAIN-2015-35
2,480
27
https://tableplop.notion.site/Tableplop-Docs-a441ac6f11f342b4b0f76e30a309a5b1
code
Tableplop might be simple but that doesn't mean it doesn't need documentation! We've tried to cover the most important features here but it's far from 100% coverage, if you have any questions that aren't covered please ask on Discord: Join the Tableplop Discord Server! And I'll try to update this document after! <aside> ‼️ If you're just starting out check out the Getting Started Guide first, it will take you briefly through all tableplop's most important aspects. <aside> 💬 You can comment on these pages if you need clarification or think there's something wrong (this requires a notion account). Frequently Asked Questions Getting Started Guide
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473472.21/warc/CC-MAIN-20240221102433-20240221132433-00678.warc.gz
CC-MAIN-2024-10
658
7
https://progovtjobs.com/2020-macbook-air-for-gaming/
code
2020 MacBook Air For Gaming? Install Raid for Free ✅ Mobile: https://clik.cc/swyce ✅ PC: https://clik.cc/2xbsf and get a special starter pack 💥 Available only for the next 30 days! Disclaimer: Footmouse is a parody, and not a real product available for purchase. The 2020 MacBook Air has up to 80% faster graphics thanks to the new intel iris plus integrated graphics, but is this really enough graphical power to play even light games on the MacBook Air? Follow me on Twitch: https://www.twitch.tv/gregstation Buy The Best Valued MacBook Air (i5 version): https://amzn.to/2JGABbP *Affiliate Link generates Revenue Greg’s Gadgets Discord: https://discord.gg/s8jp9Kt Subscribe to the Podcast: https://www.youtube.com/gadgetcast Apple Podcast: https://podcasts.apple.com/us/podcast… Follow Me on Twitter: http://bit.ly/2G9H3HM Product Recommendations: https://www.amazon.com/shop/gregsgadgets macbook air gaming,macbook air 2020 gaming,macbook air 2020 gaming test,macbook air 2020,macbook air 2020 review,macbook air i7 2020,macbook air 2020 gaming i7,macbook air 2020 i3 gaming,macbook air 2020 gaming fortnite,macbook air 2020 csgo,macbook air civilization 6,macbook air csgo settings,macbook air fortnite,macbook air 2020 starcraft 2,macbook air 2020 gaming review,2020 macbook air gaming performance,2020 macbook air gaming benchmark
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650409.64/warc/CC-MAIN-20230604225057-20230605015057-00374.warc.gz
CC-MAIN-2023-23
1,347
12
https://news.ycombinator.com/item?id=12045058
code
This would make users not use the browser that implemented it. > When something goes wrong, the site gets a HTTP PUT request with an error report, so sites can tell this happened. If I bother to implement a handler just to get error reports from browsers, I surely took first the easier step to open my website in such a browser to check how it looks. >This would make users not use the browser that implemented it. I think the idea behind this is that 1) the web developer will now the site is broken and 2) the client who is paying the web developer will know the site is broken so 3) the site will be fixed before it even gets to the end user.
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315865.44/warc/CC-MAIN-20190821085942-20190821111942-00027.warc.gz
CC-MAIN-2019-35
646
8
http://hackinggamesfree.com/download-sb-game-hacker-apk-for-android/
code
Download SB Game Hacker Apk For Android Download SB Game Hacker Apk For Android: SB game hacker is a simple android app through which you can hack almost all the android games. In order to use sb game hacker your android device must be rooted. SB game hacker only works in rooted android devices. You can download sb game hacker apk for android from below of this post. Among all hacking apps sb game hacker android app is simple and very powerful. With this sb game hacker you can hack many games like Temple Run, Temple Run 2, Subway Surfers, Hill climb racing, Dr.Driving, Candy crush saga , and many other games. Features Of SB Game Hacker : - It will search the values accurately. - Simple and very powerful. - No ads. - Improve Efficiency. How To Use SB Game Hacker : - First download sb game hacker apk for android. - Next install in your rooted android device. - Follow the below link to know “How To Use SB Game Hacker “
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578586680.51/warc/CC-MAIN-20190423035013-20190423061013-00529.warc.gz
CC-MAIN-2019-18
933
12
https://docs.microsoft.com/en-us/windows/win32/api/oaidl/nf-oaidl-ierrorinfo-getsource
code
IErrorInfo::GetSource method (oaidl.h) Returns the language-dependent programmatic ID (ProgID) for the class or application that raised the error. HRESULT GetSource( [out] BSTR *pBstrSource ); A ProgID, in the form progname.objectname. If this method succeeds, it returns S_OK. Otherwise, it returns an HRESULT error code. Use IErrorInfo::GetSource to determine the class or application that is the source of the error. The language for the returned ProgID depends on the locale ID (LCID) that was passed into the method at the time of invocation.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103037649.11/warc/CC-MAIN-20220626071255-20220626101255-00529.warc.gz
CC-MAIN-2022-27
547
6
https://www.sanity.io/answers/craft-cms-commerce-how-to-migrate-data-from-craft-cms-commerce-website-to-sanity
code
I'm copy pasting manually from WordPress. To be fair, i only have about 60 posts 😄 Aug 15, 2020, 12:28 PM Copying manually is one approach, but this is an e-commerce site with more than 240 product entries and hundreds of product variants which could be a little longwinded , would it be possible to link through GraphQL and transfer data that way ? Aug 16, 2020, 10:44 AM AFAIK there no way to import via graphql. Either you need to export your data to ndjson and use the cli to import, or write an import script as described in the guide above.Also see more here: https://www.sanity.io/docs/importing-data
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499953.47/warc/CC-MAIN-20230201211725-20230202001725-00429.warc.gz
CC-MAIN-2023-06
610
5
http://perplexus.info/show.php?pid=8339&cid=51741
code
(In reply to possible way - spoiler by Ady TZIDON) "It is a simple calculator that can do one binary operation at a time." Given the above statement, the broken calculator would require the equal key pressed for each binary operation. Assuming that the initial default value in memory is zero and is not counted as one of the two operands in the operation -7/7, the number of keystrokes required for your proffered expression, with the appropriate equals keystrokes, would be 20: -7/7 = +7 = +7 = +7 = +7 = +7 =. Posted by Dej Mar on 2013-07-31 12:33:42
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038062492.5/warc/CC-MAIN-20210411115126-20210411145126-00242.warc.gz
CC-MAIN-2021-17
553
6
https://www.daily-doses.com/blogs/news/7822679-daily-doses-leather-snakeskin-strapback
code
We are proud to present you with our latest release- Daily Doses Leather Snakeskin Strapback. Made from a 100% genuine leather crown, the hat also features a snakeskin leather brim and an Italian Pebble Grain Calf Leather Underbrim. The is finished with a matching strap and a gold buckle. This is our first all leather snakeskin hat, and it is super limited. Get yours from our online store now.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475897.53/warc/CC-MAIN-20240302184020-20240302214020-00253.warc.gz
CC-MAIN-2024-10
396
1
https://bestcatfoodforcats.com/cat-food-tips-and-tricks/faq-who-makes-miko-cat-food.html
code
- 1 What happened to Miko cat food? - 2 What company makes Authority cat food? - 3 What is the healthiest cat food on the market? - 4 What cat food is made in the USA? - 5 What is the best wet cat food? - 6 Is Miko Mitama good? - 7 Is authority a good brand of cat food? - 8 Do cats get bored of eating the same food? - 9 What foods should Cats avoid? - 10 What’s the worst cat food? - 11 What is the best cheap cat food? - 12 Is Aldi cat food healthy? - 13 What cat food is not made in China? - 14 Is Fancy Feast cat food made in China? - 15 Is Blue Buffalo made in China? What happened to Miko cat food? Exclusive to chewy.com, Miko brand cat food has been discontinued. The product reviews below will remain for historical purposes, but these products will be difficult if not impossible to find for purchase going forward. What company makes Authority cat food? About Authority Authority is a pet food brand made for PetSmart, a US-based pet retailer founded in 1986. It’s now North America’s largest pet specialty chain, with retail locations numbering over 1,500. PetSmart introduced the Authority brand back in 1995. What is the healthiest cat food on the market? - Purina Pro Plan LiveClear Probiotic Chicken & Rice Formula. - Purina Cat Chow Complete Dry Cat Food. - Iams Proactive Health Indoor Weight & Hairball Care. - Hill’s Prescription Diet k/d Kidney Care Chicken & Vegetable Stew. - PetGuard Organic Chicken & Vegetable Formula. - Fancy Feast Gravy Lovers Ocean Whitefish & Tuna Feast. What cat food is made in the USA? |Best Cat Food||Best for:| |Taste of the Wild Rocky Mountain Feline Recipe||Dry Cat Food| |Natural Balance Limited Ingredient Diets Canned Cat Formula||Wet Cat Food| |Whole Earth Farms Grain Free Recipe Dry Cat Food||Kittens| What is the best wet cat food? Best Wet Cat Food of 2021: Overall Picks - Hill’s Science Diet Adult Sensitive Stomach & Skin Canned Cat Food. - Instinct Limited Ingredient Wet Cat Food. - Blue Buffalo True Solutions Fit & Healthy Wet Cat Food. - Purina Pro Plan Weight Management Wet Cat Food. - Avoderm Indoor Weight Support Wet Cat Food. Is Miko Mitama good? Mitama the Oracle is considered one of the best Ubers you could ever acquire. With her resistance and slow effect against enemies with traits, she makes the near entirety of Stories of Legend a cakewalk. She’s also very tanky against traited enemies, toting nearly 120,000 effective HP (almost 150,000 with Treasures!) Together they average 5.8 / 10 paws, which makes Authority an average overall cat food brand when compared to all the other brands in our database. The 17 reviewed dry foods scored on average 5.4 / 10 paws, making Authority an average dry cat food brand when compared against all other dry food manufacturer’s products. Do cats get bored of eating the same food? Can cats get tired of eating the same food? Yes, cats can get bored of eating the same type of food every day. That’s one of the reasons why Whiskas recommends mixing up your cat’s food with part wet food and part dry food. What foods should Cats avoid? Seven foods your cat shouldn’t eat - Milk, cheese and other dairy products. Many of us grew up with the image of kittens drinking milk or cream in cartoons or picture books. - Raw eggs, meat or fish. - Dog food. - Bread and yeast. - Onions and garlic. What’s the worst cat food? The 8 Worst Cat Food Brands - 9Lives. Canned and dry cat food. - Kit & Kaboodle. Dry cat food. - Whiskas. Dry and wet cat food. - Purina Cat Chow. Dry cat food. - Meow Mix. Dry and wet cat food. - Iams Cat Food. Dry and wet cat food. - Friskies. Wet and dry cat food. - Hill’s Pet Nutrition Science Diet. Dry and canned cat food. What is the best cheap cat food? 10 Best Cheap Cat Foods Reviews - Cat Chow Complete Dry Cat Food. - 9Lives Dry Cat Food. - Cat Chow Naturals Original Dry Cat Food. - Meow Mix Tender Centers Dry Cat Food. - Sheba Perfect Portions Seafood Pate Variety Pack. - Purina Friskies Canned Wet Cat Food. - Iams ProActive Health Adult Dry Cat Food. Is Aldi cat food healthy? Aldi’s canned cat food seems to be good to average in terms of ingredient quality, and it is comparable to other familiar mid-priced brands such as Purina, Fancy Feast, and 9 Lives. It avoids certain undesirable ingredients such as cornmeal, bone-meal, and other fillers. What cat food is not made in China? The Honest Kitchen 100% human grade pet food for cats and dogs is made in the USA. The Honest Kitchen pet foods contain no ingredients from China, and are soy free, GMO free, wheat free, and corn free. Is Fancy Feast cat food made in China? Sourcing And Manufacturing Most Purina products are sourced and manufactured in the United States. A few products are made in Thailand— Fancy Feast Purely, Broths, and Flaked Fish & Shrimp. Regardless of location, all products are made in company-owned facilities. Is Blue Buffalo made in China? None of the ingredients are sourced from China. All Blue Buffalo products are manufactured in the United States. Many of their ingredients, such as most grains and meats, like chicken, beef and turkey come from the United States.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057421.82/warc/CC-MAIN-20210923104706-20210923134706-00123.warc.gz
CC-MAIN-2021-39
5,137
77
https://www.genealogy.com/forum/surnames/topics/whipkey/166/
code
Mary Whipkey (Emma) Sorry, my computer has been down. Actually I know very little about Emma Yoder.She was my husband's grandmother but he knew nothing about her, not even her name. So other than what I have found on Censuses, death certificates, and Soc. Sec. applications, I know nothing.I had no idea who her parents were until I read the article on Tobias Yoder in the Yoder Newsletter[it mentioned his wife Mary Whipkey and his daughter Emma Burket]and Chris Yoder wrote they had only one Emma Yoder that married a Burket.If I find where she is buried [I know she is buried in Somerset Co., but not where]and when she died I will let you know.Are you descended from her?
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585302.56/warc/CC-MAIN-20211020024111-20211020054111-00282.warc.gz
CC-MAIN-2021-43
675
3
https://github.com/rice-university
code
Grow your team on GitHub GitHub is home to over 28 million developers working together. Join them to grow your own development teams, manage permissions, and collaborate on projects.Sign up Python script that utilizes Google Docs and Google Voice for next level crawls. An API used for collecting Rice Bus details. Will be used as test data during the weekend. short URLs for screenshots online poetry composition aid
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590443.0/warc/CC-MAIN-20180719012155-20180719032155-00185.warc.gz
CC-MAIN-2018-30
417
6
https://www.bleepingcomputer.com/forums/t/3200/behind-the-internet-rat-race/
code
I'm wondering though, how much software is too much?! Does this software chase never end? Good questions, and good to question limitations, cjsears if for no other reason than to demonstrate a plain reality of life on the interenet full of duplication and inconsistancies. Take a look at this list . It's ironic that the bottomline yields such a small percentage of what's available. jgweed's list is really a good summation and there doesn't exist conflicts in using those particular ones on the same machine. Although they are similar in many ways, using each can provide some overlapping of benefits and broaden the protection you receive. It's important to note that each day that passes often brings inclusions to lists of products that fall into the category of malware. Thats what we get having a world of participants in the relatively finite world of operating systems for millions of PC's. I would typically have about a hundred programs on my PC. I might use a dozen regularly, and be updating more than half of them on a weekly basis. The combined total of all of them would amount to the same volume of file sizes roughly equivalent to having 50 albums of music. A dozen programs would be larger than 100 MB in size, programs for web browsing photo editing, animation creation, speech recognition, character recognition, word processing & data management falling into this category. Most all others have much smaller "footprints" on the system yet many of them are quite powerful in their own regards. Installing/uninstalling is the trial & error I've experienced over time. Having a relatively new machine, as you have, or having a relatively new installation of OS on any machine, gives you an advantage. The install/uninstall process is the one that creates a need for disk defragmentation more than most other normal PC operations using software. Please monitor your disk defrag utility on a regular basis like updates. You'll avoid slowdowns that way. Also, desktop shortcuts and placement of tray icons can be a hassle. For the most part, it's just as easy to enter "start" and locate the desired program to launch as it is to have a oppressive (or impressive, I guess) display of icons confronting you each time the desktop is visible. I only allow automatic updating to occur in a couple programs, as I don't like unpredictable popups demanding an internet access to do it, nor running at times that often conflict with what I may be doing at any given time. Typically I will have 5-6 browser windows minimized, 4-5 word documents open, an audio player going, a spreadsheet perhaps or more than one, and be performing a download in the background. I do not want do an update "right now". Same holds true of playing games...all of a sudden the action is interrupted by "OMG, your anti-virus may be out-of-date...do something!!" Having a hundred software programs, as I have mentioned, is really no big deal. I think I've tried 300 or more, and never use more than a small percentage simultaneously. My "stand alone PC" would be considered on a scale of 1-10 of available PC's as about 4.6. Hang around BC a while, read the tutorials and wide variety of topics/discussions here... you'll be surprised at how quickly you become familiar with the once bewildering array of information. (like for instance how I know about that scale of 1-10 or how to get reporting on the details of the machine you have, a free program I highly recommend As for things that do the same thing... the best advice I've gotten is to install Mozilla Firefox and leave IE alone except to update windows and a few other reasons. I just make it secure as it can be and take it off my start menu. Same thing with the Windows Media Player. I have better alternatives that are free and I set them as the default programs. The majority of my trial & error has been because of the winXP pro I use, not the programs built to use it. Edited by phawgg, 02 October 2004 - 10:04 PM.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827769.75/warc/CC-MAIN-20181216143418-20181216165418-00355.warc.gz
CC-MAIN-2018-51
3,965
13
http://basicprogramming.blogspot.com/2016_01_13_archive.html
code
Liberty BASIC doesn't map the BAS file extension to itself when it is installed. This is because I didn't want to be so presumptuous as to steal a common file type away from another version of BASIC that might be installed. So, because there is a bug in Windows which makes it really hard to remap a file extension and there have been discussions about this in the Liberty BASIC forum at conforums.com one of our member Chris Iverson (thanks Chris!) has contributed some Liberty BASIC code to solve this problem. Click to see thread in the forum
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875143695.67/warc/CC-MAIN-20200218120100-20200218150100-00012.warc.gz
CC-MAIN-2020-10
545
3
https://discourse.slicer.org/t/custom-events-for-vtk/1286
code
I was wondering if there is a convenient way to define custom vtk events (preferably at a high level) and thereafter attach a data payload to them? As an analogous example, the qt slider widget has a valueChanged signal that has an attached payload containing the new value. In the context of vtk, one could then do something along the lines of (perhaps as a static variable): For most data types in Slicer, a vtkObject is actually returned as a wrapped version of whatever concrete subclass was passed in the payload, so it actually covers all slicer events that come from nodes or the scene or other classes. You can also call InvokeEvent from python with a calldata (payload) argument. In practice it’s often the case in Slicer that you don’t need calldata because knowing the caller is enough to get the information you want because what would otherwise be the payload data has already been set in the corresponding instance variable of the caller.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337432.78/warc/CC-MAIN-20221003200326-20221003230326-00540.warc.gz
CC-MAIN-2022-40
956
5
http://esemplastic.ianvarley.com/2003/10/mike-switzer-points-out-great-new-way.html
code
Mike Switzer points out a great new way to amuse yourself on the web. It's called Googlism, and it basically uses Google search results to suck out a series of more or less sensible phrases that can be applied to the given query. Try it, put in your own name. It's just the sort of unintentional poetry you might find from the likes of Donald Rumsfeld. I think my favorites are the ones about George Bush and cameltoe. What's your favorite?
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711232.54/warc/CC-MAIN-20221208014204-20221208044204-00472.warc.gz
CC-MAIN-2022-49
440
2
https://mail.python.org/pipermail/python-list/2006-May/373142.html
code
Windows & Apache 1.3 & mod_python.dll Tim N. van der Leeuw tim.leeuwvander at nl.unisys.com Tue May 16 17:24:08 CEST 2006 Any particular reason for not using Apache 2, and mod_python 3.x? Anyways, looks to me like there's a problem with the path where the DLL is installed, vs. where it's search for by Apache? I had no particular problems installing Apache 2 and mod_python 3.x on WinXP, using the mod_python installer. Sorry, but that's best I can offer! More information about the Python-list
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027316783.70/warc/CC-MAIN-20190822042502-20190822064502-00352.warc.gz
CC-MAIN-2019-35
495
11
https://buspriority.org/how-to-enroll-in-free-coursera/
code
Course Company– How To Enroll In Free Coursera. Convenient Summary on Tap Course material was quite well organized, with a menu of lessons, grades, notes, and discussions down the left-hand column. The main course page had a welcome message from the course tutor, highlighting important features like where to get help.In 2008, he established the Stanford Engineering All Over (SEE) program, which provided three Stanford courses on machine knowing, databases, and AI to online trainees for complimentary. Each of these 3 online courses gathered signups of 100,000 trainees or more, as detailed by Andrew himself. Returning in time to 2012, take a look at this interview with Daphne Koller, co-creator of. At the time when she was providing this talk, just had 43 online courses readily available. In less than 8 years, that number has grown almost a hundred-fold to 4000. Andrew and Daphne saw so much capacity in this kind of e-learning that they put their careers as teachers at Stanford on hold and began focusing entirely on the MOOC website. Looking back on it, they definitely made the best option, as just seven years later, the company they developed is already valued at over $1 billion. Find How To Enroll In Free Coursera Online The two ex-CEOs of, Andrew, and Daphne, are no longer actively managing the business themselves. In 2018, Daphne Koller founded Insitro, an ingenious company that links drug discovery and machine learning. is still a reasonably brand-new business, and I am actually interested to see what the future will look like.Just how much does cost? Private courses cost $29 to $99, however in the majority of cases, they can be investigated for totally free.’s online degrees, nevertheless, can cost anywhere from $15000 to $42000. Plus is’s annual subscription service through which students can access all 3000+ courses, expertises and expert certificates with unlimited gain access to. The plan offers exceptional worth for trainee such who take online courses frequently. Yes, is legitimate and worth the expense. is one of the most cost-effective MOOC websites currently out there. Countless university-backed online courses make it extremely appealing for MOOCs, and the new subscription-based Plus uses exceptional value for regular online trainees. How does earn money? ‘s yearly revenue is estimated to be around $140 million and the majority of it originates from paid online courses, Expertises, MasterTracks, online degrees, and enterprise customers. The global business e-learning market size is growing astonishingly rapidly, and it’s likewise ending up being an increasingly big part of’s profits. When you explore the course catalog, you’ll instantly discover there’s a lot on offer. The brochure includes courses in liberal arts and arts, sciences, business, IT, languages, personal development, and more. as possibly the best machine finding out course ever and i kind of agree with that because it’s rather an excellent course however back in 2015 this course was a little bit excessive for me because after a couple of lessons i understood i needed to go back to the basics however even if i started this course was so inspiring for me due to the fact that i understood there’s numerous things that i need to learn when it concerns artificial intelligence and it was amazing inspiration to get started with artificial intelligence and after that get to where i am now so played a big function when it pertains to my profession and my motivation and i can not thank them enough for that having this in mind let’s go through some benefits that you might have and also through some unreasonable expectations that a number of you might have because all of us understand that the e-learning area and the e-learning market is growing rapidly and alongside we have a lot of other e-learning platforms such as you know a cloud expert or udemy or pluralsight there are many options out there for instance for cloud services a cloud master is great and also for anything tech related pluralsight is great and i use them all i utilize all of them right i used both pluralsight for numerous months and multiple times for numerous months because i wanted at various times to up my skills and i likewise utilize for example in 2013 2014 i’ve been using udemy a lot however the thing resembles with you to me nowadays i don’t truly utilize it that much due to the fact that it’s excessive sound on that platform due to the fact that everybody’s doing a lot of courses nowadays you get a lot of people that do not have a great deal of experience in many fields and they simply do courses on udemy since there’s no vetting process there and because of that there is a lot of sound obviously you have a great deal of excellent courses there however they get lost because prevalent amount of of fairly i don’t understand average courses however even so uw still has some good courses and i have a video about the very best maker discovering course on udemy go and inspect that a person out but once again since we have so many platforms that create courses and offer accreditations this waters down the importance of one specific accreditation so you need an edge when it concerns these certifications and kind of has that edge since it uses courses from top universities and they’re quite cost effective and likewise you get these courses from these top universities are likewise recorded by practitioners in the field so you get this type of effect because the courses and the accreditations that you receive from they still have some sort of reputational advantage compared to other platforms so in my viewpoint coursera i think is the best platform if you want to get a certification due to the fact that you still have that track record that type of circulations below the university onto you as a specific and also having these accreditations assists you because you can add them to your linkedin profile for instance or to your cv i suggest perhaps not to your cv however clearly if you add them to your linkedin profile you can promote yourself and therefore you can signify the fact that you understand those subjects also it reveals the truth that you are a long-lasting learner and this is extremely essential for companies due to the fact that they want to see an individual that continuously wishes to up their skills fine you want somebody that always has an interest in improving that is in this sort of self-improvement mode that they never ever simply get comfortable with the position that they remain in because everybody sort of enjoys ideal everyone loves a self improver everyone
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100739.50/warc/CC-MAIN-20231208081124-20231208111124-00805.warc.gz
CC-MAIN-2023-50
6,670
16
http://torturing.us/t/sexy-trees/2296
code
Compliments and kudos to @SoCool21 for his trees ADVERTISEMENT: Want trees like these?? (heh, rhymes) then PM me to get MCBuilds original build team working for YOU. Heh, this is actually my first proper attempt at making custom trees. I thought they looked quite nice, glad you agree I don't want these trees
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814833.62/warc/CC-MAIN-20180223194145-20180223214145-00252.warc.gz
CC-MAIN-2018-09
309
4
https://www.jove.com/author/Matthew+G._Holt
code
Matthew G. Holt Matthew Holt is based at the VIB-KU Leuven Center for Brain and Disease Research. He originally trained as a biochemist at the University of Liverpool, before pursuing research into the physiology of synaptic transmission at the MRC Laboratory for Molecular Biology, obtaining his Ph.D. degree from the University of Cambridge. He followed this with post-doctoral training in the lab of Reinhard Jahn at the Max Planck Institute for Biophysical Chemistry in Göttingen, Germany. Since 2012, he has been an independent VIB group leader and professor at the KU Leuven, working on the role of astrocyte-neuron interactions in control of CNS function.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488273983.63/warc/CC-MAIN-20210621120456-20210621150456-00479.warc.gz
CC-MAIN-2021-25
663
2
http://www.ioffer.com/i/549081274
code
SIZE: 36 37 38 39 40 41 42 43 44 EUR40 = US7 = UK6=25CM EUR41 = US8 = UK7=26CM EUR42 = US8.5=UK7.5=26.5CM EUR43 = US9.5=UK8.5=27.5CM EUR44 = US10 =UK9=28CM EUR45 = US11 =UK10=29CM EUR46 = US12 =KU11=30CM I accept the following forms of payment: Bank wire transfers Western Union Money Transfer item will take 20 - 25 days in normal for (Air mail) delivery If you need faster, please contact me... "Delivery time faster than expected, 15 days to Norway! Good quality!"
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948214.37/warc/CC-MAIN-20180426125104-20180426145104-00281.warc.gz
CC-MAIN-2018-17
467
14
https://sites.google.com/site/suhasprojectprofilesite/webpage/captchaswithapurpose
code
Following are specialized CAPTCHAs belonging to the genre 'Captchas With A Purpose'. Apart from preventing online abuse they help in serving some 'practical purpose' as well which benefits human community. 1)Sentence Based Captcha Solutions-(A)None of us is as smart as all of us - Word 'of' and 'all' are swapped and garbage alphabet is filled in the white space. (B)Anna Hazare breaks fast after 288 hours - Words 'Hazare' and 'after' are swapped and garbage is filled - A News Headline (C)Bad officials are elected by good citizens who do not vote - Words 'elected' and 'citizens' are swapped. - Humorous Quote A sentence is selected. Two random words are selected from the sentence and are swapped. A Random alphabet is filled in each whitespace present in the sentence.Further distortions are added to the sentence image to make it harder for computers.Challenge is to guess the sentence and write the sentence in correct format by inserting whitespaces between words. Sentence can come from variety of sources of different genre,it can comes from news website,jokes website,educational/general knowledge websites.Thus,this CAPTCHA can serve as a source of education,entertainment as well as enlightenment! How cool! it is to catch up with latest news just while doing routine activities such as checking regular email,posting at blogs. Read more here See Captcha 'live' in action at - 2)Emotion Based Captcha A statement or a graphic is displayed to the user depicting a particular human emotion. User has to choose an emotion describing his feeling as an answer .We also add 'NULL' images to the database which does not depict any emotion corresponding to which user has to type 'NULL' as an answer. One measure for comparing emotions can be the Russell circumplex model of emotion illustrated in (1) . The two principal axes are excitement and pleasure. Russell states that these axes are orthogonal. For example, the emotion distress implies high excitement and displeasure, and so distress falls in the upper left quadrant of the model. However, low excitement and displeasure correspond to depression in the lower left quadrant. Emotions that are close to each other on the model are perceptually similar to humans, and vice versa. Opposite, or most dissimilar, emotions are diagonal to each other on the model. So, we can categorize emotions on the basis of the quandrant in which they lie and in this way group similar and dissimilar emotions. This model can be deployed in Emotion based CAPTCHA for identifying correct and incorrect answers when tags depicting emotion attached with the image are not sufficient, thus will improve the accuracy of CAPTCHA. Database for this CAPTCHA can be generated from an online game with a purpose.A simple game can be "Identical Emotions‟ - player and partner are given same image and they have to type emotion corresponding to that image, they keep on getting images till their emotions are same, when their emotions differ, game is over, more their emotions are identical, more points they get. Also, image for which their emotions differ is displayed to them and they also see each others responses for it. It will help to categorize images belonging to different genre such as 'sorrowful', funny', 'shocking', 'beautiful' etc.Also captcha can be indirectly used for conducting online polls on a very large scale. See Captcha 'live' in action at - Identical Emotions - Game With a Purpose 'Game with a Purpose' was innovative idea developed at CMU. These games help computers learn to think more like humans.One plays the game computers get smarter.Some of these games include ESP game which helps to label images on the web, Verbosity which help to collect common sense facts, Matchin which helps to generate best images etc.These Games are available on http://www.gwap.com/gwap/ This game is an extension of 'ESP' Game whose main purpose was to label images on the web. Identical emotions,instead of assigning description to the image,helps to assign emotions to the images,thus provides tags describing emotions depicted by the images.This helps to classify images according to different genre such as 'sorrowful', funny', 'shocking', 'beautiful' etc. Description of the system - The game is played by two partners and is meant to be played online by a large number of pairs at once. Partners are randomly assigned from among all the people playing the game. Players are not told whom their partners are, nor are they allowed to communicate with their partners. The only thing partners have in common is an image they can both see.Challenge imposed by Identical Emotion to players is that they have to type 'emotion' the image is depicting and player and his partner have to type same emotion to win points.Once both players have typed the same string, they move on to the next image and we say that their emotions are 'identical' . (1) (2)In the figure (1) when player and partner type the same emotion depicted by image for example love,they move on to the next image. Partners strive to agree on as many images as they can in 3 minutes. Every time two partners have 'Identical Emotions' on an image,they get a certain number of points.More their emotions are Identical,more points they get.Players can also choose to pass or opt out on difficult images. If a player clicks the pass button, a message is generated on their partner’s screen; a pair cannot pass on an image until both have hit the pass button. As the player and his partner have to type same string describing emotion for the image to move on,they have to agree on the same emotion depicted by the image,thus string which they type can act as a good tag for the image, describing emotion conveyed by the image. Off -Limit Words - If an image has been labeled many times before,system generated off limit words and players cannot use this words for labeling.These words act as Taboo words.These words make the game harder as the players now, will have to think of another possible emotion which image is conveying.Taboo words are obtained from the game itself. The first time an image is used in the game, it will have no taboo words.When it has been labeled by players in previous games, it will start having taboo words. These taboo words guarantee that image will get different tags describing emotions associated with it. When the game is over,player and partner can review the labels they submitted for the image as shown in (4) For game to be successful images presented to the user should be evocative. Images are retrieved from flickr database. Images are searched for different keywords such as "face", "nature", "flowers”,"expression","celebration","emotion","movie","baby","children","books", "god" etc. Keywords are selected intelligently such as search will return images depicting different emotions. Moreover, for the game to be able to create a good database and to be able to serve Emotion based Captcha, images should pass through the system multiple times. This mean same image should be labeled by different players. More "times" a particular label depicting emotion has been assigned by different players to the image, more accurate the tag is for the image. Thus, system also selects the images which have already been presented to previous players and are present in the database. This, also helps in obtaining multiple tags for the images which is also essential for accuracy. In some cases, if Images are not evocative, Images could also be labeled "NULL" or simply passed for smooth functioning of the game. When is an image done ? One image passes through the system multiple times.When it has acquired many labels which become off limit words ,image becomes too difficult for players such that they begin to pass it each time.As this point of time,image is removed from the database. Below collages illustrate different images on flickr with their emotional tags obtained from 'Identical Emotions'. Tag - Happy Tag - Love 3)Time Based Captcha At t=1sec At t=2sec At t=3sec Solution - ayt Splash random alphabets on random positions on a screen at different time instants.User will have to type alphabets in a sequence they appeared. Moreover, these Captchas expire if they don't receive a response within particular time interval. Please note that letters are distorted to make it harder for computers.Current implementation makes use of animated gif. This captcha can be made harder by asking users to enter the repeated sequence as well and playing repeated sequence random no. of times. In this way even if, program is able to extract frames from animated gif and recognize individual alphabets, it may not know, how many times sequence of alphabets is to be entered. It can be a suitable means to measure certain reaction times of human beings. A good data about human beings which is otherwise difficult to obtain and is very useful. See Captcha 'live' in action at - Security of CAPTCHAs - Most of the websites today use a single CAPTCHA to secure the login interface. As there are plenty of CAPTCHAs available today, different CAPTCHA problems can be used to secure a single login interface. Set of different CAPTCHA problems is maintained and a random CAPTCHA is selected from these CAPTCHAs before a login prompt is granted.Random CAPTCHA script, (A random CAPTCHA problem) is selected each time before giving login prompt to the user. If a login is unsuccessful, a random CAPTCHA problem is selected and presented to the user. As CAPTCHAs of different genre are presented randomly, this makes it very difficult to attack these CAPTCHAs. Even if a program is written to attack one CAPTCHA problem, devising an online password guessing attack becomes infeasible as after one unsuccessful try, a different random CAPTCHA problem will be presented to the user and attacking program should be capable to solve that as well. This problem, introduces a new problem of identifying CAPTCHAs, before attacking a CAPTCHA, attacking program will have to identify which CAPTCHA, it is as well. How it aids in enabling CAPTCHAs serve some practical purpose? CAPTCHAs such as sentence based CAPTCHA presented earlier might be bit annoying to people if presented to people everytime, but as in the above technique, a random CAPTCHA is presented each time, people might encounter it sometimes and might be willing to solve it to gain some useful knowledge. Moreover, as random CAPTCHAs are presented to the user, it is not possible to attack them as a graphic can be a sentence, image with different challenges such as figuring out sentence, typing emotion corresponding to image, typing letters, so each CAPTCHA has a different solution which can be figured out by humans more easily but is difficult for computer as it does not know what to give as a answer. Increasing the Usability of CAPTCHAs using Partial Credit Algorithm- Partial credit scheme is introduced in paper describing Asirra by Microsoft Research. It can also be used to make CAPTCHAs bit easy for people which are otherwise difficult. For eg- If in a Sentence based CAPTCHA, sentence being presented to the user is bit difficult and he is able to figure out say 5 out 7 words , he is given partial credit and a second CAPTCHA is presented to the user, this scheme can be combined with the above the system. Second CAPTCHA presented to the user may or may not be Sentence Based CAPTCHA, for example it might be Emotion based CAPTCHA and if person is able to get that partially correct as well, he is believed to have solved CAPTCHA challenge completely. At present, most websites deploy reCAPTCHA which helps to digitize books, this CAPTCHA can be used in conjunction with other "CAPTCHAs with a purpose" to broaden the application domain of CAPTCHAs and make CAPTCHA solving more interesting and beneficial to the human community. For more details - Read my paper available here in the below folder. Contribute to Solve Complex Problems while Playing a game! See section on gameswithapurpose Catch up with the latest News! Get Offers related to Cool technology Products! Suhas Aggarwal >
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119080.24/warc/CC-MAIN-20170423031159-00221-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
12,106
53
https://deiropalto.web.app/543.html
code
The reason i cannot use the sdk provided compiler, from xilinx, is that it was not compiled with the enableplugins options so i cannot add any plugins to the compiler. Can i use icl as cross compiler on windows for linux. Raspberry pi stack exchange is a question and answer site for users and developers of hardware and software for raspberry pi. It will be unable to build almost anything else because it cant link against the c library it doesnt have. Pdf porting linux kernel on fpga based development boards. Development tools building embedded linux systems, 2nd. Selection from building embedded linux systems, 2nd edition book. Build the crosscompiled c library using the stage 1 cross compiler. This is why patch provides cmake build for this great json library, it eases integration in cmake projects i. The cross compile tool chain that i used was version 5. Configure kdir to the address where the linux kernel of the target machine is stored. Cmake cross compile mysql connectorc for linuxpowerpc. In order to crosscompile the linux kernel module, the makefile should be aware of the linux kernel on the target machine, which in your case is kdir. I am in a similiar situation, however, we already have a native compiler on linux that will build 32bit and 64bit linux cross compilers. The embedded linux development kit eldk includes the gnu cross development tools. Clangllvm is a cross compiler by default and is now available on nearly every linux distribution, so we just need a proper port of the cctoolsld64 and the os x sdk. My host platform is a virtual machine running ubuntu 14. The embedded application must be compiled using the eldk crosscompiler package, that will generate code compatible with the cpu of the flex device. We have official support for android and winriver linux because both them has windows toolchainssdk. I know what youre saying duoas, and i actually though of it yesterday while i was playing with the two crosscompilers. The a option is a bit overkill, the shared library references are all in the dynamic section, the d option. Most notably, these are the gnu cross compiler, binutils, and gdb. Prerequisites to build a crosscompiler, you need a working c compiler gcc is generally a good idea. Flex devices have a cpu, onboard memory, and run an embedded linux rtos. To use the eldk toolchain for cross compiling you can simply source the created configuration file. How to use a linuxtolinux cross compiling gnu toolchain. This version of eldk runs on x86linux, x86freebsd and on sparcsolaris host operating systems and supports a wide range of powerpc. Webhome cross compiling snort recently, i am installing embedded linux system and some programs on power pc 440 of virtex5 ml507 test board. Free compilers and crosscompilers for linux and windows. Thus, for example, a crosscompiler for a freescale 8541 powerquickiii linux system. Install the arm cross compiler toolchain on your linux. The development board is running a custom port of linux. I am crosscompiling a linux kernel for an embedded arm system, on ubuntu 14. Denx software engineering announces the first release of a new embedded linux development kit eldk. However, the current crosscompiliation support makes some general assumptions that the target is an embedded linux device and provides some further conveniences if that embedded linux target is a debian or ubuntu system. Linux kernel and bootloader will run on arm processor of. Thus, for example, a crosscompiler for a freescale 8541 powerquickiii linux system will be called powerpc8540linuxgnugcc gcc being the executable name for the gnu compiler collection, whereas the linker for a littleendian mips linux system might be named mipsellinuxld, ld being the executable name of the gnu linker. The denx embedded linux development kit eldk provides a complete. To build a crosscompiler, you need a basic knowledge of the build process of a typical unix open source project, some basic shell skills, and a lot of patience. Cross compilerlinker network booting diskless 6 motorola mvme linux support. How to make a cross compiler gcc for freebsd under linux. This is what worked for me when cross compiling for the freescale. Another method popularly used by embedded linux developers involves the combination of gcc. For very simple programs, crosscompiling turns out to be as simple as using this crosscompiler instead of the usual gcc. Type the following command to display the version number and location of the compiler on linux. In the terminal, execute the below command to build an example application based on the libpng library. For linux this is normally based on binutils assembler, linker, object tools etc. How to build up the eldk cross compiler for s3c6410step1. Linuxmvme targets using motorola board support joe sullivan epics system developer aesbcda. The embedded application must be compiled using the eldk crosscompiler. Free embedded linux development kit for powerpc released. Our eldk provides a complete and powerful software development environment for embedded and realtime systems. A c compiler is supplied with most linux unixbased operating systems. In our particular case, we already have compilers 1 and 2 because linux systems will mostly have a preshipped version of gcc fully functional. Osxcross includes a collection of scripts for preparing the sdk and building the cctoolsld64. A native toolchain, as can be found in normal linux distributions, has usually been. Hello, i need to build gcc to crosscompile for the zynq7000 device. Also, a tool like this or the objdump answer is correct, as a crosscompiler ldd wont work, due to how ldd works. In order to simplify things a little, were gonna stop at making the compiler 3, that is the cross compiler from machine. Linux is in widespread use in embedded systems and handheld devices. However, i now receive the following errors related to package. Cross compile mysql connectorc for linuxpowerpc architecture using cmake failure hi, this problem is now resolved, my tool chain already had a definition for rint which was causing the problem, but cmake was unable to detect it. My test platform was the freescale p2041rdb development board. A cross compiler is a compiler capable of creating executable code for a platform other than the. Now we want to go a step further and be able to crosscompile on a windows host. To build, give the compiler access to the appropriate include directories and link to the seemingly static. Now we try the eldk cross tool chain here for armv7a. If you are using a different toolchain such as that codesourcery you will make use of armnonelinuxgcc cross compiler. For the raspberrypi architecture, a common toolchain provides armlinuxgnueabihfgcc. In this way crosscompiler eldk is install and ready to use. Fact is, i think that, to obtain the win32 executable, i could spend a lot of time to find the perfect options combination for the crosscompiler using a native source code which i havent found, or i could just use the mingwcygwin port of gcc for win32 installed. Icl itself cannot be used for crosscompile, but we have another product for embedded intel system studio, which has the cross compiler provided for android, winriver linux, yocto etc. The compilation of the win32 mingw32 cross compiler failed.31 551 1137 914 1357 1069 831 1095 896 1463 186 410 328 772 691 148 399 381 1391 734 338 340 1112 1227 1087 193 522 1055 1495 737 277 82 500 155 1122 515 1157 309 997 78
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817289.27/warc/CC-MAIN-20240419043820-20240419073820-00606.warc.gz
CC-MAIN-2024-18
7,485
7
https://k8sgpt.ai/blog/post-5/
code
K8sGPT helps us to analyze current problems in the K8s cluster and with the help of AI it explains what the problem is and how it could be fixed. In larger organizations you probably have a platform team and lots of application teams who don’t have direct access to the cluster via the k8sgpt cli. However, your application teams still need the SRE superpowers of K8sGPT so that they can fix their problems easily. So how can you achieve this? Backstage.io is a very popular platform for building developer portals, where teams get a holistic view on their services. It can show your service documentation, your github pipelines and also informations about your K8s resources. A perfect place to show also the K8sGPT results which belong to your application! So we at suXess-IT are happy to announce that with our backstage k8sgpt plugin you can integrate your K8sGPT results in your Backstage dev portal within a minute. So your dev teams get immediate access to the K8sGPT results which they need to take care about. Just follow the Readme or informations on our github project . The current version is still alpha, so please use it at your own risk. If you find bugs or have feature requests please create an issue on https://github.com/suxess-it/backstage-plugin-k8sgpt . Thanks to Aris and Alex who integrated backstage support in K8sGPT, which will be available in the upcoming release v0.0.17. For those who don’t know about backstage.io yet, here is a good blog post what backstage.io can bring to K8s dev teams: https://backstage.io/blog/2021/01/12/new-backstage-feature-kubernetes-for-service-owners
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816820.63/warc/CC-MAIN-20240413144933-20240413174933-00076.warc.gz
CC-MAIN-2024-18
1,613
8
https://loschmidt.chemi.muni.cz/academy/speaker/faraneh-haddadi/
code
Faraneh got her B.Sc. and M.Sc. degrees in software engineering from K. N. Toosi University of Technology (Tehran, Iran) and Alzahra University (Tehran, Iran), respectively. During her master’s study, she worked on drug-target interaction networks using machine learning to predict potential interactions. She currently studies and works as a Ph.D. student at Masaryk University and Loschmidt Laboratories, in the Czech Republic, where her main research interest is exploring machine learning algorithms and explainable artificial intelligence methods for producing designs of improved proteins. She has two research articles.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233509023.57/warc/CC-MAIN-20230925151539-20230925181539-00535.warc.gz
CC-MAIN-2023-40
628
1
http://www.afdown.com/s/58320-free-setup-builder-software-2-0-1-5-download.html
code
How to generate the complete professional look installer program of your software with the help of few mouse clicks? Setup installer creator software is useful or helpful for various users such as software developer, analyst, application programmer, coder and any other users to develop customized setup executable file. Professional setup maker tool is compatible with all Windows operating system including Windows Vista, ME, NT, XP, 2000, 2003, 98 etc. Setup install wizard creator utility facilitates user to generate their software using all major languages or platform. Setup application build or produce single self extracting installation file or package of your software or project program that helps in distributing your windows application among multiple users over internet or using any removable media drives. Professional setup builder software create installer wizard with all basic features including dialog box, title, company name, product version, name, shortcut path or icons, add license agreement etc. Self extracting archive utility can save all information in DLL file format at user specified location for future reference. Professional setup creator software generates customized setup wizard with product registry details such as registry type, root key, sub key name, sub key value and product value. Features: * Setup installer builder tool facilitates to include uninstaller in your software setup. * Setup installation creator application is useful for all IT professional and non professional to generate setup package of your application. * Self extractor generator utility is cost effective and reliable tool that maintain original structure of your windows application program. * Windows installer maker program easily generate the set up of any software within few mouse clicks across any platform. Setup Builder Software 126.96.36.199 Setup Builder Software 188.8.131.52 - The Latest Versions History Setup Builder Software 184.108.40.206 -> Jan 11, 2008 -> Major Update: Added support for Uninstaller
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742567.46/warc/CC-MAIN-20181115054518-20181115080518-00138.warc.gz
CC-MAIN-2018-47
2,038
5
https://docs.genesys.com/Documentation/Options/latest/ES/KM-security
code
Default Value: false Valid Values: true, false Changes Take Effect: At start/restart Enables you to use role based access control feature. The value is automatically set to false, so that RBAC is enabled for your application. If you need to turn it off, set the option to true.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100535.26/warc/CC-MAIN-20231204214708-20231205004708-00497.warc.gz
CC-MAIN-2023-50
277
4
https://www.math.uni-bonn.de/people/lenz/homcor/
code
Selected Topics in Topology (V5D2) Homotopy Coherent Algebraic Structures |Time & place Großer Hörsaal (please note the change of room!) |instead of exercise classes we will have an informal Q&A session after each lecture (in SR 0.011) in which you can ask any question about the material you like course password: Gamma In algebraic topology we are often not really interested whether two maps between a fixed pair of objects are equal, but only whether they are homotopic. However, it was an important observation (and one of the founding moments of modern homotopy theory) that it is many cases not enough for such a homotopy to simply exist, but that one should consider it as an object in itself. This naturally leads one to consider homotopies between homotopies and so on, leading to an infinite hierarchy of ‘compatibility data.’ In this lecture course we want to give an introduction to this family of ideas by studying one classical example of this philosopy in action, namely homotopy theoretic versions of abelian groups. Following the above pattern, it turns out that topological abelian groups are too rigid for many purposes, while the naive notion of abelian groups up to homotopy does not carry enough structure to support an interesting theory. Instead, we will consider homotopy coherent abelian groups in the form of so-called very special Γ-spaces, and in particular see as the main result of the first part of this course how they account for all cohomology theories concentrated in non-negative degrees. Along the way we will learn about several interesting concepts from homotopy theory, and in particular homotopy colimits and homotopy limits. In the second part of the course we will consider some related questions, the exact choice of topics depending on the interests of the participants. Some suggestions: - Segal spaces as a model of ‘categories’ with a composition that is associative and unital only up to coherent homotopies - equivariant versions of homotopy coherent abelian groups - other models of homotopy coherent abelian groups, in particular E∞-algebras and models based on the notion of ultra-commutativity - homotopy coherent versions of commutative rings The contents of last semester's course Algebraic Topology I and the topology lectures before it, in particular: simplicial sets, fibrations and cofibrations, loop spaces, representability of singular cohomology. In addition some familiarity with categories will be assumed (in particular limits, colimits, and adjoint functors). You can find lecture notes for this course on eCampus. They also contain additional references to the original research articles as well as other sources.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816954.20/warc/CC-MAIN-20240415080257-20240415110257-00744.warc.gz
CC-MAIN-2024-18
2,696
15
http://androidmarketapps.org/persistent-notifications-in-android-4-3-problem-or-solution/
code
Android 4.3 is already reaching a Nexus users, and eventually the manufacturers will make use of it for implement it on their devices. Despite being a minor update, system developments less obvious to the end user are many, and we are gradually discovering details on these. Today we talked a little more of the persistent notifications Android 4.3 , explained to background directly by Dianne Hackborn Android team at Google. One concern among the new features of Android 4.3 is the possibility that persistent notifications employ applications , is ie a type of notifications in the bar dedicated to this end that we could not remove, they are there forever. This apparently is a problem that has proved to be the solution to a more complicated.The original problem is the abuse of certain developers using the API Service.startForeground () that allows impossible closing the application by the user . That is, the application is always running, and we can not know. This will create a false notification that the notification manager does not detect and therefore we shown in the bar. Thus the manager sees activity in the application and prevents it from closing, but everything comes from something created intentionally in order to always remain open without the user knowing. In principle Google going to fix this by detecting malicious what applications make use of this API and closing the application in question, but many applications have been detected that are cashing is not a viable solution. So has resorted to persistent notifications , causing the system to display their own notifications when it detects that this happens. Thus now I see the notifications of applications that are taking advantage and abusing this new feature of Android 4.3, and we can not eliminate them. The idea is that by failing to eliminate them, the user will notice that the application is not good and uninstalled . Furthermore, the notification now appear, misses the point for the developer, therefore will be forced to update their app eliminating this feature.It’s funny how what at first had seemed a problem of Android 4.3 has ended up becoming a very interesting solution that hopefully works and Android 4.3 for when a major bulk of users completely gone.
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997857714.64/warc/CC-MAIN-20140722025737-00197-ip-10-33-131-23.ec2.internal.warc.gz
CC-MAIN-2014-23
2,263
4
https://blog.csdn.net/wwq518/article/details/51549409
code
Define a one-to-many dependency between objects so that when one object changes state, all its dependents are notified and updated automatically. Observer pattern is used when there is one-to-many relationship between objects such as if one object is modified, its depenedent objects are to be notified automatically. Observer pattern falls under behavioral pattern category. The observer pattern is a software design pattern in which an object, called the subject, maintains a list of its dependents, called observers, and notifies them automatically of any state changes, usually by calling one of their methods. For more
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676591837.34/warc/CC-MAIN-20180720213434-20180720233434-00383.warc.gz
CC-MAIN-2018-30
623
3