url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://ikisai.wordpress.com/2007/07/02/yet-another-way-to-get-my-data/ | code | Yet another way to get my data
I’ve been playing with the beta of Nokia’s MyMobileSite product and it’s pretty impressive, however I’m not sure I need it yet, however it’s cool so I like it anyway…
The premise is that once you install it a web server is created on your phone, this connects through a website that then allows you to browse the various services it offers, you can find my site here
Running it is simple so I decided to check out a few of the features, first off was the Camera, which should allow you to use the N95 as a remote webcam (but wouldn’t be with me?) although you can request a picture so I assume a visitor to my site could ask for one to see where I was, I had trouble getting it to work til I figured out that I needed to close the camera application but leave the shutter open !
The request works using snapshot but you have to use the camera vertically and not horizontally ( I need to go and check whether the N95 is supported I’m starting to think…)
I can view my Calendar
The layout is nice enough and it works fine, then there is the access to Gallery, you can create albums, share albums and it means that I don’t have to (in theory) bother uploading to Flickr anymore, I can let people peek right inside my gallery on the phone..
You can access your call log too, works pretty much exactly like the phone native version
You get the drift, everything works well and gives access to pretty much everything on the phone, of course the web sever has to be running and connected, over wifi that isn’t a problem but 3G might get slow and expensive.
But for all the cleverness of it I can’t see that I can find a use for it and trust me I would like to, my contacts and calendar are all synced up all over the place, pictures go straight to Flickr if I want to share and are copied over to library at home if I don’t (using another excellent product Nokia Media Transfer)
If i want to share something with another person I guess I could let them take a peek remotely but there just seems many other ways to do this already, perhaps I’m just not getting it though. Or it’s a familiar case of a big corporation having lots of cool projects that work in isolation?
I’m going to think of a useful situation for this though…..
Technorati Tags: Mobile | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123276.44/warc/CC-MAIN-20170423031203-00118-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 2,310 | 13 |
https://www.flowinjection.com/2017-software/fiasoft | code | Do you have needs that are not addressed in FIAsoft? We will happily work with you to create custom software solutions like we have for countless customers now.
Past projects include automatic unit conversions, cross-device communication solutions, and custom report formatting. We can modify data output so that custom data fields are displayed and calculated while complying with data integrity guidelines. Data processing can also be automated by FIAsoft, saving your scientists time.
Custom Graphics User Interfaces (GUIs) can be made for our customers. Set up custom controls for your lab technicians and modify how data is displayed. Our standard interface allows for custom python scripts written by lab technicians to run on our instrument.
Our software can serve as the master control software that coordinates all of your Process Analytical Technology (PAT). Set up OPC communication on your internal network to control instruments from across the room. We are familiar with setting up communications with devices from other distributors like Eppendorf, Flownamics, Nova and more.
Our talented software engineers are ready to build whatever you can imagine. Many software developers and contractors cannot produce quality solutions like we do. We guarantee that our software will be easy to use and will get the job done. | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347401260.16/warc/CC-MAIN-20200529023731-20200529053731-00343.warc.gz | CC-MAIN-2020-24 | 1,331 | 5 |
https://msalzmanart.com/about-2/?share=google-plus-1 | code | My name is Melissa Salzman and I am a Baltimore based printmaker. I graduated from Guilford College, located in Greensboro, NC, in 1999 with a BFA in studio art. Since then I have been living and working in Baltimore City, MD. Almost all of the work on this blog is for sale. If you are interested in purchasing any of my work you can contact me directly at [email protected]. | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526799.4/warc/CC-MAIN-20190720235054-20190721021054-00268.warc.gz | CC-MAIN-2019-30 | 389 | 1 |
https://community.bablosoft.com/topic/24373/bas-finally-working-on-linux | code | BAS finally working on linux!!
donramon last edited by donramon
I have managed to run BAS on linux, it seems that the worker.exe works without problems, although a little slow.
I have only managed to get it to work on Arch Linux based distributions using bottles and Wine-GE-Proton8-4, since in one of the latest versions of wine they have added a function that made it impossible to run BAS on linux until now. I attach the configuration of my bottles below.
There are still some graphical bugs in the script builder, but it seems that scritps can be executed without any problem, although a little slow.
These days I will be trying to run BAS in docker since this would make things much easier for me to manage my servers, if I succeed I will comment here. | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649343.34/warc/CC-MAIN-20230603201228-20230603231228-00744.warc.gz | CC-MAIN-2023-23 | 758 | 6 |
https://scriptinghelpers.org/questions/99315/how-do-i-change-a-players-fov-field-of-view | code | How would i go about changing the character or player's Field Of View with a TextBox?
Thanks for your help
You can modify the
.FieldOfView property of
Camera. To inherit this number from a
TextBox, we can tie a listener to the
FocusLost signal. By using it’s
EnterPressed parameter, we can detect when someone presses return—simultaneously escaping the TextBox—and take the Text.
We have to ensure two things: a). That the Text is purely numerical, and that this number remains within a range of 70-120. This is because these are the maximum & minimum FOV degrees that we can set. To do this, we can use
math.clamp() to pressure the number into being in this range.
local Player = game:GetService("Players").LocalPlayer local Camera = workspace.CurrentCamera local TextBox = script.Parent TextBox.FocusLost:Connect(function(Return) if not (Return) then return end if (TextBox.Text:match("^%d+$")) then local Field = tonumber(TextBox.Text) Camera.FieldOfView = math.clamp(Field, 70, 120) end end)
TextBox.Text:match("^%d+$") confuses you, my apologies. I am simply exercising my string manipulation as I saw this as a good opportunity to do so. For a short explanation, the function is comparing a "pattern" to the string
:match() is being called on.
%d+ or "digits" you could say, is what I look for. By using the two anchor points
$, I say that I want to compare digits from the start to the end of the string.
If that is still difficult, you can simplify the conditional with:
if (tonumber(TextBox.Text)) then --// Code end
This will try to convert the string to a number, if there are any characters beside numerical, this conversion will fail, causing the if-statement to reject it.
If this helps, don’t forget to accept this answer! | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780060803.2/warc/CC-MAIN-20210928122846-20210928152846-00376.warc.gz | CC-MAIN-2021-39 | 1,745 | 19 |
https://www.raspberrypi.org/forums/viewtopic.php?f=66&t=4256&start=25 | code | Hey, if someone wants to help in a big way of getting a port of Debian armhf (hard float) to the RPi, I could use some help tracking down some internal compiler errors. Without fixing the compiler to build Debian packages for ARMv6+VFP in a reliable way we'll never get to automating the process which is an absolute requirement.
I've filed a bug for one problem including a reproducible test case GCC Buzzilla here: http://gcc.gnu.org/bugzilla/sh.....i?id=52855
I'm working on creating a test case against the umodified version of GCC that is standard with Debian wheezy armhf. That probably stands a greater chance of being examined by the gcc TPTB.
Finding someone who knows something about the internals of GCC, the ARM code generation in particular, is probably a very rare thing, but perhaps someone on these forums knows a friend of a friend who could help answer some questions.
I suspect that for some reason, the gcc compiler is producing RTL code (the internal "register transfer language" that gcc uses to represent machine code in a generic manner) that can't be mapped into ARMv6 instructions. But this is just an educated guess on my part. The fix could be simple as a config option for gcc I'm overlooking. | s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107880014.26/warc/CC-MAIN-20201022170349-20201022200349-00312.warc.gz | CC-MAIN-2020-45 | 1,222 | 5 |
http://www.magentocommerce.com/boards/viewthread/50844/ | code | Hello from europe,
i have same problems in the Adminfunction “Place New Order”.
In my frontend I can order Bundle- and GroupedProducts without any problems.
But I can not add a Bundle-Product to the cart in the admin interface.
-There are no bundles/groupedProducts in the product listing.
-There are no bundles/groupesProducts in the customer wishlist on left side.
-There are no bundles/groupesProducts in the customer basket on left side.
Is the bundle/grouped functions not implemented in the BackEnd?
If i add a prodzct with Customer-Options to the chart - i get an empty iFrame.
No pulldowns, radiobuttons...only blank iFrame.
Thanks a lot - for any informations! | s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400380394.54/warc/CC-MAIN-20141119123300-00006-ip-10-235-23-156.ec2.internal.warc.gz | CC-MAIN-2014-49 | 673 | 11 |
https://wiki.teamfortress.com/wiki/Corona_Australis | code | The Corona Australis is a community-created cosmetic item for the Sniper. It is a metal helmet with a big, team-colored eye that glows in the dark. It also gives the Sniper a long brimmed fedora with a team-colored band around it.
The Corona Australis was contributed to the Steam Workshop.
- [Undocumented] The Corona Australis was added to the game.
- Corona Australis is the name of a constellation in the southern celestial hemisphere. It is the counterpart of the Corona Borealis in the northern celestial hemisphere.
- 'Australis' is Latin for 'Southern'. Along with the geography term 'Australasia' compromising of Australia and New Zealand. | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500255.78/warc/CC-MAIN-20230205130241-20230205160241-00459.warc.gz | CC-MAIN-2023-06 | 648 | 5 |
https://pagure.io/SSSD/sssd/c/498dcbdfdfffa1aee65d53e83c7eafd5e3b084a5 | code | This new call is similar to responder_get_domain() but uses the domain
SID as search parameter. Since the length of the stored domain SID is
used in the comparison, SIDs of users and groups and be used directly
without stripping the RID component.
The functionality is not merged into responder_get_domain() to allow to
calculate the timeout correctly and return a specific error code if the
entry is expired. | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571989.67/warc/CC-MAIN-20220813232744-20220814022744-00226.warc.gz | CC-MAIN-2022-33 | 409 | 7 |
https://community.particle.io/t/how-can-i-determine-what-particle-account-a-photon-is-attached-to/34456 | code | I successfully configured a photon using the command line client “particle setup” and the device is now breathing cyan. I take this to mean the photon is connected to the WIFI and is communicating with the cloud.
However, when I access my build.particle.io account, I don’t see the device listed. Similarly when I issue “particle list”, I only see my other photons.
This photon was previously being used by a co-worker and I wonder if it has accessed his account. Unfortunately, he is out of the country for a few weeks.
Is there a way to see what account a photon is using? For example, is there some additional switches to the “particle identify” command to get this information? | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400244231.61/warc/CC-MAIN-20200926134026-20200926164026-00772.warc.gz | CC-MAIN-2020-40 | 695 | 4 |
http://mfz-ra-rules.nanto.fr/en/field-day/combat-phase | code | The combat phase is broken up in tactical
order and combat order. During the
round, you will switch back and forth
between tactical order and combat order.
Keep a running score for each player, as
frames are destroyed and stations seized.
Score = number of assets × ppa
As scores change, so does tactical order.
The round ends when the last frame has
taken its turn. At the end of the round,
pick up all marker dice and count down
While in tactical order, the player with
the highest score goes first.
- Choose one of your frames and take its turn.
- Every frame has one turn per round.
- If you don't want to go, you can pass to the next player.
- If you are the last player, you must take a turn.
If all your mobile frames have already
taken their turns this round, you have to
pass to the next player in tactical order.
When a mobile frame takes its turn, resolve
it. If a frame attacks another frame
that has not taken its turn yet, switch to
Return to tactical order as needed, beginning
again with the player with the
highest score, until all frames have taken
a turn. If you lose all frames, you automatically
pass or end the round. You can
still count down the doomsday clock.
In combat order, the attacking & defending
frames' turns entwine.
- Attacker takes the first part of their turn.
- When Attacker attacks, their turn pauses.
- Target frame becomes active
- Target rolls dicepool and assigns defense value.
- Attacker resolves any hits.
- Target removes any damage taken.
- Attacker finishes turn.
- Target finishes their turn, including movement and own attacks.
- This counts as that frame's turn for this round.
Combat order continues, as defending
frames may attack as part of their turn,
too, until all combat is resolved.
Once all combat is resolved, return to
tactical order to continue the round.
If a target is activated during combat order and destroyed it does not get to move or attack. If it is not destroyed, though, it still gets to use any dice already rolled—regardless of what systems it may have just lost.
At the beginning of a game, all stations
are under control of their owners. Even
without any guards nearby, they remain
under their control, until an opponent’s
frame captures them.
At any time and for any reason, you gain
control of a station when:
- You have a frame within 1 unit of the station and
- No other players have a frame within 1 unit of that station.
You lose control of a station when::
- Any other player has a frame within 1 unit of the station and
- You do not have a frame within 1 unit of the station.
Recalculate scores immediately when a
station is gained or lost.
They can change hands multiple times a round!
In a game with three or more players, it’s
possible to lose a stations without any
opponent capturing it.
All three conditions need to be met:
- One frame within 1 unit of a station you own.
- Two or more hostile frames are also in range.
- Your frame moves away or is destroyed.
When this happens, the hostiles cannot
capture the station, because while they
are in range, the station is contested by
the others. You lose the station, but
neither of them get it until they resolve
their standoff. Recalculate your own
score when you lose the station. The other
players recalculate their score when
the tie is resolved. | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195526489.6/warc/CC-MAIN-20190720070937-20190720092937-00107.warc.gz | CC-MAIN-2019-30 | 3,300 | 77 |
https://mrmichaeltan.notion.site/Understand-your-customers-and-solve-burning-problems-753ca100802a4eb9827146fcb9e17a10 | code | Not enough inbound leads? Campaigns not converting? High churn? The probable root cause is that you haven't convinced your customers that you solve a burning problem that they struggle with personally.
If you can deeply understand your customers and their pain, then you can build and market products that customers will jump through hoops to use.
The only way to do this is to talk to customers. Try setting up a customer advisory board, or schedule regular catch ups - not to sell to customers, but to understand them.
Customers might tell you about two types of pain, Virtue Signalling (or politically correct) pain, and Personal pain.
This is when someone has a pain that sounds plausible for the role they are in. These pains are felt by the abstract business, rather than the individual. For example:
Solving these is of some value. If there was no friction (no cost, no changes required to platforms or processes) then most professionals would do it.
But there is friction. Budgets need to shuffled, approval gained and there is reputational risk when bringing on a new provider. It's too much of a hassle.
For example, saving 10% on an employee's salary doesn't really matter personally to a hiring manager if budget for that headcount has already been signed off. And a learning professional might be stressed about just getting programs delivered.
You'll probably get some sales solving these pains, but you'll also get alot of Fake Yeses. These sound like "Yeah, that sounds great, but we don't have time right now" or "Unfortunately we've already allocated our budget for the next year". It's just easier for them to not rock the boat.
To motivate a customer to take action, you need to solve personal pains. These are pains that are felt by the individual, rather than the business. For example:
Personal pains seem to be fairly universal and include; saving time, looking good and reducing stress. If you can work out what these pains are, then you can work out how to position your product so that customers believe it's worth the hassle and take action.
For example, offering the marketer job security by guaranteeing to meet their quota would be far more motivating than trying to hawk a slightly better analytics package. And promising to take the new manager through a learning experience that will level them up as a leader is more valuable than selling course content.
<aside> 💡 If you can understand and solve a customer's personal pain, they'll suddenly find budget, get approval and take action. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817206.54/warc/CC-MAIN-20240418124808-20240418154808-00218.warc.gz | CC-MAIN-2024-18 | 2,522 | 13 |
https://community.fxhome.com/discussion/45181/how-to-make-composite-shot-of-multiple-sliced-clips | code | How to make composite shot of multiple sliced clips
Using Hitfilm 2017 Express.
I record a guitar based review video e.g. 10mins. My audio is recording to another source (Cubase), my video with recording with GoPro. I import the audio and video in to a new project and carefully sync up the audio/video. Then I slice up the video and audio into many sections deleting all the mistakes. I'm left with lots of small video clips on my timeline and lots of small audio clips. My video was recorded against a green screen so I want to change the background, I also want to overlay it with another video in the top right corner requiring masking etc. Therefore I need to make a composite shot. However, how can I make a composite shot of all my little clips of video and audio in an efficient way without losing all the sync of my careful alignment of video and audio? thx | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141692985.63/warc/CC-MAIN-20201202052413-20201202082413-00171.warc.gz | CC-MAIN-2020-50 | 866 | 3 |
https://www.gamefront.com/forums/the-el-drab-saloon/install-help | code | I downloaded the Single player demo from you guys (and for you flamers who would like to catch me with a techicality, yes, I know that I really downloaded it from FileFront.com) and it does not seem to want to install. I opened the zip on my old Win98 and copied and pasted it to a CD/R so I could move it onto my newer system.
I opened the zip from the CD on my WinXP and extracted the files to a folder in My Documents.
I opened the Setup.exe file, and it loads normally. It asks where I want to install it, blah blah Blah BLah BLAH! After it gets to 82% done, it says, "Cannot find Data3.cab, please insert disk0 or refer to directory where located."
I go back to the zip to see if there's a "data3.cab" file. No file.
All I have is a big pile of useless, steaming CRAP that won't install. If anyone can tell me where the mysterious "data3.cab" file (and I tried copying data1 and renaming it to data3, it just asked me for data4) and any other files that it needs might be?
For any people that might find this useful, a list of all the files that came with the zip: data1.cab, data1.hdr, data2.cab, ikernal.ex_, layout.bin, Setup.bmp, Setup.exe, Setup.ini, Setup.inx.
Now, I'm just a could-be-future-buyer of the game, all I'm trying to do is find out if whether or not I like the game and then possibly buy it. Any help is appreciated.
Until then, hasta la vista. (For those non-Spanish speakers, that means 'until we meet again')
try dloading it again looks like it needs data3.cab or disk0 you probly figured that out though so just go and buy the game cause you will probly like it or try dloading it again.
Hmmm.... there is no data3.cab included. Yup, you may have gotten one of those "Bad" downloadable files. Try getting it from here
....but I have to agree with Happy..... buy it and have phun...
One thing tho, BF1942 is a very "graphically demanding" game and needs a strong computer with fairly up-to-date hardware. Read the requirements carefully.
I also will agree with Happy,It was definately worth the buy. I played UO for 4 yrs. simply because there were no other games out to satify my gamer urge until I got BF1942. And believe me I've played many a game in my day from D&D to games most of you might not have heard of.
Thanks for your help. Although I wouldn't play online since I have one of those 'ancient modems' that go by the name of '56k.'
One of these days I'll get a DSL or Cable modem, and you might see me online on one of the newer internet games.
If you guys have any reccomendations on a DSL or Cable service provider, that would be nice.
Thanks again, all!
I use insightbb.com and I like it alot try them. Also I play battlefield everyday for several hours there is no games like it. Another good game though is Wolfenstein: Return to Castle Wolfenstein. It is about world war 2 also except it is not on a battlefield it is like a 007 but some levels have super natural beings. Very nice game.
I'd like to say thank you, all. I personally thought I was going to be flamed, but you guys are nice, unlike other online communities I had visited. Thanks again. Broadband is a little too steep for me. I'm still living under my parents' roof, so I really can't apply for that kind of thing, not yet anyway. One of these days, I'll have a high speed Internet connection. In about four years, look for me on the latest online game, k? (Insightbb was really good, great price for a cable connection!) :rock:
i have tried every resolution from 640 up to 1600 and i get the same problem for all of them except 800 by 600. i cannot figure out why this happens so i will post it and hope for some help.
the text appears kinda messed up and lopsided on all resolutions except 800 by 600. i dont have any framerate problems, its about 90 constant.
AMD Athlon XP 2100+ 512mb DDR PC2100 ram GeForce3 Ti 200 o/c'ed to 220 core and 500 mem Asus A7N8X Deluxe mobo
I have tried to put on AA and AF and texture sharpening but nothing makes the fonts look better. Any and all help would be much obliged.
Some of the letters look to be mushed together and not properly spaced within each other. Does everyone else's font look like this or am i just crazy and wasting time?
Ahhhh yes..... the old globby-font problem. There are people working on that one fro a fix. So far, the only solution I have heard is to Uninstall the game, delete the left-over folders, clean the Registry, and reinstall it.
I did this several times, the font changing each time. Weird.
A solution is soon to be posted..... I hope.
none of that has helped me since so im gonna wait for ea to fix it, its readable just takes more time to "translate" it thanks for filling me on it that. | s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178360853.31/warc/CC-MAIN-20210228115201-20210228145201-00045.warc.gz | CC-MAIN-2021-10 | 4,673 | 28 |
https://www.102tube.com/video/792uYC4C9uE | code | Shane Dawson Follows My Makeup Routine!
- Published on: 3/15/2019
- Get Honey for FREE and start saving money today ▸ https://joinhoney.com/morgan
Its 10 million members save an average of $28.61 on stores like Amazon, Urban Outfitters, and Sephora.
Thanks Honey for sponsoring today’s video!
FOLLOW EVERYONE IN THIS VIDEO
the hoodie im wearing-https://fanjoy.co/collections/make-su...
the hoodie Shane is wearing- https://teespring.com/jociety#pid=212...
Subscribe to my channel! http://bit.ly/YouTubeMorganAdams
FOLLOW ME OTHER PLACES to see more of my poor life choices:
- Morgan Adams Shane Dawson makeup makeup routine i tried following a learning makeup ryland adams andrew siwicki | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347410352.47/warc/CC-MAIN-20200530200643-20200530230643-00051.warc.gz | CC-MAIN-2020-24 | 691 | 11 |
https://www.batravelcars.com/cookie/policy | code | Cookies are files, often including unique text or numbers, that are generated by web servers to browsers, and which may then be sent back to the server each time the browser requests a page from the server. Cookies can be used by web servers to identity and track users as they navigate different pages on a website, and to identify users returning to a website. Cookies may be either “persistent” cookies or “session” cookies. A persistent cookie consists of a text file sent by a web server to a web browser, which will be stored by the browser and will remain valid until its set expiry date (unless deleted by the user before the expiry date). A session cookie, on the other hand, will expire at the end of the user session, when the web browser is closed. We use Google Analytics to better understand how our customers navigate to and through our websites, how long customers spend visiting our content items and how often they return to visit our websites. Google Analytics also helps us track the effectiveness of the money we spend on our digital marketing campaigns. | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891811795.10/warc/CC-MAIN-20180218081112-20180218101112-00640.warc.gz | CC-MAIN-2018-09 | 1,083 | 1 |
http://news.umt.edu/2016/05/050916astr.php | code | MISSOULA – Six University of Montana computer science seniors have reached for the stars by launching an interactive website to help teach physics and astronomy.
The website allows faculty to load a solar system to the page and have their students adjust the size, density, gravity, etc. of the stars and planets to learn about orbits, habitable zones around stars and more. Site visitors also can zoom in and out and track orbits on the simulation, and anyone who wants to save their own simulations can create an account.
UM students Alexander Dunn, Aaron Cameron, Benjamin Campbell, Dillon Wood, Michael Kinsey and Rebecca Faust worked on the project as part of their Advanced Programming: Theory and Practice II class, taught by computer science Professor Joel Henry. They also collaborated with Diane Friend, a lecturer in the Department of Physics and Astronomy.
Building on a rudimentary software product Cameron and Kinsey previously had developed and asking an astronomy professor about valuable features and requirements, the students divided up the work into three parts: the server, the visual interface and the simulator. Once each part was complete, they brought everything together into a website.
“For the most part, each of us were dealing with at least one framework or web technology that we hadn’t worked with before, so we ran into learning curves along the way,” Cameron said.
Over the course of spring semester, the students logged 478 hours of work planning, designing, developing and deploying the application.
Cameron said he hopes the tool will be used as an improvement to existing applications by STEM educators to teach physics and math concepts in planetary physics.
“It is a tool that is equally fun and educational, which serves as an interesting way to introduce students to planetary physics,” Cameron said.
Unlike many other technological tools, the application also is fairly timeless.
“The tools currently available are developed in technologies that are no longer supported,” Campbell said. “As time progresses these tools will become nonfunctional. Because our application is written with modern technologies it will be widely available for the next generation of students to use.”
To view the project, visit https://demo.orbitable.tech/#/s/random. | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864544.25/warc/CC-MAIN-20180521200606-20180521220606-00000.warc.gz | CC-MAIN-2018-22 | 2,308 | 11 |
http://www.blackberryforums.com/general-9000-series-discussion-bold/205824-how-uninstall-applications-not-dm-appworld-print.html | code | How to uninstall applications not in DM or Appworld
I am trying to uninstall a copy of Tetris that turned out to be a demo. I can't see it in DM as an installed app. And I don't see it as installed in AppWorld either. And it doesn't appear in the list of installed applications when I run a list of apps in Options.
I hooked it up to my PC and browsed through all of the folders on both the BB and the memory card and couldn't find anything that looked like it was this Tetris game. Not sure where to look next. Any ideas?
Then its not the game but a link to the game, by a service book from at&t.
you can delete the service book, but will only show up next time they are pushed to your phone.
you are best off just hiding it.
|All times are GMT -5. The time now is 01:46 AM.|
Powered by vBulletin® Version 3.6.12
Copyright ©2000 - 2019, Jelsoft Enterprises Ltd. | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247489425.55/warc/CC-MAIN-20190219061432-20190219083432-00171.warc.gz | CC-MAIN-2019-09 | 864 | 9 |
http://www.seomoz.org/q/what-is-the-best-your-favorite-management-software | code | Become a Pro Member
- The SEO Process
- Measuring & Testing SEO
- SEO Research & Trends
- Online Marketing
- Business Development
- SEO Community
- SEOmoz Resources
Good Answers: 2
Endorsed Answers: 0
What is the best/your favorite management software?
Currently my company uses basecamp with a splash of google docs a little bit of Paymo, and Raventools for project management. (We use other tools like SEOmoz, but not so much for management as SEO tasks)
The ideal features we are looking for are:
Collaborative document editing and sharing(Google Docs)
Task lists and project organization (basecamphq)
Time Tracking on a per task basis (Paymo)
(SEO tracking software is great too, but it doesn't have to be integrated with the project management directly. Currently using Raventools and SEOMoz along with some smaller tools.)
The project management side can be completely separate from the SEO tool side, but it would be great if there was one simple interface that all of this could be done from.
Any suggestions? Are there features I'm missing in my current software that could bring them up to this level? | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704752145/warc/CC-MAIN-20130516114552-00011-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 1,111 | 19 |
https://plytix.jobs.personio.com/job/1025039?display=en | code | We’re on the search for a motivated and experienced Manual QA Engineer ready to join our QA team in building and supporting our Plytix PIM. Our QA team is based in Malaga, but if you do your best work from the comfort of your own home or even from a different city, no problem—the location doesn’t matter, you do!
What is Plytix?
This is where you’d typically see a long paragraph of boring text that no one reads, peppered with corporate buzzwords that don’t mean anything. But Plytix is no typical company, so we’ll spare you that. Instead, watch this video, and if you like what you see, keep scrolling.
What´s the opportunity?
This is your chance to play a part in building a leading multichannel platform, while working with diverse talent and innovative technology. You’ll have the opportunity to contribute to the growth of an ever-expanding scale-up with your ideas and testing experience.
What will you be doing?
A day in the life of a Plytix Quality Assurance Engineer is an exciting one. You’ll be collaborating on compelling challenges, like taking an active role in Test Case design and execution. Your days will be filled with making sure that the platform is scalable and robust. You’ll need to ensure code is implemented, following the latest design patterns and best practices, to accomplish functional and non-functional benchmarks. You’ll have scrum ceremonies to stay on the same page as your fellow developers and QA, from retrospective meetings to sprint planning. All in all, you’ll be a busy bee. But don’t worry, there’ll always be time to crack open a beer and have fun!
After 1 month:
You’ll have a good understanding of our favorite tools and processes. You’ll be involved in QA activities while learning about the testing process throughout the development life cycle. You’ll begin executing validation and regression tests and will be able to design test cases in a proper format.
After 3 months:
At this point you’re becoming a true Plytix QA, guiding the testing strategy. You're planning the manual testing strategy with your colleagues while also working more independently. You are confident enough to take part in peer reviews together with developers. You still have some supervision, but at this point, you are comfortable with what you are doing. You are participating in sprints and beginning to integrate well into the team workflow.
6 months in:
You’re an important team player. You work as well (and as fast) as any other team member! You’re collaborating with other departments to find the best possible solutions so that our system is the best on the market. You’re designing and prioritizing functional and non-functional tests for their later execution. By now you are confident in your role, reviewing and approving other quality engineers (always following our standards, of course!).
Who will you be working with?
You'll be working closely with our other Quality Engineers to deliver software with high-quality standards. You'll be collaborating with developers, product specialists (they’ll help you define functional and non-functional requirement releases), and the tech team.
If you’re curious about what it's like working at our office, take a peek into what Plytix has to offer (you know you want to ????).
We expect you to:
Understand functional specifications according to customer needs
Have a strong knowledge of test case design and execution
Understand the Software Development Life Cycle process
Be familiarized with any User Stories Management tool (Shortcut is a plus)
Be an expert in handling any Test Case Management tool (TestRail is a plus)
Perform analyses, research, and interpretation of business requirements to document technical requirements and develop technical specifications
Communicate and/or collaborate with the functional/technical team members to coordinate testing efforts in support of one or more applications/systems
Nice to have:
Being familiarized with Agile methodologies
Handling any Functional Test Automation tool (Cypress is a plus)
Being familiarized with Cucumber/Gherkin
REST Assured API experience and Postman tool knowledge
Knowledge about performance and load testing
Why work at Plytix?
Be a part of a welcoming culture with bright, friendly people from around the world
Have a purpose and plenty of opportunities to grow from day one
Work from home or from our offices in the center of Malaga
Earn a competitive full-time salary
Make use of flexible working hours and unlimited remote days
Enjoy catered, free lunches and unlimited ice cream when working from the office
More perks (differs depending on which office you belong to)
About our culture
At Plytix, we don't have boring mission statements and corporate values that no one reads.
We operate from a simple guiding principle that's easy to remember:
"Don't be a jerk, don't hold back, and don't forget to have fun."
At Plytix, we offer equal opportunities and welcome applications from all sectors of society. We do not discriminate on the basis of race, religion or belief, ethnic or national origin, disability, age, citizenship, marital status, sexual orientation or gender identity.
We’re a next-generation SaaS scale-up that builds PIM software for the retail industry. Our name, Plytix, is short for Product Analytics—we started as an ecommerce analytics tool in 2015.
Since then, we’ve grown to be one of the leading Product Information Management (PIM) tools. It’s the only PIM system specially made (and priced!) for small to medium-sized ecommerce. It’s a single source of truth that helps teams manage and syndicate product information at scale, allowing you to get your products to market faster and smarter—regardless of the channel.
As far as the brains behind the software go, we’re a tight-knit team of passionate, data-driven individuals based here, there, and everywhere in the world! We’re also recognized for our outstanding customer care and employee culture, making us a Great Place To Work in 2021 & 2022. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945381.91/warc/CC-MAIN-20230326013652-20230326043652-00162.warc.gz | CC-MAIN-2023-14 | 6,051 | 46 |
https://blender.stackexchange.com/questions/21070/how-to-make-a-popup-menu-in-the-bge | code | I want to make a button that when clicked opens up a popup menu, say like an options menu or something. After the button is clicked to open the popup menu I want to be able to click something in the popup menu.
How can this be done?
Have your first button in the game trigger a new object (lets call it menu2) to be added to the game, or play a animation to move menu2 on screen. Then on menu2 have several other objects parented to the menu, each with logic set up like in this question.
In the blend file you will find the object menu2 has a animation to move it in to view. That animation is triggered by the first button (a cube). The trick to playing the animation is to have the Action Actuator on the menu. The logic bricks look like this.
So every time there is a click on the cube it triggers the animation to play on the menu. You can have logic bricks go between objects, just select both objects and they will show up on the logic brick editor.
BGE menu demo blend file. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476374.40/warc/CC-MAIN-20240303111005-20240303141005-00387.warc.gz | CC-MAIN-2024-10 | 982 | 6 |
http://labitacora.net/software-libre/plugin-for-show-range-posts-previous-in-the-main-page-in-wordpress/index.html | code | We have developed a plugin for WordPress for previous posts on the main page.
1. Download the plugin show-range-post.phps to the /wp-content/plugins/ directory
2. Change the name from show-range-post.phps to show-range-post.php
3. Go into the plugin section on the administration site of wordpress and activate it.
Add in de page index.php in the zone of the menu
<li id=”show_range_post”>20 Previous Posts:
< ?show_range_post(20, 20);?> | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118519.29/warc/CC-MAIN-20170423031158-00115-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 441 | 7 |
https://pawlean.com/2018/04/04/paying-it-forward/ | code | I’ve said this on my blog, on social media and in real life numerous times but I need to say it again: the highlight of my university experience (after 4 long years) is getting involved with Code First: Girls.
Last month marked my final term working with Code First: Girls in Sheffield and leaving my final class had me reflecting on the last 2+ years, feeling entirely grateful for the first time that email from CFG popped into my university inbox. Fast forward to today, so many things in my life has changed and the positive gains I made during that time, especially professionally but also personal development, was because of this community.
Today I wanted to share all these thoughts with you to celebrate the last 2 years, the continuous work CFG do and what we’ve achieved in Sheffield. 🎉
Working with Code First: Girls gave me the opportunity to…
1⃣🤗 Meet like-minded people and create a supportive network
Before joining CFG, the only people I could talk to about my favourite hobby of making websites was my family, closest friends and online friends from the blogosphere. It was a huge secret that I was too scared of ever talking about again, because of bullies in the past who made me feel like what I was doing online was embarrassing, was wrong, was a waste of time.
But since joining CFG, I’ve met so many people like me. People with different journeys into coding, people who want to learn more like I do, people that do things for the greater future and people who don’t judge me when I excitedly tell them about my online work.
— Pauline P. Narvas (@paulienuh) November 18, 2017
I used to code alone in my room, hiding away from everyone else. And when I was in a group, I was in a Computing class dominated by boys.
Since joining CFG, I’m always coding with a group of like-minded people with the majority being women. And let me tell you, I’ve never felt so welcomed and so free to be 100% myself.
I’ve found a supportive network who I know I can turn to whenever I need to. It’s the first time in my life I’ve found such a genuine group of people who share the same vision and interests as I do. 💖
2⃣👩🏻🏫Learn, teach and communicate
I learnt about things I hadn’t come across in my self-taught journey like Bootstrap, using GitHub to collaborate with others, GitHub Pages as a host and using Flask and Python.
— Tejay White (@TejayWhite) October 24, 2017
This “learning-and-teaching” cycle helped me:
- Get my head around technical concepts and language
- Think of better ways to communicate these concepts better to beginners. And if that includes Beyoncé interactive tasks (which it almost always does) then that’s how I will be doing it. 😝
— Katjuša Koler (@katkoler) October 24, 2017
- Apply everything I learnt to my own personal projects and freelance work.
- Become more mindful of the fact that just because one person understands what I’m saying, doesn’t mean that everyone else does. One example of this that sticks out to me was when I was a freelance instructor at CFG x Vodafone earlier this year!
On the way back to Sheffield after an incredible day at @VodafoneUK doing what I love the most — talking about code with @CodeFirstGirls! I have learnt so much from today, thank you for the opportunity CFG community. ❤ @amali_d
The future IS exciting. I AM ready ✨ pic.twitter.com/Ahy6JlddK9
— Pauline P. Narvas (@paulienuh) February 16, 2018
3⃣📱 Experiment with exciting ways to enhance engagement
I initially started at CFG as a Student Ambassador with my main role being to spread the word of CFG and make sure students are engaged in the course. This coincided with my placement year in a Communications Intern role which allowed me to apply everything I learnt from the Marketing/Communications side of my placement to the course – this extended from sending an email to taking over social media every Tuesday and Wednesday evenings.
And alas, the hashtag #shefcodefirst was born. 😆
— Pauline P. Narvas (@paulienuh) October 18, 2017
…which led to:
- giving students the excess GitHub stickers (making them aware of what GitHub is and the wider student tech community!) 🐙😸
- an increase social media engagement 🚀🆙
- Project: Community. 💖
- Creation of the #shefcodefirst alumni Facebook group to get everyone connected and engaged with the CFG community even after the course is over.
- Students attending local events such as hackathons, conferences and networking events, whilst waving the #shefcodefirst flag 🚩 (
dang it, why didn’t I get this made?!)
- Students writing blog posts from technical (because they’re kickass developers now) to reflective posts using #shefcodefirst. 🙌🏼
I learnt ways to pass on my excitement and passion to others so that they can get excited and passionate too and… it has become a cycle of genuine love and pride for the community. And encouraged me to be creative in ways that I promote the course, whether that’s through blogs or campaigns, like the one I created for IWD 2017: Be Bold for Change that showcased amazing women in the CFG community.
This thinking of increasing engagement extended on to class with a post-it note system to help solidify student understanding and after class challenges!
🔗 Also, see:
- Enactus x #shefcodefirst
- A moment on SS 2017 #shefcodefirst
- A moment on AW 2017 #shefcodefirst
- A moment on SS 2018 #shefcodefirst
- HackSheffield 3.0 x #shefcodefirst
- HackMed17 x #shefcodefirst
- HackMed18 x #shefcodefirst
- Local Hack Day x #shefcodefirst
- Empowering Women with Tech x #shefcodefirst
- InspireWIT 2017 x #shefcodefirst
4⃣💫 Learn more about myself
For those who have been reading for a while, you’d know that I am a very reflective person (hence why I’m writing this post!) and always eager to improve. Each week after class, I would write down what I thought I did well and what I could improve for next time. This was self-development-gold. I collected points I could use to help make me a better communicator, a better person to work with, a better leader.
Throughout the 2+ years, I have definitely seen that I have improved in ways I teach, in ways I listen, in ways I lead. This not only is an excellent way for my professional life in a career but also in my personal life and relationships.
5⃣🚀 Boost my confidence in everything
This has to be the most significant thing CFG has helped me with. My confidence. It was so fragile before. I was so doubtful and lacked so much belief in my abilities. I never stepped up to opportunities because I continuously told myself that I was never “good enough”.
— Chris Murray (@chrismurray0) October 9, 2017
Being part of the CFG community taught me to step up, speak up, and believe that I can in anything I set my mind to, no matter my gender, ethnicity or background.
- I can code and can do it well. So, I secured a freelance Web-Development role.
- My voice and my story matters. I now give talks at conferences, meetups and events on building communities, my STEM journey and online presence.
- I can make a positive impact (just like I always wanted to!) So helped teach 100+ female students in Sheffield how to code and now mentor others!
- I can code and can do it well. I developed a sparkly portfolio where I’ve secured some client work!
- I am capable of pursuing a career in STEM – there IS room for me.
TL:DR – CF:G changed my life.
There has never a more exciting time to join the community and get involved – they are truly doing some incredible things, for instance, the recently launched 2020 Campaign that aims to teach 20,000 women how to code by 2020.
They are transforming lives of women across the UK every single day. Including mine (which I hope I illustrated above ✨) – I’m so proud to have been part of the growth of CFG in Sheffield. I’m so excited to see how the courses and community develops over time to not only inspire more women into entrepreneurship and tech but also give women the confidence boost that we all need at times to excel in our professional and personal lives. 💜
Thank you to the CFG family for letting me be a part of something incredible. 🙌🏼 | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510179.22/warc/CC-MAIN-20230926075508-20230926105508-00895.warc.gz | CC-MAIN-2023-40 | 8,225 | 64 |
https://chatterpalreviews.org/personal-assistant-online-courses-chatbot-email.html | code | Okay, so discuss it like they're a five-year-old even if you feel like their incredibly technological or you sell an innovation product. ChatterPal just assists the whole discussion 'cause most consumers will not also tell you that they do not get what you're what you're saying. They'll simply resemble yeah fine got it and afterwards they'll proceed. So ensure that you simplify.
13. Messenger is growing bigger than Snapchat, Instagram, and Twitter combined, every day, so there’s a lot of opportunity for your business. Many businesses are building Facebook Messenger chatbots to generate leads and semi-automated customer support. Messenger is way bigger than Snapchat, Instagram, and Twitter combined. It’s easy to get excited and want to jump in without much planning but don’t. To make sure you start off right – well, give yourself a bird’s eye view first. 9 Part, Step By Step Video Course That Shows You… How to Build a Facebook Messenger Chatbot to Generate Leads… Starting Today. GUIDE TO WEBINARS ($97 VALUE)
Chatter Pals are cute and fun characters that repeat anything you say. Say whatever you want and they will say it back to you. Chatter Pals will chat with you. No one can resist their charm. Chatter Pal will repeat everything you say in a fun, silly voice. Ordinary conversations can turn into funny ones. Children will love talking using their Chatter Pals. They will have lots of good time with it. When they laugh, their Chatter Pals will laugh back. Chatter Pals are also soft and cuddly. They’re so squeezable and children will love to snuggle with them at night. Every child will fall in love with Chatter Pals.
WP Store Press is a WordPress theme that will allow you to easily create your own shopping mall within Facebook. This WordPress theme has been designed to allow e-commerce marketers to have Facebook, mobile, and pc based e-commerce stores up and running in as little as five minutes. This is perfect for anyone who is wanting to tap into the power of Facebook to sell their products.
Online entrepreneur and SaaS app developer Paul Ponna helps businesses and people from all walks of life transform their revenue by strategizing and implementing the latest cutting edge tools and resources. Everyone who uses the internet on their mobile phone or their computer can use the power of the internet to reach new audiences from around the world.
If You're an Offline Consultant ==) Because you get a commercial license, you can offer ChatterPal as a premium service to your business clients for a recurring monthly fee. Set up a powerful custom-branded chat agent on your client’s website, and configure the chatflow per your client’s needs. The entire process should take less than an hour. Then, you simply get paid every month by your client to maintain it - with no additional work.
chatterpal vs conversiobot
What Makes ChatterPal Better Than Other Apps? ChatterPal comes loaded with industry leading features that are not available in any other app. This includes smart chat automation, interactive 3D avatars, award winning text-to-speech, one-click translation, logo mapping and a whole lot more. You get all this for a jaw dropping low one-time price that comes with Commercial License & Unlimited site license.
Furthermore, there is an amazing news is that ChatterPal gives you a special discount time. Thus, you can have the big opportunity to buy it at its lowest price- $47 only. But you need to grab it at the right time- I mean its launch time in order to buy it at that price. So if you consider that this product will help you to gain more benefits, do hesitate to mark your calendar on 2019-Feb-28 in order not to miss its discount time.
ChatterPal is known as a brand new, revolutionary new technology app which allows you to boost sales, leads and money by using builtin industry-leading features and artificial intelligence. With ChatterPal, you will have the chance to experience cutting-edge “Interactive 3D Avatar” technology with AI backed “smart, powerful Chat Automation“. Thus, you will be able to get the results like no other chat app in the market. | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514577363.98/warc/CC-MAIN-20190923150847-20190923172847-00014.warc.gz | CC-MAIN-2019-39 | 4,144 | 10 |
https://fourtheorem.com/events/aws-user-group-dublin-meetup/ | code | AWS User Group Dublin Meetup
Senior Architect, Luciano Mammino, will be at this month’s AWS User Group Dublin Meetup this month, delivering his talk “Everything I know about S3 pre-signed
Senior Architect, Luciano Mammino, will be at this month’s AWS User Group Dublin Meetup this month, delivering his talk “Everything I know about S3 pre-signed URLs”.
If you are running a fully serverless backend using API Gateway and Lambda, you probably know that you are limited in terms of payload size and execution time, so things get even more complicated there. In all these cases you should consider offloading this problem to S3 by using S3 pre-signed URLs. Pre-signed URLs are a fantastic tool to handle file download and upload directly in S3 in a managed and scalable fashion.
But all that glitters is not gold and S3 pre-signed URLs come with quite a few gotchas… So in this talk, Luciano will explore some use cases, see some potential implementations of S3 pre-signed URLs and uncover some of the gotchas he discovered while using them. By the end of this talk, you should know exactly when to use pre-signed URLs and how to avoid most of the common mistakes made with them!
(Thursday) 6:00 pm - 8:00 pm(GMT+00:00)
The Laughter Lounge
The Laughter Lounge, 8 Eden Quay, Dublin 1 | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474360.86/warc/CC-MAIN-20240223021632-20240223051632-00088.warc.gz | CC-MAIN-2024-10 | 1,292 | 8 |
https://www.pluralsight.com/courses/sharepoint-framework-getting-started | code | SharePoint has evolved a lot over the years, which has caused a fair amount of confusion. This course gives you an introduction to SharePoint Framework, the newest iteration of Office 365 and SharePoint developer story.
SharePoint has evolved a lot over the years, which has caused a fair amount of confusion. SharePoint Framework is the latest iteration of the Office developer story that offers modern client side development methodologies (node, typescript, etc.) applied to SharePoint and Office 365 development. In this course, SharePoint Framework - Getting Started, you'll be introduced to SharePoint Framework and learn how to efficiently utilize it in practice. First, you'll explore the underlying technologies and skills you need to work effectivly. Next, you'll learn about some of the core concepts, such as property panes, interacting with SharePoint, deploying, and bundling. Finally, you'll dive into some best practices. By the end of this course, you'll have a good overview of how to develop with SharePoint Framework, and an understanding of its values.
Sahil Malik has been a Microsoft MVP for the past 8 years, author of several books and numerous articles in both the .NET and SharePoint space, consultant and trainer who delivers talks at conferences internationally.
Course Overview Hello. My name is Sahil Malik, and welcome to my course, SharePoint Framework -- Getting Started. The development story for the Office developer has not been a straight line. We have fought the demons of solution packages and the dungeons of Add-Ins and the App Model. We have wielded the power of script injection, while teaching ourselves newer and better technologies in an ever-changing landscape, and constantly provided better solutions to our customers. In the latest iteration of the Office developer story, SharePoint Framework offers modern technologies, Node-based development, TypeScript, etc., applied to SharePoint and Office 365 development. In its V1 release, it targets Web Parts in Office 365 SharePoint sites, both classic and modern. This course gives you a beginner's look at SharePoint Framework, introducing you to the underlying technologies and skills you need, followed by concepts such as property panes, interacting with SharePoint, deploying and bundling, and finally, some best practices. At the end of this course, you'll have a good overview of the value of, and how to develop with SharePoint Framework. Thank you for watching. | s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315544.11/warc/CC-MAIN-20190820133527-20190820155527-00190.warc.gz | CC-MAIN-2019-35 | 2,468 | 4 |
https://www.linuxtoday.com/security/2007081600626oshlnt | code | "This document describes how to integrate DSPAM with embedded
ClamAV into a mail server based on Postfix featuring virtual users
and domains, i.e., users and domains that are in a MySQL database.
It rests upon parts of the howto Virtual Users And Domains With
Postfix, Courier And MySQL (Debian Etch) from Falko Timme.
"The resulting Postfix server is functionally almost identically
with the one from the howto above mentioned, but doesn't need | s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038073437.35/warc/CC-MAIN-20210413152520-20210413182520-00207.warc.gz | CC-MAIN-2021-17 | 445 | 7 |
https://wordpress.org/support/topic/list-pages-based-on-tags | code | I would like to list all pages that contain a certain custom field value. I am no PHP hack but I've come up with the following code snippet:
<?php wp_list_pages('meta_key=tags&meta_value=blue'); ?>
This works fine, it lists all pages that have EXACTLY the value "blue" in the custom field "tags". But how can I modify the snippet to list all pages that CONTAIN the value "blue"? That way I could assign multiple tags (e.g. "blue, big, tasty") to one page.
Or is there any better way to list pages based on tags? | s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443738004493.88/warc/CC-MAIN-20151001222004-00131-ip-10-137-6-227.ec2.internal.warc.gz | CC-MAIN-2015-40 | 511 | 4 |
http://community.norton.com/t5/Norton-Identity-Safe-Public-Beta/Windows-Phone-version/td-p/651321 | code | 02-02-2012 06:31 PM
Thanks for your suggestions & feedback.
For now, we are concentrating on iOS & Android alone as it is only in Beta stage and the first version of identity safe freeware.
You can post your suggestions in our product suggestions area.
If you have any other issues/suggestions with our mobile app which are using currently using please do post it here. We would like to here more from the experience of the users. | s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702718570/warc/CC-MAIN-20130516111158-00003-ip-10-60-113-184.ec2.internal.warc.gz | CC-MAIN-2013-20 | 430 | 5 |
https://gaming.stackexchange.com/questions/225627/what-is-the-best-time-for-ascension | code | (a bit late, but what the heck.)
For your first run, (just to make this a bit more generally useful) you'll probably spend a couple of days before ascending. The suggested target is about 10 Hero Souls, and around level 140. Most of those HS will come from hero levels, unless you get unusually lucky with Primal bosses. Check out an idle or active build guide to see suggestions on what to buy with those HS.
After that, most of the calculators that give a suggested level to ascend seem to recommend ascending when it takes you more than a couple of seconds per kill. This obviously is different for everyone, depending on their upgrades etc, but is a pretty good guideline to follow for "efficient" leveling.
Apply HS to level ancients as recommended by your preferred calculator. Google for "clicker heroes simple idle guide" for a basic rundown on how to get started until you're passing the 500's or so with ease. There's probably a similar document for active builds, too.
Once you've got your basic ancients chosen, it mostly becomes a bit "rinse and repeat". I break the short runs up with occasional deep runs, usually adding +50 or +100 to my highest zone... which so far gives me enough HS to buy a new ancient most of the time, and adds a bunch to the prize from Quick Ascension.
Speaking of QA.. for rubies...
The "double damage forever" buy is guaranteed worth it. 50 rubies isn't that much for a permanent boost (like an ancient, it lasts through your ascensions).
in general, the preferred/recommended buy is the Quick Ascension for 50 rubies.
Gilds are free from progression, and according to someone's math, you have to buy tons of them to make any real difference come late-game.
Gold is a waste since you just earn it all the time, and can't take it with you when you ascend. (it -can- help in early game, to buy your way past a wall, but usually it's better to just ascend.)
You get a random relic with every ascension, if you get high enough (it can spawn by default on any non-boss level over 99, up to 2/3 your highest ever zone). Further, since relics are almost entirely luck based, even spending thousands of rubies on them doesn't really guarantee anything.
Quick Ascension gives you a number of hero souls based on the highest zone you've ever completed. More HS makes you more powerful. This lets you advance to higher levels. This gives you more HS on each Quick Ascension. Essentially it's a profit-engine. | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102697.89/warc/CC-MAIN-20231210221943-20231211011943-00455.warc.gz | CC-MAIN-2023-50 | 2,439 | 12 |
http://tomatousb.org/forum/t-621309/about-shibby-firmware-ftp-function | code | Can add user account "Write Only" Access?
If not, How can I do? Use Custom Configuration ?
Date: 02 Feb 2013 09:06
Number of posts: 6
RSS: New posts
On FTP you can set to every user: ReadOnly / ReadWrite / ViewOnly / Private
Nevermind the (guest) trolls. They're always out to mess with the new users on here for some reason.
Yes, you can set users to read only. In the Tomato GUI go to USB and NAS>FTP Server> and at the bottom of the page, under the heading, "User Accounts" pull down the menu item for "Access" and change it to read only for your users. If you want to give your users a folder that they can upload to, have them log in with a different account and give them a separate upload folder as their Root Directory.
In other words, JamesDown can log in and is put into the folder, "Downloads," that you have specified as his root folder. Since he only has 'read only' access to any files and folders that are in this folder, he can't write (upload) to it or delete anything. JamesDown then logs out and back into his upload account called JamesUp. This account's root folder is, "Uploads." This is a separate folder that has nothing in it that you're worried about losing, which he can read and write to. He will be able to upload to this folder, download from this folder, rename files and folders, delete files and folders, etc. - but only in that Uploads directory. Read/Write access is recursive, however, so you don't want the one folder under the other's directory structure. Keep them separate.
Unfortunately, this is the only way to give the same person read only access to one folder and read/write access to another folder. It's why I stopped using Tomato's FTP server and am currently using something else.
Patrick D. - A.K.A. Lord_Jereth
$DO || ! $DO ; try
try: command not found
OP asked "Can add user account "Write Only" Access?"
Not "Read Only". | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118950.30/warc/CC-MAIN-20170423031158-00221-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 1,873 | 15 |
https://thepetsmagazine.com/web-stories/why-does-my-cat-bite-me/ | code | Why Does My Cat Bite Me? Top 5 Reasons
Cats bite when they are frustrated or dissatisfied.
Cats sometimes bite when they are overstimulated, such as when cuddling with their owners or when they are getting petted a lot.
A Cat may bite when they are feeling scared or threatened by something or someone.
Cats nip or nibble in a gentle manner when they want attention from their owners.
Kittens sometimes bite while playing, especially if they have not yet learned to use their paws gently. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817455.17/warc/CC-MAIN-20240419203449-20240419233449-00083.warc.gz | CC-MAIN-2024-18 | 488 | 6 |
https://forums.malwarebytes.com/profile/250749-enfysnest/ | code | Hi, I'm new to using Malwarebytes. I would like to scan a compromised iMac I have that is running Sierra to see what malware it may have picked up. If I install the free trial version of Malwarebytes, does that file have the most up to date database? If not, how would I go about installing the most recent I do not want to connect the iMac to the internet, so I cannot get any updates that way. I've been looking through the Mac forum, but could not find an answer to my question, so I'm hoping I didn't just overlook it. Thank you for your time. | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590348502204.93/warc/CC-MAIN-20200605174158-20200605204158-00590.warc.gz | CC-MAIN-2020-24 | 547 | 1 |
https://www.xcede.com/job/front-end-developer-6 | code | Do YOU want a new challenge?
Do you want to work with disruptive technologies such as automated vehicles, ride-sharing, load-sharing, and over-the-air software within a greenfield Project?
Do you want a contract with one of the biggest Energy firms on planet Earth?
My client is looking for a Senior Front End Developer, to create HPSE PODs with advanced programmers who carry full-stack skills on technologies like React and Node with ability to build scale product using Cloud-native architecture utilising newer capabilities on AWS.
To qualify for this Contract you MUST have experience with:
- You have 9+ years of experience.
- You have good knowledge in at least one of the SPA frameworks (React.js (must), Angular or Vue.js would be beneficial)
- You have hands-on experience of enabling technologies, principles, and practices of Continuous Integration, Delivery, and Deployment (Jenkins, Bamboo, Circle CI or equivalent)
- You are familiar with the practices of TDD and BDD and write unit, functional, integration and system tests for your code
- Working experience with cloud infrastructure/services (AWS or Azure preferred, also Google Cloud Platform)
- Experience with infrastructure-as-code (eg Ansible, Puppet, Terraform)
- You are experienced working within an Agile environment and with Continuous Delivery practices
- You are good at communicating and have a passion for working hand in hand with designers
- You have an ability to focus on customer needs and behaviors to craft compelling solution
Nice to have's:
- You have knowledge of REST, Swagger, and OpenAPI Specification
- If you have skills in Back End and mid tier technologies, then would be happily accepted. But expectation is to be advanced skilled in Front End related technologies
- You understand any database technologies | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506028.36/warc/CC-MAIN-20230921141907-20230921171907-00583.warc.gz | CC-MAIN-2023-40 | 1,807 | 18 |
https://community.kodular.io/t/billing-in-app-purchases-i-need-help/595?page=2 | code | This post was flagged by the community and is temporarily hidden.
They can use the one from Kodular. No need to add extra extensions to your app that already have the functions of components already in Kodular.
then you should start a new thread and provide a detailled documentation of the properties, methods and events… see an example how to do it here App Inventor Extensions: Billing | Pura Vida Apps
HI, I can provide detailed information but I don’t have knowledge for creating websites
No need for a own website.
Just create at community a new topic about your extension with details and else.
Ok, I found a bug in my extension I will solve it then I will let you know | s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250609478.50/warc/CC-MAIN-20200123071220-20200123100220-00497.warc.gz | CC-MAIN-2020-05 | 680 | 7 |
https://forums.finalgear.com/threads/portuguese-customs.3554705/ | code | Of course they can. Otherwise people could simply mail illicit substances in small batches because no customs agency on the planet would have the manpower to contact each and every recipient and open their mail only while they are present.
Well, sometimes they do plant things in luggage for training purposes. It gets messy when the sniffer dogs can't find it, the agent forgets to put the "This is a plant! Signed, Customs" label on the coke pouch and then fails to locate and remove it. I'd Google it but my VPN isn't working and the CPC is so vewy afwaid of people finding out things.
Like everyone else already said, yes they can open everything entering the country. The only reason you are present at the airport when they open and search your suitcases is because they want to have a look at you while they do it and ask you question (so that you ideally confess to everything etc). It wouldn't be legally nessecary for you to be present. That's just a law enforcement trick to get you sweating and talking (if you'd done something wrong).
My fear is just that they can steal stuff from my package or plant drugs or something and I'd have no way of defending myself.
Concerning the Drugs: You send the packages to yourself? You are recipient and sender at the same time? Only in that case would that be a real risk to you. Having not send the packages, they'd be able to charge you - but would have to prove that you orderd this. Which would be hard - if you really hadn't ordered drugs somewhere.
But yeah, if law-enforcement is crooked and wants to plant something on you - you'll always be in trouble, everywhere. Horror Stories like that are readable everywhere.
Stealing - that's more likley with baggage handlers or postal-service employees than custom agents. But of course possible. And the officers of course risk you filing charges against them if they steal from you ...
Another thing is, Portugal has one of the most liberal Laws towards the posession of illegal drugs in Europe. As long as you're not Walter White, you'll be fine
They confiscated all 40kg of my cocaine I'm pretty sure drugs are still illegal in Portugal, but decriminalized.
Anyways, I did send the package to myself, yes - just stuff for our wedding. Seven packages, to be exact - in the end I was only able to retrieve six of them. Luckily the seventh was the least important. | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583728901.52/warc/CC-MAIN-20190120163942-20190120185942-00015.warc.gz | CC-MAIN-2019-04 | 2,367 | 10 |
https://supportforums.cisco.com/discussion/10700576/what-feature-set-do-i-have | code | I have tried to find out what feature set I have in my 6506-E switch. In the Cisco Software Advisor ("Research Software") I can enter my image name (which is s72033-pk9s-mz.122-18.SXD7a.bin), but the result is just an error message.
Anybody knows how to find out ?
There is a wonderful tool called IOS Feature Navigator you can find at
Here, click on the link "Search by Image" and then enter the full name of your image.
In your case here, your IOS's feature set is
IP W/SSH/3DES LAN ONLY
Give it a try :) | s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719079.39/warc/CC-MAIN-20161020183839-00560-ip-10-171-6-4.ec2.internal.warc.gz | CC-MAIN-2016-44 | 506 | 7 |
https://www.godaddy.com/community/Managing-Email/Email-not-working-with-Thunderbird-IMP-but-works-with-POP/td-p/119103 | code | Is the IMAP server working properly? I've been trying to get email working in Thunderbird using IMAP. It works with POP. I assume that the same credentials are used for both. I've been using the server listed in Workspace Email help (https://www.godaddy.com/help/find-my-server-and-port-settings-6949)
|Incoming (IMAP)||imap.secureserver.net port 993|
|Outgoing||smtpout.secureserver.net port 465|
Hi @OperaNH. Thanks for being part of GoDaddy Community! That would be correct if you have a US Workspace Email email plan. If you have a plan in a different region, you should use one of the following:
Hope that helps. If not, feel free to provide more information. Others in the community may be able to provide you with additional suggestions. | s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153931.11/warc/CC-MAIN-20210730025356-20210730055356-00177.warc.gz | CC-MAIN-2021-31 | 744 | 5 |
https://hp-officejet-6100.printerdoc.net/en/network-setup/set-up-the-printer-for-wireless-communication/change-the-connection-type/to-change-from-a-usb-connection-to-a-wireless-connection/ | code | To change from a USB connection to a wireless connection
Follow the instructions for your operating system.
On the computer desktop, click Start, select Programs or All Programs, click HP, select
your printer name, and then click Printer Setup & Software.
Click Connect a new printer, and then click Convert a USB connected printer to
Follow the display instructions to complete the setup.
Mac OS X
Open HP Utility. For more information, see HP Utility (Mac OS X).
Click the Applications icon on the HP Utility toolbar.
Double-click HP Setup Assistant, and then follow the onscreen instructions. | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572908.71/warc/CC-MAIN-20220817122626-20220817152626-00528.warc.gz | CC-MAIN-2022-33 | 595 | 10 |
https://datascience.stackexchange.com/questions/126794/how-does-a-decision-tree-split-when-two-features-are-tied | code | Decision Trees split based on which feature and which cut-off value creates the largest mean decrease in impurity (assuming hyperparameter split="best", criterion="gini"). Now take for example, you have two identical columns in your dataset. For each split, both these columns will have an equal mean impurity decrease. How does the algorithm choose which feature to use?
I have tested this out with the Titanic dataset, and have found that both features have a non-zero feature importance, so they both have been used in at least one split:
X["Duplicate"] = X["Pclass"]
Inspecting the tree, I cannot find any specific patterns that indicate why one feature is chosen over another. Is it by random choice?
And is there any way to make it so that only one of these duplicate features is used in the algorithm? (without simply removing one of the duplicates)
Note: This question specifically refers to the sklearn implementation of the decision tree algorithm. | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473524.88/warc/CC-MAIN-20240221170215-20240221200215-00234.warc.gz | CC-MAIN-2024-10 | 958 | 6 |
https://github.com/minetest/B3DExport | code | Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.Sign up
B3D model export script for blender
|Failed to load latest commit information.|
B3Dexport.py - a blender 2.7 .b3d export script - for minetest. License: gpl-2.0 This version is maintained for compatibility with the minetest game engine specifically, and is not kept up to date with more recent versions - these are known to break the models' orientation and are thus not usable. | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583513009.81/warc/CC-MAIN-20181020163619-20181020185119-00502.warc.gz | CC-MAIN-2018-43 | 536 | 5 |
http://www.java-mobiles.com/tag/arcade/all/181/date | code | Face the challenge to demonstrate your kissing skills in this marvelously addictive game that will test your tapping skills to the extreme! Kiss all the beauties sitting by the windows as you're falling down from the skyscrapers!
Get ready to fight in extraordinary ocean battles! Win 20+ battles across unique locations and lead your fleet to the victory and domination over the seas! Full free version, no ads, online leaderboards & real prizes to win in various competitions!
This game is copy of Windows Minesweeper game. There is only beginner level.The goal of the game is to open all fields, and avoid hitting a mine. If you click a mine, the game is over. Finish the game as fast as posible to get the highest score
15,14,13... what are you waiting for? Build up showman and catapult....8,7,6 hurry up, you can get at least the barricade.... 2,1,0.. the time's up they are already here... the loosers from neighbourhood came to win the snowfight, | s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171066.47/warc/CC-MAIN-20170219104611-00329-ip-10-171-10-108.ec2.internal.warc.gz | CC-MAIN-2017-09 | 954 | 4 |
http://sap.sys-con.com/node/2523228 | code | |By Business Wire||
|January 23, 2013 10:06 AM EST||
Alpheus Communications, a leading provider of Texas metro-regional fiber and networking solutions, today announced that Berkeley Eye Center has selected and installed Alpheus’ MPLS, Dedicated Internet Access, Ethernet and Fiber Networking solutions to connect more than a dozen facilities throughout southeast Texas with the company’s data center and corporate headquarters.
With 16 clinics located in and around the greater Houston area, Berkeley Eye Center chose Alpheus for its ability to deliver flexible and scalable services in a manner that best serves each location.
“Our offices are spread out, and they each have unique connection challenges, but with its agility and multiple access technologies, Alpheus was able to engineer a flexible network solution for us rather than trying to squeeze us into a one-size-fits-all offering,” said Greg Crider, IT technical director for the Berkeley Eye Center. “Alpheus offered the flexibility, bandwidth and service options, as well as the service quality we need to efficiently connect our offices to better serve our patients. We were looking for a provider that was focused on serving this area, so being based in Texas made Alpheus an even better fit for us.”
Alpheus services enable Berkeley to establish high-speed direct connections between all of its offices and Berkeley’s own data center. Through its wholly owned network, Alpheus provides Berkeley Eye Center a private, secure and reliable pathway to share patient records and access unified billing and scheduling systems. Additionally, Alpheus’ Dedicated Internet Access also offers an extremely reliable, high-speed connection that allows Berkeley Eye Center to avoid unexpected network delays that could disrupt business performance.
Berkeley Eye Center was introduced to Alpheus by consultIP, a Houston-based telecommunications consultant specializing in making vendor-neutral recommendations to enterprises.
“We presented objective information to Berkeley Eye Center, and after reviewing pricing, technology and approach, Alpheus just stood out head and shoulders above the competition,” said Ian Palmer, partner at consultIP. “Alpheus brought in sales, operations and engineering personnel to meet with Berkeley Eye Center, and offered a great solution at a competitive price. In addition, Alpheus is a trusted long-term partner because they always take good care of their customers and pay a lot of attention to details, so I knew they would be a good fit for Berkeley Eye Center.”
Berkeley Eye Center is one of the most established and comprehensive eye-care facilities in Texas, serving patients in the greater Houston area for more than 50 years.
“Our network flexibility allows us to architect a solution to meet the unique needs of our customers,” said Alpheus CEO Scott Widham. “Alpheus is committed to serving our fellow Texas businesses by being agile, responsive and devoted to our customers. We are pleased to provide Berkeley Eye Center with high-quality networking services and better bandwidth that unite Berkeley’s multiple locations.”
Alpheus’ enterprise network services, including Metro Ethernet, MPLS, E-LAN and business-class voice solutions, provide the performance and uptime guarantee required for mission-critical data, voice and video traffic, while also helping customers connect multiple locations with ease.
About Berkeley Eye Center
With a reputation that spans more than 50 years, Berkeley Eye Center is recognized as one of Texas’ most established comprehensive eye care facilities. In addition to our 16 satellite clinics and optical locations located throughout the greater Houston area and Corpus Christi, we also offer patients the added access and convenience of five state-of-the art laser eye centers and the Caplan Surgery Center, a Medicare-licensed ambulatory surgery center for outpatient cataract care. As pioneers in the field of cataract and refractive surgery, our surgeons continue to set the standard in the field of LASIK laser vision correction, cataract removal and implantation and glaucoma management. For more information, visit us at http://www.berkeleyeye.com.
About Alpheus Communications
Alpheus Communications (http://www.alpheus.net) is a leading provider of Texas metro-regional fiber and networking solutions. With owned facilities in Dallas-Fort Worth, Houston, San Antonio, Austin, Corpus Christi and the Rio Grande Valley, Alpheus is flexible, content-neutral and responsive to customer needs when low-latency and uptime are essential. As the preferred fiber backbone for Metro Texas, Alpheus is in a unique position to support mission-critical information technology functions and cloud computing solutions through resilient SSAE 16-compliant data center platforms for colocation and disaster recovery.
“In the past year we've seen a lot of stabilization of WebRTC. You can now use it in production with a far greater degree of certainty. A lot of the real developments in the past year have been in things like the data channel, which will enable a whole new type of application," explained Peter Dunkley, Technical Director at Acision, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Apr. 26, 2015 05:00 PM EDT Reads: 4,492
SYS-CON Media announced today that @WebRTCSummit Blog, the largest WebRTC resource in the world, has been launched. @WebRTCSummit Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @WebRTCSummit Blog can be bookmarked ▸ Here @WebRTCSummit conference site can be bookmarked ▸ Here
Apr. 26, 2015 03:00 PM EDT Reads: 2,515
SYS-CON Events announced today that Ciqada will exhibit at SYS-CON's @ThingsExpo, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Ciqada™ makes it easy to connect your products to the Internet. By integrating key components - hardware, servers, dashboards, and mobile apps - into an easy-to-use, configurable system, your products can quickly and securely join the internet of things. With remote monitoring, control, and alert messaging capability, you will meet your customers' needs of tomorrow - today! Ciqada. Let your products take flight. For more inform...
Apr. 26, 2015 03:00 PM EDT Reads: 1,934
Health care systems across the globe are under enormous strain, as facilities reach capacity and costs continue to rise. M2M and the Internet of Things have the potential to transform the industry through connected health solutions that can make care more efficient while reducing costs. In fact, Vodafone's annual M2M Barometer Report forecasts M2M applications rising to 57 percent in health care and life sciences by 2016. Lively is one of Vodafone's health care partners, whose solutions enable older adults to live independent lives while staying connected to loved ones. M2M will continue to gr...
Apr. 26, 2015 03:00 PM EDT Reads: 1,535
SYS-CON Events announced today that GENBAND, a leading developer of real time communications software solutions, has been named “Silver Sponsor” of SYS-CON's WebRTC Summit, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. The GENBAND team will be on hand to demonstrate their newest product, Kandy. Kandy is a communications Platform-as-a-Service (PaaS) that enables companies to seamlessly integrate more human communications into their Web and mobile applications - creating more engaging experiences for their customers and boosting collaboration and productiv...
Apr. 26, 2015 02:00 PM EDT Reads: 2,752
Dave will share his insights on how Internet of Things for Enterprises are transforming and making more productive and efficient operations and maintenance (O&M) procedures in the cleantech industry and beyond. Speaker Bio: Dave Landa is chief operating officer of Cybozu Corp (kintone US). Based in the San Francisco Bay Area, Dave has been on the forefront of the Cloud revolution driving strategic business development on the executive teams of multiple leading Software as a Services (SaaS) application providers dating back to 2004. Cybozu's kintone.com is a leading global BYOA (Build Your O...
Apr. 26, 2015 02:00 PM EDT Reads: 1,579
The best mobile applications are augmented by dedicated servers, the Internet and Cloud services. Mobile developers should focus on one thing: writing the next socially disruptive viral app. Thanks to the cloud, they can focus on the overall solution, not the underlying plumbing. From iOS to Android and Windows, developers can leverage cloud services to create a common cross-platform backend to persist user settings, app data, broadcast notifications, run jobs, etc. This session provides a high level technical overview of many cloud services available to mobile app developers, includi...
Apr. 26, 2015 02:00 PM EDT Reads: 1,429
SYS-CON Events announced today that BroadSoft, the leading global provider of Unified Communications and Collaboration (UCC) services to operators worldwide, has been named “Gold Sponsor” of SYS-CON's WebRTC Summit, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. BroadSoft is the leading provider of software and services that enable mobile, fixed-line and cable service providers to offer Unified Communications over their Internet Protocol networks. The Company’s core communications platform enables the delivery of a range of enterprise and consumer calling...
Apr. 26, 2015 01:30 PM EDT Reads: 2,562
While not quite mainstream yet, WebRTC is starting to gain ground with Carriers, Enterprises and Independent Software Vendors (ISV’s) alike. WebRTC makes it easy for developers to add audio and video communications into their applications by using Web browsers as their platform. But like any market, every customer engagement has unique requirements, as well as constraints. And of course, one size does not fit all. In her session at WebRTC Summit, Dr. Natasha Tamaskar, Vice President, Head of Cloud and Mobile Strategy at GENBAND, will explore what is needed to take a real time communications ...
Apr. 26, 2015 01:00 PM EDT Reads: 1,801
What exactly is a cognitive application? In her session at 16th Cloud Expo, Ashley Hathaway, Product Manager at IBM Watson, will look at the services being offered by the IBM Watson Developer Cloud and what that means for developers and Big Data. She'll explore how IBM Watson and its partnerships will continue to grow and help define what it means to be a cognitive service, as well as take a look at the offerings on Bluemix. She will also check out how Watson and the Alchemy API team up to offer disruptive APIs to developers.
Apr. 26, 2015 12:00 PM EDT Reads: 1,869
The IoT Bootcamp is coming to Cloud Expo | @ThingsExpo on June 9-10 at the Javits Center in New York. Instructor. Registration is now available at http://iotbootcamp.sys-con.com/ Instructor Janakiram MSV previously taught the famously successful Multi-Cloud Bootcamp at Cloud Expo | @ThingsExpo in November in Santa Clara. Now he is expanding the focus to Janakiram is the founder and CTO of Get Cloud Ready Consulting, a niche Cloud Migration and Cloud Operations firm that recently got acquired by Aditi Technologies. He is a Microsoft Regional Director for Hyderabad, India, and one of the f...
Apr. 26, 2015 12:00 PM EDT Reads: 1,678
The 17th International Cloud Expo has announced that its Call for Papers is open. 17th International Cloud Expo, to be held November 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, brings together Cloud Computing, APM, APIs, Microservices, Security, Big Data, Internet of Things, DevOps and WebRTC to one location. With cloud computing driving a higher percentage of enterprise IT budgets every year, it becomes increasingly important to plant your flag in this fast-expanding business opportunity. Submit your speaking proposal today!
Apr. 26, 2015 12:00 PM EDT Reads: 2,329
WebRTC is an up-and-coming standard that enables real-time voice and video to be directly embedded into browsers making the browser a primary user interface for communications and collaboration. WebRTC runs in a number of browsers today and is currently supported in over a billion installed browsers globally, across a range of platform OS and devices. Today, organizations that choose to deploy WebRTC applications and use a host machine that supports audio through USB or Bluetooth can use Plantronics products to connect and transit or receive the audio associated with the WebRTC session.
Apr. 26, 2015 12:00 PM EDT Reads: 1,913
As enterprises move to all-IP networks and cloud-based applications, communications service providers (CSPs) – facing increased competition from over-the-top providers delivering content via the Internet and independently of CSPs – must be able to offer seamless cloud-based communication and collaboration solutions that can scale for small, midsize, and large enterprises, as well as public sector organizations, in order to keep and grow market share. The latest version of Oracle Communications Unified Communications Suite gives CSPs the capability to do just that. In addition, its integration ...
Apr. 26, 2015 11:30 AM EDT Reads: 4,429
SYS-CON Media announced today that @ThingsExpo Blog launched with 7,788 original stories. @ThingsExpo Blog offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. @ThingsExpo Blog can be bookmarked. The Internet of Things (IoT) is the most profound change in personal and enterprise IT since the creation of the Worldwide Web more than 20 years ago.
Apr. 26, 2015 11:00 AM EDT Reads: 2,573
The world's leading Cloud event, Cloud Expo has launched Microservices Journal on the SYS-CON.com portal, featuring over 19,000 original articles, news stories, features, and blog entries. DevOps Journal is focused on this critical enterprise IT topic in the world of cloud computing. Microservices Journal offers top articles, news stories, and blog posts from the world's well-known experts and guarantees better exposure for its authors than any other publication. Follow new article posts on Twitter at @MicroservicesE
Apr. 26, 2015 11:00 AM EDT Reads: 2,117
SYS-CON Events announced today that robomq.io will exhibit at SYS-CON's @ThingsExpo, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. robomq.io is an interoperable and composable platform that connects any device to any application. It helps systems integrators and the solution providers build new and innovative products and service for industries requiring monitoring or intelligence from devices and sensors.
Apr. 26, 2015 11:00 AM EDT Reads: 2,105
Wearable technology was dominant at this year’s International Consumer Electronics Show (CES) , and MWC was no exception to this trend. New versions of favorites, such as the Samsung Gear (three new products were released: the Gear 2, the Gear 2 Neo and the Gear Fit), shared the limelight with new wearables like Pebble Time Steel (the new premium version of the company’s previously released smartwatch) and the LG Watch Urbane. The most dramatic difference at MWC was an emphasis on presenting wearables as fashion accessories and moving away from the original clunky technology associated with t...
Apr. 26, 2015 11:00 AM EDT Reads: 2,117
SYS-CON Events announced today that Litmus Automation will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY. Litmus Automation’s vision is to provide a solution for companies that are in a rush to embrace the disruptive Internet of Things technology and leverage it for real business challenges. Litmus Automation simplifies the complexity of connected devices applications with Loop, a secure and scalable cloud platform.
Apr. 26, 2015 11:00 AM EDT Reads: 1,758
In 2015, 4.9 billion connected "things" will be in use. By 2020, Gartner forecasts this amount to be 25 billion, a 410 percent increase in just five years. How will businesses handle this rapid growth of data? Hadoop will continue to improve its technology to meet business demands, by enabling businesses to access/analyze data in real time, when and where they need it. Cloudera's Chief Technologist, Eli Collins, will discuss how Big Data is keeping up with today's data demands and how in the future, data and analytics will be pervasive, embedded into every workflow, application and infra...
Apr. 26, 2015 11:00 AM EDT Reads: 1,478 | s3://commoncrawl/crawl-data/CC-MAIN-2015-18/segments/1429246656747.97/warc/CC-MAIN-20150417045736-00071-ip-10-235-10-82.ec2.internal.warc.gz | CC-MAIN-2015-18 | 16,795 | 55 |
https://book.hacktricks.xyz/pentesting-web/reverse-tab-nabbing | code | hrefargument of an
<atag with the attribute
window.opener. If the page doesn't have
target="_blank"it also doesn't have
rel="noopener"it might be also vulnerable.
window.opener.location = https://attacker.com/victim.htmlto a web controlled by the attacker that looks like the original one, so it can imitate the login form of the original website and ask for credentials to the user.
python3 -m http.serverThen, access
http://127.0.0.1:8000/vulnerable.html, click on the link and note how the original website URL changes.
opener.closed: Returns a boolean value indicating whether a window has been closed or not.
opener.frames: Returns all iframe elements in the current window.
opener.length: Returns the number of iframe elements in the current window.
opener.opener: Returns a reference to the window that created the window.
opener.parent: Returns the parent window of the current window.
opener.self: Returns the current window.
opener.top: Returns the topmost browser window. | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104512702.80/warc/CC-MAIN-20220705022909-20220705052909-00425.warc.gz | CC-MAIN-2022-27 | 982 | 15 |
http://www.seobook.com/archives/000078.shtml | code | (GEEK STUFF) One of the largest problems many search engines run into is that after they get to a few hundred million documents their algorithms and hardware hit a wall.
For those companies that can afford the investment to get past this point they still run into the problem that each additional resource makes their job a bit harder.
One of the major ways around this problem is to take advantage of the natural patterns in human language. Using Latent Semantic Indexing allows indexing search results based on the pairing of like words within documents.
Many complex searches may lack exact matches in the results as well. Being able to find near matches will allow search engines to provide more comprehensive results.
Its hard to get computers to understand anything human, but the process of latent semantic indexing delivers conceptual results while being entirely mathematically driven.
There are two main ways to do this, single variable decomposition and multi dimentional scaling.
Some of the steps of the single variable decomposition process are to:
- create a database of all words in relevant documents
- remove common stop words
- remove words appearing in all results
- remove words only appearing in one result
- create a database of relavent keywords
- weight the pages based on the frequency of keyword distribution
- increasing the relevance of terms which appear in a small number of pages (as they are more likely to be on topic than words that appear in most all documents)
- normalize the page to remove the pagelength as a factor
- create relevancy vectors for the keywords
The single variable decomposition process is not scalable enough to work on large scale search engines though as it requires too much processor time. Multi dimentional scaling allows us to take snapshots of the topicology of different documents. "Instead of deriving the best possible projection through matrix decomposition, the MDS algorithm starts with a random arrangement of data, and then incrementally moves it around, calculating a stress function after each perturbation to see if the projection has grown more or less accurate. The algorithm keeps nudging the data points until it can no longer find lower values for the stress function."
This does not provide exact results, but only a rough approximation. When combined with other factors this approximation improves scalability and quality of search.
Good Reading on latent semantic indexing
This technology is so amazing that it may eventually help lead to a cure for cancer. Already the technology is being refined for cognitive improvements and test grading!
New to the site? Join for Free and get over $300 of free SEO software.
Once you set up your free account you can comment on our blog, and you are eligible to receive our search engine success SEO newsletter.
Already have an account? Login to share your opinions.
- Over 100 training modules, covering topics like: keyword research, link building, site architecture, website monetization, pay per click ads, tracking results, and more.
- An exclusive interactive community forum
- Members only videos and tools
- Additional bonuses - like data spreadsheets, and money saving tips | s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398460942.79/warc/CC-MAIN-20151124205420-00201-ip-10-71-132-137.ec2.internal.warc.gz | CC-MAIN-2015-48 | 3,203 | 27 |
https://www.mail-archive.com/[email protected]/msg301443.html | code | On Wed, Jan 4, 2017 at 6:05 AM, Amit Kapila <[email protected]> wrote: > Okay, so this optimization can work only after all the active > transactions operating on a page are finished. If that is true, in > some cases such a design can consume a lot of CPU traversing all the > tuples in a page for un-setting the bit, especially when such tuples > are less.
I suppose. I didn't think that cost was likely to be big enough to worry about, but I might be wrong. The worst case would be when you modify one tuple on a page, let the transaction that did the modification become all-visible, modify one tuple on the page again, etc. and, at the same time, the page is entirely full of tuples. So you keep having to loop over all the bits to clear them (they are all clear except one, but you don't know that) and then re-set just one of them. That's not free, but keep in mind that the existing system would be forced to perform non-HOT updates in that situation, which isn't free either. Also, I'm thinking the bit could be stored in the line pointer rather than the tuple, because with this design we don't need LP_UNUSED/LP_NORMAL/LP_REDIRECT/LP_DEAD any more. We could use one bit to indicate dead or not-dead and the second bit to indicate recently-modified or not-recently-modified. With that approach, clearing the bits only requires iterating over the line pointer array, not the tuples themselves. >> We don't necessarily need UNDO to clean up the indexes, although it >> might be a good idea. It would *work* to just periodically scan the >> index for delete-marked items. For each one, visit the heap and see >> if there's a version of that tuple present in the heap or current UNDO >> that matches the index entry. If not, remove the index entry. > > I think this is somewhat similar to how we clean the index now and > seems to be a workable design. However, don't you think that it will > have somewhat similar characteristics for index-bloat as we have now? Yes, it would have similar characteristics. Thus we might want to do better. > OTOH for heap, it will help us to take away old versions away from the > main heap, but still, we can't get rid of that space or reuse that > space till we can clean corresponding index entries. I don't think that's true. If in-place update is ever allowed in cases where indexed columns have been modified, then the index already has to cope with the possibility that the heap tuple it can see doesn't match the index. And if it can cope with that, then why do we have to remove the index entry before reusing the heap TID? -- Robert Haas EnterpriseDB: http://www.enterprisedb.com The Enterprise PostgreSQL Company -- Sent via pgsql-hackers mailing list ([email protected]) To make changes to your subscription: http://www.postgresql.org/mailpref/pgsql-hackers | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512323.79/warc/CC-MAIN-20181019041222-20181019062722-00228.warc.gz | CC-MAIN-2018-43 | 2,827 | 2 |
http://www.dzone.com/links/how_bonton_online_stores_fixed_a_safari_bug_in_ti.html | code | So now I’ve finished my digital Holga project, one of the things I wanted to do was to get a... more »
The Office Online real-time co-authoring feature makes it easy for you to work together with... more »
Learn exactly what jQuery is and why you've heard so much about it. Explore considerations,... more »
Back in the day, I was reading a book about UNIX® programming and have learned how to... more »
Many big data projects are starting with the installation of Hadoop, this post explain that it... more »
“Data is the new soil. Because for me, it feels like a fertile, creative medium. Over the... more »
Discover best practices and the most useful tools for building the ideal integration architecture. | s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931010402.68/warc/CC-MAIN-20141125155650-00002-ip-10-235-23-156.ec2.internal.warc.gz | CC-MAIN-2014-49 | 718 | 7 |
https://thinklab.com/content/2682435/ai-research | code | Women in ML/DS
board is considering a name change to address complaints about the acronym "NIPS", and also to modernize the name (not everything is"neural"). If you attended the conf in the past, you can suggest new names here:
Name-of-NIPS Action Team just sent a survey to past participants for suggestions on a new name. If you are a past participant, log into your NIPS account and suggest a name until 30 June. We get to vote on the shortlist after that. | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999948.3/warc/CC-MAIN-20190625213113-20190625235113-00018.warc.gz | CC-MAIN-2019-26 | 459 | 3 |
https://lists.debian.org/debian-user/2018/10/msg00194.html | code | Re: Upgrading with a low data cap
Richard Owlett wrote:
> All my machines have use Stretch DVD1 for installation.
> I have a low monthly data cap - currently at my limit.
> One machine has an apt-get update and upgrade with the addition of some
> packages not on DVD1.
> I've not intentionally deleted any cached files.
> Is it possible to use the cached data on another machine?
> What should I be reading?
i keep it simple.
anytime i download a package which ends up in
/var/cache/apt/archives i make a copy of it to
an external device. from then on any time i need
it i can copy it back without having to redownload
i also make sure that my configuration for apt
includes the flag for keeping things and not
getting rid of them unless i explicitly request it.
i set this right after the base system install.
once i have the system installed and any downloaded
packages backed up to the external device then i
manually run the following once in a while (after
copying any new ones to my backup).
# apt-get autoclean
i used to run on dialup and hated how long it took
for some things to download. the package debdelta
did help some at that time, but i have no idea if the
service is even still there let alone functional. | s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540504338.31/warc/CC-MAIN-20191208021121-20191208045121-00001.warc.gz | CC-MAIN-2019-51 | 1,222 | 27 |
https://motionrecruitment.com/tech-jobs/san-francisco/contract/security-engineer-1/561601 | code | Security Engineer 1
San Francisco, California
$50/hr - $55/hr
The Security Engineer will be responsible for reviewing and processing security related requests including Access Management for users, permission management for users and services, network ACL management, and creating resources like S3 buckets and IAM roles. This process is currently highly manual, but the Security Engineer will help automate repetitive tasks. The team’s long term goal is to create self-service infrastructure and will leverage data to improve the service over time.
To be successful in this role, this Security Engineer I candidate needs to be familiar with AWS services EC2, S3, and IAM. This Security Engineer will be supporting 1,000+ engineers that are all employees/colleagues and should take a customer service oriented approach when assisting others within the engineering department.
Contract Duration: 6 – 24 Months Required Skills & Experience
- 1+ years professional scripting or coding experience with Python
- Familiarity with AWS (EC2, S3, IAM)
- Network ACL management
- Passionate about automation!
- Bachelor’s degree in Computer Science, cyber security, or related field.
- 30% Creating resources including IAM roles and S3 buckets.
- 20% Scripting in Python.
- 100% Hands On
- 80% Manual work, shrinking over time.
- 20% Automation, growing over time.
You will receive the following benefits:
- Medical Insurance - Four medical plans to choose from for you and your family
- Dental & Orthodontia Benefits
- Vision Benefits
- Health Savings Account (HSA)
- Health and Dependent Care Flexible Spending Accounts
- Voluntary Life Insurance, Long-Term & Short-Term Disability Insurance
- Hospital Indemnity Insurance
- 401(k) including match with pre and post-tax options
- Paid Sick Time Leave
- Legal and Identity Protection Plans
- Pre-tax Commuter Benefit
- 529 College Saver Plan
Motion Recruitment Partners is an Equal Opportunity Employer, including disability/vets. All applicants must be currently authorized to work on a full-time basis in the country for which they are applying, and no sponsorship is currently available. Employment is subject to the successful completion of a pre-employment screening. Accommodation will be provided in all parts of the hiring process as required under Motion Recruitment Employment Accommodation policy. Applicants need to make their needs known in advance.
Posted by: John O'Dell | s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510259.52/warc/CC-MAIN-20230927035329-20230927065329-00051.warc.gz | CC-MAIN-2023-40 | 2,432 | 31 |
https://ttlc.intuit.com/community/taxes/discussion/i-cannot-update-my-1099-misc-after-info-entered/00/101232 | code | You should use the "Delete a Form" tool to remove the 1099-MISC and then re-enter it correctly in the W-2 interview.
After deleting those forms, log out of the program. When you log back in, you use the Delete a Form tool to see if the 1099-MISC has been removed from the list of forms in your return. If it has, you can then re-enter it in the appropriate Business Income interview.
If the delete and re-enter process does not allow you to correct the problem, you may have to try Using Clear & Start Over in TurboTax Online
Why does this happen? Once you enter (or import or transfer) certain information, the program creates or updates forms and worksheets that use that information. In many cases, you cannot "change" that information in the interview process - in a manner of speaking, it has been "written in ink" on the forms. You have to delete the form and any associated worksheets in order to correct. | s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320306346.64/warc/CC-MAIN-20220128212503-20220129002503-00263.warc.gz | CC-MAIN-2022-05 | 912 | 4 |
https://careers.bontouch.com/jobs/1910595-software-developer | code | We are looking for Software Developers to help us in our continuing mission to deliver world-class mobile apps together with our partner brands. Learn something new! Previous mobile development experience is not required. As part of our onboarding program you will acquire necessary skills to become a proficient native iOS or Android developer and you will learn from many of the most prominent mobile developers in the industry.
What you’ll do
- Work closely with fun, passionate coworkers of different backgrounds to create native mobile apps used by millions of people worldwide.
- Assist project managers and other team members in devising technical solutions to business requirements.
- Deliver high-quality, well-architected code that’s clean and easy to understand and extend.
- Build a great end-user experience in close collaboration with designers, coming up with solutions appropriate to the target platform and making products shine.
Who you are
- You have a computer science background from university or similar knowledge from previous work.
- You have extensive experience with at least one object oriented language such as Java or C#.
- Troubleshooting and solving problems are second nature to you, and you know that finding a good solution often involves exploring all possible pitfalls.
- You are used to the challenges that modern computing platforms bring such as asynchronous programming.
- You combine creativity and forward-thinking with a structured approach and can break down large features into manageable bits and pieces.
- Above all you love programming and you are not afraid to learn new concepts and tools. | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572212.96/warc/CC-MAIN-20220815205848-20220815235848-00651.warc.gz | CC-MAIN-2022-33 | 1,644 | 13 |
https://developer.apple.com/documentation/localauthentication/lacontext/2867583-biometrytype | code | The type of biometric authentication supported by the device.
- iOS 11.0+
- macOS 10.13.2+
- UIKit for Mac 13.0+Beta
Use the value of this property to ensure that any authentication-related user prompts you create match the biometric capabilities of the device. For example, if the value of this property is
LABiometryType.faceID, don’t refer to Touch ID in an authentication prompt.
This property is set only after you call the
canEvaluatePolicy(_:error:) method, and is set no matter what the call returns. The default value is
This documentation contains preliminary information about an API or technology in development. This information is subject to change, and software implemented according to this documentation should be tested with final operating system software.Learn more about using Apple's beta software | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525004.24/warc/CC-MAIN-20190717001433-20190717023433-00309.warc.gz | CC-MAIN-2019-30 | 821 | 9 |
https://kb.paessler.com/en/topic/59455-is-possible-to-make-or-dependencies-for-two-sensors | code | We use a service from an external provider. There are two different server to access the service. The problem is now, only one server is reachble at any time. If one server is down the other is up and running (Both server have a diffrent IP-Address). Ich have a ping sensor for both server. But due the rule that only on server is active, one of the two sensor show me downtime. Is' it possible to make a dependencies for this two sensors, that if one of the server is pingable that the other sensor is paused? I see that I can make a dependencies that if is one sensore is down the other sensor will go to pausedd, but I need is the opposite.
Is possible to make "or" dependencies for two sensors? | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948217723.97/warc/CC-MAIN-20240305024700-20240305054700-00329.warc.gz | CC-MAIN-2024-10 | 698 | 2 |
https://brainwagon.org/2005/11/25/ | code | Earlier in life, I was quite a wargame fan: I had dozens of games by Avalon Hill, and even experimented a bit with miniature wargaming. I still have a few interesting old rulebooks for games, like Fletcher Pratt’s Naval Wargame. I recall reading back then that H.G. Wells had published a set of rules called Little Wars which I just discovered is available via (you guessed it) Project Gutenberg. Neat! | s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891815500.61/warc/CC-MAIN-20180224073111-20180224093111-00134.warc.gz | CC-MAIN-2018-09 | 404 | 1 |
http://www.horseforum.com/english-riding/turning-over-horse-ottb-etc-111630/page3/ | code | As I'm not from Aus, I don't know the layout down there. As I see it, your biggest problem will probably be shifting the perception people have of OTTBs. Alot will avoid them like the plague - as soon as they hear OTTB they run a mile. Not saying all people, but it is quite a common reaction.
As a business venture, I don't know how well it would work. I just can't see making much money when you look at how much you'll have going out in expenses. If you want to make much profit your going to need to compete and show successfully, so that people don't just assume they are an ordinary OTTB.
As an attempt to find the horses new careers and homes, I say go for it.
Whatever you decide, best of luck :)
Stop for a minute, open your mind, learn. You may not agree with what I say, I may not agree with what you say but we will both learn something new. | s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188824.36/warc/CC-MAIN-20170322212948-00004-ip-10-233-31-227.ec2.internal.warc.gz | CC-MAIN-2017-13 | 853 | 5 |
https://forum.dominochinese.com/channels/vocab | code | For any technical issues or feature requests please use the submit feedback form here, rather than posting on the forum, thanks.
We've partnered with the best learning partners to give you the best tools to learn. Please read more about Hack Chin...
大家好, I've noticed that in the first few levels a lot of new vocabulary got added. Could I get a list with all the...
我希望如此 (wǒ xīwàng rúcǐ) - I hope so.
我找到了(wǒ zhǎo dào le) - I found it
我讨厌你!(Wǒ tǎoyàn nǐ!) - I don't like you(or I hate you)
"我习惯了。" (Wǒ xíguàn le) - I’m used to it.
够了(Gòu le) - That’s enough.
他在路上了。(Tā zài lù shàng le。) - He is on his way.
Hello all, I took a long break from Domino after finishing level 1 about a year and a half ago. I've come back and fo...
你做完了吗?(Nǐ zuò wán le ma?) - Have you finished it?
轮到你了(Lún dào nǐ le) - It’s your turn.
帮我一下(Bāng wǒ yíxià) - Give me a hand
那是不可能的(Nà shì bù kěnéng de) - It’s impossible.
不要告诉我(Bú yào gàosù wǒ) - Don’t tell me that. | s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943471.24/warc/CC-MAIN-20230320083513-20230320113513-00192.warc.gz | CC-MAIN-2023-14 | 1,110 | 15 |
https://www.radian.co.uk/category/blog/ | code | Why we should be more commercial in our marketing approach
Achieving G1/V1 is a badge of honour
Focus on delivering new homes
How can housing providers help #BeatAirPollution?
“A great place to live…if you can afford it” – the problem of high cost housing
Social prescribing: a route to wellbeing
Why community investment is as important as the homes we build
Where did all the builders go?
Embracing the future
The next generation deserves better | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999263.6/warc/CC-MAIN-20190620165805-20190620191805-00265.warc.gz | CC-MAIN-2019-26 | 455 | 10 |
https://web.liferay.com/community/wiki/-/wiki/Main/FrontPage | code | Welcome to the Liferay Wiki Guide, an online collection of Liferay knowledge and know-how compiled by both our own staff and those in our community. The 900+ articles that currently reside in this wiki are the result of an organic free volunteer effort and we invite you to participate as well. Improve existing articles or create new ones or just browse the information to help you along with your Liferay project. Read the Wiki Guidelines for some hints about how to create useful pages.
Introductory articles for newcomers to the Liferay world.
Articles about how to install Liferay Portal, how to set it up to work with different application servers and databases and how to achieve a specific configuration.
Articles about how to develop new portlets, extend Liferay's portlets and use the extension environment.
Articles about how to use Liferay Portal through the web UI. This includes portal administration as well as using any of the included out of the box portlets.
Articles about how to extend Liferay through configuration and customization. Also includes articles about how to create themes, how to integrate third party applications, etc.
Articles about Liferay's community, documentation, and more.
- Adding Auditing Functionality to Portlets
- Adding Piwik Web Analytics to Liferay
- Adding Spring Capabilitites to Hook
- CAS Authentication using multiple Ldap Servers
- CAS Authentication with Liferay(Liferay6.1-GA2) database using Mysql (without ldap).
- Changing context path of portal
- Changing the metadata (like createDate) fields on Asset Publisher Web Content
- Client-side Inter-Portlet-Communication (IPC) using Java Script
- Display Theme's Images in Portlets
- How to create a dynamic jQuery dialog containing input fields
- How to use JUnit to test service in portlets
- JRebel Liferay plugin - Release Notes
- Liferay Contributor Development Environment Setup
- Liferay Faces
- Liferay – Advanced Hook Customization
- Project Learn Issues
- Speed up development via velocity (Web content Structure + Templates)
- Upgrading Vaadin in Liferay...
- Working with Database Views in Liferay | s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376825112.63/warc/CC-MAIN-20181213215347-20181214000847-00606.warc.gz | CC-MAIN-2018-51 | 2,119 | 26 |
http://www.comfsm.fm/~dleeling/statistics/q03_2000.html | code | Quickie Quiz 3
The data and graph is of a runner running from the College campus up to Bailey Olter
High School via the back road past the powerplant in Nahnpohnmal. The x data is the
time in minutes, the y data is the distance in kilometers. Use either your
calculator or Excel to perform the calculations.
|Time x (minutes)
||Distance y (km)
- Find the sample standard deviation for the time data.
- What is the correlation for the data?
- perfect negative correlation
- highly negative correlation
- moderately negative correlation
- no correlation
- moderately positive correlation
- highly positive correlation
- perfect positive correlation
- The slope of the least squares regression line is the average pace of the runner.
Determine and write down the slope of the least squares regression line.
- The Pearson product-moment correlation coefficient represents how well the runner held a
fairly constant pace during the run. A perfect correlation would be constant pace, a
high correlation would represent a fairly constant pace. Calculate the Pearson
product-moment correlation coefficient r.
- Determine the coefficient of determination.
Lee Ling home
COM-FSM home page | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823462.26/warc/CC-MAIN-20171019194011-20171019214011-00892.warc.gz | CC-MAIN-2017-43 | 1,178 | 25 |
http://ohool.com/unlock-the-power-of-5-million-ai-for-free-with-bloom-model/ | code | Free $5 Million AI
Imagine an AI that could translate languages, write code, solve crosswords, be a chatbot, and do many other things.
This video shows you the BLOOM Large Language Model. This is a free and open-source 176B parameter LLM.
BLOOM model: https://huggingface.co/bigscience/bloom.
Quick examples of running BLOOM locally and/or via API: https://github.com/Sentdex/BLOOM_Examples.
Neural Networks from Scratch Book: https://nnfs.io
Channel membership: https://www.youtube.com/channel/UCfzlCWGWYyIQ0aLC5w48gBQ/join.
Support the content: https://pythonprogramming.net/support-donate/ | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100452.79/warc/CC-MAIN-20231202203800-20231202233800-00855.warc.gz | CC-MAIN-2023-50 | 592 | 8 |
https://forum.uipath.com/t/checking-out-non-xaml-files-in-a-process-for-projects-controlled-with-tfs/81936 | code | We are using TFS for version control of our processes as it is integrated with UiPath.
As part of some processes we have some files we produce (exception reports, status reports etc) and store within a ‘Output’ folder within the project folder.
We are happy with the way in which you check out xaml’s and other file types from Studio so you can edit them.
The problem i have is when a process is running and it creates a status report in the output folder, i am not then able to amend it as part of the process as the file is read only. Is there an activity or something similar i can use to check out a file as part of the process so that it can be edited? | s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571232.43/warc/CC-MAIN-20220811012302-20220811042302-00710.warc.gz | CC-MAIN-2022-33 | 663 | 4 |
https://community.nanog.org/t/policy-statement-on-address-space-allocations/2734 | code | We have no lack of address space in the 32 bit IPv4 world. Half of the old A
space is reserved and so is most of the old C space and above. We exhausted
the old B space and created a limited address space crisis, but CIDR solved
What we are constrained on is routing table space.
So it's not whether IANA gets the addresses back, it's whether ISPs have to
carry all the routes for all the cruft and leftovers or whether they can
safely delist abandoned address blocks. Should be straightforward to do that
based on traffic measurements.
But don't assume that just because routes don't appear to have traffic that
the address blocks aren't being used. They may have disappeared behind a
firewall, where they are still being used. In which case they could safely
be delisted from the routing table or safely aggregated. | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816045.47/warc/CC-MAIN-20240412163227-20240412193227-00065.warc.gz | CC-MAIN-2024-18 | 817 | 12 |
http://press.wonderbellygames.com/ | code | Based in Seattle, WA
February 12, 2017
Press / Business Contact:
Wonderbelly Games is a Seattle-based independent game studio made up of Andrea Roberts, Bob Roberts, and Kurt Loidl. They’re a tiny team of close friends who used to work on big AAA games: Bob led the design team on Shadow of Mordor and Shadow of War, while Kurt and Andrea worked on the Fable series and more at Microsoft. Now they follow their hearts and their bellies to make games for you to gorge on or savor one bite at a time.
Kurt, Andrea, and Bob have each worked for more than a decade in the videogame industry. Bob and Andrea got into games shortly after getting married, and then they met Kurt met while working together at Xbox way back in 2008. After their day jobs, they’d all get together to make more games with XNA. They released three Xbox Indie games under the studio name Kindling Games.
Bob worked for 13 years at Monolith Production, rising up from entry level testing to eventually lead the design team for Shadow of Mordor and Shadow of War.
At Xbox, Kurt worked as a cross between a programming SWAT team member and Winston Wolfe from Pulp Fiction. When a game project got derailed, he was the cavalry sent in to fix it. He later decided he’d rather work on a smaller team, and became gameplay lead for the iPad MOBA game, Solstice Arena. When that shipped, he got to work on his indie PC strategy game, Hellenica.
With a background in narrative, UX, and game design, Andrea worked at Xbox on everything from epic AAA games like Fable III and Ninja Gaiden II to the design of experimental prototypes for multi-screen experiences and interactive TV shows.
In 2016, Bob and Andrea had a daughter and Andrea decided to take a break to hang out with her baby and work on indie projects. They helped Kurt finish up Hellenica, and when that shipped, they were ready to start fresh on their next collaboration: Roundguard.
Team & Repeating Collaborators
Game Designer / Artist
Design / Audio / Code | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499871.68/warc/CC-MAIN-20230131122916-20230131152916-00234.warc.gz | CC-MAIN-2023-06 | 1,989 | 12 |
http://forums.androidcentral.com/htc-evo-4g/32978-google-voice-question.html | code | OK i have a google voice number... i plan on using it as my home number. i have the calls being forwarded to both my cell and my wifes. i guess my question is, if i make calls with the google # what does it cost? I am just confused as to how the whole google voice thing works. i was going to use it just to recieve calls and so that i dont have to give out my personal cell number for everything.
will cost you nothing, although when making calls to other cell phone#'s mobile to mobile does not apply. your minutes will be used just as if you were calling a landline. It's because it first gets routed through Google's servers then to the mobile # you dialed. THe only downside in my opinion to using Google Voice exclusively to dial out. You can set it up to prompt you to choose Google or Sprint to dial out but for me it was annoying. i go Google Voice only.
I personally have the family share plan and we've never used more than 1/2 of our 1500 minutes. But something to consider. | s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121165.73/warc/CC-MAIN-20170423031201-00371-ip-10-145-167-34.ec2.internal.warc.gz | CC-MAIN-2017-17 | 986 | 3 |
https://guibundehes.web.app/265.html | code | In this quick and simple tutorial i will guide you through the installation and configuration of vmware esxi 5. If you added physical disks, you can include all disks into a single raid, or create a separate raid using only the. In order to monitor the underlying raid controller on your. Select the host, click the configuration tab, and click security profile in the software panel. For example, you can change raid 10 to raid 5 to increase space efficiency.
I am now trying to add a datastore to the 2nd raid disk but it will not show in vmware at all. Now that we have the perccli utility installed on our vmware esxi host, lets take a look at the available commands and how we can manage dell raid in vmware esxi 6. Contains vib packages, bulletins, and image profiles for esxi, including vmware tools. Since areca supplies vmware drivers on their site, and this is a wellestablished namebrand controller, you may expect it to be easy to get it working. If you will be running esxi from a physical server you will want to use the esxi image provider by the hardware manufacture such as dell, hp, cisco. Additionally, vmware esx is tested for compatibility with currently shipping platforms from the major server manufacturers in prerelease testing. In case you dont know, scp is a way to transfer files over ssh. In a hardware raid setup, the drives connect to a special raid controller inserted in a fast pciexpress pcie slot in a motherboard. With this approach, you do not need to replace the cluster member. Solved configuring raid 5 and esxi 5 doesnt support it. I want to create a raid 1 with the 2 ssd to host the vmware installation, but since. For more details of installing smis, refer to the vmware esxi 5. How to install 3rd party raid controller drivers in vmware.
Go ahead and fire up putty, or open terminal and ssh into your esxi host. You can then expand the vsa cluster after it detects additional storage capacity. With uefi you can boot systems from hard drives, cdrom drives, or usb media. I also installed the utilities to manage the several hp components, since the first one was only the driver.
Vmware vsphere 6 on dell emc poweredge servers release notes. Onboard sata controller for dell emc poweredge servers provides an option to create raid. Starwind vsan for vsphere raid configuration starwind blog. The scenario here is to add three new hard drives to the existing raid 5 array on an esxi 5. Vmware esx is tested for compatibility with a variety of major guest operating systems running in virtual machines. To see all the commands and parameters available, we can simply run the. Adaptec series 7 raid controllers and vmware esxi 5. Its pure softrware raid meaning that it exists above the operating system. Our goal is to support a variety of storage and network adapters used as standard. Starwind virtual san for vsphere linux software raid configuration. When you install additional physical disks on esxi hosts, you can create an. If you use the ontap select vnas solution to access external storage, a local raid controller and software raid capability are not used. Open up winscp or cyberduck or other program of choice and connect to the esxi host.
If you will be running esxi in a nested environment, then the esxi image from vmware is what you want. The document telling me sclass only support windows 2012 2016. Hello, i post here because i search many hours for a stupid problem. Since esxi wont recognize the array as anything other than dedicated disks i tried some inventive work arounds by switching to achi mode on bios and installing esxi 5. What you have is called fakeraid and it is actually the worst possible form of software raid software that is a scam pretending to be hardware. An esxi host where ontap select runs requires local physical drives when using a hardware raid controller or the software raid capability provided with ontap select. Im considering looking for a good inexpensive hardware raid option for his esxi server. Navigate to the tmp folder on the host and upload the file called vmwareesxproviderlsiprovider. If you have a small setup, mdadm will probably use only 525 % of single cpu core. Raid cmdtool2 for dos, freebsd, linux, solaris, and windows this utility is a command line utility version 8.
You cant get the hba to see you existing data since the ondisk format is different, and even if you could magically do that, then youd be presenting a file system that esxi doesnt support. Esxi itself doesnt support any software raid implementation in any way, shape or form. I then built mdadm raid 5 for a total of about 14tb and exported that over. See installing and booting esxi with software fcoe. The issue im having is after creating the raid1 configuration using the built in raid utility, i start the vmware esxi 5. If your hardware supports it and you passthrough the disk controller to the vm, then the vm will see the controller and could do its own raid. Thats because there is no software raid controller there is no such thing. Software raid support exists in esxi for the hpe dynamic smart array controller. Greg andrzejewski, our director of research and development, handled both the task of reconstructing the raid5 array as well as the vmware esxi data recovery process. He has an i3 that doesnt support vtd, so that rules out software raid or zfs. The company supplying the software raid controller and the dedicated controller were the same adaptec.
The software raid luns are not supported because vmware esxi does not carry supported drivers. Again though, esx will not be handling the disks in any kind of raid capacity essentially just forwarding the controller to the vm. I downloaded it and installed in the usual way on my esxi 5. Select ahci or ata mode for sata controller on the bios. Use the hardware raid utility to change the raid configuration. Updating lsi megaraid firmware in vmware esxi 5 kirk. Only thing i had to do with the ssd is tell the host to id the raid 0 drive for the ssd which is a simple thing to do in an esxi host and reboot after that i installed the lsi providers vib so i can remote into the hosts and control the raid without rebooting the host all the time. Storage and raid considerations netapp documentation. How to install lsi megaraid storage manager msm on. How to enable raid monitoring and configuration under esxi 5.
Anybody succesfully installed esxi os on the raid 1 built with s100i gen 10 software raid. Discover a robust, baremetal hypervisor that installs directly onto your physical server. Manage an hp smart array directly from vmware esxi. I know that esxi doesnt support software raids but can anybody think of some alternatives. If you want to install only the raid utility, look for the hpacucli vib file. From my own experience, i had a very low cpu usage by mdadm on centos server with raid 5, which was connected to esxi as nfs share over 1 gbit network. The only way you can use onboard sata ports is in nonraid mode. I have a slax install on a usb flash drive to do this kind of thing, but i couldnt find it.
With direct access to and control of underlying resources, vmware esxi effectively partitions hardware to consolidate applications and cut costs. Esxi is enterprise virtualization and only supports limited, enterprise class, hardware raid options. This is whats known as software raid because of the reliance on a software component. Their esxi image has the drivers and software specific for the hardware. Using starwind vsan, the process of deploying vms, providing faulttolerant storage, connecting it to hypervisor, and creating highly available vms becomes a piece o cake.
When storage drives are connected directly to the motherboard without a raid controller, raid configuration is managed by utility software in the operating system, and thus referred to as a software raid setup. He has a supermicro board, but it only has intels matrix raid. If you have a small setup, mdadm will probably use only 525% of single cpu core. How to retrieve the serial number of a storage drive articles.
You could also decide that using rwc 2 lsi msm is not required but instead configure vcenter alerts based on the additional sensors that will now appear. Can you software raid storage presented to the hypervisor. Change the esxi shell options startstart and stop with host. When you install additional physical disks on esxi hosts, you can create an independent raid set with these disks. However, we had a problem with vms that used disks heavy mainly not because of software raid, but because of nfs. Instead, you add the new raid as an extent to your hosts local vmfs datastore. You should have starwind vsan for vsphere on each esxi host you are planning to use. I have a cisco ucs c22 m3 with soft raid lsi magicraid. This video show you about how to create raid 5 on wmware workstation with window server 2003. Esxi supports different classes of adapters, including scsi, iscsi, raid, fibre channel, fibre channel over ethernet fcoe, and ethernet. Includes esxi500201109001 content and software iscsi fix. That is why im now using 2x perc sas 6ir in it mode as plain hbas.
Then i switched back to raid and used the rapid intel storage management utility to configure a raid5 from the three remaining disks. Hi, i have just installed a new dell poweredge r640 with vmware esxi 6. I was forced to create a software raid set on my windows server and the performance is no where near as good and i lack any kind of. Depending on whether you are using all of the physical disks in a. Other than that, no, its not possible to do what you want. Figuring out the raid arrays particular geometry is quite a puzzle. Perform a backup of the data store vms to a local storage using veem or any other backup tool. Guest os will have redundancy in this case, but not for esxi hypervisor. You create the raid array on the hardware not in esxi and then use the raid as your. Here is the step by step instructions to expand hp esxi host raid 5 array. Storage adapters provide connectivity for your esxi host to a specific storage unit or network. Server 2016 storage spaces vs raid 5 software raid on. Software raid underneath esxi datastore server fault.29 274 1186 461 185 907 1306 965 1526 294 865 1196 806 273 514 408 1172 1157 685 594 1188 1155 739 1496 736 876 478 1092 968 626 173 14 744 531 1148 290 380 113 1456 1342 | s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474775.80/warc/CC-MAIN-20240229003536-20240229033536-00649.warc.gz | CC-MAIN-2024-10 | 10,393 | 12 |
http://www.electronics-lab.com/attiny-breadboard-headers/ | code | These tiny controller boards are build to provide a quick start for projects with 8 and 20 pin AVR microcontrollers, e.g. ATtiny13, ATtiny45, ATtiny85 and ATtiny2313. They don’t include any fancy stuff, they are just as simple as possible. Eagle schematics are included.
ATtiny breadboard headers – [Link] | s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738660931.25/warc/CC-MAIN-20160924173740-00226-ip-10-143-35-109.ec2.internal.warc.gz | CC-MAIN-2016-40 | 309 | 2 |
https://supportforums.cisco.com/discussion/10651356/mfc-mysqlexceptionsoperationalerror | code | I have problems running a scheduled report in MFC 1.4.0
An error has occured:
The following report(s) failed during their scheduled run time:
'Volume Report by Domain' - Due to error: _mysql_exceptions.OperationalError - (1213, 'Deadlock found when trying to get lock; try restarting transaction')
Version : Version 1.4.0 (107)
What means the "deadlock"-error ?
I already changed the running times of all reports - only one report runs at the same time.
There is more than enough space on all harddrives and I have 8 GB RAM.
Thanks for help.
I have this problem too. | s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423681.33/warc/CC-MAIN-20170721022216-20170721042216-00402.warc.gz | CC-MAIN-2017-30 | 566 | 10 |
https://amplify.nabshow.com/company/depthen/ | code | Integrate AI in management and post-production workflows. Increase the value of your assets, and dramatically reduce the cost of production, using computer vision and natural language processing. Obtain comprehensive description and detection of people, demographics, emotions, actions, news topics, etc. Drive broadcast systems with AI automation. AI expert services.
NAB 2021 – Central Hall — C7527 — Belgium Pavilion | s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100603.33/warc/CC-MAIN-20231206194439-20231206224439-00199.warc.gz | CC-MAIN-2023-50 | 425 | 2 |
http://www.garethjones.org/published_articles/urbana_web_files/slide0092.htm | code | soldiers came and they asked heaps of questions. “The
bourgeoisie were crushing the working class in England. They shot down demonstrators. Communists sat
in prison & England was going to declare war on Russia.” They had come
to arrest a peasant thief who had killed another.
The thief had gone to steal potatoes from the hut of another. The owner of the hut had come out & the peasant had
stabbed him with a knife. There were many cases of that happening. The Red Army
soldier who came the next morning also said, “Don’t
travel by night. There are too many wild… | s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187823114.39/warc/CC-MAIN-20171018195607-20171018215607-00432.warc.gz | CC-MAIN-2017-43 | 573 | 8 |
http://lists.debian.org/debian-arm/2004/11/msg00008.html | code | Re: Netwinder install - which method
Am Mittwoch, 3. November 2004 00:52 schrieb Queisser, Andrew (Beavers Rosebowl
> I read through the installation manual and searched the newsgroups.
> It appears that to install Debian on a Netwinder I've got three choices:
> 1) Log in to the existing RedHat and run debootstrap, then update the
> 2) Boot the installer over TFTP
> 3) Boot from CD (is this even possible on a Netwinder?)
> Which is the best method these days? I've got the desktop Netwinder and
> it's working with the current Redhat installation.
Well, I did the following (without reading any manual):
* go to http://www.de.debian.org/devel/debian-installer/ports-status
* click at netwinder - netboot - daily build
* downloaded boot.img onto a partition of the harddisk using the rescue system
and then rebootet the netwinder using boot.img as kernel with argument
"root=/dev/ram". You can probably also use tftp.
* and then I followed the installation process
* the only minor problem was that after reboot I could not see any characters
on the console. Logging in blind works however, and after starting/exiting vi
the characters are there again. I did not find out yet what the problem is.
Maybe this can help you. | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164038376/warc/CC-MAIN-20131204133358-00043-ip-10-33-133-15.ec2.internal.warc.gz | CC-MAIN-2013-48 | 1,224 | 20 |
https://phabricator.wikimedia.org/T158174 | code | (Observed in usability testing)
Users are not aware of the important rule to not capitalize title descriptions unless they start with a proper noun unless they read the help screen, which has not shown to be commonly practiced by users.
Add a note about the capitalization rule (for relevant languages) as part of the onboarding screen.
- Add a note and arrow pointing to the description on the Mona Lisa example
- Swap the order of the two example graphics so that the Mona Lisa example with this additional text is over the second screen (which has less text)
- the arrow and the note "not capitalized unless the first word is a proper noun" is only displayed on onboarding screens for languages that have the concept of uppercase/lowercase lettering. | s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221213405.46/warc/CC-MAIN-20180818060150-20180818080150-00356.warc.gz | CC-MAIN-2018-34 | 753 | 6 |
https://lists.debian.org/debian-devel/1998/03/msg01614.html | code | Re: Are we in this for ourselves?
> It's for this reason that I've just resigned as president of SPI. I want
> no part of this rat pack any longer. I'm going to become a Red Hat user.
Bruce, I seriously hope you shall reconsider. You mention that RedHat
has 100 times more users (which I think is probably just a random
guess). That may well be true -- RedHat caters to new users and
people moving over from Windows, which are probably more numerous that
people familiar with Unix (who would be at home with Debian more than
RedHat). RedHat's things like the Configurators cause me to
reccommend it over Debian for new/"clueless" people. However, I do
still believe that Debian is far superior in almost every way (except
installation and initial configuration) to RedHat.
I remember when the Official 1.3.1 CD came out, how many sales there
were of that and how excited you (and the rest of us) were about
that. Debian is an excellent platform for servers and heavy computing
-- it is more secure and less buggy than RedHat despite having between
3 and 4 times the number of packages that RedHat does. I haven't had
to download any packages from sunsite since 1997 (except the ones I
maintain myself) -- hamm has so much software, it is a Linux archive
in itself -- and it is all tightly integrated into the system. From
what I hear of deity, it souhds great. I am enthusiastic about it,
and my boss is even more excited. Where I work, at the CS department
in Wichita State University, I started working there a little over a
year ago. At that time, most computing was done with SunOS 4.1.3_U1,
with file and mail servers running RedHat. There was no Debian in the
department at all. In the past year, we have gone from SunOS to
Debian on all our main servers, using Debian for almost all of our
computing needs including research, student logins, X servers with 50+
simultaneous users logged on, etc. All of our RedHat machines have
switched to Debian, and we hope to switch some Sun machines over to
SparcDebian when it matures. The administration time for the Debian
machines are significantly lower than the Sun ones and a good deal
lower than the RedHat ones were as well.
In short, I think that Debian is a VERY good distribution. I agree
that better management could be needed; however, that is not
necessarily a reflection on you. I think that Ian ought to make his
presence felt a lot more than he does now.
On the topic of doing things for "me" instead of for "us" or "others",
I don't think that is a big problem.
Here's why I am a Debian developer. I wouldn't want to speak for
others, but I suspect others have similar reasons.
1. I was struck with the quality of Debian and I wanted to "give back"
to it. I wanted to do what I could to improve it.
2. I have, for a long time, been a big fan of free software. No other
Linux distribution is commited to it like Debian is; and some, such as
RedHat, seem to go against it by putting commercial software alongside
free software, thus making the difference sometimes unnoticeable.
3. It has provided me with valuable Unix experience. One is always
learning with Unix, no matter how much you know already. This was not
an original reason for becoming a developer, but it is a benefit I
have realized since becoming a developer.
Again Bruce, please don't let a few rotten apples spoil things for
everyone (including yourself).
John Goerzen | Developing for Debian GNU/Linux (www.debian.org)
Custom Programming | Debian GNU/Linux is a free replacement for
[email protected] | DOS/Windows -- check it out at www.debian.org.
uuencode - < /vmlinux | mail -s "Windows NT security fix" [email protected]
To UNSUBSCRIBE, email to [email protected]
with a subject of "unsubscribe". Trouble? Contact [email protected] | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257645513.14/warc/CC-MAIN-20180318032649-20180318052649-00494.warc.gz | CC-MAIN-2018-13 | 3,792 | 59 |
https://deeplearn.org/arxiv/171414/learning-to-predict-the-3d-layout-of-a-scene | code | While 2D object detection has improved significantly over the past, realworld applications of computer vision often require an understanding of the 3Dlayout of a scene. Many recent approaches to 3D detection use LiDAR pointclouds for prediction. We propose a method that only uses a single RGB image,thus enabling applications in devices or vehicles that do not have LiDARsensors. By using an RGB image, we can leverage the maturity and success ofrecent 2D object detectors, by extending a 2D detector with a 3D detectionhead. In this paper we discuss different approaches and experiments, includingboth regression and classification methods, for designing this 3D detectionhead. Furthermore, we evaluate how subproblems and implementation detailsimpact the overall prediction result. We use the KITTI dataset for training,which consists of street traffic scenes with class labels, 2D bounding boxesand 3D annotations with seven degrees of freedom. Our final architecture isbased on Faster R-CNN. The outputs of the convolutional backbone are fixedsized feature maps for every region of interest. Fully connected layers withinthe network head then propose an object class and perform 2D bounding boxregression. We extend the network head by a 3D detection head, which predictsevery degree of freedom of a 3D bounding box via classification. We achieve amean average precision of 47.3% for moderately difficult data, measured at a 3Dintersection over union threshold of 70%, as required by the official KITTIbenchmark; outperforming previous state-of-the-art single RGB only methods by alarge margin. | s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141732835.81/warc/CC-MAIN-20201203220448-20201204010448-00187.warc.gz | CC-MAIN-2020-50 | 1,599 | 1 |
https://forum.xda-developers.com/showthread.php?p=22050407 | code | So, having had a little bit of time to catch up somewhat on recent happenings...
Between these two threads:
Gain root access on the latest 1.55.531.3 update, ONLY IF you are S-OFF
HBOOT (1.44.0006) missing fastboot oem commands
... it's shaping up where the answer will be to end up lifting the restrictions that prevent us from writing to certain memory when flashing things.
Originally Posted by Blue6IX
re-writing the software to allow you to flash things out of the safe memory range in recovery mode would be a disastrously bad idea. We will start getting reports of bricked phones left and right if someone does that.
Let me qualify the above warning - the MT4GS crowd seems to be more along the lines of asking questions and then flashing, instead of just flashing and asking questions when there's a problem.
I wonder how much of that is because we are a smaller section of the XDA forums compared to the endless amounts of threads some other phones have that have been around for a while - or if it's because you mostly can't get yourself into too much trouble with it. Maybe because of the device cost people tend to research it more and just start with a better grip?
Consider this thread from a while ago:
How many bricked phones?
How many sub-forums on xda do you find only one thread talking about bricked handsets for that model, and it's only a handful of posts long and everyone is happy and upbeat. Not a problem in the world.
Heck, part of the short thread doesn't even discuss bricked phones and nothing is left out about it happening to anyone.
If we choose to open this door and figure out how to write out of the protected memory range - bringing that option down to the level of any user who can download and flash a package ( or near enough to it ) - how long before our first bricked phone from flashing something?
With the back and forth on re-locking and actively having control of our devices taken away from us a risk with every update ... we just may end up having to anyway but before that happens just keep this in mind.
I'm not saying don't do it, as we are getting boxed into the corner of that being all we have to work with, but before it happens I just want everyone to consider the implications of doing it.
The nature of open source can place a lot of responsibility on the end user simply because you have all the freedom you need to screw yourself beyond repair. This is one of those times where that's what's going to happen.
I know i'm fine with it, and a lot of people who are here now would be fine too, but now that this device is being given out instead of older devices we'll be getting new people that maybe didn't seek out the device and thereby learn about it first.
For how often you see people who just ended up with that device and flashed something not knowing what it did and breaking their handset, that's a hard thing to do here even if you wanted to.
I'm definitely at least half un-sympathetic for anyone that happens to - if you flash stuff without taking the time to read what it does you deserve what you get.
Here is a response I made to a thread where someone was trying to pass the cost of the device on to either the carrier or the manufacturer when they broke it through their own willful fault. Neither the carrier nor the manufacturer broke the phone, complete responsibility for the fault rests on the end user.
And really, the problem of forcing the manufacturer to eat the cost of the device when it's not they are not to blame does more then just raise cost we pay at retail.
You could absolutely articulate the argument that it's their fault we had to do this, since they left us bereft of other options, but in the end we're the ones who suffer the most as the individuals trying to get hardware we can do what we want to - and it's already an expensive device.
Some of you have realized how cautious I am about losing data and this and that, so making this observation is just my nature...
Again, not saying don't do it - the way things are going we'll probably have to figure out how to make it happen. We will gain options we definitely don't have now past the pressing issues too, which is another reason to do this.
Just want people to realize what we're actually doing before it happens.
I'll cross-post this to the other thread quoted at the top of this post, as these two will represent the majority of the ingress to opening up protected memory space. | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999000.76/warc/CC-MAIN-20190619143832-20190619165832-00429.warc.gz | CC-MAIN-2019-26 | 4,437 | 27 |
https://math.stackexchange.com/questions/2151193/second-derivative-test-con-cavity | code | I don't feel like I'm understanding the actual concept.
I know that it's concave up when f''(x)>0 but I'm trying to visualise what happens to f(x) when the second derivative becomes positive or negative which I fail to. Sorry for this broad question, but it feels like I don't actually understand it apart from those basic conditions of when it's concave up or down.
Also, To clarify one thing, when the second derivative is zero at a stationary point (ie the x value where the first derivative is equal to zero), this tells us nothing useful right? This is different to when the value of a certain x which makes the second derivative equal zero, right? Because this would tell us the point of inflection?
(Also this is to a final year high school level math extent) | s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195531106.93/warc/CC-MAIN-20190724061728-20190724083728-00375.warc.gz | CC-MAIN-2019-30 | 766 | 4 |
http://wordpress.org/support/topic/permalink-without-author | code | Maybe have a main page -> list all authors -> author.php with profile and author posts underneath?
Yes, my index.php is working like that
what happens when an author makes a post with the same name as another author? That's bad structuring ( and with that comes bad sites ).
I can use a filter when update posts and change the slug to prevent that, but if it happens then the permalink will show the author page - default.
My blog will give special atention to the authors, then the permalink will be very important.
but ok, you convinced me.. I will leave it /author-name/post-name
thank you very much for your help =) | s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164034642/warc/CC-MAIN-20131204133354-00047-ip-10-33-133-15.ec2.internal.warc.gz | CC-MAIN-2013-48 | 619 | 7 |
http://logicmatrixonline.com/smtp-authentication/info-smtp-error-code-530.php | code | I have a machine with a failing while playing COD 4. You could have an optical drive error Card Update from earlier, still nothing. And then they say "oh,platters in another drive?We have to suspect other hardware,your system for virus and spyware infestations?
Or removing half the memory to say nothing under 1TB. Thanks. What type of UPS system 530 this content being detected and was making a clicking sound. code Hmailserver Smtp Authentication Is Required psu and i want to replace it. They can fail 530 I am not keen on the 9500GT.
Examine all sockets for dirt and debris, shop if you don't get an answer here. I don't have very computer with the serial cable? Could this have something to do with smtp Safe boot got stuck as soon a premade from Dell and forget about it.
PC's don't suffer as set cd drive to share already, it will be accessible. How long haveoffer a bit more advice. Smtp Error Codes 550 I would also trysince two hard drives have similar symptoms...Even booting the computer,blank screen and wouldn't boot in safe mode.
Re-formatting or accepting the drive Re-formatting or accepting the drive I have since bought a molex fan, that do not seem part of the problem...I have a lot ofmuch knowledge on laptops.I am not a heavy a "user interface" or something like that?
I'm so frustrated, I almost want to buygreatly appreciated; sorry for the long post.Wouldnt the CPU fan turn for even 530 Smtp Authentication Is Required Hmailserver do you have, and hold old is it?Then my computer would boot to a to the menu, the beeping stops. Recently I have been getting lag spikesthat is not seeing the software properly.
What did you use to scancomputer boots up with no issues at all.As it may be a long and slowbad as laptops do.I don't want to waste moneyRC from a Raptor Drive.Any help with this would be have a peek at these guys test the other half, then switching.
Pls help me about 1 second and then the backlight turns off.Ive even reinstalled the Nvidia Videofrom the one drive to the other. Is it wired to your Discover More replacing them temporarily?Have you carefullythe screen Spazzes out.
I'm looking for working fine, and that drivers are installed. So I wouldused, ethernet connection or software, .That is WHILEa strange behaviour from my UPS when playing Call Of Duty 4.When I take the drive out my is wrong with my computer?
You may need to rule out some things code some help please.I am running Windows 7 the laptop is posting. Can anyone think of Sent: 530 Smtp Authentication Is Required. supply and it still shuts down randomly!!!Is it updating and scanning properly? defect. I have a SATA 1 TB Maxtor drive that is giving me issues.
But you may have copied evil stuff http://logicmatrixonline.com/smtp-authentication/fixing-smtp-530-error-code.php process to figger out where the problem is...And If I try you been using it?It's very frustrating because it error drive in a SATA enclosure.Screen Is fine when I'm not watching any code makes the laptop less mobile.
Have your CD/DVD combo burner replaced If you a second if the ram was bad? So, I proceeded to order Hmailserver Disable Smtp Authentication here that I'm not using.The drives are a slightly-older 250GB HitachiDeskstar which is not very common I guess.I bought a brand new power since then, and now I have this problem.
However, it's most noticeableask me my model number and serial number...The backlight only seems toas I went into event viewer.Sometimes, during playing, theproblems elsewhere if the conditions are right...If it doesn't, to be honestthe cables first.
It means that at any time on check my blog go off sometime immediately after boot.In system, it says to bewith this one. Every time I talk to them they important data on this drive. Can I try the Hmailserver Smtp Authentication another drive and cable...
My question is wth also facing the same problem. Then ask me to do thingsand clean your system thoroughly but carefully.Is it some zv5000, not too long ago, and dvd-rw worked fine. NFS Most Wanted a couple of times.
I have a that aren't possible on this model laptop... We always suspectdo to my processor (AMD Athlon 64 3200+). 530 I bought the laptop, which is hp pavilion Hmailserver Smtp Authentication Settings videos of any type or running a Game. error So I would begin by making a check 530 gamer I only play Warcraft 3.
It will(after a few tries) which I intend on attaching to the 9500GT. I am also waiting on a Brandwhat it could be? Maybe someone else can 530 Smtp Authentication Is Required Outlook F8's must not have that feature"...You may need to take it into achecked your cables...
Video card, modem even if not As soon as I quit code is lost is my last option. I have a buncha replacement drive, an identical unit. UPDATE: I put the and look good.
Any defective hardware part can cause replacing parts unless I'm absolutely sure. Or even tried list, then trading out everything on the list... I have installed windows a couple of times new case VGA PCI fan Best cooler.This has also occurred when playing laptop model ASUS X51r.
After i format my laptop the road it could be almost entirely unusable... It shows the American trends bios screen for largest one you can afford. The original problem was the drive was not to launch a Video.But it is also possible that your Asus board, good as it is, has a card seems fine.
Anyone have an boot off of a windows cd. Jon Buy the problem with UPS. Also, My video idea about this thing?Let me know how you do I've been noticing UPS just starts beeping frantically.
© Copyright 2017 logicmatrixonline.com. All rights reserved. | s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511122.49/warc/CC-MAIN-20181017090419-20181017111919-00388.warc.gz | CC-MAIN-2018-43 | 5,621 | 22 |
https://forum.vital.audio/t/heavy-resource-use/2209 | code | Hi I have just tried new VST. It sounds incredibly amazing. My concern is that the audio resource usage is too much. I get glitches and when I use this in Cantabile it goes over 200% usage and is distorted. I am using a fast i7 4 core in a Surface Pro 6. Is there any way to reduce usage otherwise I cannot use this?
Go into the advanced page and see if your’ oversampling is set to 8x that could be the issue.
Maybe you want join this thread?
Thanks It was set to 2x Oversampling and I have reduced it to 1x which makes a difference but not enough for Cantabile. | s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710534.53/warc/CC-MAIN-20221128171516-20221128201516-00599.warc.gz | CC-MAIN-2022-49 | 565 | 4 |
http://zihm.svarog96.ru/validating-php-code-258.html | code | Validating php code dating stangl birds
Simple and safe workaround for this is using strlen() before filter_val().I'm not sure about 5.3.4 final, but it is written that some 5.3.4-snapshot versions also were affected. Then, the if (isset($_POST["submit"])) test returns true, and it executes the code in that if-block.
Validation for non-empty, alphabets and whitespace only The following code is added within the form So, if you try to understand how to write code for it step by step, step 1 is to declare the mail address to whom you want to send mail, step 2 is to write subject of the mail, step three is to collect data from POST so that you can write them to the body of mail, step 4 is to declare the mail id from which the mail is coming and finally sent mail with PHP mail() function.So if your rules was CVC-VCV, the user would have to enter consonant, vowel, consonant followed by a dash, followed by vowel, consonant, vowel. It lets you validate a field by a regular expression.This rule comes in two forms: one with a Reg Exp flag (like “g” for global, “i” for case-insensitive etc.) and one without.The PHP Validation script is a set of validation rules which lets you add server-side validation to your forms quickly and with as little effort as possible.The script checks the values that a user has entered into your form, and if it doesn’t meet the criteria specified (e.g. | s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347422803.50/warc/CC-MAIN-20200602033630-20200602063630-00365.warc.gz | CC-MAIN-2020-24 | 1,401 | 3 |
http://assignmenthelpservice31048.bloguetechno.com/Top-latest-Five-r-programming-project-help-Urban-news-18885779 | code | This web site generously supported by Datacamp. Datacamp provides a totally free interactive introduction to R coding tutorial as an extra resource. By now in excess of a hundred,000 people today took this free tutorial to sharpen their R coding capabilities.
A person change nevertheless is that the Groovy swap statement can cope with virtually any swap worth and diverse sorts of matching is usually carried out.
Illustration: Assuming that a is actually a numeric variable, the assignment a := two*a implies that the content of the variable a is doubled following the execution of the statement.
Eventually, the kind is often eradicated entirely from both the return type plus the descriptor. But in order to take out it with the return form, you then must include an specific modifier for the tactic, so which the compiler may make a distinction between a method declaration and a way simply call, like illustrated in this instance:
R Programming may very well be complicated and from time to time fairly sophisticated for students, nonetheless someone do not require to fret that they have labored over the language to get a prolonged time. We now have bought a panel of experts that have massive command about the R programming.
In the above mentioned code gantt defines the following information format. Section refers back to the project’s area (valuable for giant projects, with milestones) and every try these out new line refers into a discrete job.
R has really wound up being the preferred language for details science and a significant Instrument for Financing and analytics-driven company which include Google, Fb, and LinkedIn.
If we mix these two kinds of parameters, then we must make sure the unnamed parameters precede the named kinds.
Quite a few outstanding code editors can be obtained that present functionalities like R syntax highlighting, auto code indenting and utilities to send out code/functions to your R console.
“I actually get pleasure from Understanding with my tutor each individual week. She builds my confidence up – if I get a little something Erroneous, she tells me in which I went Web Site wrong and the way to do it greater.”
R language was recognized from S language being an execution prepare with a mixture of lexical scoping semantics. R language materials a wide scope visual and analytical procedures like linear and non-linear modeling, classical and analytical checks, time-collection Evaluation and class clustering.
We click this site can easily place code in Visit Website just a 'at last' clause following a matching 'attempt' clause, making sure that irrespective of whether the code in the 'try out' clause throws an exception, the code within the finally clause will constantly execute:
Is it actively made? It is an efficient indicator if deals are usually up-to-date. A often current package deal will have its newest version ‘published’ just lately on CRAN. The CRAN deal webpage for ggplot2, by way of example, explained Released: 2016-03-01, fewer than six months old at enough time of writing.
def is usually a substitute for a type identify. In variable definitions it is applied to indicate you don’t treatment concerning the variety. | s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583763149.45/warc/CC-MAIN-20190121050026-20190121072026-00563.warc.gz | CC-MAIN-2019-04 | 3,216 | 14 |
https://stonewithwoodford.edublogs.org/2020/01/30/slow-internet-by-lewis/ | code | Slow internet…By Lewis
I was on my laptop doing my work. It was about a fast car. A car that go’s 304 mph. But soon as i searched it up on my laptop the internet went really slow.
“It’s so slow!” I shouted
The next day I told my teacher that I couldn’t do my work because I had slow internet.
“Then you do your work at playtime.” my teacher snapped
It was nearly the end of playtime. I was still doing my work I’d done 10 words. Then my teacher came in.
“Do more work!”she shouted
I went home at three o’clock. | s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057158.19/warc/CC-MAIN-20210921041059-20210921071059-00361.warc.gz | CC-MAIN-2021-39 | 534 | 8 |
http://charlottesans.blogspot.com/2011/05/riaa-wants-to-start-peeking-into-files.html | code | The RIAA really just doesn't know when to give up attacking and to start innovating. Its latest legal move is to file for a subpoena to get information from cloud storage provider Box.net to see if some people are using the service to store and share unauthorized music. There are, of course, a variety of different services out there for cloud storage, that allow individuals, small groups and companies to share files -- not for illicit purposes, but because that's how collaboration and sharing work. I use just such a service to share photos with my family, and another to share documents with coworkers.
But, of course, technologically speaking, the actions of these systems can just as easily be used to share unauthorized content in a potentially infringing manner, and it appears that this is what the RIAA is targeting. As Eriq Gardner notes at the link above, it's not at all clear what the RIAA intends to do with the information it gets. It's difficult to see how it could sue Box.net, who almost certainly has no real liability here, but it could go after the users -- something we'd thought the RIAA had sworn off for the time being.
The whole thing just seems like a waste of time. This is what computers do. They copy. There's always a way to copy. Pretending you can stop that isn't rational. What would be rational is helping the RIAA member labels adapt, but for whatever reason, that just doesn't appear to be within the RIAA's skillset.
Permalink | Comments | Email This Story | s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998808.17/warc/CC-MAIN-20190618163443-20190618185443-00283.warc.gz | CC-MAIN-2019-26 | 1,497 | 4 |
https://forum.webflow.com/t/center-scaling-image-in-div-issue/94371 | code | I really want a full width container that has two 50% divs where left is an image that fills the whole div space but that div space adjust when the div right has text. So basically I want both divs left and right to always have the same height and the image on the left div to stay centered and scales to fill left dive until a break point.
I have tweaked it as much as i can but maybe i am doing something wrong. I now have it as a background image but the example below where the people are in the picture on the left side is not a background image and just a regular placed image. Not sure how to do this in webflow. the text on the right makes the full width container stretch and the image adjust.
Here is my site Read-Only: | s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573289.83/warc/CC-MAIN-20190918131429-20190918153429-00166.warc.gz | CC-MAIN-2019-39 | 729 | 3 |
https://www.fi.freelancer.com/projects/php/ecards-php-formatting/ | code | I have an eCard php program that needs several formatting changes.
1. [url removed, login to view] - the gray page numbers beneath the images displays differently in ie than in firefox. They are smaller in ie, I need hem to match firefox.
2. admin - The Address Book Maintenance section when selected does not match the other sections. When selected it is too far to the left. All the gray text is smaller in ie, I need it to match the size of firefox.
3. [url removed, login to view] - Gray text in between header and footer is smaller in ie. I need it to match the size it is in firefox. (not the gray text in the footer - it is correct)
4. [url removed, login to view] - I need the line "Separate email addresses with comma" and the To: field dropped down 1 line.
5. The captcha gray word "Security:" is smaller in ie. I need it to match the firefox size. | s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257651780.99/warc/CC-MAIN-20180325025050-20180325045050-00669.warc.gz | CC-MAIN-2018-13 | 858 | 6 |
https://confusedcoders.com/random/getting-started-with-the-raspberry-pi | code | - Buy all the hardware stuffs
- Raspberry pi
- Display Screen
- HDMI Cable
- Micro SD card and Card reader
- UBB Hub and 2 Micro USB cables
- Download Raspberry pi Image : https://www.raspberrypi.org/downloads/
- Create Raspberry pi image on your computer. I created one on My box using this video – https://www.youtube.com/watch?v=jxAcvEsPkd8
- The micro card is ready and insert it into the raspberry pi.
- The pi should boot up and ask for userid / password. The default is pi / raspberry.
- All good. Ready for fun.
Yash Sharma is a Big Data & Machine Learning Engineer, A newbie OpenSource contributor, Plays guitar and enjoys teaching as part time hobby.
Talk to Yash about Distributed Systems and Data platform designs. | s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986657949.34/warc/CC-MAIN-20191015082202-20191015105702-00427.warc.gz | CC-MAIN-2019-43 | 728 | 13 |
https://brianpeek.com/coding4fun-book-chapter-teaser-for-pdc/ | code | At PDC2008 we have been giving away printouts of our first chapter and table of contents for our new book, “Coding4Fun: 10 .NET Programming Projects for Wiimote, YouTube, World of Warcraft, and More” to anyone who drops by the Coding4Fun area. We ran out of copies early today, so for those of you at PDC (and anyone else for that matter) that’s interested in taking a look at the (not really properly formatted in all places) first chapter of the book in PDF format, you can do so by visiting http://oreilly.com/go/mspdc . This chapter covers how to build a simple 2D game named Alien Attack using XNA 3.0.
This link will die within the next few days, so download soon. Any questions and comments are welcome, as always…enjoy! | s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232257244.16/warc/CC-MAIN-20190523123835-20190523145835-00362.warc.gz | CC-MAIN-2019-22 | 735 | 2 |
https://trac-hacks.org/ticket/5414 | code | redirectfrom rooting incorrect
|Reported by:||potter||Owned by:||martin_s|
- Trac installed under Apache, accesable under http://host/trac.
- There exists a wiki page SourcePage with a simple redirect of [[redirect(wiki:TargetPage)]]
After the redirection takes place to TargetPage:
- With ServerSideRedirectPlugin enabled and TracRedirect disabled I am currently getting a URL of http://host/trac/wiki/TargetPage?redirectedfrom=/wiki/SourcePage
- With ServerSideRedirectPlugin disabled and TracRedirect enabled I am currently getting a URL of http://host/trac/wiki/TargetPage?redirectedfrom=SourcePage with "Redirected from SourcePage" link on the page which correctly takes one back to http://host/trac/wiki/SourcePage.
- With both ServerSideRedirectPlugin and TracRedirect enabled I am currently getting a URL of http://host/trac/wiki/TargetPage?redirectedfrom=/wiki/SourcePage; however with a "Redirected from /wiki/SourcePage" link on the page which incorrectly takes one to http://host/trac/wiki/wiki/SourcePage
I assume this issue is caused by my Trac installation not being rooted at http://host/ but at http://host/trac/.
Change History (2)
Note: See TracTickets for help on using tickets. | s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280835.60/warc/CC-MAIN-20170116095120-00255-ip-10-171-10-70.ec2.internal.warc.gz | CC-MAIN-2017-04 | 1,198 | 11 |
https://answers.sap.com/questions/12729376/multiple-tracking-numbers-for-a-single-delivery-in.html | code | For our business we may have an order with multiple lines and each line may have a separate shipping method. One may ship FedEx and another UPS, for example. This is fine as SAP Business One allows you to define a shipping type on a row-level.
However for the Delivery you can only have one tracking number and there is no row-level field for tracking numbers.
What is the standard SAP procedure/flow for this scenario? I know some options are Pick & Pack or splitting the delivery, but those add extra complication to our process which I'd like to avoid. Another options I considered was adding a UDF for the tracking number.
Can anyone provide some insight? | s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500080.82/warc/CC-MAIN-20230204012622-20230204042622-00879.warc.gz | CC-MAIN-2023-06 | 659 | 4 |
https://mcccd.pipelineaz.com/jobs/163191669-software-development-engineer-test | code | At PayPal (NASDAQ: PYPL), we believe that every person has the right to participate fully in the global economy. Our mission is to democratize financial services to ensure that everyone, regardless of background or economic standing, has access to affordable, convenient, and secure products and services to take control of their financial lives.
Job Description Summary:
Join the PayPal Checkout Test Automation Team, with responsibilities for building test framework, tools, infrastructure, and tests for end-to-end checkout experience. Work on a complex ecosystem where the life cycle of a Checkout product needs to be tracked and validated across various components touching a wide range of technologies and teams, both within and outside of Checkout team.
SDET is a developer with the primary responsibility of developing frameworks and tools to test products. It is a unique and challenging role providing immense opportunity to design and develop wide-reaching tools. You'll be writing code that automatically verifies the quality of the product.
You will implement modular framework components/systems, enhancements, within web/mobile web and native app Framework. You are expected to use various design patterns and technologies to build solutions which are reliable, generic, extendible, and reusable, across multiple locales, devices, features, teams etc.
* Design and develop various robust and highly scalable test automation framework and test plan for front end, backend, and mobile applications
* Collaborate with other cross-functional PD teams, product teams and business stakeholders across various PayPal teams
* Build scalable modules of automated test frameworks across latest technologies
* Provide consulting to test execution team in terms of planning and risks
* Establish and maintain an effective results-reporting and metrics program
* You will onboard various teams to the framework, to help them understand high level architecture of the F/W, mentoring and training teammates/stakeholders
You will utilize S/W Engineering best practices/processes to improve operational excellence, maintaining high coding standards, reviewing design and code for partner teams
* Develop tools and scripts to increase efficiency of testing software
* Proactivelyescalate key quality issues
* Champion functional testing, and other Continuous Integration/Continuous Delivery (CI/CD) processes leading up to superior quality products.
•Must have graduated within the past 12 months, or will be graduating by Spring 2023, with a Bachelor's or Master's degree in Computer Science or related field from an accredited college or university.
. 2+ years of test automation frameworks and tools building experience preferred.
•Minimum of 3 + years of hands-on experience in SW development in test automation preferred.
•Experience in Web/Mobile automation using Webdriver.io, Cypress or Selenium
•Experience in web and mobile native app testing.
•Able to work in fast paced and dynamic environment
•Experience in web/mobile testing tools including Sauce labs, Browser Stack etc.
•Knowledge of mobile (Android, iOS) test tools and technologies.
•Knowledge of web services standards and related technologies including XML, SOAP, and REST
•Experience in Continuous Integration and Continuous Deployment.
•Scrum/Agile development methodology a plus.
•Excellent communications skills both written and verbal.
We know the confidence gap and imposter syndrome can get in the way of meeting spectacular candidates. Please don't hesitate to apply.
Additional Job Description:
At PayPal, we're committed to building an equitable and inclusive global economy. And we can't do this without our most important asset-you. That's why we offer benefits to help you thrive in every stage of life. We champion your financial, physical, and mental health by offering valuable benefits and resources to help you care for the whole you.
We have great benefits including a flexible work environment, employee shares options, health and life insurance and more. To learn more about our benefits please visit https://www.paypalbenefits.com
Who We Are:
Click Here to learn more about our culture and community.
PayPal has remained at the forefront of the digital payment revolution for more than 20 years. By leveraging technology to make financial services and commerce more convenient, affordable, and secure, the PayPal platform is empowering more than 400 million consumers and merchants in more than 200 markets to join and thrive in the global economy. For more information, visit paypal.com.
PayPal provides equal employment opportunity (EEO) to all persons regardless of age, color, national origin, citizenship status, physical or mental disability, race, religion, creed, gender, sex, pregnancy, sexual orientation, gender identity and/or expression, genetic information, marital status, status with regard to public assistance, veteran status, or any other characteristic protected by federal, state or local law. In addition, PayPal will provide reasonable accommodations for qualified individuals with disabilities. If you are unable to submit an application because of incompatible assistive technology or a disability, please contact us at [email protected].
As part of PayPal's commitment to employees' health and safety, we have established in-office Covid-19 protocols and requirements, based on expert guidance. Depending on location, this might include a Covid-19 vaccination requirement for any employee whose role requires them to work onsite. Employees may request reasonable accommodation based on a medical condition or religious belief that prevents them from being vaccinated.
While all employers are vetted to meet the Maricopa Guidelines, the job postings are not individually reviewed. Students should be diligent in ensuring they are applying for positions that meet their needs and are not in violation of the Maricopa guidelines. | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653631.71/warc/CC-MAIN-20230607074914-20230607104914-00751.warc.gz | CC-MAIN-2023-23 | 5,964 | 37 |
http://feetup.org/wiki/E61Gripes | code | Here's a quick list of Nokia E61 gripes and moans as I find them.
- The SIM slot is a bit odd, nice and secure when you've got the SIM in there, but I had to check the docs to work out how to insert it!
- The battery cover is rather tough to slide off
- The comma key seems to have a life of its own, sometimes it decides to be an apostrophe instead, which would be very useful if I could work out how to toggle it back and forth
- Smileys are a pain to type, shift ":" blueshift "-" shift ")" on a UK keypad - blueshift ")" on a Swedish layout
- The volume keys on the side are just crying out for more use
- Why, oh why, doesn't the back command go back? Yes, the History style thumbnail view is pretty, but I generally just want to go back to the previous page
- Is there an easy page up/down mechanism? Hell, there's plenty of available buttons...
- Joystick is unidirectional, horizontal or vertical only, why not diagonal?
- The behaviour with edit fields on forms is very nasty, if you switch focus to another app and back again, it loses what you've typed
- It's almost impossible to edit on large edit fields like this page (disappointing)
- Getting the browser to ask you which access point to use is difficult - it wouldn't do this for me until I set up an access point group in Menu - Tools - Settings - Connections
- It's a bit of a nasty little stick, I much prefer the Nokia 6680 or Nokia N-Gage's pad, it looks like the E61i is a bit better
- Very first thing I had to do was turn off keypad tones, they're annoying and antisocial, and there's no reason for them to be that loud by default - Menu - Tools - Profiles - General (personalise)
- Nokia tune on startup, why can't I turn this off, or at the very least chose a tune that doesn't cause my teeth to grate?
- Red key closes apps, wtf! Not nice for long term S60 users, and annoying for newbies in a "wtf did my app go?" sort of way
- The IM app is a waste of rom, does anyone really use Wireless Village/IMPS? Throw it away and get a proper xmpp/Jabber client instead, Jabber Inc's Symbian client is pretty slick, it'd certainly be more useful...
- doesn't seem to be a way to select and copy text. I.e. no pen key. Update: instructions here. Basically, use Shift + joystick to select, Ctrl+C to copy, Ctrl-V to paste.
- can't define an access point from the WLAN selection if the AP is protected. WTF?!
- I'm having trouble using a WLAN connection if the encryption is WPA/WPA2. Some people suggest assigning a static IP to the phone. I'll look into this asap. Update: may be fixed, look at the E61 Setup page.
- sorting in the address book is incorrect, Å is sorted as A. Maybe this is locale-dependent?
- after 2 days the left softkey is very loose, like a loose tooth, wiggly.
- the phone is rather large and quite slippery. A rougher texture would help.
- hard to see the difference between the call/end call buttons and the softkey buttons.
- no keypad navigation in menu mode, why not? The blue number keys are in a 4x3 grid, just like the app grid. Why do you have to use the joystick for this?
- The wifi is rather weak, but of course the antenna is much smaller than a laptop's
- If you set your own wallpaper it doesn't cover the entire screen (when using active standby)
- keyboard backlight doesn't seem to work on my phone. This may be a hardware issue. | s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794863923.6/warc/CC-MAIN-20180521023747-20180521043747-00064.warc.gz | CC-MAIN-2018-22 | 3,341 | 28 |
https://the-overlord.net/index.php?/profile/441-xaltotun/ | code | As I can see, the number of new posts in this thread is decreasing, like - probably - the entusiasm around the project. Am I wrong?
If you agree, I'd like to go on to the next scenario, conan and the wolves/atlantean sword.
I'd take the Easter time to "close" the discussion about the BotM and then to start with the new project.
My only suggest is first to:
- create the next scenarios with no further and new special rules;
-elaborate a good connections between the scenarios, the create the campaign.
-once we have a first version of the campaign, we can take time to check each scenario, test it and try variants to the official rules.
What do you think about? | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267862248.4/warc/CC-MAIN-20180619095641-20180619115641-00509.warc.gz | CC-MAIN-2018-26 | 664 | 8 |
https://www.techspot.com/community/topics/my-hijack-log.69213/ | code | Hi all, I recently have a red shield with a white cross onto it in my taskbar. I followed the instructions on https://www.techspot.com/vb/topic68441.html and managed to remove that annoying icon. I think my system still might have other viruses/spyware etc. Can somebody help to take a look at my hjc log to see if my system is clean? Many thanks in advance. | s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889473.61/warc/CC-MAIN-20180120063253-20180120083253-00028.warc.gz | CC-MAIN-2018-05 | 358 | 1 |
https://americanhistory.si.edu/ja/profile/1508 | code | Profile profile for StaitiA
B.S., Textiles and Apparel Design, Cornell University
M.A., History and Museum Studies, University of Delaware
Ph.D., Science and Technology Studies, Cornell University
My research draws on history of technology, body studies, science studies, and visual studies. I write about the technical and aesthetic practices of scientific and computer graphic modeling and visual cultures of computing in late twentieth century United States. My academic background combines fashion history and practice, material culture studies, and science and technology studies.
I have worked at several museums and special collections, primarily in the Mid-Atlantic region. I advocate for critical and thoughtful collections stewardship, expanded access to collections, and transparency and cross-disciplinary communication in museum practice.
- History of technology
- History of computer graphics and animation
- History of scientific and artistic models; history of body modeling
- Feminist science studies
- Material culture and visual studies
- Cultural history of 20th c. U.S.
Curator of the History of Computers and Information Sciences
Recent projects and activities:
- I was interviewed for an episode of the podcast 99% Invisible, about a mannequin designer, Lester Gaba and his mannequin Cynthia (released November 26, 2019): https://99percentinvisible.org/episode/mannequin-pixie-dream-girl/
- On November 8, 2019 I was interviewed by Cornell in Washington students for a podcast created for their Enduring Issues course, led by Prof. David Silbey: https://blogs.cornell.edu/issues/2019/11/11/hill-to-hill-podcast-episode-25-with-dr-alana-staiti-of-the-smithsonian/
- At the annual meeting of the Society for the History of Technology, I presented a paper entitled, "The Digital Michelangelo Project: Italophilia in Computer Graphics Research," (Milan, October 26, 2019)
- At the annual meeting of SIGCIS (Special Interest Group for Computing, Information and Society), I co-chaired a panel with Dr. Andrew Meade McGee entitled, "The Digital as Material," featuring papers by Sytze Van Herck (University of Luxembourg), Kimon Keramidas (New York University), and Petrina Foti (Rochester Institute of Technology), (Milan, October 27, 2019)
- Society for the History of Technology
- History of Science Society
- Costume Society of America | s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400188049.8/warc/CC-MAIN-20200918155203-20200918185203-00451.warc.gz | CC-MAIN-2020-40 | 2,356 | 21 |
https://ai.meta.com/blog/facebook-research-at-cscw/ | code | November 03, 2018
Social computing experts are gathering in New York City this week for the ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW). Research from Facebook will be presented in oral paper and poster sessions.
Among this research is the paper The Effect of Computer-Generated Descriptions on Photo-Sharing Experiences of People with Visual Impairments (Yuhang Zhao, Shaomei Wu, Lindsay Reynolds and Shiri Azenkot). Visual content plays an increasingly important role in our daily communications online. Like sighted people, people who are visually impaired want to share photographs on social networking services, but find it difficult to identify and select photos from their albums. The research conducted in this paper aims to address this problem by incorporating state-of-the-art computer-generated descriptions into Facebook’s photo-sharing feature. Read more about this research here.
Facebook researchers and engineers will also be organizing and participating in workshops throughout the week. Keep reading to learn more about the research being presented at CSCW.
Public discussions on social media platforms are an intrinsic part of online information consumption. Characterizing the diverse range of discussions which can arise is crucial for these platforms, as they may seek to organize and curate them. This paper introduces a framework to characterize public discussions, relying on a representation that captures a broad set of social patterns which emerge from the interactions between interlocutors, comments, and audience reactions.
We apply our framework to study public discussions on Facebook at two complementary scales. First, at the level of individual discussions, we use it to predict a discussion’s future trajectory, anticipating future antisocial actions (such as participants blocking each other) and forecasting the discussion’s growth. Second, we systematically analyze the variation of discussions across thousands of Facebook sub-communities, revealing subtle differences (and unexpected similarities) in how people interact when discussing online content. We further show that this variation is driven more by participant tendencies than by the content triggering these discussions.
The Effect of Computer-Generated Descriptions on Photo-Sharing Experiences of People with Visual Impairments
Yuhang Zhao, Shaomei Wu, Lindsay Reynolds and Shiri Azenkot
Like sighted people, visually impaired people want to share photographs on social networking services, but find it difficult to identify and select photos from their albums. We aimed to address this problem by incorporating state-of-the-art computer-generated descriptions into Facebook’s photo-sharing feature. We interviewed 12 visually impaired participants to understand their photo-sharing experiences and designed a photo description feature for the Facebook mobile application. We evaluated this feature with six participants in a seven-day diary study. We found that participants used the descriptions to recall and organize their photos, but they hesitated to upload photos without a sighted person’s input. In addition to basic information about photo content, participants wanted to know more details about salient objects and people, and whether the photos reflected their personal aesthetic. We discuss these findings from the lens of self-disclosure and self-presentation theories and propose new computer vision research directions that will better support visual content sharing by visually impaired people.
How Social Ties Influence Hurricane Evacuation Behavior
Danaë Metaxa-Kakavouli, Paige Maasand Daniel P. Aldritch
Natural disasters carry enormous costs every year, both in terms of lives and materials. Evacuation from potentially affected areas stands out among the most critical factors that can reduce mortality and vulnerability to crisis. We know surprisingly little about the factors that drive this important and often life-saving behavior, though recent work has suggested that social capital may play a critical and previously underestimated role in disaster preparedness. Moving beyond retrospective self-reporting and vehicle count estimates, we use social media data to examine connections between levels of social capital and evacuation behavior. This work is the first of its kind, examining these phenomena across three major disasters in the United States—Hurricane Harvey, Hurricane Irma, and Hurricane Maria—using aggregated, de-identified data from over 1.5 million Facebook users. Our analysis confirms that, holding confounding factors constant, several aspects of social capital are correlated with whether or not an individual evacuates. Higher levels of bridging and linking social ties correlate strongly with evacuation. However, these social capital related factors are not significantly associated with the rate of return after evacuation.
Panel: Without a Trace: How Studying Invisible Interactions Can Help Us Understand Social Media
Nicole Ellison, Megan French, Eden Litt, S. Shyam Sundar and Penny Trieu
Workshop: The Changing Contours of “Participation” in Data-driven, Algorithmic Ecosystems: Challenges, Tactics, and an Agenda
Christine T. Wolf, Haiyu Zhu, Julia Bullard, Min Kyung Lee and Jed R. Brubaker | s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816879.25/warc/CC-MAIN-20240414095752-20240414125752-00560.warc.gz | CC-MAIN-2024-18 | 5,313 | 16 |
https://community.fullstory.com/general-questions-7/cumulative-data-from-segments-228 | code | I want monthly/weekly/daily cumulative data based on a specific event from a segment/session. For example, in a particular session from a segment, 5 user received “Some pop-up Error”. I want to see or send one email stating “Some pop-up error” occurred 5 times in this segment.
or another example,
10 users received 3 types of error during their sessions 1. ABC Error - thrice 2. MNO Error - Twice 3. XYZ Error - Once. What I want is to have a view/email or both to see the errors and their occurrences so that I can easy distinguished what type of errors are coming the most.
What FS is giving us to achieve the above requirement? Can “Alert” be helpful here?
@Mranal Dubey Snap One lots of great ideas here! We have a client that has a similar need for daily/weekly/monthly errors and what errors they are, so we’ve set up some pretty slick, custom dashboards for them. There’s no real-time notifications for dashboards, but what is handy is any
Dashboards in FullStory has a unique URL and it can be downloaded as a PDF. You might need to build a process for your team manually sending those out to stakeholders.
Another option that’s more automated but less granular is setting up your FullStory Digest, which you can add (or remove) Segments with the toggle (see image below):
You can also change that to Daily, Weekly, or Off depending on your preferences, and that’s in Settings > Account Management > Notifications
Hope this helps!
Thank you for this response. I would really like to know How to create such dashboard where I can see all the errors which occurred in a red toaster Message (Custom event)? Lets say, in a particular session, an user encountered with “Null Pointer Exception” which has occurred 4 times, so I want to see this data in a dashboard?
Is that possible to create a dashboard for us to have:
Fullstory digest (Which you have suggested above) does not seems to be useful for my requirements.
In addition to this, we were also trying to find out the errors after exporting data from this API (https://api.fullstory.com/search/v1/exports/<SEARCH_EXPORT_ID>/results), again please note: we are searching for the error text not the div id or element id. When I export data from the above API I get this:
but I need to find out the error text, please see below snapshot from an error during an user session:
I need to have the error text which is “java.lang.NullPointerException” from export. How I can do that?
@Mranal Dubey Snap One the first step in creating a dashboard like this is ensuring you have access to Watched Elements, which is available on FullStory Advanced and FullStory Enterprise plans. If you aren’t familiar with Watched Elements, here’s a help article from FullStory.
In the top area you’ll want to use [Watched Element] [element is] [<whatever you named your element>]
Then on the bottom area you’ll select your Segment (likely everyone) and do Group By: Text
That will give you the frequency with which text is showing for your declared notifications. That should set you on a path!
If you need additional help, I recommend sending a note to your Customer Service Manager at FullStory who can walk you through in more detail. If you need someone to just figure this out for you, we at CXperts can help with that too.
I am in Advanced Plan. I followed the steps but while creating element I am unable to check on Watch this Element box (Its available for enterprise plan).
It would be great if I can get a help from the team and if they can walk me through with this option before EOD today as the current plan is going to expire today (20th Jan 2023).
@Mranal Dubey Snap One! 😊
I spoke with our team and heard they’ve gotten in touch with you. Please let me know if you have anymore questions in the meantime! | s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224652235.2/warc/CC-MAIN-20230606045924-20230606075924-00253.warc.gz | CC-MAIN-2023-23 | 3,800 | 24 |
https://talk.openmrs.org/t/how-do-i-get-access-to-issues-openmrs-org/9055 | code | To get JIRA access you need to request on https://help.openmrs.org/.
How long will I wait when I request access?
We aim to resolve this kind of tickets in less than 48h
To try to summarize information, since people ask about this all the time…
Why? Unfortunately, bots and people were creating a lot of spam content, so we are forced to require you to prove that you’re human, and you want to log into the wiki or issue tracker for a legitimate purpose, and a human must approve this.
What should I do? Go to http://om.rs/helpdesk, click on Create a New Case, and ask for access to the wiki or issue tracker, explaining why you want access.
How would I know to do this? We have a banner on JIRA like this:
On Confluence non-logged-in users see this on the home page:
@jwnasambu this is an example of a response that you can transfer to the wiki as part of our documentation.
@dkayiwa thanks bro | s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103624904.34/warc/CC-MAIN-20220629054527-20220629084527-00311.warc.gz | CC-MAIN-2022-27 | 898 | 10 |
http://www.indiastudychannel.com/experts/4876-files-not-opening-pen-drive.aspx | code | 1-check that it is properly connected and the port is working.Try inserting in another port.
2-See if the files are hidden. To resolve this click on
tools---->folder options---->view--->show hidden files and folders.
3- may be the pd has no files at all. It only cntains previous used up sectors which occupy the space. Try defragmenting it.
4-finall, if nothing works, either your system or pd conatains virus. Try a latest antivirus solution.
hope that it helps:=)
Your problem suggests that the Memory Chip of the pen drive is corrupted or damaged. You can try to open the files using another system. If you are able to open them then backup all files and format the Pen Drive. It may solve your problem.
But, if the problem persists use any pen drive data recovery tool to recover data first and if it is in warranty take to service center for replacement.
I usually format my pen drive using linux for this. Try to format the pen drive (even using Windows). That should solve your problem.
Also, this can happen by a damaged memory chip of your pen drive. Try using branded ones like kingston, transcend and iball etc. | s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864303.32/warc/CC-MAIN-20180621231116-20180622011116-00008.warc.gz | CC-MAIN-2018-26 | 1,123 | 10 |
http://lucasforums.com/showpost.php?p=1709047&postcount=8 | code | I think they are in two of the assets pk3 files .... assets0 and assets1. Just open them with pakscape and drag whatever you want out of there. I think the voice acting in JO was better than JA. DF sounds eh...don't need them.
PM me if ya' need more. | s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824499.16/warc/CC-MAIN-20160723071024-00035-ip-10-185-27-174.ec2.internal.warc.gz | CC-MAIN-2016-30 | 250 | 2 |
https://docs.tenable.com/sccv/Content/RecastRiskRules.htm | code | Recently Viewed Topics
Recast Risk Rules
Path: Workflow > Recast Risk Rules (Organizational users)
Path: Repositories > Recast Risk Rules (Administrator users)
The Recast Risk Rules page displays a list of recast risk rules configured in Tenable.sc. Organizational users must add recast risk rules before the rules appear on this page. For more information, see Add a Recast Risk Rule.
Administrator and organizational users can manage recast risk rules. You can access information on what particular vulnerabilities or hosts have had risk levels recast, their new severity level and, if noted in the comments, the reason for the severity change. Rules may be searched by Plugin ID or Repository. If you want to reset a vulnerability to its original severity level, you can delete the rule.
To view details for a rule, click the row.
To delete the rule, click the gear icon. Then, click Delete. To apply your changes, click Apply Rules in the upper-right corner. | s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247479729.27/warc/CC-MAIN-20190216004609-20190216030609-00207.warc.gz | CC-MAIN-2019-09 | 962 | 8 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.