url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://pdfever.com/best-e-books-on-hacking-free-download/
|
code
|
Here I share some of the best eBooks on various topics like Hacking, Viruses & Malware, Cryptography, Forensics, Cyber Security, etc., that I have found on the web. Some of these eBooks are available for free on the Internet. But I thought I’d put them together here. I am sharing them here absolutely free, just download them from mediafire.
GREY HAT PYTHON- PYTHON PROGRAMMING FOR HACKERS AND REVERSE ENGINEERS
Metasploit- The Penetration Testerś Guide
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943484.34/warc/CC-MAIN-20230320144934-20230320174934-00168.warc.gz
|
CC-MAIN-2023-14
| 457 | 3 |
http://mommyverbs.com/ontario/how-to-create-log-and-har-file.php
|
code
|
Import and Export Formats Telerik.com
A customer service team member may request that you record a HAR file, or a log of network requests, while that issue is occurring and then provide that to them for further analysis. Below are some instructions about how you can easily generate a HAR file using Google Chrome.... Create a HAR file using the popular Firebug debugger utility for Firefox, or another HAR supporting tool. TestMaker operates an HTTP protocol-level test using the HAR file as input to a test. TestMaker loads the resources for a Web page just as the browser does, in pools of concurrently running HTTP protocol connections. TestMaker shows the test operation - including drill-down on how long
How do I create a SysInspector log and submit it to ESET
tar czvf arh.tar.gz public_html 1 >1.log 2>&1 I added a v so it's verbose, ie it will output the list of files/dirs it is tarring, and this will go into 1.log.... On Log on Properties box click on Add button. On Add a Script box click on Browse button. In the opened box paste the copied batch file that you have created in the previous section and click on Open button.
Unable To Create Archive Log File Experts-Exchange
Notice that resulting HAR file can contain privacy & security sensitive data and user-agents should find some way to notify the user of this fact before they transfer the file to anyone else. The format described below is based on HTTP Archive 1.1. how to create light traills d3200 i need to create a log file for each and every request made to my application. now can u please tell me how can i do this with the help of this code. also, please tell me that, if i, made this class and its methods static then what would be the expectations after doing that.
How do I capture a HAR file for troubleshooting? – Support
Could anybody advise how to generate a har file from given a url via command line in linux? Detail tools used and guidelines are much appreciated. Detail tools used and guidelines are much appreciated. how to change the compression of pdf file Paste HAR log into the text box below and press the Preview button. Or drop *.har file(s) anywhere on the page (if your browser supports that).
How long can it take?
Import and Export Formats Telerik.com
- Chrome How to create a HAR file - YouTube
- How can I locate my .log files? Microsoft Community
- Bash tar and output to log file Super User
- Chrome HAR Viewer GitHub Pages
How To Create Log And Har File
Right-click the zip file and select Extract all, click OK to unzip the file, then navigate to the folder where you extracted the logging-related command files. Run logging-on.reg to …
- Since we naturally have access to our side of the connection, we may ask you to capture a log of your side of the connection and send it to us. This is referred to as a HAR (Http ARchive) file. This is referred to as a HAR (Http ARchive) file.
- To add data or log files to a database In Object Explorer , connect to an instance of the SQL Server Database Engine and then expand that instance. Expand Databases , right-click the database from which to add the files, and then click Properties .
- Click the HAR dropdown on the far right of the tool and select Save all as HAR and save the file HAR files can contain sensitive information. Before sending the HAR file to 10,000ft, remove/censor any sensitive information using a text editor (i.e. remove passwords, secrets, user info, project names, etc).
- It is generally used to create simple text file (files which have .txt extension). It has very basic formatting tools such as font, font size, font style, finding and replacing text, cut, copy, paste and select all and save option. In Notepad you can save file with ANSI, UTF-8, Unicode, big-endian formats.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999615.68/warc/CC-MAIN-20190624150939-20190624172939-00406.warc.gz
|
CC-MAIN-2019-26
| 3,767 | 20 |
https://community.infineon.com/t5/Wi-Fi-Combo/using-getAddrInfo/td-p/217627
|
code
|
I want to obtain network address information. Linux has its own getAddrInfo() method. I am not sure if netdb.h is in the compilation path for WICED SDK. is there an alternative?
Sure, That seems a close function to linux's getaddrinfo. Can you tell me if I need to add this library(LWIP) explicitly in my project? if so, which directory? or an include of header would be ok, if this library is present in WICED SDK?
wiced_hostname_lookup() is prepared as a part of normal WICED API.
So you can call it in your application.
LwIP is not used as default.
Adding -FreeRTOS-LwIP like below builds your application with LwIP.
Please refer <WICED-SDK>/Makefile for detail
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475897.53/warc/CC-MAIN-20240302184020-20240302214020-00055.warc.gz
|
CC-MAIN-2024-10
| 664 | 7 |
https://gamnesia.nintendoenthusiast.com/polls-gamnesia-game-development/
|
code
|
It goes without saying that we at Gamnesia love games. Chances are that you, given the fact that you’re reading this, also love games. Some of us however, myself included, have always wondered just how the hell these damn things get made. I know countless programmers and designers who got to their chosen profession with that question at heart and I am happy to include myself among them. Not content with simply making games for a living, I’ve decided to share it all with you fine folks.
With that introduction I am proud to announce that Gamnesia will be getting a new article series focusing entirely on game development and news from the game development front. These will include mostly tutorials, tips & tricks, Q&A’s and anything else that I (and you) can think of. That last bit is very important, so let me emphasize it – the majority of the stuff that will be shown, presented and analyzed in these articles will be influenced by you, the readers. Whether you want more tutorials, finished code assets, Q&A’s or just plain old dev logs, you’ll get it.
A few things to note:
- No previous experience in any game development related segment will be needed to follow along
- The engines this will center on most are the Unreal Engine 4 and Unity, being that I’m proficient in those.
- Reviews of different engines will be here, more than likely upon request
- I expect tutorial series to take up the bulk of the content
These articles will be focused on people aspiring to become game developers regardless of the role they want to perform, and to kick it off from the very beginning we’re going to have a beginner’s tutorial series for either the Unreal Engine or Unity, the specific choice depending on the outcome of the embedded poll. Once the poll closes, you’ll start seeing these articles pop up twice per week.
And that’s about it, I believe this covers everything you fine folks need to know about this new endeavor and I hope you’re as excited as I am. Happy voting!
Which game engine would you like to see a tutorial series for?
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195524290.60/warc/CC-MAIN-20190715235156-20190716021156-00290.warc.gz
|
CC-MAIN-2019-30
| 2,072 | 10 |
https://thetechobserver.com/list-of-applications-summarize-from-pdf-online-multifunctional/
|
code
|
Advances in technology help many people to work more effectively. For example, the presence of an application that summarizes from PDF can shorten the contents of the reading. The reason is, PDF is a file format that is used in various scopes to share readings. Good for learning materials or work needs.
The content of reading in a PDF file is very diverse, some are simple to complex. But not infrequently, the PDF contains so much writing that the reader is confused to find the important part.
To make it easier to understand something, many people like to summarize what they are learning. Currently there are applications/tools available that can summarize text from PDF so that it becomes shorter. The following are application recommendations:
The first application that is recommended is Resoomer. This application is equipped with a simple interface and is a favorite among students because of it. With easy use, users can trim text from long PDFs to be more concise.
Resoomer can analyze and then summarize writing from PDF files, articles on websites, literature, and other works. Thus, the structure of language and writing becomes easier to understand and the most important parts can be identified.
In Resoomer, users can enter a link to the text they want to summarize. This application, which can be accessed online via a browser, can process writing up to a maximum of 5000 words. So if the number of words is very large, the user can divide it into several parts to be summarized.
The next application to summarize from PDF is SMMRY, derived from the word “Summary” which means “summary”. As the name implies, this application that can be accessed online from mobile or laptop/PC has a unique appearance. Not only the appearance, but the function is also very helpful.
Here the user can choose how to summarize the text, how many sentences to make. Users just need to fill in the blank column “Summarize my text…” with the number of sentences they want to generate. There are two options available i.e upload file or put URL.
If so, you can immediately click “Summarize” to start the process of summarizing it. SMMRY also supports various file formats such as TXT and PDF which can be adjusted to your needs. Users can register first to be able to use it for free.
3. Text Summary
The next effective platform for automatically summarizing PDF text is Text Summary. This online application can be used easily and provides fast results.
Even elementary school students can also use it without much difficulty to summarize lesson texts. With these apps, users can copy text or enter the address of a website that contains writing to summarize.
After clicking “Summary”, the apps that can be accessed from this website will immediately summarize it and generate a PDF or TXT format file. Text Summary can be used for free, but the number of words is more limited.
Paraphraser is an application that summarizes from PDF with the quality of the writing that is maintained even though it has been summarized. The method used by this online application is to summarize the algorithm and keywords in the text.
Thus, the summary results are easier to understand and clearer. Not only a feature to summarize, Paraphraser also has a scanner feature. With this feature, users do not need to type or upload documents before summarizing the text.
Users can immediately scan documents, for example theses or other long readings so that the gist of the reading can be found. This is especially useful for jobs or tasks that need to be completed quickly. Likewise, learning something will be more effective.
Smodin is an application that is fully used to summarize various writings. Not only short articles such as articles, but also scientific papers, legal documents, lecture materials, manuscripts, and many others.
This platform for summarizing is often used by students to lecturers, as well as various professions that need to summarize texts. Users can directly paste the PDF text in the column provided, then click “Summarize” to carry out the process.
This PDF encapsulating application can be accessed directly from each browser. The advantage of Quillbot is that it doesn’t only provide features for summarizing an article. But there is also a paraphrasing feature to check plagiarism.
With features like that, this platform is perfect for college needs, especially for working on theses. So, you can see at the same time whether plagiarism is detected in the writing you make. Users can directly upload PDF files which are then summarized by Quillbot which supports various languages.
Editpad also includes applications that don’t only function to summarize text. it is also equipped with other supporting features, such as checking plagiarism, editing grammar, and paraphrasing text.
Editpad is widely used by students to lecturers, as well as other professions that are engaged in the world of writing. PDF files can be placed in Editpad then the results of the analysis will come out immediately without a long wait.
Thus, several application options summarize from PDF, which have various functions. Most of these applications are available online, so there is no need to download them. Just visit it via the internet, and the results will come out soon. Users can use several applications to compare the results and find the most suitable.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100686.78/warc/CC-MAIN-20231207185656-20231207215656-00683.warc.gz
|
CC-MAIN-2023-50
| 5,387 | 23 |
https://design.mist.com/snr-co-channel-contention/
|
code
|
Signal-to-noise (SNR) compares the level of the received signal to the level of background noise and specifies the number of dBs a received signal is above the noise floor. Modern day WLANs should be designed to meet a minimum SNR of 25dB to help ensure successful RF operations.
Co-channel contention occurs when two access points (or their clients) on the same channel can hear and decode each others’ signals. In this scenario, the devices will share the capacity of a single channel. It is therefore desirable when designing Wi-Fi networks to ensure two access point configured for the same channel cannot receive and decode each others’ signals - we call this 'channel reuse'. While our goal in Wi-Fi design should be have no co-channel contention between APs, it is not always possible, especially in the 2.4GHz band where we only have three channels available. Therefore, as the designer, you have to decide what will be an acceptable level of co-channel contention.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100583.13/warc/CC-MAIN-20231206031946-20231206061946-00418.warc.gz
|
CC-MAIN-2023-50
| 977 | 2 |
https://arfc.github.io/manual/guides/software_templates
|
code
|
A few tools and templates for building a software project
Software projects are often unique with specifications that exceed the capabilities of a single template. However, there are some cases where a template can save a lot of time and overhead. This document will hopefully provide ARFC members with the individual tools to mix and match as they create software projects.
There are some open source projects that provide high quality templates that can be useful in software development. If your project falls under the range of capabilities they have you can save a lot of time by using them or adapting them to start your project.
Shablona is a template repository that is designed for scientific python projects. The template comes with everything a small-scale project might need, and can be easily adapted for python projects.
To get a sense of whether or not using the Shablona template is appropriate for your project, check out the example provided.
Cookiecutter is not a template repository like Shablona, instead it is a command-line utility that allows you to build a repository from a “pantry” of templates. This project has an extensive Read the Docs, and it’s definitely worth a review before you decide.
Additional documents that will give you a sense of whether or not to use this utility:
Software Project Parts
Even if neither of the above templates fit your requirements, there are still some pieces that might benefit your project. JOSS (The Journal of Open Source Software) has a useful review checklist for reviewers that you should review before beginning your project.
Makefile is a scripting tool that
compiles or re-compiles a program or process through a user-defined command in the command-line:
make. Makefiles streamline the build process for project contributors or reviewers.
CMake generates makefiles, similar Make or a makefile, except that it is much more compatible with C++.
Snakemake is a workflow engine with a python-based language and an optimizing execution environment. It allows developers to write human-readable workflows that document themselves.
A Dockerfile is a text file that contains commands that can be used from the command line to generate images. Like a Makefile, docker build can automate a series of command line instructions. Several links have been provided as informational resources, and there exists a template file.
Here is a template dockerfile, which also has a lot of useful information on what different components do.
Continuous integration with CircleCI allows users to verify that their contributions do not break any software functionality. CircleCI automatically builds environments and executes tests before every pull request. An example repository is PyNE, which employs CircleCI to run multiple tests on every pull request. Prof. Huff’s book gives an overview of testing approaches.
Every repository that is a part of the ARFC Github Organization should have some form of license. Choosing a license can seem daunting but for a simple BSD-3 Clause will cover many software projects. If your project uses pieces of code under a different license, there are many ways you can address it.
One suggestion is that you create separate directories for the code that is under the other license. In the separate directory, you can then include the license that covers the code in that directory.
Another suggestion is that you add all the licenses to the docs folder and then indicate which files or directories are covered under the respective licenses in the README.md files in the directory covered by it, or in the file itself.
There are many other ways to abide by differing licenses, the above are simply suggestions and should not be taken as legal advice. Regardless of the method you use, make sure you are following the requirements of any software you are using or adapting.
Labels and Projects
Make sure that your repository has the ability to add all of the ARFC labels and projects. The labels and projects are an important part of the workflow in the organization, and they help categorize issues and pull requests.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104054564.59/warc/CC-MAIN-20220702101738-20220702131738-00126.warc.gz
|
CC-MAIN-2022-27
| 4,110 | 23 |
https://www.promptcloud.com/blog/web-scraping-vs-api/
|
code
|
Types of APIs
Web Scraping API
The Functionality of Web Scraping
Data analytics has become a huge part of how organizations are run. Rightly so, because data is growing exponentially with the world going digital and with a high surge in data consumption across the world. Web scraping is by far the most sophisticated way to get structured data. Either you can be familiar with big data analytics or work with one of the best web scraping providers like PromptCloud.
There are all kinds of data on the internet like images, product info, and customer reviews from Yelp or Tripadvisor; that can be used for market research. You might be interested to know Google regularly uses data analytics to index its content and for marketing purposes. Web scraping runs on three core principles. First, it makes an HTTP request to the server, extracts data by parsing the code, and it saves the relevant data on the cloud or locally.
The Role of an Analyst in Web Scraping
Now, we understand what web scraping does, but how does it function? How exactly does an analyst help to put things in perspective and give direction for bots to do their thing? An analyst provides the URLs for scraping by shortlisting the websites first. Then pushes a code to the scraper that identifies elements to be scraped on the front end. An analyst can also identify the source of data located in the backend of the website by using relevant nest tags. Once the nest tags are identified, with the help of Python libraries, the analyst specifies the data types like title or rating, to parse and save. A data analyst also keeps a check on if the target data is refined or not, if the terms of services are met, if the data protection protocols have been followed, or if the website is at risk of crashing. An analyst is always mindful of these considerations, and hence web scraping is easily one of the best ways to get structured data.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100626.1/warc/CC-MAIN-20231206230347-20231207020347-00669.warc.gz
|
CC-MAIN-2023-50
| 1,907 | 7 |
https://www.hardcoregames.ca/1980/11/30/rogue/
|
code
|
Rogue was developed and released on November 30, 1980 by Michael Toy and Glenn Wichman. Rogue is a fantasy game.
In Rogue, the player assumes the typical role of an adventurer of early fantasy role-playing games. The game runs on Unix operating systems as free to play and public domain licensing.
In Rogue, players control a character as they explore several levels of a dungeon seeking the Amulet of Yendor located in the dungeon’s lowest level. The player-character must fend off an array of monsters that roam the dungeons. Along the way, players can collect treasures that can help them offensively or defensively, such as weapons, armor, potions, scrolls, and other magical items.
Rogue is turn-based, taking place on a square grid represented in ASCII or other fixed character set, allowing players to have time to determine the best move to survive. Rogue implements permadeath as a design choice to make each action by the player meaningful — should one’s player-character lose all his health via combat or other means, that player-character is simply dead.
In the original text-based versions, all aspects of the game, including the dungeon, the player character, and monsters, are represented by letters and symbols within the ASCII character set.
Monsters are represented by capital letters (such as Z, for zombie), and accordingly there are twenty-six varieties. This type of display makes it appropriate for a non-graphical terminal such as a VT52.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154085.58/warc/CC-MAIN-20210731074335-20210731104335-00132.warc.gz
|
CC-MAIN-2021-31
| 1,468 | 6 |
https://msdn.microsoft.com/en-us/library/microsoft.visualbasic.interaction.savesetting(v=vs.80).aspx?cs-save-lang=1&cs-lang=vb
|
code
|
Assembly: Microsoft.VisualBasic (in microsoft.visualbasic.dll)
'Declaration Public Shared Sub SaveSetting ( _ AppName As String, _ Section As String, _ Key As String, _ Setting As String _ ) 'Usage Dim AppName As String Dim Section As String Dim Key As String Dim Setting As String Interaction.SaveSetting(AppName, Section, Key, Setting)
public static void SaveSetting ( String AppName, String Section, String Key, String Setting )
public static function SaveSetting ( AppName : String, Section : String, Key : String, Setting : String )
Required. String expression containing the name of the application or project to which the setting applies.
Required. String expression containing the name of the section in which the key setting is being saved.
Required. String expression containing the name of the key setting being saved.
Required. Expression containing the value to which Key is being set.
For more detailed information, see the Visual Basic topic SaveSetting Function.
The SaveSetting function adds the key to HKEY_CURRENT_USER\Software\VB and VBA Program Settings.
If the key setting cannot be saved for any reason, an error occurs.
SaveSetting requires that a user be logged on since it operates under the HKEY_LOCAL_USER registry key, which is not active until a user logs on interactively.
Registry settings that are to be accessed from a non-interactive process (such as Mtx.exe) should be stored under either the HKEY_LOCAL_MACHINE\Software\ or the HKEY_USER\DEFAULT\Software registry keys.
SaveSetting requires Write and CreateRegistry Permission.
The following example first uses the SaveSetting function to make entries in the Windows registry for the MyApp application, and then uses the DeleteSetting function to remove them.
Windows 98, Windows 2000 SP4, Windows CE, Windows Millennium Edition, Windows Mobile for Pocket PC, Windows Mobile for Smartphone, Windows Server 2003, Windows XP Media Center Edition, Windows XP Professional x64 Edition, Windows XP SP2, Windows XP Starter Edition
The .NET Framework does not support all versions of every platform. For a list of the supported versions, see System Requirements.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560280774.51/warc/CC-MAIN-20170116095120-00187-ip-10-171-10-70.ec2.internal.warc.gz
|
CC-MAIN-2017-04
| 2,142 | 17 |
https://nursingpaperspros.com/business-ethics-and-organization-social-responsibility/
|
code
|
I’m stuck on a Management question and need an explanation.
Identify any one organization inside Saudi Arabia and find out the reasons why that organization would be interested in being ethical and classify those reasons in terms of whether they represent moral motivation or economic motivation.
Regarding Economic Motives the key areas to discuss should include
- Ability to attract employees
- Better public image
- Industry pressure
- Sentencing guidelines
- The fair and right thing to do
- Consistent with values of the organization
Regarding Moral Motives the key areas to discuss should include
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038077336.28/warc/CC-MAIN-20210414064832-20210414094832-00192.warc.gz
|
CC-MAIN-2021-17
| 604 | 10 |
https://community.denodo.com/docs/html/browse/latest/en/platform/new_features/what_is_new_u20230301
|
code
|
What Is New in Denodo 8.0u20230301¶
This page lists the main enhancements of the update 8.0u20230301 of the Denodo Platform and the Solution Manager.
We also published these videos that explain the enhancements included in this update:
The new VQL procedures
For the full list of enhancements and bug fixes, read the Release Notes in the Support Site, in the page of this update.
Virtual DataPort now has a procedural language to create stored procedures that invoke VQL statements and use elements such as conditions and loops. These are called VQL procedures. For example:
CREATE OR REPLACE VQL PROCEDURE procedureUsingCursors (idInternet OUT INTEGER, ttime OUT TIMESTAMP, idtax OUT VARCHAR) AS ( CURSOR cursorData IS 'SELECT iinc_id, ttime, taxid FROM internet_inc WHERE specific_field1 > 1'; rinternet cursorData%ROWTYPE; ) BEGIN OPEN cursorData; LOOP FETCH cursorData INTO rinternet; RETURN ROW ( idInternet, ttime, idtax) VALUES (rinternet.iinc_id, rinternet.ttime, rinternet.taxid); EXIT WHEN cursorData%NOTFOUND; END LOOP; CLOSE cursorData; END ;
VQL procedures are an alternative to developing stored procedures with the Java API of Denodo.
Main benefits of these new procedures compared to Java stored procedures:
The SQL developers do not need to know Java to develop stored procedures.
VQL procedures are easier to modify than Java procedures: you do not need to recompile a Java class, package it in a .jar file and import it again; you can modify the procedure from the Design Studio, the Administration Tool or any client application.
It is easier for other users to review your procedure because they do not need to download the .jar file with the extension, open it and extract the Java class in another editor.
Developing stored procedures with the Java API is still fully supported and has not changed.
This update includes embedded Massively Parallel Processing (MPP) capabilities to improve the performance on environments containing data in an object storage:
Added support for a special data source that allows to explore an object storage like Amazon S3 or HDFS and create base views over data, using Parquet format.
Improves the performance accessing these data by leveraging on the MPP capabilities of a customized PrestoDB cluster.
We are also going to release a new version of this utility that deploys a Presto cluster that has been customized to work with Denodo. This utility creates in Virtual DataPort a special data source (called “embedded_mpp”) that points to this PrestoDB.
The query optimizer now applies new acceleration techniques that have been designed for queries accessing this kind of data.
These features require the subscription bundle Enterprise Plus.
Subqueries: before this update, you could use subqueries in the
WHEREclauses of the queries. Now, you can also use them in the
SELECTclause. For example:
SELECT name, (SELECT AVG(price) FROM product) AS average, FROM product;
Virtual DataPort - Data Sources
There are several improvements in the JDBC data sources:
Added pass-through credentials of OAuth credentials. You can configure a JDBC data source so when a client application queries a view that uses this data source, the data source uses the credentials of the user to connect to this database. Before this update, you could do this for databases that accept username/password authentication and Kerberos authentication. Now, you can do this for data sources that accept OAuth authentication. See JDBC Sources - Connecting to a JDBC Source with OAuth Authentication.
New JDBC adapters:
Google AlloyDB for PostgreSQL (also for the Cache Engine)
MySQL 8 (also for the Cache Engine)
Spark SQL 3.x (also for the Cache Engine)
JDBC data sources: the PostgreSQL adapter now supports passing-through Kerberos credentials.
For Hadoop sources: added support to use Apache Knox when doing bulk data loads when the file system is HDFS.
Virtual DataPort - Cache Engine
The Cache Engine creates tables in a database when enabling the cache of a view, to create a remote table and a summary table and to do a data movement. You can now customize the SQL statements the Cache Engine executes to create these tables (see Cache Table Creation Templates - VQL Guide).
Virtual DataPort - Design Studio
The Design Studio now has a wizard to list the functions of Virtual DataPort you can use in queries. To open it, click the menu Help > Functions list.
Virtual DataPort - Operations and Security
Added support to import and assign tags defined in Collibra: in the previous update (8.0u20220815), we added a stored procedure to obtain the tags assigned to views and their columns, from Collibra. This procedure returns the VQL statements that assigns the tags to the views and columns. We also added a procedure to do it from any catalog.
This update includes a wizard to this graphically with Design Studio and the Administration Tool. To open it wizard, click the menu Administration > Semantic and Governance > Import tags from external catalog.
In the pill CONFIGURATION of this wizard, you configure the connection to Collibra and in EXTERNAL CATALOG, where you want to obtain the tags. Once you review the tags obtained from Collibra, click Accept changes to apply the changes in the tags assigned to views and their columns.
Data Catalog now has a “VQL Shell” similar to the one in Design Studio and the Administration Tool. With this, users can execute any query in Virtual DataPort without having to define a My query or create a view (see VQL Shell - Data Catalog Guide).
Added support to store the metadata of Data Catalog in PostgreSQL 13, and SQL Server 2016, 2017 and 2019.
Performance improvement in the CSV exporter.
You can now obtain reports of all the Scheduler jobs using the REST API.
Improvements in the feature of storing the metadata of Scheduler: added support for PostgreSQL 13.
With this update, the Solution Manager now deploys revisions and does rollbacks much faster (faster by orders of magnitude)
Creating a revision is easier thanks to the new Differences Wizard that allows you to compare the metadata of two Virtual DataPort servers. This wizard helps you identify what elements you have to add to a revision.
REST API of Solution Manager:
Information about Deprecated Features
With the release of this update, we have deprecated these features:
Version Control Systems Integration: the integration with Subversion and Microsoft Team Foundation Server (TFS) is now deprecated. The integration with Git, including Git repositories managed by Microsoft Team Foundation Server, is still fully supported.
The function IS_PROJECTED_FIELD of Virtual DataPort is now deprecated.
The page Features Deprecated in Denodo Platform 8.0 lists all the features that are deprecated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816820.63/warc/CC-MAIN-20240413144933-20240413174933-00559.warc.gz
|
CC-MAIN-2024-18
| 6,751 | 53 |
http://ahouijevois.com/
|
code
|
I would like, if I may, to take you on my strange way.
I would try, if I can, to create a piece of something.
You could say why, or ask what for?
I won't answer, don't know yet… or more…
If you remember to come back often.
I think every week, there'll be something.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550249406966.99/warc/CC-MAIN-20190222220601-20190223002601-00531.warc.gz
|
CC-MAIN-2019-09
| 269 | 6 |
https://blenderartists.org/t/shadows-in-the-graveyard/1101929
|
code
|
My first real render of a full scene I made. I haven’t attempted a project of this size before and it’s been quite a challenge and I learned a lot of new things in the process of making this image. Hope you like it
The render took around 6hrs with 768 samples and I did post processing in Krita and Gimp.
P.S. Sorry about the quality but for some reason it won’t upload the 4k version.
I got the basic male and female meshes off Clara.io under the https://creativecommons.org/licenses/by/3.0/ license and then further modified them.
Here’s the link to the artist that made them : https://clara.io/user/bhouston
Male model : https://clara.io/view/d49ee603-8e6c-4720-bd20-9e3d7b13978a
Female model : https://clara.io/view/3832af86-0c6c-4909-a17e-e95ff48312e7
Most of the textures are from Poliigon .
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400265461.58/warc/CC-MAIN-20200927054550-20200927084550-00187.warc.gz
|
CC-MAIN-2020-40
| 805 | 8 |
http://wavelandsp.com/mini_dsp.html
|
code
|
MINI DSP is the smallest DSP Waveland module. This module is perfect for developers that want to integrate DSP processing in their audio products. With few electronics is possible to obtain a powerful DSP processed audio product.
This module is stand alone, and only power supply and audio in signals are needed, providing audio out signals to the developer circuit. Waveland MINI DSP is a very small PCB with pin strip interface headers, ready to be installed over the developer audio board. For programming the DSP it’s necessary to use Waveland Burner MINI DSP. This programmer is easy to use with our software Waveland Designer, offering complete capabilities of signal processing and configuration options. Customers have to define the scheme of the audio signal processing chain and Waveland team will personalize the Waveland Designer Layout to allow Mini DSP Burner to control the MINI DSP module.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738380.22/warc/CC-MAIN-20200809013812-20200809043812-00470.warc.gz
|
CC-MAIN-2020-34
| 907 | 2 |
http://kdpaine.blogs.com/themeasurementstandard/2013/05/your-resume-and-interview-dont-count-new-data-on-how-to-predict-a-good-employee.html
|
code
|
Yesterday, I posted about how being well connected leads to more and better employment. Today, here's a very different side of the job hunt story.
You think that good employees are a product of a good school, good grades, and months of training? Think again, says this article in Business Insider. New ways of gathering data and assessing employees has lead to new knowledge about what makes a good employee. Old school job-search staples like resumes and interviews are being replaced by online data, analytics, and the Moneyball approach to hiring.
The most valuable innate quality in an employee? "Over and over again, the people who perform best are the ones who don't need to be told what to do, the ones that love challenges, seek information on their own, and quickly adapt." --Bill Paarlberg, editor (Thanks to Innovation Box for the image.)
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218191396.90/warc/CC-MAIN-20170322212951-00550-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 849 | 3 |
https://community.adobe.com/t5/bridge-discussions/bride-and-auto-stack-for-panorama-hdr/td-p/11641980
|
code
|
I used to be able to select a set of image files (RAW or JPG) then use Auto-stack panorama/HDR in Bridge which would then allow me to produce a stitched panorama or process a set of exposure bracketed shots. Since the last update of Bridge this has been impossible because Bridge closes immediately and an error report is produced - This has been sent to Adobe but nothing has resulted from this.
I'm using an Apple iMac with more than enough RAM
Anyone else had this problem ?
Anyone rectified this problem?
What version of Bridge?
Did you install the correct copy of PS after you installed Bridge?
I use Bridge and Photoshop for Windows, and have the same problem. I can no longer merge photos into panorama.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100583.13/warc/CC-MAIN-20231206031946-20231206061946-00183.warc.gz
|
CC-MAIN-2023-50
| 710 | 7 |
https://flylib.com/books/en/4.250.1.310/1/
|
code
|
One of the ways you can dress up a Web is to give a page a background. The background can be either a solid color or a picture that's loaded from an image file.
Select Format, Background to open the Page Properties dialog box that's used to select a background (see Figure 35.4).
Figure 35.4. Selecting a page background.
To use a background picture, click the Browse button and a file open dialog box enables you to choose any file on your system. A background picture must be in the GIF, JPG, or PNG format.
You can use a URL to specify the background picture, but this causes FrontPage to use a graphic that isn't part of your Web.
If the graphic is removed from that URL, it will stop appearing on your pages. For that reason, it's better to make a copy of the image on your system ”if you have permission to do so ”and work directly with that copy.
Background pictures are repeated under the contents of a page. This is called tiling , because each copy of the graphic is like an identical tile on a kitchen floor. If you would like the background to be displayed once, select the Watermark option. The background won't scroll along with the rest of the page.
To choose a background color instead of a picture, deselect the Background Picture check box and click the Background Colors pull-down menu. The standard FrontPage color selection dialog box appears with 16 basic colors to choose from. If none of these fit what you're looking for, click the More Colors button and a more advanced color dialog box will appear, as shown in Figure 35.5.
Figure 35.5. Choosing a page's background color.
You can select one of the colors shown in the More Colors dialog box or enter a color's hexadecimal value in the Value field. You also can click the Custom button to open a third color selection dialog box with even more options.
The color you select is displayed underneath the contents of the page.
When a page has both a background color and a picture selected, the color will be replaced by the picture when the page is fully loaded. To cause only the color to display, deselect the Background Picture check box.
If you want to designate a background for an entire Web, it's much easier to create a new theme with the desired background and apply that theme to the Web. The theme will also be available for use in other projects, unlike a background that is selected manually.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107904039.84/warc/CC-MAIN-20201029095029-20201029125029-00506.warc.gz
|
CC-MAIN-2020-45
| 2,384 | 13 |
http://www.linuxforums.org/forum/miscellaneous/linux-filenames-print-134495.html
|
code
|
I did a strange thing today.
Notice the hash symbol after my directory name. It hasn't created a directory, however I can view the contents of the zip file within the 'non directory' by using midnight commander.Code:
mv myfile.zip mydir#
I cant find an explaination(googling) of what the hash does within a linux filename.
Im using Bash. Can anyone help?
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-35/segments/1409535922763.3/warc/CC-MAIN-20140909055527-00495-ip-10-180-136-8.ec2.internal.warc.gz
|
CC-MAIN-2014-35
| 354 | 5 |
https://kb.cloudblue.com/en/129967
|
code
|
Office 365 domain removal task fails with the error:
APS Application Error: 500 Internal Server Error [ApplicationUnknownError] Unprovisioning: resource f2aeaa42-7418-4952-abe4-4685df43eb97 of type 'office365domains' (http://www.parallels.com/Office365/Domain/1.0) for APS application 'Office 365-16.6-43': Unable to remove this domain. Use Get-MsolUser DomainName <domain name> to retrieve a list of objects that are blocking removal. (Microsoft.Online.Administration.Automation.DomainNotEmptyException,Microsoft.Online.Administration.Automation.RemoveDomain).
Trying to create the domain again in CCP with internal DNS hosting gives the error:
Failed to create APS link
There is an active Office 365 subscription with services assigned to this domain.
Two solutions are possible:
- Find and remove the subscription, using the domain.
- In case the Office 365 subscription should remain, and the domain was canceled by mistake, contact Odin Technical Support to apply a workaround and recreate the domain.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590794.69/warc/CC-MAIN-20180719090301-20180719110301-00180.warc.gz
|
CC-MAIN-2018-30
| 1,006 | 8 |
http://sidedev.blogspot.com/2010/08/qublib-distributable.html
|
code
|
Well, I've been working hard for the past while on QubLib, and today was the first day that I actually build a distributable version. Unfortunately, just because I can build one now, doesn't mean I'm going to distribute it, but it's in the works.
I also just finished working on QubLib Strings. It was a really good experience working on them. I ended up deciding to make them the shared strings like I talked about in an earlier post. They're pretty nice, and hopefully the experience will not have just been for learning purposes.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589172.41/warc/CC-MAIN-20180716021858-20180716041858-00469.warc.gz
|
CC-MAIN-2018-30
| 532 | 2 |
https://nick.af/articles/page/2
|
code
|
Make your website load faster by adding these snippets to your .htaccess file
Fact: if your site does not force https then it is not secure. So fix it.
This custom Valet driver can get those sweet ".test" websites on any Laravel site
Trim the fat off your MailChimp email list by removing the unsubscribed or bounced contacts.
Quick UX tips: turn jerky scrolling into smooth scrolling with a the CSS scroll-behavior property.
This was an annoying process to do, so here is how.
I don't use Laravel. But you can still get the magic sauce of Laravel Mix without Laravel.
Get rid of that pesky "PHP executable not found" error message in VS Code
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474361.75/warc/CC-MAIN-20240223053503-20240223083503-00093.warc.gz
|
CC-MAIN-2024-10
| 642 | 8 |
https://teamcity-support.jetbrains.com/hc/en-us/community/posts/206844065-Cannot-Connect-to-Database-until-Server-is-Restarted
|
code
|
I recently migrated to using an external database and that all seems to be fine. All my data was there, the migration went smoothly (apart from the confusing and outdated documentation). However, when ever the machine is rebooted, initially TeamCity says that the login for the database failed. If I pop over to the Services and Restart the Teach City Server and then go back to the Team City view in the browser the app goes through an initialisation process and then connects to the database without any problems at all.
Anyone seen this?
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476442.30/warc/CC-MAIN-20240304101406-20240304131406-00776.warc.gz
|
CC-MAIN-2024-10
| 540 | 2 |
http://restoran-bonaca.com/access_info_win7.htm
|
code
|
5 Level Triage & Patient Assessment program access details
Below are the instructions to UNZIP both the DEMO program and the full program. The instructions are written for the DEMO program but they
are exactly the same for the full program (just the file downloaded is different). There are 4 Steps labeled below to help walk you through this
process and a video showing you all the steps will be available also (coming in a couple of weeks).
How to UNZIP the file...
Windows 7 with the Internet Explorer Browser:
After clicking on the download link on the main page Internet Explorer will start downloading the file. When it is done you will see.
Click Open. You should see something similar to this...
See the pink label "Compressed Folder Tools"? Below that you should see "Extract". Click on Extract. You should see...
Click "Extract All". You should see... (yours will be similar, not exact)
Click Browse. You should see...
Return to Top | Return to 中国体彩官方客户端app下载page
Just email us if you need more help.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875144150.61/warc/CC-MAIN-20200219122958-20200219152958-00314.warc.gz
|
CC-MAIN-2020-10
| 1,032 | 13 |
https://www.thediar.com/en/blog/bed-breakfast-analytics-the-10-motivations-and-the-10-foundations/
|
code
|
We are surrounded by data. What can we do with that? For what? How? What can we expect and what not? What are the common errors? Size matters? Open source or commercial tools? Here you should find some tips to discover your own journey on the data realm. Bon voyage!
I still remember a nearly-hilarious situation I faced in my first job as data analyst. The CEO came to me and asked me for tons of data very important for a strategic decision
. Wow! Panic! Just graduated from College. Just landed in this job. No clue about the business. No clue about data structure. No clue about KPI names. No clue about anything. After some minutes of panic, I deeply breathed and tried to deliver what I’ve been requested. I promised I did the best I could: gathered data from different departments (no Data Warehouse, no unique source of truth) and different people, in very different formats, I used some advanced and fancy stuff in Excel, and, after 10 hours of intense job, I delivered a kind-of-report. I really had no idea what I was doing. I had no idea what data I was delivering. Some days after I went back to my CEO and asked him how useful my data was. His answer was: “Which data? Ah, that report. Well, we did not use it. We took the decision XXX based on a market research the CMO found in a blog”. I suppose I should say thanks.
Sorry. Probably your data-setting is not correct. You should consider start reading this.
After years of experience, probably you’ve heard these stories many times. The Marketing Manager (random Manager example) requires some data. Let’s depict some standard scenarios. The requested data corresponds to…
1. … clicks, sessions, bounces, etc. This one should be easy. The Web Analytics Manager easily performs this task (is part of its basic skill set), probably by applying some complex advanced segments to the data (easy does not necessarily mean simple). Nowadays, the implementations of the web analytics tools trend to be very complex, mainly because they need to cover a lot of business cases. Simple, right? Well, now imagine that for some unfortunate reason, the Web Analytics Manager is on vacation. Panic! Then, the request is given to, let’s say, a Campaign Manager. Of course, he/she has access to the web analytics tool, and hence tries to retrieve the requested data. A bit of panic appears, as the data seems not coherent (of course not, he’s not applying those complex advanced segments he should be applying). He then tries to search for some documentation regarding this topics and… surprise! he/she finds no such documentation. Finally he delivers some numbers, but they all know those numbers might not be totally reliable. At the end, and as the requests get more complex, the process to retrieve such data gets more complex as well. If the process is not clear enough for all stakeholders, the result is a lack of trust on the delivered data, leading to a lack on trust on the data strategy (if such thing exists in the company).
Here I already find my first three motivations:
- Motivation 1: there is a lack of proper documentation. Information transference is virtually inexistent in many e-commerce companies, specially for data-related topics.
- Motivation 2: business complexity translates directly into data complexity. Not every stakeholder understands this implication.
- Motivation 3: wrong data strategy leads to lack of trust and, even worse, to wrong decisions.
2. … revenues, sales, etc. This one gets a bit trickier. The Marketing Manager pings somebody by BI, or by Finance. Traditionally the request is not complete or it’s poorly written: time frames missing, before/after refunds, etc. Normally, such simple requests, requires 2-3 iterations, leading, again, to a lack of trust in the provided data. In some cases, a variation of this scenario takes place: reports and data is built by manually joining data retrieved from different data sources, as the full data map is not clear for everyone.
Again, two more motivations appear:
- Motivation 4: it’s very hard to write clear requests.
- Motivation 5: outside our comfort area, finding data could be a challenge. Even when having a data warehouse, or a nice-and-expensive-but-totally-useless BI tool.
- Motivation 6: it’s easier to request than to retrieve, and it’s easier to retrieve than to process.
3. … data that has been already requested any time (many times?) before. This one is a quite disappointing. There is nothing more frustrating, in both directions, that performing a recurrent request, and being requested for the same time after time. Assume for a second that, indeed, such data is available. Why is data recurrently needed not easily available? Even worse, what if we have (as I mentioned in the previous paragraph) a very nice BI tool? Why some users are reluctant to use self-service data platforms? Now, assume that the data isn’t available. Tough times are about to come: it’s time to reach IT in order to start gathering this data. Normally, from a BI/Data department is very hard to write clear specifications for IT to start gathering some data, due to several reasons: lack of knowledge on the platform, lack of database architecture knowledge, etc.
With this, two further motivations appear:
- Motivation 7: having a BI tool does not ensure self-service. Having a self-service platform does not ensure data availability.
- Motivation 8: communication between BI and IT could be a struggle.
4. … data, or analysis that we don’t know whether it can be accomplished or not, or data which is not clear how is going to be used upon delivery. The first challenge when receiving a request, or when performing it, is to determine whether it can be done or not (assuming whether it makes sense or not). Many of the analysts work directly with data, without designing a plan for such analysis or request. That is, both requesters and analysts work without an analysis framework, even when it’s clear that the analysis will require some time to be finished, probably due to its complexity. A different case appears when the request is coming from the CEO. We have to admit that is very hard to say no to our CEO. However, the CEO does not know everything, and he’s not always right. Even CEO’s requests need to be challenged, understood, and accepted.
With this, we find my two final motivations:
- Motivation 9: working with analysis framework is a must-have.
- Motivation 10: determine whether a request (for data or for an analysis) makes sense. Find the way to challenge every single request.
The Decalogue: the 10 Foundations of Bed & Breakfast Analytics
With my thoughts over the desk, and the motivations I find out of them, I’m ready to state my Decalogue.
1. Burn the silos! Managing data requires transversality and deepness on each vertical. Skill silos are not suitable any more.
2. Complexity matters! Understand how business complexity affects data complexity.
3. Better alone than… No data is better than wrong data.
4. Write, write, and write. Documentation is a must-have. Learn how to document and learn how to request.
5. Going beyond your comfort area. You should consider expanding your comfort area. Even more, you should consider not having any comfort area at all.
6. Bring order to chaos. Narrow your analysis: understand the need, design and framework, and only then, retrieve data.
7. Communication is the key. Your CEO does not care about regression models, decision trees, or how fast your database engine is. He wants a way to keep a sustainable and profitable business.
8. Choose wisely. The right tool for the right set-up. Self-service is not always the best solution.
9. Don’t rush! Data is a path with some mandatory steps. Cheating leads to frustration and lack of trust.
10. So, how are you doing? Integrate data. Move aways from data silos. Design KPIs, reports, and dashboards based on integrated data.
So, what’s next?
With all these, I want to share with you how do I measure, why do I measure and how do I analyze, with the hope that you will join me walking through the learning curve of the data-related world. In a Bed and Breakfast hotel you share your experiences with many others, and you obtain a clean and cheap way for sightseeing. This is exactly what I pretend to do here: every two or three weeks I will be sharing my thoughts, tips, tools, and techniques. Everything what I know will be shared. I’m willing to do so!
Hope you find this interesting, and welcome onboard!
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817103.42/warc/CC-MAIN-20240416155952-20240416185952-00557.warc.gz
|
CC-MAIN-2024-18
| 8,523 | 38 |
https://wiki.fysik.dtu.dk/gpaw/algorithms.html
|
code
|
Features and algorithms¶
Quick links to all features:
This Page gives a quick overview of the algorithms used. We have written some papers about the implementation, where all the details can be found.
Using the projector-augmented wave (PAW) method [Blo94], [Blo03] allows us to get rid of the core electrons and work with soft pseudo valence wave functions. The pseudo wave functions don’t need to be normalized - this is important for the efficiency of calculations involving 2. row elements (such as oxygen) and transition metals. A further advantage of the PAW method is that it is an all-electron method (frozen core approximation) and there is a one to one transformation between the pseudo and all-electron quantities.
Description of the wave functions
Pseudo wave functions can be described in three ways:
- Finite-difference (FD):
Uniform real-space orthorhombic grids. Two kinds of grids are involved in the calculations: A coarse grid used for the wave functions and a fine grid (\(2^3=8\) times higher grid point density) used for densities and potentials. The pseudo electron density is first calculated on the coarse grid from the wave functions, and then interpolated to the fine grid, where compensation charges are added for achieving normalization. The effective potential is evaluated on the fine grid (solve the Poisson equation and calculate the exchange-correlation potential) and then restricted to the coarse grid where it needs to act on the wave functions (also on the coarse grid).
- Plane-waves (PW):
Expansion in plane-waves. There is one cutoff used for the wave-functions and a higher cutoff for electron densities and potentials.
- Linear combination of atomic orbitals (LCAO):
Expansion in atom-centered basis functions.
Grid-based techniques for FD-mode
Solving the Kohn-Sham equation is done via iterative multi-grid eigensolvers starting from a good guess for the wave functions obtained by diagonalizing a Hamiltonian for a subspace of atomic orbitals. We use the multi-grid preconditioner described by Briggs et al. [Bri96] for the residuals, and standard Pulay mixing is used to update the density.
Compensation charges are expanded to give correct multipole moments up to angular momentum number \(\ell=2\).
In each of the three directions, the boundary conditions can be either periodic or open.
Mask function technique
Due to the discreticed nature of space in finite difference methods, the energy of an atom will depend on its position relative to the grid points. The problem comes from the calculation of the integral of a wave function times an atom centered localized function (radial functions times a spherical harmonic). To reduce this dependence, we use the technique of [Taf06], where the radial functions (projector functions) are smoothened as follows:
Divide function by a mask function that goes smoothly to zero at approximately twice the cutoff radius.
Cut off short wavelength components.
Inverse Fourier transform.
Multiply by mask function.
All the functionals from the libxc library can be used. Calculating the XC-energy and potential for the extended pseudo density is simple. For GGA functionals, a nearest neighbor finite difference stencil is used for the gradient operator. In the PAW method, there is a correction to the XC-energy inside the augmentation spheres. The integration is done on a non-linear radial grid - dense close to the nuclei and less dense away from the nuclei.
Parallelization is done by distributing k-points, spins, and bands over all processors and on top of that domain-decomposition is used.
The code has been designed to work together with the atomic simulation environment (ASE). ASE provides:
Nudged elastic band calculations.
Maximally localized Wannier functions.
Scanning tunneling microscopy images.
GPAW is released under the GNU Public License version 3 or any later version. See the file LICENSE which accompanies the downloaded files, or see the license at GNU’s web server at http://www.gnu.org/licenses/. Everybody is invited to participate in using and developing the code.
P. E. Blöchl, Phys. Rev. B 50, 17953 (1994)
P. E. Blöchl, C. J. Först and J. Schimpl, Bull. Mater. Sci, 26, 33 (2003)
E. L. Briggs, D. J. Sullivan and J. Bernholc, Phys. Rev. B 54, 14362 (1996)
A general and efficient pseudopotential Fourier filtering scheme for real space methods using mask functions, Maxim Tafipolsky, Rochus Schmid, J Chem Phys. 2006 May 7;124:174102
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816045.47/warc/CC-MAIN-20240412163227-20240412193227-00006.warc.gz
|
CC-MAIN-2024-18
| 4,462 | 33 |
https://codewithshabib.com/category/oop/design-patterns/behavioral-patterns/
|
code
|
In real life software development one particular challenge we developers constantly face is requirement changes. Anyone who is in the software business game knows how frequently and drastically software specification can change in any time. For this reason, in software engineering only one thing is considered as constant: CHANGE!
In object oriented world, we have some nice ways to deal with this, i.e. design patterns to the rescue. There are lots and lots of design patterns out there to help us, the developers. Amongst them the most common and widely used one is known as Strategy Pattern. Any developer with a few years of experience under his/her belt uses this quite frequently (sometimes even without knowing they are using it!).
In this post I am going to try to create a scenario, which we can solve using strategy pattern.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496667333.2/warc/CC-MAIN-20191113191653-20191113215653-00031.warc.gz
|
CC-MAIN-2019-47
| 835 | 3 |
http://www.sevenforums.com/general-discussion/160102-issue-windows-7-fails-boot.html
|
code
|
Last night i shut my machine down - as it was refusing to play when downloading.
I switched off the screen in annoyance not watching what it was doing.
I booted it up this morning to check see if it would download, it booted fine and downloaded normally again.
As i barely use my machine actually at the machine anymore - i use my iPhone to control it and watch it.
I was checking it from time to time to see if it was downloading okay when i lost connection - i went to check on it and it was in system restore process asking me to continue.
I have seen this many times at work before and fixed it by switching it off and booting as normal - this didnt work.
i tried to run the startup repair - it managed to finish the first time - but didnt work.
Second and therefore after (about 6 times), it fails to complete.
The log says it tested all tests and passed and also says it can boot - but it doesnt.
and the error signature says "Bad Patch" Maybe update caused this?
i have tried to run a recovery disk - with no change.
Anyone got any ideas or help?
PS running CHKDSK right now with /r....and is running for quite a while.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164120234/warc/CC-MAIN-20131204133520-00003-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 1,126 | 13 |
https://phenomenologica.com/index.php/resources/expositions/34-applied-math/31-applied-math
|
code
|
Introduction and Overview of Hydrocode for Impact Cratering Modeling
An introduction to continuum mechanics and some numerical methods used for simulations of continuous phenomena, with a brief overview of their use in the numerical modeling of impact cratering phenomena. References are provided for more details.
Dynamical Numerics for Numerical Dynamics
An examination of the problem of assessing the validity of numerical simulations of continuous-time dynamical systems by treating numerical methods as discrete-time dynamical systems. Simulations of simple explicit and implicit Runge-Kutta methods, along with their Matlab code, are included.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657735.85/warc/CC-MAIN-20230610164417-20230610194417-00677.warc.gz
|
CC-MAIN-2023-23
| 649 | 4 |
https://admissions.highline.edu/faq-items/on-the-tuition-grid-whats-this-about-non-resident-eligible-for-a-waiver/
|
code
|
Individuals who are not considered residents of Washington state (for tuition purposes) are “non-residents.” However, in the cases of those who have a formal and specific tie to the United States, they get a significant discount in recognition of that affiliation. If your record is accurate and you are eligible, you do not need to do anything. This discount (waiver) is automatically applied to those (and only those) who are US Citizens, US Nationals and US Permanent Residents. You might think of it as similar to what is commonly referred to as “out-of-state” tuition (e.g. someone who is a US Citizen who just moved from Oregon or a US National who just moved from American Samoa).
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948464.28/warc/CC-MAIN-20180426183626-20180426203626-00608.warc.gz
|
CC-MAIN-2018-17
| 695 | 1 |
https://getrecipecart.com/recipe/easy-lemon-green-beans/5fb1a34073e44a65b1f2d308
|
code
|
Hi, I'm Parker 👋
Instead of buying me a coffee, check out the best coffee I've ever had (And it's instant!)
Export 3 ingredients for grocery delivery
Trim the green beans.
Place 1 1/2 cups water into a saucepan or pot and bring it to a boil.
Once boiling, add the green beans in the steamer basket. Steam with the lid on 4 to 5 minutes until just tender (test with a fork).
Carefully remove the beans to a bowl. Toss with the olive oil, lemon juice, lemon zest, kosher salt, and plenty of fresh ground black pepper.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780056120.36/warc/CC-MAIN-20210918002951-20210918032951-00249.warc.gz
|
CC-MAIN-2021-39
| 518 | 7 |
https://community.homehabit.app/t/dimmer-widgets-and-groups/2190
|
code
|
I just noticed a cosmetic bug today.
I have two devices in a group in HA, I can add this group as a dimmer widget and it works great.
However, when I change the position, say if i move the slider to 50%, the devices correspond correctly
Homehabit shows 50%, then a couple of seconds later, it shows 100%
So irrespective of the actual position, Home Habit always shows 100%
Love Lace / Home Assistant reports the correct group position at 50%
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402124756.81/warc/CC-MAIN-20201001062039-20201001092039-00345.warc.gz
|
CC-MAIN-2020-40
| 441 | 6 |
http://www.fuelly.com/forums/f14/list-of-automobile-cds-8241.html
|
code
|
Thanks for the link. Interesting info.
This is in part the reason I am considering building my own, one or two seat, microcar (after the mini is done of course). I thought about doing aero mods on the pickup, but it is rarely used for commuting, and more for actual truck duties. So instead, I thought I would put the efforts towards a dedicated, all weather (within reason) three wheel, lightweight, and aerodynamic, commuter.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988718423.65/warc/CC-MAIN-20161020183838-00252-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 427 | 2 |
https://humanitiescenter.byu.edu/events/odh-lecture-julia-flanders/
|
code
|
Date(s) - 02/04/2021
2:30 pm - 4:00 pm
Last year, ODH teamed up with Digital Matters at the U to extend an invitation to Julia Flanders (Northeastern) to speak. That co-sponsored event is finally happening on 4 February, from 2:30-4:00pm via Zoom. Flanders is, among other things, the director of the Digital Scholarship Group in the Northeastern University Library, the director of the Women Writers Project and serves as editor in chief of Digital Humanities Quarterly, an open-access, peer-reviewed online journal of digital humanities.
Title: “Digital, Archival, Literary: Evolving Models for Digital Scholarship”
This presentation will consider our evolving conception of “digital text,” through the lens of the 30-year history of the Women’s Writers Project. The shifting tensions between information and artifactuality have produced changes in both theory and practice for editors, readers, and tool designers. We’ll look not only at the digital object itself but also at larger aggregations: archives, digital collections, data sets, and networks of linked open data. How are digital texts and digital collections framed in social, professional, and disciplinary terms, and what are the consequences for work flow, expertise, pedagogy, public reuse, and cultural authority?
If you’d like to add a link to a Google Calendar, you can do so here. (The calendar event also shows the Zoom link and passcode.)
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335276.85/warc/CC-MAIN-20220928180732-20220928210732-00026.warc.gz
|
CC-MAIN-2022-40
| 1,425 | 6 |
https://help.incontact.com/Content/Admin/Users/ManageMultipleUsersAtOnce.htm
|
code
|
Required security profile permissions: Users Create
You can conveniently create or edit multiple CXone user accounts through a spreadsheet, which you upload directly into CXone. If you want to create new users, CXone provides a downloadable template CSV file to get you started. This bulk upload tool in CXone supports CSV or XLSX file types.
To edit multiple users at once, download the existing users spreadsheet, make your desired changes, then reupload the file. Be sure to enter a Y in the Row Changed column for each user that you modified. You can leave this column blank, but CXone will upload the entire list new instead of only updating the specific users that you indicated. This likely increases the upload time, as CXone processes the entire list. When reuploading the file, you can select the Changed Rows Only setting, which instructs CXone to only accept rows that you indicated with a Y.
If you want to create or edit a single user in the CXone interface, see Create a User.
Key Items When Uploading Files:
- Do not modify column names or change the format of the template.
- Duplicate email addresses, agent numbers, or extensions are not allowed.
Sherlock Holmes is setting up a new contact center for Intriguing Mysteries, a division of Classics, Inc. He employs three different teams. Each handles crime tips regarding infamous villains, such as Professor Moriarty. Holmes decides to bulk upload users in the following manner:
- First, he manually creates an individual user account in CXone for his three team leads. He makes sure all skills and settings are assigned appropriately. He plans to use these accounts as templates for other users on each corresponding team.
- Second, he downloads the existing user list from CXone. So far, the list only contains four accounts: his own administrator account and the three team lead accounts.
- Third, he adds new rows for each agent on each team. Since Holmes wants the agents to have the same settings as the team lead, he quickly copies and pastes those settings from the team lead to the team agents.
- Fourth, he uploads the revised user list into CXone.
- Click the app selector and select Admin.
Click Create New > Manage Multiple Users.
If you want to download active users only, instead of all the users in your environment, select Active users only for Users to Include.
- Click Download Existing Users. If you are creating a completely new user list, click Download Template.
Open the file in a program that can manage CSV files, such as Excel or Notepad.
Enter information about each user in the rows below the header and explanation rows. Don't modify the column names, order, or data format. The columns mostly match the same fields that are available when you create a new user.Learn more about fields in this step
The following table provides an alphabetical listing of the fields for each
userin your CXone system. Each field definition also indicates the tab on which the field appears in the userrecord and the column in the template used for that field.
Address line 1
Address line 2
Optional full address details for the user.
In the United States, if CXone is able to verify the address, these fields are combined to provide the address used during a 911 call to determine the local Public-Safety Answering Point (PSAP) and deliver the call there. If CXone is unable to verify the address, 911 calls are sent to a national or regional calling center instead.
Description: The internal ID assigned to the user. This is a system-assigned value and should not be changed. In the template, this field is labeled Agent ID.
Agent Phone Timeout
Tab: Contact Settings
Allows you to specify the number of seconds before a voice call times out based on agent silence. You can set this time frame by assigning the user to a station profile. The station profile specifies the length of time a user can be inactive before timing out. If you do not assign a station profile, then the Business Unit-wide Phone # Timeout applies. Agent phone timeout allows you to configure the timeout for specific agents.
Agent Voice Threshold
Tab: ACD User > Contact Settings
Template: This field cannot be updated by bulk upload.
The volume level of the agent's voice. This setting helps to accurately distinguish the agent's voice from background noise. The threshold range is based on a custom volume unit computed by the frequency analyzer.
Users with proper permissions can change this value themselves through the Voice Threshold tuning setting in MAX.
Allow Voicemail Web Access
Tab: CXone Attendant
Available only when you use CXone Attendant. Specifies whether the user is allowed to access voicemail via using CXone, or only from a phone. Acceptable values are True to grant web access or False to limit the user to phone access.
User > Groups
Allows you to assign the
userto a logical group if you use WFM as part of the CXone suite.
Assigned to Team, Team Name, Team, Team ID
The team the
In the User UI, select a team from the Team drop-down. In the bulk upload template, enter a valid Team ID exactly as it appears in the Teams list in CXone.
At Home Worker
Used to identify employees who work from home or remotely. In the UI, selecting the checkbox indicates the user works remotely. In the template, enter True or False. The default value is False.
Attendant User Type
Available only when you use CXone Attendant. Allows you to specify the type of user. On the CXone Attendant tab of the user profile, select from a drop-down. In the bulk upload template, enter one of these acceptable values: agent, business-user, rollover, or general-voicemail.
The city where the user works.
Available only in an Omnichannel Session Handling. Forces MAX to set the active focus to the newest interaction when the agent clicks Accept.
On the ACD Users Contact Settings tab, this field is a checkbox. In the ACD Users bulk upload template, enter True or False.
Contact Handling: Voice, Chats, SMS, Emails, Work Items
Available only in an Omnichannel Session Handling environment, specifies the maximum number of simultaneous contacts the user can handle. The maximum allowed voice contacts is 1 (including phone and voicemail); chats, 12; emails, 25; work items, 25, and .
In the bulk upload template, these fields have "omnichannel" prepended to each name (for example, Omnichannel Voice).
Contact Refusal Timeout: Phone, Voicemail, Chat, SMS, Email, Work Item
The number of seconds the agent can be idle in an active interaction before the interaction times out and transfers to another agent. If you leave any of these blank, the profile inherits the default system value of 45 seconds. Values for refusal timeouts must be between 15 and 300 seconds.
The country where the user is working.
Tab: This field does not appear in the CXone UI.
This field can be used by an API call to your CRM system to tag call recordings with metadata for the NICE CXone legacy call recording.
These five fields are called Custom 1, Custom 2, Custom 3, Custom 4, and Custom 5
by default. However, you can customize the names of the fields in your business unit High-level organizational grouping used to manage technical support, billing, and global settings for your CXone environment settings.You can use these properties to meet the needs of your specific organization, such as listing your agents' favorite flavor of ice cream or favorite super hero. Because the fields vary by organization, contact your CXone Account Representative to explore how to use these fields in your tenant. All five fields have a character limit of 40. CXone Attendant
Tab: CXone Attendant
Available only when you use CXone Attendant. Allows you to specify the Access Type for each CXone Attendant user. On the CXone Attendant tab of the user profile, select from a drop-down. In the bulk upload template, enter one of these acceptable values: AttendantOnly, AttendantWithACD, or None.
Available only when your NICE CXone account representative enables granular Omnichannel Session Handling (OSH) settings, it specifies whether you want agents on the team to use Omnichannel or Single Contact handling. See Set Up Omnichannel Session Handling for more information.
Select Omnichannel to allow agents to handle multiple contacts using various channels at the same time. Agents can also elevate contacts to other channels. In the ACD Users bulk upload template, enter 1.
Select Single Contact to allow agents to handle only one contact using one channel at a time. Those agents also have the ability to elevate contacts to other channels. In the ACD Users bulk upload template, enter 0.
Agent Pattern ID
Tab: Contact Settings
The default dialing pattern assigned to the user. A dialing pattern specifies the way each call is dialed. For instance, a dialing pattern can specify that each call must begin with '1'. Agents do not need to a dial a '1' before every call, because the system automatically prepends it to the number dialed.
On the Contact Settings tab of the user profile, select from a drop-down list of agent dialing patters in your system. In the bulk upload template, enter the ID for the dialing pattern. You can see these IDs on the ACD > Agent Patterns page.
Available only when you use CXone Attendant. Contains the direct dial-in number for the user.
A valid email address associated with the
user. Employment Type
The user's current employment type. It can be Full-Time, Part-Time, Temporary, Outsourced, or Other.
Available only when you use CXone Attendant. Contains the user's extension.
External Identity If you want to authenticate the employee using a SAML-based login authenticator, enter the email ID that is used as the external identity (IDP) of the user. Federated Identity Visible only if you have federated identity or OpenID Connect enabled in your business unit. For more information, contact your CXone Account Representative. It's the unique value that is passed as part of the federated identity authentication assertion. The value is tied to the user requesting access to NICE CXone in your IDP system. First Name
agent'sfirst name. Hire Date
The date you hired the employee, for your records only. CXone doesn't use this information.
Free-text field to describe how the user learned about the job and came to work at your company. The field accepts a maximum of 30 characters. Click New Hiring Source to add custom options for the drop-down, such as Internal Hire, Employee Referral, Recruiter and so on.
The amount the user is paid per hour.
Available only when you use CXone Attendant. Specifies whether the user is included in the company directory. Acceptable values are True or False.
Integrated Softphone URL 1-2
Visible only when custom softphone (WebRTC) URLs are enabled for your tenant. Specifies which custom softphone URL to apply to the ACD user profile.
Description: Allows you to specify an optional identifier for this user (such as the user's employee ID from your HR systems). The field accepts a maximum of 50 characters.
agent'slast name (surname). Location
The location assigned to the user in CXone. In the UI, select the value from the drop-down of locations in your system. In the template, enter a valid location name from the locations in your system.
In the United States, this setting does not impact 911 calls.
If you have configured multi-factor authentication (MFA), and want to require it for this user, select it from this drop-down.
Determines the version of MAX for the agent in the
business unitfor the 28-day trial period prior to the official release of the new version. This feature is only available when enabled by your CXone Account Representative. Select one of these from the drop-down:
- Default—The agent will use the version defined in the
- Previous—The agent will use the MAX version prior to the current release. For example, if the current release version is Spring 2021, the agent will the MAX version from the previous Fall release. This option is typically only useful if the default
business unitversion is set to Current.
- Current—The user will use the MAX version for the current major release. This option is typically only useful if the default
business unitversion is set to Previous.
For related information, see Configuration Tasks.
Maximum Concurrent Chats
Available only in a single-contact handling environment. Specifies the maximum number of chats the agent may engage in simultaneously. You can enter a number between 1 and 12. If you don't enter a value here, the agent will default to either the Team Default, or the configured maximum number of chats allowed for the team to which the user belongs.
Maximum Email Auto-Parking Limit
Available only in a single-contact handling environment. Specifies the maximum number of emails the agent may contain in the inbox at one time. You can enter a number between 1 and 25. If you don't enter a value here, the agent will default to either the Team Default, or the configured maximum number of parked emails allowed for the team to which the user belongs.
This field is part of the user record but cannot be viewed by anyone other than the user.
If you want to configure a standard secret for
usersvia bulk upload, you can do so.
Pairs the employee account in CXone with an MFA device that employees use to generate a one-time password (OTP). CXone allows users to generate an MFA secret either manually or automatically.
agent'smiddle name. No Fixed Address
In the United States, indicates the user's address is not permanent and should not be used for dispatching 911 calls.
NT Login Name
OS Login Name
The name the user logs in to their workstation with.
Allows you to enter notes about the user. In the bulk upload template, you can enter up to 1,000 characters and specify line breaks with three pipes (|||).
Available only when you use CXone Attendant. Specifies the way in which users are notified about a phone call received through CXone Attendant. Acceptable values are email-only, email-with-attachment, web-only, or via-my-agent.
Available only when you use CXone Attendant. Contains the user's personal phone number. For non-US numbers, add + followed by the country code and the phone number (for example, +16145551212).
Phone # Timeout
The amount of time an inactive agent's voice path stays connected. You can set the timeout period with station profiles. Station profiles specify the time in seconds that an inactive agent stays connected to the call. If a station profile isn't assigned, then the default applies. Phone # timeout applies to all agents that don't have an Agent Phone Timeout set.
The CXone phone ID associated with the user that will be recorded using NICE CXone legacy recording. Consider the following when you add information to the Phones field:
- You cannot assign an extension to more than one user. For example, extension 1234 cannot be assigned to Elizabeth Bennet and Charlotte Lucas, even if they sit at the same extension on different shifts.
- You can assign multiple extensions to the same user. For example, Elizabeth Bennet may take incoming calls on extension 1234 and make outbound calls on extension 4321. In the users bulk upload template, separate multiple values with semi-colons.
Available only when you use CXone Attendant. Contains the Personal ID Number (PIN) the user created to access voicemails.
Referral information about the user. This is a free-text field that accepts a maximum of 30 characters.
Whether the user is Eligible or Not Eligible for rehire in the future. The default value is Eligible.
You can specify the immediate manager or supervisor of this user by entering that person's Agent ID. This field is optional and is not used by the CXone suite.
Available only in an Omnichannel Session Handling environment. Enables the user to manually request an additional digital (non-voice) contact, if the current state is Working.
On theUsers Contact Settings tab, this field is a checkbox. In the ACD Users template, enter either True or False.
Tab: This field appears only in the bulk upload template.
Allows you to identify whether the row has changed. Typically used when a list of current users is downloaded, edited, and then uploaded. Enter Y if the CXone should update the record for this ACD user, or N if the user should not be changed.
Security Profile ID
Tab: Users > General
Identifies the security profile assigned to the user. On the General tab of the User record, this field is named Security Profile. Select from a drop-down of existing security profiles.
In the bulk upload template, this field is named Security Profile ID. Enter a valid ID for an existing security profile. You can see the ID for each profile in the security profiles list.
Shift Times to User's Time Zone
Tab: Users > WFO
This field is used by the NICE Uptivity Workforce Optimization products to display reports in the user's timezone. Enter True or False to indicate the preferred option for each user.
If you use Skype for Business Connector, this value is the SIP username of the user in the format sip:[email protected].
Tab: Users > Skills
This field includes three parts: the skill IDs assigned to this user, the proficiency that the user has in that skill, and whether the skill is assigned as active or inactive.
Proficiency is represented by a number between 1 and 20 with 1 representing the highest proficiency and 20 representing the lowest proficiency. Separate the skill ID and proficiency with a colon as seen in the example below.
To assign the skill as active, enter TRUE after the proficiency. To assign the skill as inactive, enter FALSE after the proficiency.
To add multiple skill IDs, separate them by a semi-colon. For example: 11111:1:TRUE;22222:3:FALSE;33333:12:TRUE;. In this example, the user can use skills 11111 and 33333 at a proficiency level of 1 and 12 respectively. The user cannot use 22222 at a proficiency of 3, however, because the skill is assigned as inactive.
You can also assign user skills by only including the Skill IDs separated by semicolons. For example: 197642;197648;391021. If you only include the Skill ID, the default proficiency and active/inactive values will be applied. The default proficiency value is 3. The default active/inactive value is TRUE or active.
You can see the ID for each skill in the list on the Skills page in CXone.
Identifies whether the user is Active or Inactive. This field is informational only and cannot be edited manually or by bulk upload.
Suppress Ringing - Personal Connection
When the agent uses a Personal Connection skill, this setting prevents them from hearing a ringing sound before the system answers the call. Instead, the agent first hears audio when they receive the answered call from the network. This setting overrides the skill setting for Treat Progress as Ringing.
Visible only if you use NICE CXone screen recording and is required in that case. The domain associated with the System Username.
Visible only if you use NICE CXone screen recording and is required in that case. Adds a Windows username to the user account (that is, the name with which the user logs in to your network). NICE CXone WFO uses it to locate the user's desktop via the screen recording client. Each user must have a unique system username, regardless of Windows domain, and they must log in to their desktop PC with that system username. For example, if your organization has two Elizabeth Bennets, they cannot both have "ebennet" as their Windows username even if they are on separate Windows domains.
Tab: Contact Settings
Visible only if your system uses Omnichannel Session Handling. Specifies whether the user should use the default contact handling settings for the assigned team. On the Contact Settings tab of theuser profile, this field is a checkbox. In the bulk upload template, enter True if you want the agent to use the default team settings. Enter False if you want the agent to use the default
business unitsettings or if you plan to enter individual settings for the agent.
Visible only if your system includes NICE Uptivity WFMv2 and if the user is assigned to an NICE Uptivity WFMv2-enabled team. It allows you to add up to two telephone number to the user record, other than their NICE CXonePBX Internal telephone network that manages an enterprise's incoming, outgoing, and internal voice calls.-associated number. The field is informational, and the value is not used by the NICE CXone WFMv2 application itself.
If applicable, the date the user's employment was terminated in the format mm/dd/yyyy.
Time Display Format
This field is used by the NICE Uptivity Workforce Optimization products to display reports in either 12-hour or 24-hour format. Enter either 12 and 24.
Time zone to apply to the employee. Unless you change it, the employee is automatically assigned to the
business unittime zone. In the CXone UI, you can select the time zone from a drop-down. If you update this field in the bulk upload template, you must a format that matches the drop-down options. Title
Available only when you use CXone Attendant. Allows you to specify the title of the user.
Total Contact Count
Available only when your CXone Account Representative enables granular Omnichannel Session Handling (OSH) settings. Specifies the maximum number of total contacts the agent can handle at a time. For example, if you set Chats to 5, Emails to 5, and Total Contact Count to 7, the agent would receive a maximum of seven contacts at any given time. Up to five of those seven contacts could be chat contacts and up to five of them could be email contacts. See Set Up Omnichannel Session Handling for more information.
URL 1-2 Weight
Visible only when custom softphone (WebRTC) URLs are enabled for your tenant. If you specified two custom softphone URLs for the ACD user profile, the URL weights specify the importance of the URLs compared to each other. The higher-weighted URL will be attempted before the lower-weighted URL.
The username associated with the employee. While the username must be in the format of an email address, it doesn't have to be an actual email address.
Visible and required only if your system includes NICE Uptivity Hosted WFO or NICE CXone WFMv2 and if the user has been assigned to a team that is NICE Uptivity Hosted WFO- or WFMv2-enabled. Both applications treat agents differently from other users. While you can designate users as Supervisor or Admin if appropriate for your organization’s needs, it is critical to correctly select Agent for all users who should be treated as agents in the NICE Uptivity Hosted WFO and WFMv2 applications.
WFM Schedule Notification Interval
Tab: My Account > Details
Visible only if you have an integrated WFM application in your CXone system. On the My Account page, agents can specify how often they want to receive notifications about their schedule in WFM. In the bulk upload template, you can specify a value on behalf of the user.
- Default—The agent will use the version defined in the
On the Manage Multiple Users page in CXone, click Browse next to Select File.
Browse for the file you created. Select it and click Open.
Select the File Type corresponding to the file you chose.
If you're creating new users, or if you are modifying existing users and chose not to use the Row Changed column in the bulk upload template, select All Rows for Rows to Include.
If you're modifying existing users and chose to use the Row Changed column in the bulk upload template, select Changed Rows Only for Rows to Include.
Click Upload File.
Check your email for an error report. Resolve any errors that appear. To do so, fix the issue in the file you uploaded, click Back in CXone, and re-upload the file. If you have no errors, click Close.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104628307.87/warc/CC-MAIN-20220705205356-20220705235356-00735.warc.gz
|
CC-MAIN-2022-27
| 23,749 | 170 |
https://ibissource.org/knowledgebase/hide-passwords-in-ladybug/
|
code
|
When you scroll through Ladybug reports, it can be embarassing to see passwords exposed. At any time passwords should be shielded against examination by others. Adding a regular expression to DeploymentSpecifics.properties solves this issue.
To avoid this, you can add a line in DeploymentSpecifics.properties ; adapt the phrase “password” when necessary.
The result in Ladybug will be that the password will be replaced by stars.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525312.3/warc/CC-MAIN-20190717141631-20190717163631-00360.warc.gz
|
CC-MAIN-2019-30
| 434 | 3 |
https://www.warriorforum.com/search-engine-optimization/682497-why-i-am-not-having-no-1-google-uk.html
|
code
|
I am working for about 3 months for this site and keyword:
It is on 2nd position in google.co.uk
I have worked, directories, articles, web 2.0, blog commenting.
Its still on no.2, I am not getting what should I do now to get it to no 1.
Anyone please guide me a better way to achieve no 1 for this specific keyword in google UK, thanks in advance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320302706.62/warc/CC-MAIN-20220120220649-20220121010649-00364.warc.gz
|
CC-MAIN-2022-05
| 347 | 5 |
https://www.dabsoft.ch/dicom/5/7.8.1/
|
code
|
It is possible that multiple implementors may define Private Elements with the same (odd) group number. To avoid conflicts, Private Elements shall be assigned Private Data Element Tags according to the following rules.
Note: The versions of this standard prior to V3.0 described shadow groups. These were groups with a group number one greater than the standard groups. Elimination of conflicts in Private Data Element Tags have made this distinction obsolete and this terminology has been retired.
Note: The versions of this standard prior to V3.0 specified private group element numbers (gggg,10FF- 7FFF) reserved for manufacturers and private group element numbers (gggg, 8100-FFFF) reserved for users. Elimination of conflicts in Private Data Element Tags has made this distinction obsolete and this specification has been retired.
Since each Item within a sequence is a self contained Data Set (see Section 7.5 on the nesting of Data Sets via Sequences of Items), any Item which contains Private Data Elements shall also have Private Creator Data Elements reserving blocks of Elements for those Private Data Elements. The scope of the reservation is just within the Item. Items do not inherit the Private Data Element reservations made by Private Creator Data Elements in the Data Set in which the Item is nested.
Note: If a sequence is itself a Private Data Element and the Items within the sequence also have Private Data Elements, then there will be Private Creator Data Elements both outside the sequence and within the sequence Items.
Note: Different Items may reserve the same block of Private Data Elements for different private creators. This is necessary to allow the nesting of Data Sets collected from multiple sources into folders.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583722261.60/warc/CC-MAIN-20190120143527-20190120165527-00092.warc.gz
|
CC-MAIN-2019-04
| 1,748 | 6 |
https://www.bleepingcomputer.com/forums/t/637190/help-me-please/
|
code
|
Several Vista SP2 users are currently discussing the same problem in KellyB56's thread Windows Vista Update Hangs at "Checking For Updates".
Most users find that the step-by-step instructions on page 1 of m#l's thread Updates not working, it has been searching for updates for hours will get Windows Update working again. There are six Windows kernel-mode driver (Win32K.sys) updates listed in STEP # 2 of those instructions that must be manually installed on your computer to speed up Windows Update if any of those updates are currently missing.
And "speed up" is a very relative term. This workaround can reduce the "Checking for updates..." hang from days down to hours, but Note 6 of those instructions warns users to be prepared to let Windows Update run several hours after the Win32K.sys speed up patches are installed.
32-bit Vista Home Premium SP2 * Firefox v50.1.0 * NIS v126.96.36.199 * MBAM Premium v2.2.1
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583517376.96/warc/CC-MAIN-20181023195531-20181023221031-00101.warc.gz
|
CC-MAIN-2018-43
| 918 | 4 |
https://jobs.epicor.com/job/monterrey/java-web-developer/432/8276794
|
code
|
Job Title: Java Web Developer
Location(s): Monterrey, Mexico
Epicor Software drives business growth.
We provide flexible, industry‐specific software designed around the needs of our manufacturing, distribution, retail, and service industry customers. More than 40 years of experience with our customers’ unique operational requirements are built into every solution―in the cloud, hosted, or on premises. With this deep understanding of our customers industries, Epicor solutions manage complexity, increase efficiency, and free up resources to enable our customers to focus on growth.
Role Summary/Purpose: This position is primarily responsible for supporting our Java based web solutions and projects, maintaining corporate and IT procedures and standards. The IT Java Developer will be supporting existing Java web solutions and developing new Java web solutions as required by the various corporate business unit teams.
- Perform daily support of Java web applications for business reported and other found issues or submitted enhancement requests.
- Participate in the change control process to implement both planned and unplanned application changes.
- Work closely with application teams and DBA systems administrators on current production system changes or upgrades.
- Upgrade Java platform and applications as required, with new Java versions.
- Be responsible for and/or assist in the design, development, unit testing and implementation of customizations and fixes for internal web systems used worldwide.
- Support the maintenance of Automated e-mail Notifications (SQL)
- Support the maintenance of reports on the Report Center (SSRS, SharePoint)
- Support the maintenance of data warehouses
- Elaborate and Document designs and test scenarios
- Document existing and new business processes
- Production Support focused on customer service
- Troubleshooting reported issues as required
- Fluent English.
- BS degree in Computer Science or related field.
- Experience troubleshooting Windows Servers.
- At least 4 years of experience in Java Web Application Development.
- Hands on technical knowledge of MVC development.
- Web services knowledge.
- Experience managing mid to large-scale Java solution development projects and sustainment.
- Experience troubleshooting issues in SQL Servers.
- Experience working on implementations of CMS, Intranet and/or Customer Portal websites.
- Experience on Customer Service.
- Experience working in multiple projects at the same time.
- Experience working with distributed teams around the world.
- Experience in technology migrations is a plus.
- In disposition to take meetings in work off hours.
Specialized or technical knowledge required
- Strong experience in following programming languages:
- Java 6 or above
- HTML / XML
- Strong experience in the following JAVA Frameworks.
- Spring MVC or any other.
- Experience using the following web servers and/or tools
- Apache Tomcat, IIS
- Maven, Ant
- SVN, Git
- Eclipse, Netbeans
- Hudson, Jenkins
- Angular JS
- Any experience with Microsoft technologies is a high plus such as:
- .NET project development in Visual Studio (C#, Visual Basic, etc.)
- SQL Server 2008 or above.
- SQL Server Integration Services (SSIS packages)
- Microsoft SQL Server BI Tools (SSIS, SSAS, SSRS)
- Microsoft TFS
- Crystal Reports
- MS Azure
FOLLOW US ON LINKEDIN - http://www.linkedin.com/company/epicor-software-corp
Epicor Software Corporation is proud to be an equal opportunity/affirmative action employer
What’s around You
Restaurants, bars, gyms and more. Take a look at the map to see what’s nearby.
Join our talent community
Send Us Your resume/CV
If you prefer, you can email your resume/CV directly to us and we'll contact you if a suitable role arises.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267864822.44/warc/CC-MAIN-20180622220911-20180623000911-00048.warc.gz
|
CC-MAIN-2018-26
| 3,765 | 59 |
https://community.graphisoft.com/t5/Collaborate-forum/Special-character-translation/td-p/2658
|
code
|
This was discussed briefly on escribe (click for escribe discussion). Is there a table of special characters that we can reference when mapping characters in the DWG translator? A few were listed in the previous discussion, eg. Alt+0248 = ø (small dia. symbol), but I get a lot more odd strings of text than I would like, and I would like to know what symbols are actually supposed to be showing.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499871.68/warc/CC-MAIN-20230131122916-20230131152916-00648.warc.gz
|
CC-MAIN-2023-06
| 397 | 1 |
https://magento.stackexchange.com/questions/297680/magento-2-2-0-reindex-through-command-is-not-working
|
code
|
I have setup magento 2.2.0 version and set index to update on scheduel. When I remove category from product and run
php bin/magento indexer:reindex command it's reindex successfully but when I check in front end it's not take any effect.
Anyone know how to solve it? Thanks in advance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571982.99/warc/CC-MAIN-20220813172349-20220813202349-00300.warc.gz
|
CC-MAIN-2022-33
| 285 | 3 |
http://www.cheathappens.com/show_board2.asp?headID=65781&titleID=6181&onPage=217
|
code
|
Idk the name.... I think it was some forum dedicated to gaming in the SW universe, got boring so i left...
thats a lot more then one word.
anyway, im real close to the hub, so i download stuff in a fraction of the time it takes.
it took me 7 min to download shivering isles for oblivion.
Anywho, I <3 you, Ho-Oh.
[Edited by Chingy42007, 8/20/2008 9:10:24 PM]
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661915.89/warc/CC-MAIN-20160924173741-00033-ip-10-143-35-109.ec2.internal.warc.gz
|
CC-MAIN-2016-40
| 358 | 6 |
https://rogercostello.wordpress.com/category/discovery/
|
code
|
Want to discover something or invent something? Discovering or inventing something that is completely new, that no one has ever conceived, is very unlikely (virtually zero probability). You are much more likely to succeed by taking an existing idea and applying it in a novel way.
Below is a quote from the book Hard Facts by Jeffrey Pfeffer and Robert I. Sutton. They are talking about the benefits to companies of using old ideas in new ways. However, I think this benefit applies to all of us, not just companies.
I have always (mistakenly) thought that research meant discovering/inventing something totally new. If I were Albert Einstein then perhaps I could do that. Since I’m not, I now realize that a better approach is to expand my learning to many different areas and then apply ideas from other areas to my area of research.
“Creativity is mostly sparked by old ideas. Both major creative leaps and incremental improvements come from fiddling with ideas from other places and blending them in new ways.”
“Better ideas result when people act like nothing is invented here and seek new uses for others’ ideas.”
“Unfortunately, too many companies are plagued by the not invented here syndrome, where people insist on using homegrown ideas, especially ideas that can be ballyhooed as new and different.”
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121528.59/warc/CC-MAIN-20170423031201-00207-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,326 | 6 |
https://www.milwaukeetool.jobs/Jobdetails?reqNumber=9804
|
code
|
Milwaukee Tool is undergoing a complete digital transformation and continuing our push to be even more cutting edge!
We are an industry-leading manufacturer of heavy-duty power tools, accessories and hand tools for professional users worldwide, and are looking to add a Senior Software Developer -- Front End to our team.
Duties and Responsibilities:
- Work as member of an agile software development team
- Enhance and support existing applications
- Work closely with analysts to identify and troubleshoot issues
- Collaborate with UX Designer(s) to create functional designs
- Translate UI/UX wireframes into functional interfaces
- Advocate and evangelize modern web design best practices
- Design, build, and maintain reusable web components using React/React Native
Education and Experience Requirements:
- Bachelor's Degree in Computer Science, Management Information Systems, or related field
- 5+ years work experience in software development or IT-related position
- 5+ years professional experience creating responsive, mobile-friendly websites
- Strong professional written and verbal communication skills
- Strong analytical and problem-solving skills
- Strong CSS skills, including pre-processors (Sass), animations, flexbox, etc.
- Client-side testing tools including Jest and Enzyme
- .NET Core
- Git/other source control
- Example of projects/work demonstrating skillset
- Experience building web layouts from scratch
- Experience using CSS and UI frameworks including Ant Design, Bootstrap, etc.
We're progressive problem solvers that help build the world -- come join us and let Milwaukee Tool build your career!
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046151638.93/warc/CC-MAIN-20210725045638-20210725075638-00663.warc.gz
|
CC-MAIN-2021-31
| 1,631 | 24 |
https://budgettrainerbuild.wordpress.com/
|
code
|
In recent news, I’ve combined the code from my various test harnesses into a single control process (plus the PRU firmware).
I’d be the first to confess the code is a bit ugly as it stands – it’s clearly several separate programs squished together with some threading and (far too many) globals! However, I’ve plenty of time to re-factor and tidy up the codebase, and it’s functional enough to get me started on the next steps. I’ve also added a rudimentary ncurses console interface for mode selection & feedback.
On the power side, I’m transmitting as an ANT+ power meter, broadcasting the ‘power only’ data page (0x10), which reports instant & accumulated power in watts (as well as optional cadence and L/R power balance values – which I’m ignoring). With a small patch to Golden Cheetah, I’m capturing the per-second data from both the PowerTap and Trainer devices into the training mode .csv files, from where I can export it into a spreadsheet for easy analysis. I’ve also got a small python script to extract all the power messages from the GC antlog.bin files (where all the ANT+ traffic is logged) in case I need a closer look at the original 4hz message data.
The data as graphed below came from a training .csv file, with the trainer firmware using a simple 4 sample (1 second) moving average for the acceleration component of the power figure.
With power tracking pretty well, I’ve also started thinking about speed reporting. ANT+ speed messages are essentially broadcasting the time taken for a single wheel revolution, where they are then converted to speed at the receiving side based on a pre-configured wheel size. The wheel rotations could be sent in either speed or power (wheel torque) messages.
From my trainer perspective, I can calculate the road speed very easily, but have no insight into the actual wheel size. If I were to store my own configuration parameter for wheel size, I could work back and provide the necessary fake wheel speed timestamps. The downside is that any changes to wheel size would need to be manually set in two places instead of one.
Another hiccup is that the power message that includes the wheel rotations is the ‘wheel torque’ data page (as broadcast by a PowerTap). Instead of power in watts, this transmits the data as wheel speed and torque, which is then converted to watts on the receiving side. Again, I could just work back and provide the necessary ‘fake’ torque figures to make it all add up, but is starting to feel like a lot of effort for minimal gain…
I suspect it may be easier to present as a dedicated speed sensor alongside the power sensor. But for the moment, I’ll just park the speed reporting in the ‘things to consider later’ pile. Both bikes that I’m testing with already have ANT+ speed data (coming from either a S&C sensor or PowerTap), so doesn’t actually gain me anything just yet.
ANT+ Trainer Profile
I’ve also been wondering whether the upcoming (and snappily named) ANT+ Fitness Equipment – Control (i.e. Trainer) profile might have a provision for either passing road speed to, or receiving wheel size from, a head unit. Either would help make the above speed situation a bit simpler. Unfortunately (for me), this profile is still in it’s ‘competitive advantage’ phase, where it’s only available to paid-up ANT+ Members, not to freeloading ANT+ Adopters like myself!
On a related note, I’ve been working on the assumption that this new ANT+ profile will be available by the time I’m ready to start adding the variable resistance control back in. However, nothing seems to be moving very fast (on either count) at the moment. I think I also have a plan B, which would be to respond to the control messages used by Wahoo for their Kickr trainer, which should at least allow me to hook up to some 3rd party trainer software platforms for further testing.
Next job is to get back into the workshop, and make up some new magnets & mounts for the eddy current brake…
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195524522.18/warc/CC-MAIN-20190716095720-20190716121720-00291.warc.gz
|
CC-MAIN-2019-30
| 4,016 | 12 |
http://forum.ragezone.com/f353/source-blackbird-rp-r63-784628/index14.html
|
code
|
Well theres a few things.... 1. We could be using something completely diff that u. Our vps could be diff from urs. Our anything could be diff. And its not hard to setup. I got it running. Just a gay authenticator error.
200th Post (In topic)
Ontopic: I wouldn't recommend using this, from the issues people have been having, it seems this is a rushed release, and is just to prove that he has left.
Nice work, downloading now, hopefully its good:)
I decided to set this up since everyone is having issues, so far just done the CMS, go to setup.php
Replace the following:
$fp = fopen('../inc/cache/site.cache', 'w');
Then run setup.php, if you were an idiot and ran before changing path link, then run it again, or it will try to go to the default hamachi IP.PHP Code:
$fp = fopen('inc/cache/site.cache', 'w');
Alright, found something else on the main site, (with the default style not tested all others, but probably a global error, because the SQL cache or whatever isn't there so all I did was comment out on the:
So do this at your own risk, or whatever..PHP Code:
public function save_sql($result, $sql)
$fp = fopen(BASE.'cache/sql/'.md5($sql).'.cache', 'w') or die('ERROR');
- Cheers.PHP Code:
//$fp = fopen(BASE.'cache/sql/'.md5($sql).'.cache', 'w') or die('ERROR');
- EDIT -
I'll get you guys a SWF pack and give you all the files set up!
Last edited by Sledmore; 16-10-11 at 06:43 PM.
It just goes to show.. That someone actually knows what they're doing.
What did I remove?
The 'Mock Installer'.
The 'GUI' which wasn't used.
Most of the Resharper bits, etc..
Mysql.data - not needed..
SWFs - Credits go to oleaa for them, I just put them on my website and set them up for you.
CMS - I didn't clean the folder structure, just did the 2 simple fixes so it would run for you.
Emulator - Just removed the license check and cleaned up the folder structure, so it's easier for you.
Database - Did nothing, just imported it to test it out.
How do I run this?
1) Upload the database
2) Put in your database information in setup.php
3) Do the path and other options in setup.php
4) Run setup.php (http://sitepath/setup.php).
5) The SWFs have been left simple, just drag the 'data' folder to the root of your directory.
6) Edit the IP in the data/gamedata/external_variables.txt - (it's 127.0.0.1 defaulty, change to yours).
7) Edit the IP in client.php (if your running this on your local machine as a test, this is all done same with SWFs).
8) Edit the config file in the emulator.
9) Run the emulator!
NOTE: Each time you update setup.php - rerun the file.
Last edited by Sledmore; 16-10-11 at 07:29 PM.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123048.37/warc/CC-MAIN-20170423031203-00466-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 2,607 | 40 |
https://www.kashifali.ca/2014/02/new-york-times-others-attacked-with-leaked-ftp-credentials/
|
code
|
Some organizations are apparently still using the venerable FTP protocol for moving files around. Credentials for more than 7,000 FTP servers are being traded between nefarious types and used to break into servers including those of The New York Times. The access has been used to plant malicious PHP files and HTML in a bid to backdoor servers and redirect people to malicious sites.
According to security firm Hold Security, the FTP servers and credentials range from small personal sites to large multinational corporations. Where the list came from, and who put it together, is unknown.
The credentials themselves are a mix of anonymous and default accounts, with passwords ranging from simple to complex. This is suggestive that some, at least, have been acquired through phishing or client-side malware rather than guessing or brute-force password cracking. Given that FTP passes the credentials unencrypted, there are many exciting ways that the information could have been taken: passive sniffing of traffic at a café hotspot would do the trick, for example. This is one of the reasons that use of the protocol has largely fallen out of favor.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474470.37/warc/CC-MAIN-20240223221041-20240224011041-00697.warc.gz
|
CC-MAIN-2024-10
| 1,152 | 3 |
http://books.gigatux.nl/mirror/beaweblogic8.1/0672324873_fm01lev1sec4.html
|
code
|
Source Code and Updates
Source code for all the examples discussed in this book is included on this book's accompanying CD-ROM. You'll find detailed instructions for installing the CD-ROM and a list of the CD-ROM's other contents in the back of the book.
If we discover any errors in the book after publication, errata will be posted at this book's page at Sams' Web site. Please visit www.samspublishing.com, type this book's ISBN (0672324873) into the search window, press Enter, and you'll be taken to a page with links to errata and updates to the book.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202635.43/warc/CC-MAIN-20190322054710-20190322080710-00480.warc.gz
|
CC-MAIN-2019-13
| 557 | 3 |
https://optimhire.com/pages/developers/935869-qa-analyst
|
code
|
Now you can Instantly Chat with Henrik!
• Planned and performed manual and functional project testing and reported defects. • Wrote test cases and scripts for use with Selenium automation in C# and typescript with protractor. • Performed regression and smoke testing in J meter •...Show More
The project worked was a Online pdf viewer tool via which we can view the pdf documents
through web. It has some additional functionalities like drawing annotations,highlighting ,
making comments etc. For Automation we use selenium webdriver for automating the UI
payment gateway Project
The Project is based on Payment domain.The main functionality is to check the
request and response of transactions done by different type of credit card
networks.For Automation we use Jmeter for request and response.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950110.72/warc/CC-MAIN-20230401160259-20230401190259-00024.warc.gz
|
CC-MAIN-2023-14
| 804 | 9 |
https://cloudproxy.diladele.com/docs/install/k8s/verify/
|
code
|
To verify the installation, open your browser and navigate to the external IP address of the service. If everything is configured correctly you would see the login screen of Cloud Proxy.
Passw0rd credentials to login.
Installation on bare Kubernetes cluster on-premises requires quite a lot of administrative efforts. Luckily installation of Microsoft Azure Kubernetes Services or Google Cluster Engine is much more simple.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510707.90/warc/CC-MAIN-20230930181852-20230930211852-00140.warc.gz
|
CC-MAIN-2023-40
| 423 | 3 |
https://forum.videohelp.com/threads/222812-from-karaoke-dvd-to-karaoke-vcd?s=9e01a53e0f4eaa1a09c08b4e8ff5affc#post1293580
|
code
|
my friend got this karaokes dvds, but my machine is old and only takes vcds, is there a way to convert those dvd to vcds to play in my karaoke machine ?
+ Reply to Thread
Results 1 to 6 of 6
There should be no problem with converting those DVD to VCD. I'm not sure if the text is a subtitle on the kareoke DVD or if it's encoded within the video stream. If it's as a separate subtitle you have to encode the subtitle with the video if you are making a VCD as VCD doesn't support subtitles.
However if the text is within the video, then you can simply convert the DVD to a VCD. There's a lot of guides for that here at Videohelp. Check them out.
Audio may be a little tricky:
DVD audio may be simple 2 stream switchable, or could be VCD-style [L vs. R] channel switchable, or could be true "Karaoke-mode" DVD which is similar to normal 5.1 audio, but each channel is mixed live together (in ways decided by the user) to form the composite sound (e.g.: Vocal Guide + Harmony + Background Music (stereo)).
Depending on which type, there will be different methods to extract/combine/recode.
the dvd seems to have 2 different audio. lpcm and ac3. now the question is how do I convert this to vcd and keep the chapters ?
Rip DVD with DVD Decrypter & Demux streams.
MPEG2 video, as M2V
LPCM audio, as WAV
AC3 audio, as AC3
Chapter log, as ?TXT?
Many usual ways here...ex: D2V-->TMPGEnc-->M1V file
Make sure you create I-frames at the frames listed in the Chapter Log.
Open WAV in CoolEdit (or similar), mix to mono WAV. Save as "***_L.WAV"
Open AC3 in BeSweet, convert to PCM/WAV. Then do the same as LPCM WAV above, but save as "***_R.WAV"
Open both in CoolEdit (multitrack mode) and mix down to new Stereo WAV.
Convert to MP2 in TMPGEnc (224kbps, Dual Mono, 44100Hz)
Mux using TMPGEnc tools to create MPG
Make VCD in VCDEasy, using Chapter log to create chapters.
wow ! seems like a lot of work.
but Im on it.
thanks man ! u rock
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679103464.86/warc/CC-MAIN-20231211013452-20231211043452-00834.warc.gz
|
CC-MAIN-2023-50
| 1,924 | 25 |
https://help.domotz.com/release-notes/website-performance-monitoring-docker-containers/
|
code
|
We’ve just released exciting new features on Domotz. Our new features include website performance monitoring, docker container monitoring, Sony AV integration, pre-configured SNMP sensors for Synology NAS. Keep reading to find out more!
In summary, here’s what’s new on Domotz this month.
Additionally, October is Cyber Security Awareness Month so we’ve added some tips on how Domotz features can help you meet the Center for Internet Security (CIS) Controls. Learn more.
Website Content and Performance Monitoring
We now have Website Content and Performance Monitoring available through Domotz. Leveraging our Custom Integration Drivers framework you can proactively monitor the generic content of any HTTP/HTTPs based pages on the website you manage.
Our website performance monitoring allows generic HTTP based monitoring for the content of your pages in PHP, HTML, JSON and other formats.
In summary, here’s what you can do with this new integration:
- Extract the content of any HTTP/HTTPS based page
- Check whether a specific content can be extracted from the page
- Verify the return status code (HTTP/HTTPS call)
- Measure the elapsed time for the execution of each call (response time)
For more information, please visit Website Performance Monitoring on the Domotz website.
Docker Container Monitoring
You can now monitor Docker Containers, Images and Daemon/Engine configuration directly through Domotz. Leveraging our Custom Integration Drivers framework you can proactively monitor the performance of each Docker Container running on your platform, as well as the images available or the configuration of the Docker Daemon/Engine.
The new integration allow you to automatically identify and monitor the performance of all the containers running within the Docker instance. Moreover, it lists and monitor the information about the images available at the Docker engine level. Finally, it allows to review the configuration of the Docker engine itself.
For more information, please visit Docker Container Monitoring on the Domotz website.
Advanced SONY Integrations and Features
In partnership with SONY, we’ve released new integrations for the following devices:
- Audio-Video Receivers (AVR)
- Sound Bars
Additionally, we’ve got new drivers for Sony AV systems that enable you to have fast and efficient remote access to them.
In summary, the new integration with Sony devices enables you to:
- Perform better device recognition
- Remotely control displays and TV
- Grab the status of Sony projectors by leveraging the SONY SNMP MIB
- Monitor the status of the network connected sound bars (e.g. used in Conference Rooms)
For more information, visit the Sony AV integration with Domotz.
Pre-configured SNMP templates for Synology RAID and Disk SMART
We’ve added two new set of pre-configured SNMP sensors for Synology NAS drives:
- RAID Volumes: for each RAID configured on the Synology NAS, Domotz will monitor the status, the usage and how much Free storage is still available
- Disk SMART information: for each disk and variable of the Disk configured on the Synology NAS, Domotz will monitor the status of the variable and the value (for instance Airflow Temperature, Command Timeout, Pending Sector, E2E Errors, Power Cycle Counts, etc)
Additionally, for each sensor retrieved through the Pre-Configured SNMP template, Domotz enables you to get a graphical representation of the historical values:
Lastly, for more information, please visit Pre-configured SNMP Sensors.
Additional MIBs available in the Domotz Database
Additional MIB files are available for the following devices. Additionally, you can search for their OIDs from Domotz:
- SONY Projectors
- ATEN MIB
- AirSpan MIBs
- SonicWall suite
We’ve fixed the following issues:
- There’s a fix for typing search queries in the Inventory dashboard occasionally resulting in overlapping results.
- Cisco IOS unlock was missing scp setting checks.
- Highlighting text in pop-up caused the pop-up window to close.
- Missing space in the list of IP addresses in the device history page (for IP changes).
- Some entities were not in sync between the Inventory Dashboard and Site Explorer.
- An issue in retrieving the Network Interface of the device hosting the Agent has been fixed (requires Agent Version 4.5.2).
- Control4 driver was wrongly parsing ZMAN results.
- SAML Assertion did not accept Japanese chars (Azure).
- An issue was preventing the possibility to select some TCP ports in TCP Service monitoring.
- Fortigate Configuration Management was wrongly highlighting “timestamp” fields as differences.
- Pre-Configured SNMP template for Network Interface is now extracting only physical interface data (reducing the number of variables)
- Firstly, Monitoring Dashboards are currently limited to Monitoring Tables as Widgets. Furthermore, they do not report some variables (e.g. the ones created by the Custom Drivers, Pre-Configured SNMP Sensors and OS Monitoring) within the Monitoring Tables.
- Luxul Router-based Agents do not support VPN on demand. To elaborate, we’ll add this capability as soon as Luxul’s team provides us with the required API resources.
- Devices with multiple network interfaces (multiple MAC addresses) can’t be merged into a single device. This affects some types of switches that appear as multiple instances on Domotz when VLANs are configured.
- The static IP address on the Domotz Box cannot be configured before configuring the Agent.
- Lastly, DHCP cannot be leveraged on additional VLANs on the Domotz Box.
To conclude, these release notes cover the changes in the Domotz Pro service since the previous one. Furthermore, these changes include Domotz Pro cloud, Domotz Agent, and Domotz Pro App.
Lastly, to learn more about check out our network monitoring software or check out our Know Your Networks Blog.
Share via Social Networks
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474643.29/warc/CC-MAIN-20240225203035-20240225233035-00770.warc.gz
|
CC-MAIN-2024-10
| 5,878 | 59 |
https://www.dk.freelancer.com/projects/statistics/code-that-can-answer-questions/
|
code
|
To do a code in R that can answer my questions for a problem
11 freelancere byder i gennemsnit $123 på dette job
Hello, How are you? I have a lot of experiences in R programming. I read your project carefully I can do it well in short time with high quality. Please contact with me. I will wait your response. Best regards.
Hello, I am a data scientist and R programmer. I can write you custom code that will answer your questions. Just initiate a conversation so we can discuss further details. Thank you,
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195529737.79/warc/CC-MAIN-20190723215340-20190724001340-00254.warc.gz
|
CC-MAIN-2019-30
| 507 | 4 |
http://composites.blogspot.com/2007/05/solutions-manuals-i-have-received.html
|
code
|
I have received requests for copies of the solution's manual to my textbook(s) from self-learners, not enrolled in a formal course. Well, I relinquished the copyright (c) of the solution's manual to the publisher back in 1998, so they control the distribution. Even if I could hand out copies, I don't think it is a good idea. The solution's manual is of negligible pedagogical value to a self-learner. It was conceived only as help to the "instructor of a class", not to be used by students learners as a supplement or complement to the textbook. In fact, a self learner will be best served by his/her efforts to solve problems at the end of the chapters w/o resource to solutions, checking to see if the solutions make sense using engineering judgment. In real life, and engineer must solve problems for which the solution does not exist.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547584431529.98/warc/CC-MAIN-20190123234228-20190124020228-00113.warc.gz
|
CC-MAIN-2019-04
| 840 | 1 |
http://www.ssnakess.com/forums/12021-post18.html
|
code
|
See i have to agree with mary on this one ..
I do totally put human values to my snakes .. and I can't help it! i think it enjoys the company of others .. I think it enjoys a new enviroenment .. the real sun .. the grass.. and on and on ..
Just like I think it enjoys mulch instead of newspaper with a nice natural set up with plants hide waters and brancehes everywhere instead of a box, bowl and newspaper..
Again this is totally oppinions . but that is where i stand!
1.3 Coastals 6.6 Jungles
3.4 West Papuan 1.0 Bred'ls
1.1 Yellow condas 0.1 Sebea
**looking for female Bredl's python**
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719960.60/warc/CC-MAIN-20161020183839-00124-ip-10-171-6-4.ec2.internal.warc.gz
|
CC-MAIN-2016-44
| 589 | 8 |
https://www.qaratest.com/integration-with-popular-bug-tracking-tool
|
code
|
Track bugs and manage test cases with JIRA integration
Keeping in mind the requirements of an agile enterprise, the tool supports integration with JIRA – one of the most popular bug tracking and test management tools. This feature lets testers store all the test artefacts and gives them the flexibility to manage projects from the test management User Interface of QARA Enterprise.
Test Matrices Report: The test matrices report gives detailed results of “Daily Testcase Execution Progress”, “Testcase Status” & “Testcase Executions by Tester” for the duration of 15 days, 30 days, 45 days, etc. It acts as the monitor and provides improvement for the current process if any.
Test Summary Report: The test summary report summarizes the results of creation and execution of the test cases for the duration of 15 days, 30 days, 45 days, etc.
Traceability Report: The traceability report traces linkages from Release to Bug. It facilitates Improved Test Case Management & Simplified Defects Triage for large defect backlogs.
Integration with JIRA:QARA Enterprise provides support to JIRA users. With valid login credentials, users can login and import projects from JIRA, create JIRA test cases, add or edit bugs.
Unified layer of management:QARA Enterprise acts as a unified layer of management, where testers can create test cases, execute them and also keep a track of the project bugs created in JIRA.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474361.75/warc/CC-MAIN-20240223053503-20240223083503-00807.warc.gz
|
CC-MAIN-2024-10
| 1,417 | 7 |
https://testbook.com/question-answer/a-competitive-firm-will-maximize-profit-at-the-out--5f841a010ab57deb4d75a870
|
code
|
A perfectly competitive firm has only one major decision to make, that is, what quantity to produce.
The basic definition of profit:
Maximum Profit = Total revenue − Total cost = (Market Price) × (Quantity produced) − (production cost) × (Quantity produced)
Because of the equilibrium price of sell, the only variable is the quantity to be produced and that will decide the profit.
Perfect competition describes a market structure where competition is at its greatest possible level. To make it more clear, a market which exhibits the following characteristics in its structure is said to show perfect competition:
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780058467.95/warc/CC-MAIN-20210927181724-20210927211724-00539.warc.gz
|
CC-MAIN-2021-39
| 620 | 5 |
http://snubdunsdowb.bloog.pl/id,365375220,title,Wificracker-426-For-Windows-7,index.html?smoybbtticaid=61accf
|
code
|
Wi-fi--cracker 4.2.6 For Windows 7
How to Crack a Wpa2-Psk Password with Windows Rumy IT Tips
How to Crack a Wpa2-Psk Password with Windows :- It,s very common question on the internet to How to hack a Facebook account password and how to hack a WiFi password.
GitHub - savio-code/fern-wifi-cracker: Automatically .
Join GitHub today.. GitHub is home to .. v2.4 2.6 2.5 .. Fern Wifi Cracker is a Wireless security auditing and attack software program written using the Python .
Fashion & Accessories
wifi password cracker software for windows 7, Kundli for Windows Pro Edition 4.53, Email Password Hacking Software 184.108.40.206, Windows Password Recovery Software 220.127.116.11
Best Wi-Fi Password Cracker Software for Windows
5 Best Wi-Fi Password Cracker Software for Windows 1.. Aircrack Wi-Fi cracker software.. Aircrack is one of the most popular wireless passwords cracking tools that .
Easy WiFi - Download
Easy WiFi, free and safe download.. .. Windows 7; Windows 8; Also available for.. Mac Easy WiFi is also available in other platforms Downloads 1M .
WiFi Hacker - WiFi Password Hacking Software 2018, wifi .
Wifi hacker for android is best and available in app mode.. Wifi hacker for windows 7, 8, 8.1 is handsome and best choice for all developer.
Download Free WiFi Software - Canadian .
154.47 K For Windows 7, .. then Intel PROSet/Wireless WiFi Software is certainly useful for administering WiFi and Bluetooth wireless networks.. .
Cannot install .Net framework 4.6.2 on Windows 7 (SP1 .
My operating system is Windows 7 64-bit.. It's my most reliable PC, so I'm really hoping there's a solution.. Thanks.. :) Reply I have the same question (51) .
pentium 4 with windows 7? TechPowerUp Forums
how slow would windows 7 be with a 2.9?ghz 90nm p4 (dont know model name) radeon x800se 512mb ddr (dont know speed) this would be for my friends.
Fern Wifi Cracker Download For Windows 7
The fern wifi cracker download for windows 7 and Family Code bar the short configuration of operational bytes, using that line is to be the auxiliary Delivery of .
introduction to management accounting horngren 15th edition pdf download.rar
Karafun studio 1.20 full crack
Mldownloader V7 1 0 9 Incl Keygen Lz0 Rar
blaupunkt radio code calculator
MAME 0 37b11 Full romset GP2X Wiz MAME 2 0 | checked
revit architecture 2014 ita torrent
product key for learn next
tai phan mem microsoft access 2003 mien phi
watching my mom go black katie angel
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813109.36/warc/CC-MAIN-20180220204917-20180220224917-00061.warc.gz
|
CC-MAIN-2018-09
| 2,442 | 30 |
https://answers.sap.com/questions/4196714/income-tax-to-be-deducted-in-the-next-period.html
|
code
|
I need your valuable suggestions to solve this issue. My client wants to deduct employee's income tax by the next period for whose Income tax is below 100/-. say for eg: if an employee's income tax is 60/- for April period. But that will be deducted in May(April+May). Can you plz. guide me to resolve this isuue...
Thanks for your timing
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506329.15/warc/CC-MAIN-20230922034112-20230922064112-00301.warc.gz
|
CC-MAIN-2023-40
| 338 | 2 |
https://www.hilarispublisher.com/proceedings/from-complete-catalogs-to--23504.html
|
code
|
Accepted Abstracts: J Comput Sci Syst Biol
Next-generation sequencing has become a revolutionary tool for cancer research. However, there is still a big gap between complete catalogues of genomic alternations identified from NGS studies and ?actionable? shortlists for further functional investigation. Using my two recent studies (RNA-seq in gastric cancer and exome-seq in endometrial cancer), I will discuss how to identify ?driver? genes underlying the tumorigenesis. In the first study, we performed a comprehensive analysis on the whole-transcriptome of gastric cancer, and developed a multilayer and integrative analytic framework for identifying potential therapeutic targets from RNA-seq data (Kim et al., Cancer Research 2012). In the second study, we developed an integrated systems-biology approach to identifying driver somatic mutations from whole-exome sequencing data, which combines bioinformatics prioritization, a high-throughput approach to generating mutants and high-through cell viability assays (Liang et al., Genome Research 2012).
Liang received Ph.D. training from the Quantitative and Computational Biology program at Princeton University in 2006. As a postdoctoral researcher, Dr. Liang completed three years of research on computational and evolutionary genomics at the University of Chicago. Currently, Dr. Liang is an Assistant Professor in the Department of Bioinformatics and Computational Biology at the University of Texas MD Anderson Cancer Center and he is also a faculty member in Graduate Program in Structural & Computational Biology & Molecular Biophysics in Baylor College of Medicine. His research interests include the analysis of next-generation sequencing data, the integration of cancer genomics data, microRNA regulation, and the evolutionary process of tumor cells.
Journal of Computer Science & Systems Biology received 2087 citations as per Google Scholar report
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943698.79/warc/CC-MAIN-20230321131205-20230321161205-00207.warc.gz
|
CC-MAIN-2023-14
| 1,914 | 4 |
https://meta.askubuntu.com/users/621786/bebs
|
code
|
- Music Fans 7.5k 7.5k 55 gold badges1919 silver badges7070 bronze badges
- Science Fiction & Fantasy 4.8k 4.8k 44 gold badges2121 silver badges6565 bronze badges
- Movies & TV 4.7k 4.7k 55 gold badges2929 silver badges6868 bronze badges
- The Workplace 1.7k 1.7k 11 gold badge1313 silver badges2222 bronze badges
- Stack Overflow 1.3k 1.3k 33 gold badges1616 silver badges2424 bronze badges
- View network profile →
Top network posts
- 66 Why would Arya reveal her fighting ability?
- 60 My colleague is constantly blaming me for his errors
- 53 Why is Jon Snow's hair black?
- 47 As an interviewer, how to conduct interviews with candidates you already know will be rejected?
- 44 Should my manager be aware of private LinkedIn approaches I receive? How to politely have this happen?
- 42 Is the computer cheating at Dice Poker?
- 31 Why did Sansa refuse to leave with Sandor Clegane (the Hound) during the Battle of Blackwater?
- View more network posts →
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146940.95/warc/CC-MAIN-20200228012313-20200228042313-00199.warc.gz
|
CC-MAIN-2020-10
| 962 | 15 |
https://developers.shopbase.com/build-a-theme/theme-development-resources
|
code
|
Theme development resources
ShopBase Theme CLI helps you develop themes for ShopBase easily.
To install the new package, use one of the following commands. You need administrator privileges to execute these unless npm was installed on your system through a Node.js version manager (e.g. n or nvm).
npm install -g @shopbase-theme/cli
yarn global add @shopbase-theme/cli
To get started, you need to log in to your Partner account (make sure you request to create partner account here)
After authenticated by using your email & password, you can use the following command to create a new theme.
shopbase-theme create new-theme
To view all available command, use the help command
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100081.47/warc/CC-MAIN-20231129105306-20231129135306-00006.warc.gz
|
CC-MAIN-2023-50
| 675 | 9 |
http://www.stoprm.org/presentations/
|
code
|
Here is a list of useful presentations that will provide a good deal of background learning on the subject.
- Schneider, Rick (Pfizer), 2016. Piloting the progression of reactive metabolites through drug discovery. Royal Society of Chemistry, Maggi Churchouse events, 8-9th Feb.
- Claesson (Awametox Consulting), 2012. Reactive Metabolites – Hints How to Avoid a Drug Safety Hazard. Presentation at the Slideshare site.
- All 7 presentations from the SCI conference ”Designing Safer Medicines in Discovery: Current and Emerging Opportunities to Reduce Attrition”, 25th March, 2011:
- Kalgutkar (Pfizer), 2010. Metabolic Activation and Idiosyncratic Drug Toxicity: By Avoiding Structural Alerts, Do We Mitigate Risks?
- Baillie (Univ Wash), 2010. Metabolic Activation and Covalent Binding: Significance in Lead Optimization and Relevance in Drug Development.
- Dalvie (Pfizer), 2009. Approaches to Mitigating the Bioactivation Potential of Compounds in Lead Optimization.
- Crespo (Almirall), 2008. Reactive Metabolites and Drug Safety.
- Arindam Pande. Drug induced hepatitis and its management
More to come
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585204.68/warc/CC-MAIN-20211018155442-20211018185442-00090.warc.gz
|
CC-MAIN-2021-43
| 1,113 | 10 |
https://gitlab.developers.cam.ac.uk/uis/devops/devhub/docs/-/wikis/What-do-we-mean-by-%22live%22%3F
|
code
|
The live phase follows the beta phase. In the live phase of a service we:
- Are able to support the service in a sustainable way.
- Continue developing, testing and monitoring the service.
- Continue to work with end users.
- Continue to address constraints identified in beta.
- Maintain the performance and quality of the service.
As part of the transition from beta to live, we have:
- Worked out what level of continuous improvement is sensible to support for a particular service.
- Created all the base functionality needed for the service users.
- Opened the service for all users to use and test.
- Ensured the the service is accessible to all users. This is not just in terms of accessibility but making sure users understand how to use the service.
In the future, the service might need to be retired. This happens if the users no longer need it or if there are not enough users for the service to be run in a cost effective manner.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588102.27/warc/CC-MAIN-20211027053727-20211027083727-00663.warc.gz
|
CC-MAIN-2021-43
| 942 | 12 |
https://www.casinomeister.com/forums/threads/providers-moving-the-goal-posts.87975/page-29
|
code
|
Oh is that the method of slot success.
Once my compo arrives I’ll use the lot on bloatgoats ‘method’ and report back when I’m a millionaire.
Yeah, thats how i do with Dead or alive.
One ip-adress have about 2-3 wildlines in it before it gets targeted by the slot-mafia webhackers.
Thats why you have to swap ip every now and then, so they dont lower your rtp to 0%.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945376.29/warc/CC-MAIN-20230325222822-20230326012822-00031.warc.gz
|
CC-MAIN-2023-14
| 373 | 5 |
https://healingbutterfly.nl/nl/shop/designs/product/73-abundance-is-my-birthright-wallet
|
code
|
~▪︎The Abundance Wallet▪︎~ is One of them
This Code came through really clear
Our BIRTHRIGHT is Abundance,
We ARE abundance,
There is !nothing! wrong with abundance,
This Code clears unconscious sabotaging thoughts and programming about money and opens you for a flow of abundance.
And i mean Abundance in every way ♡ so you become a money Magnet.
It is important for the money that wants to come your way, that you can place it in a clean environment (your wallet). Everything is energy, so if you have an old, ugly Wallet, with a lots of old Stuff in it, thats not a good environment for you to put your money in.
Thats why i thought, i need to create a wallet for abundance ♡
The code is handdrawn ♡
I will charge each one of them with my own light/heartlanguage before i send them to you ♡ and charge them up in a crystalGrid.
Investment in your own Abundance: 44,88 eu. Excl. Shippingcosts (from Holland)
4+4=8 & 8 & 8 = 888 = Abundance Frequency
I am not sure yet if i am going to make more wallets like these.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100632.0/warc/CC-MAIN-20231207022257-20231207052257-00732.warc.gz
|
CC-MAIN-2023-50
| 1,032 | 14 |
https://support.boulevard.io/en/articles/6241836-marketing-suite-creating-and-managing-audiences
|
code
|
Audiences are managed within the Clients Tab. To create an audience first you have to select a filter. Clients can be filtered by visit type, service provider, date of last appointment, and referral source, in any combination therein. After the desired list is created, it can then be exported to a CSV file.
Creating an Audience
From the Clients tab, check the boxes on the right of the screen to select from what was Purchased, who the Provider was, when their Last Appointment occurred, and the Referral Source. Multiple boxes can be checked. To the right of every checked box is the specific number of individual clients that fit that search criteria. Once you have selected at least one filter a Save Audience button will appear on the right side of the screen. Pressing that button will open a model that lets you name the Audience and write a description for it.
Editing & Deleting an Audience
Once you have created an Audience it will show up at the top of the list of selections. Changing the filters in the Audience will automatically update it. Clicking the Edit Audience button on the top right will open a model that lets you update the Name and Description. You can also delete an Audience using the Delete Audience button on the bottom left.
Note the system will not allow you to delete an Audience that is part of a scheduled One-Time Blast Campaign.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499654.54/warc/CC-MAIN-20230128184907-20230128214907-00625.warc.gz
|
CC-MAIN-2023-06
| 1,366 | 6 |
http://www.wewebu.com/en/search-retrieval&301=wewebu-software.com
|
code
|
Search & Retrieval is the base functionality of every ECM system. However, it can be tedious to find the wanted documents, eFiles or other data among millions of objects.
Not so with OpenWorkdesk.
Its role-management assures that every user group gets a selection of search forms that fits to its job profile and requirements. Various formatting options allow to group the input fields in a logical order or to make them available via tabs. Default values pre-populate fields so that the user does not have to type in the values. Furthermore it is possible to present only the relevant fields to the user, hide the rest and populate it with wildcards or default values. Even logic and dependencies between fields can be easily implemented, e.g. the selection of a country in one field would automatically lead to a drop down selection list of the corresponding states in another field. If the underlying ECM system supports full text search of course OpenWorkdesk can provide an appropriate search field. A filter function in the hit list allows further refinement of the search results without the need to execute a new search. OpenWorkdesk can be configured also such that if a search results only in one hit the respective object will be directly displayed. Often users want to execute the same search several times, e.g. search for all documents belonging to a certain customer. To this end searches can be saved and executed again and again either from the favorites tab of OpenWorkdesk or from the respective search form. The search can also be extended to span several ECM systems and provides the search results in one common hit list.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368702444272/warc/CC-MAIN-20130516110724-00073-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 1,643 | 3 |
https://discourse.ladybug.tools/t/energy-not-writing-csv-on-rhino-6/3072
|
code
|
The following file only works properly in rhino 5 and I cant get it working in rhino 6. E+/open studio
will not output a CSV, but seems to output all other files. Ive tried it on another computer as well with both 5 and 6 installed. Why is this happening? Can it be recreated on someone elses computer?
Im running IronPython 2.7.8
internalized script e .gh (849.5 KB)
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100184.3/warc/CC-MAIN-20231130094531-20231130124531-00073.warc.gz
|
CC-MAIN-2023-50
| 367 | 4 |
http://glocktalk.com/forums/archive/index.php/t-1270031.html
|
code
|
View Full Version : Need help identifying these revolver grips
I have this old pair of Herrett Shooting Stars and I don't know what they fit. My guess is they're for a Colt but I can't tell what frame design. Can anyone tell what they fit from the pics? Thanks.
With the double-bump prawl at the top, the wide flare at the base, and the "P" in the model number/code, I'd guess Colt Python.
Or you could call/email Herrett's Stocks and ask them:
I didn't see that model code in their current listings, but I might have missed it. Looks like they have a lot of possible combos when you include checkering options and such. EDIT: They might be the Roper model for the Python, with optional fine-line checkering (that would explain the "RP" model designation).
Thanks for your help. I found the information I was looking for. They fit E/I Frame: Official Police, Officers Model, Python, Trooper.
vBulletin® v3.8.7, Copyright ©2000-2013, vBulletin Solutions, Inc.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164014082/warc/CC-MAIN-20131204133334-00008-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 960 | 7 |
http://videoblogsterpro.com/mommy-wants-to-play-poppy-playtime-chapter-2-playthrough-1/
|
code
|
Mommy Wants to Play! || Poppy Playtime: Chapter 2 (Playthrough #1)
Poppy Playtime: Chapter 2 has arrived. This is part 1 of a full playthrough of Poppy Playtime Chapter 2. Can we escape survive Mommy Long Legs and the other killer toys residing within Playtime Co? Watch on to find out…
Check out Poppy Playtime: https://store.steampowered.com/app/1721470/Poppy_Playtime/
PC Specialist built the PC I use: https://pcspeciali.st/superhorrorbro
Use promo code HORROR for £30 fixed discount on any order
You’ve been watching SuperHorrorBro Mike. If you enjoyed this video remember to like, comment and subscribe for more horror related content.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662562410.53/warc/CC-MAIN-20220524014636-20220524044636-00222.warc.gz
|
CC-MAIN-2022-21
| 646 | 6 |
https://slashdot.org/submission/1082797/ubuntu-uses-15-less-power-than-windows-7
|
code
|
An anonymous reader writes: This test is done at Orestad's Laboratories in Sweden. It shows that you save at least 15% more power by using Latest Ubuntu, compared to latest Windows 7. This could save thousands of dollars every year in electricity costs, even for a small company.
Attend or create a Slashdot 20th anniversary party! DEAL: For $25 - Add A Second Phone Number To Your Smartphone for life! Use promo code SLASHDOT25. Check out the new SourceForge HTML5 Internet speed test. ×
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187822822.66/warc/CC-MAIN-20171018070528-20171018090528-00740.warc.gz
|
CC-MAIN-2017-43
| 489 | 2 |
https://johnschultz.rocks/
|
code
|
Hi, I'm John. I'm a Salesforce senior technical consultant and web developer. I build cool things for Fortune 500 companies (actually, 5 of them were Fortune 100 companies, but who's counting?) My insatiable curiosity makes me good at what I do and helps me to enjoy the projects that I work on.
I'm also a singer, songwriter, sound guy, certified scrum master, and holder of 11 Salesforce certifications. My life's goal is to find the perfect hamburger. And if I never find it, that's ok, too. The journey is the goal--along with not dying of high cholesterol and heart failure.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817222.1/warc/CC-MAIN-20240418160034-20240418190034-00061.warc.gz
|
CC-MAIN-2024-18
| 579 | 2 |
http://mysaplib.com/00000496/8d3e5445462a11d189000000e8323d3a/content.htm
|
code
|
Archiving in Asset Accounting (FI-AA)
The archiving process in Asset Accounting can be divided into two steps:
You can set the system to automatically start the delete program when archive files are created. In this case archiving and reorganization are completed in one step. The relevant control flag is an archiving customizing parameter (for more information, see Archiving in the FI-AA Implementation Guide.
Additional transactions let you reload archive files and display information about archiving runs
For more information, see Archiving Procedure : Overview.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991428.43/warc/CC-MAIN-20210514152803-20210514182803-00573.warc.gz
|
CC-MAIN-2021-21
| 568 | 5 |
https://archive.ismrm.org/2006/2517.html
|
code
|
Tri-Exponential T2 Quantification In Vivo
Reddick W, Jain J
St. Jude Children's Research Hospital
We propose a tri-exponential model, parametric fitting of the T2 relaxation curve, restricting the range for T2 in each compartment - Myelin [20 50] ms, White / Gray [50 120] ms, CSF [120 500] ms, and estimating the probability of the existence of each compartment on a pixel-by-pixel basis. The three T2 components were forced to lie within each compartment with the magnitude parameters allowed to take any non-negative value including zero, to account for missing components. Results from the processing of six healthy normal adults are presented.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488536512.90/warc/CC-MAIN-20210623073050-20210623103050-00444.warc.gz
|
CC-MAIN-2021-25
| 648 | 4 |
https://docs.omniverse.nvidia.com/isaacsim/latest/overview.html
|
code
|
What Is Isaac Sim?
NVIDIA Omniverse™ Isaac Sim is a robotics simulation toolkit for the NVIDIA Omniverse™ platform. Isaac Sim has essential features for building virtual robotic worlds and experiments. It provides researchers and practitioners with the tools and workflows they need to create robust, physically accurate simulations and synthetic datasets. Isaac Sim supports navigation and manipulation applications through ROS/ROS2. It simulates sensor data from sensors such as RGB-D, Lidar, and IMU for various computer vision techniques such as domain randomization, ground-truth labeling, segmentation, and bounding boxes.
Omniverse Isaac Sim uses the NVIDIA Omniverse™ Kit SDK, a toolkit for building native Omniverse applications and microservices. Omniverse Kit provides a wide variety of functionality through a set of light-weight plugins. Plugins are authored with C interfaces for persistent API compatibility; however, a Python interpreter is also provided for accessible scripting and customization.
The Python API can be used to write new extensions to Omniverse Kit or new experiences for Omniverse.
For a more in-depth look at developing in Kit, see the Kit Programming Manual.
Omniverse Isaac Sim uses NVIDIA Omniverse™ Nucleus to access content such as USD files for environments and robots. Omniverse Nucleus services allow a variety of client applications, renderers, and microservices to share and modify representations of virtual worlds in Omniverse Isaac Sim.
Nucleus operates under a publish/subscribe model. Subject to access controls, Omniverse clients can publish modifications to digital assets and virtual worlds to the Nucleus Database (DB) or subscribe to their changes. Changes are transmitted in real-time between connected applications. Digital assets can include geometry, lights, materials, textures and other data that describe virtual worlds and their evolution through time.
This allows a variety of Omniverse-enabled client applications (Apps, Connectors, and others) to share and modify authoritative representations of virtual worlds.
See Nucleus Overview for a more in-depth look at the Nucleus data model, architecture, and distribution platforms.
Omniverse Isaac Sim uses the USD interchange file format to represent scenes. Universal Scene Description (USD) is an easily extensible, open-source 3D scene description and file format developed by Pixar for content creation and interchange among different tools. Because of its power and versatility, USD is being adopted widely, not only in the visual effects community, but also in architecture, design, robotics, manufacturing, and other disciplines.
The documentation is split into the following sections: Introduction, Installation Guide, API Documentation, Tutorials, Manuals, and Reference Materials.
The Introduction section is a basic overview of Omniverse Isaac Sim and how it fits into the ecosystem of NVIDIA Omniverse™. It also outlines the architecture, workflow of Omniverse Isaac Sim, and the documentation layout.
The Workstation Installation is the recommended installation process for all users.
Omniverse Isaac Sim also supports more advanced, headless, and remote installation options. Docker, Cloud, and Streaming-related setups are covered in the this page guide.
Python API Documentation for both Omniverse and Isaac Sim extensions can be found here.
Tutorials are grouped in the categories listed below. We strongly recommend completing the Introductory Tutorials, GUI Tutorials, and Core API Tutorials in order to understand all the ways Omniverse Isaac Sim can be used, before moving on to the more focused tutorials.
Introductory Tutorials: The fundamentals of working in Omniverse Kit and different workflows in Omniverse Isaac Sim.
GUI Tutorials: The fundamental concepts of robotics in Omniverse Isaac Sim via GUI.
Core API Tutorials: Building environments, robots, and tasks using Omniverse Isaac Sim Core Python APIs.
Isaac Gym Tutorials: Reinforcement learning framework and Cloner APIs.
Replicator Tutorials: Synthetic data generation.
ROS Tutorials: Examples of various ROS bridges and interfaces.
ROS2 Tutorials: Examples of various ROS2 bridges and interfaces.
Isaac Cortex Tutorials: High level behavioral programming.
Advanced Tutorials: Specific topics.
The Manuals section provides documentation for various extensions, additional examples, and features provided in Isaac Sim. These generally cover APIs or details about a specific topic and are less tutorialized.
The Reference Material section provides references, links, and resources to assist developers.
This section also provides a suite of useful examples for users to quickly try intermediate and advanced applications in Omniverse Isaac Sim. Each example includes well-commented source code that users grab and modify for their own use cases.
See the complete list of examples in the Isaac Examples Menu.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511000.99/warc/CC-MAIN-20231002132844-20231002162844-00241.warc.gz
|
CC-MAIN-2023-40
| 4,913 | 29 |
http://www.accessforums.net/showthread.php?t=63804&page=2&p=343944
|
code
|
It would be a similar fashion, but I suspect that we will run into the same type of issues if you are unable to get this other thing to work.
But there is a way around this, where I can give you the EXACT code you need. I just need you to do the following.
- Create a new Select query in Access.
- Add all the fields that you want to export to your Query view
- Be sure to include "Report Date" field
So there is nothing special going on here - just a simple Select query - no calculations, no criteria.
Confirm that is working (by going to Datasheet View).
Once you confirm that, change the query to SQL View, and copy and paste the SQL code here for me.
Once I have this, I should be able to manipulate it to work for you.
Using Access 2007
Proficient in Access, Excel, VBA, and SQL
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218188785.81/warc/CC-MAIN-20170322212948-00456-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 784 | 11 |
https://www-304.ibm.com/connections/blogs/home/tags/business_process_automation?lang=en_us
|
code
|
with Tags: business_process_automation X
Kathleen Holm [email protected] Tags: bpm process batch architect webcast binarium websphere compute-grid automation business_process_automati... batch_processing 4,563 Visits
In November of last year, I had the pleasure of talking with Sridhar Sudarsan, Chief Architect, Batch Processing Strategy, IBM Software Group. You can read our interview here: Java Batch - An Interview with Sridhar Sudarsan . In that interview, Sridhar...
from Blog: Middleware Conversations
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461860125175.9/warc/CC-MAIN-20160428161525-00045-ip-10-239-7-51.ec2.internal.warc.gz
|
CC-MAIN-2016-18
| 507 | 4 |
https://community.e.foundation/t/feature-proposal-a-built-in-trackers-ads-blocker/4225
|
code
|
Since /e/ is an open-source system, trackers can only comes with applications installed by the user.
A very good solution is Blokada, but if we use it, we can’t use a VPN at the same time. So we have to choose between giving our data to the ISP or an advertising department.
A solution is to root in order to be able to activate both, but root is not recommended for security.
So the only true and reliable solution is an ads/trackers blocker integrated with /e/.
We would be able to see in real time thanks to a persistent notification the number of things blocked since the beginning and what request is blocked in real time.
A short history of blocked requests would be available in the blocker tab settings in order to be able to whitelist a request in case the blocker brokes something we want to use.
It would definitely be a main line feature, with a good media coverage.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998600.48/warc/CC-MAIN-20190618003227-20190618025227-00515.warc.gz
|
CC-MAIN-2019-26
| 880 | 7 |
http://www.sevenforums.com/news/149544-firefox-4-0-rc-out-3.html
|
code
|
Quote: Originally Posted by rocky90
so if this RC is the only one and is going to be the RTW build, will i be able to upgrade from the RC to the RTW when its released?
I was using FF 4.0 Beta 12 and was able to upgrade to FF 4.0 by going to "Help" ------------ "About Firefox"
These are the steps that I took
1. Downloaded the FF 4.0 installer file
2. Used MozBackup and backed up Firefox
3. Backed up the FF ReminderFox addon
4. Downloaded and installed the FF update from the "Help" menu
5. Made sure everything was okay
6. Uninstalled FF 4.0 using Revo Uninstaller set to "Moderate" which is the default.
7. Cleaned files and the Registry
8. Installed FF 4.0 using the installer file downloaded in step #1.
I took those steps above in order
1. To test FF 4.0 before doing a clean install
2. Doing a clean install of FF 4.0.
When I update any software from a Beta version to a general release (RTW) I always do a clean install of the general release.
After I did the update from Beta 12 through the FF menu I installed it cleaned by files and regsitry
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706121989/warc/CC-MAIN-20130516120841-00056-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 1,053 | 17 |
http://oldfxhomeforums.s3-website-us-east-1.amazonaws.com/19351
|
code
|
Post 1 of 8
1. Lag. I don't know if the program is supposed to do this, but everytime it reads a new frame, it lags to go to the next frame, un-read frames I assume are shown by a little square. And when I click on a frame with a square it lags to load that frame. Is it just my computer or is this supposed to happen. Is the program very laggy or is it just me?
Screenshot of what I mean: (the little squares are circled in black)
Also, when I tried adding lightsaber effects, I couldn't seem to figure out how to change the lightsaber color, I know this is possible, am I just stupid or does the demo not allow me to choose a different lightsaber color other than green? On a similiar note, I couldn't use any of the tools on the lower left hand side, again, I could be computer challenged or the demo just doesn't allow me to do that.
Same picture, tools circled in red:
Thank you to anyone who can help me with these questions and hopefully I can look forward to purchasing FX Lab.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320707.69/warc/CC-MAIN-20170626101322-20170626121322-00316.warc.gz
|
CC-MAIN-2017-26
| 985 | 6 |
https://info.exosite.com/portals-development-kits
|
code
|
Exosite previously provided an IoT application called Portals that ran on top of our legacy IoT platform One Platform. We worked with many silicon companies such as Texas Instruments, Microchip, Atmel, and Renesas to provide free out of the box access to Portals for creating proof of concepts using IoT and connected kits. As of 2020, we no longer support these free community sites, some of which were available for over 8 years of operation. The list of community development kit sites no longer supported include:
The list of development kits with out of box support or available libraries for Portals includes:
Exosite offers a condition monitoring application ExoSense® for industrial IoT applications that runs on top of our Murano IoT Platform.
The Murano platform supports HTTP and MQTT for Device connectivity. The Murano HTTP interface uses the same APIs as the Portals and One Platform, including support for CIKs as a authentication method. Embedded software changes are required but are minimal to try out.
You can find information for creating a new account, building an IoT Connector for you hardware, and using ExoSense for your application needs in Exosite's documentation.
If you are interested in using Exosite's software but have questions, please contact us.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817438.43/warc/CC-MAIN-20240419141145-20240419171145-00522.warc.gz
|
CC-MAIN-2024-18
| 1,281 | 6 |
https://j5.jbei.org/j5manual/pages/33.html
|
code
|
|| ||The following is a step-by-step example of how to use j5 to design a Golden Gate assembly. This example specifically addresses how to use a PCR linearized vector backbone. This example uses the stand alone simplified web interface for j5.
[Please refer to the "Running a SLIC/Gibson/CPEC/SLiCE or Golden Gate DNA assembly design on the j5 server" section in the DeviceEditor user's manual for information concerning how the equivalent design process can be accomplished using DeviceEditor. Here is a DeviceEditor .xml design file that you can use to quickly recapitulate the design described below in DeviceEditor (Golden_Gate_example.xml, right click and save link as to save the design file to disk): ]
Here is an example assembly that we might like j5 to design for us with Golden Gate in mind:
For this particular assembly, we want to translationally fuse the N-terminus of UmuD to a GFP variant. As was the case for the previous SLIC/Gibson/CPEC/SLiCE example, we would like the BglBrick restriction sites (EcoRI, BglII, BamHI and XhoI) to be absent from the resulting plasmid. We start with the vector pS8c-gfpuv_sig.pep (this was constructed in the previous SLIC/Gibson/CPEC/SLiCE example) and E. coli genomic DNA as the templates for PCR. We'll linearize the pS8c-gfpuv_sig.pep vector with PCR, introducing the flanking BsaI sites and Golden Gate overhangs in the process, and similarly amplify the 5' coding portion of umuD. These two PCR products will then be assembled with the Golden Gate methodology.
Step 1 - Collect the genbank sequences (and create any new ones) for the assembly:
The first step is to collect all of the genbank sequence files from which we will derive the parts we want to assemble together. For the example above, we will be starting with the plasmid pS8c-gfpuv_sig.pep and (a fragment of) E. coli genomic DNA. The genbank files for these sequences are:
(Note that the umuD sequence file has been pre-annotated for a translational fusion with the GFPuv variant.)
The relevant portions of these sequences are:
Linearized pS8c-gfpuv_sig.pep backbone: bps 1239-1235 (wrapping around the beginning/end of the sequence; the translational start "ATG" has been excluded (it will be provided by the umuD fragment)).
UmuD N-terminus: bps 1-126
As noted above, and as described in the bioinformatics prerequisites section, we do not want any BglBrick sites in our resulting construct. We can use a sequence editor program such as the JBEI Registry Vector Editor, VectorNTI, ApE or Gentle to find any BglBrick sites (EcoRI, BglII, BamHI and XhoI) within the relevant portions of the above sequences:
So, we will not have to make any (silent) mutations.
Step 2 - Create the sequences list file and zipped sequences file:
Once we have all of the genbank files we need for the assembly, we need to create two input files for j5, the sequences list and zipped sequences files. Using an existing sequences list file as a starting point (e.g. myseqlist.csv), we can use MS Excel, another spreadsheet program, or even a text editor, to create our sequences list CSV file (stylized for clarity, click to view larger version):
Here is the actual csv file (myseqlist_pS8c-umuD_gfpuv_sig.pep.csv):
Now, we make a zip file that contains all of the genbank sequence files (myseqs_pS8c-umuD_gfpuv_sig.pep.zip):
Step 3 - Create the parts list file:
Now we need to define, in a parts list file, the DNA parts that we will assemble together. The first part to define is the linearized vector backbone. The relevant portion of the pS8c-gfpuv_sig.pep plasmid (as stated above) is bps 1239-1235. We define the part, pS8c-gfpuv_sig.pep_vector_backbone, accordingly, with its part source, pj5_00001, start bp, 1239, and end bp, 1235. We are free to define the vector backbone in either orientation (reverse compliment or not); here we define it as not the reverse compliment. The resulting part definition for the linearized vector backbone is shown below.
The next part to define is the UmuD N-terminus. The relevant portion of the umuD sequence (as stated above) is bps 1-126. We define the part, umuD_tag, accordingly, with its part source, umuD_tag_GFPuv, start bp, 1, and end bp, 126. In this case, the umuD sequence is on the top strand of umuD_tag_GFPuv, so it will be defined as not being the reverse complement. The resulting part definition for the umuD_tag is shown below.
Using an existing parts list file as a starting point (e.g. partslist.csv), we can use MS Excel, another spreadsheet program, or even a text editor, to create our parts list file (stylized for clarity, click to view larger version):
Here is the actual csv file (partslist_pS8c-umuD_gfpuv_sig.pep.csv):
Step 4 - Create the target part ordering list file:
Now we need to define, in a target part ordering file, the order we would like the DNA parts defined above to be assembled in. For this particular assembly, we'll be assembling all of the parts in the same direction (forward). For more information about how to assemble in the reverse direction, please see the target part ordering file documentation. Although this example assembly will use Golden Gate, the option to forcibly set a relative Golden Gate overhang positions will not be taken here, since this assembly is not explicitly part of a larger combinatorial assembly project (for example, introducing a series of N-terminal tags upstream of GFPuv). For the same reason, there is little justification for applying direct synthesis firewalls (for more information about forced relative overhang positions, and direct synthesis firewalls, refer to the target part ordering file documentation).
The first part in the order for this assembly is the linearized vector backbone. Since we defined the linearized vector backbone part above as being not in the reverse compliment direction, if we assemble it in the forward direction, we will end up with a vector backbone with the same orientation as that found in the pS8c-gfpuv_sig.pep plasmid. The resulting target part ordering entry for the linearized vector backbone is shown below.
The next part in the order for this assembly is the UmuD N-terminus. We'll assemble the UmuD N-terminus in the forward direction for a translational fusion with the gfpuv_sig.pep coding sequence that follows. The resulting target part ordering entry for the UmuD N-terminus is shown below.
Using an existing target part ordering list file as a starting point (e.g. targetpartorderlist.csv), we can use MS Excel, another spreadsheet program, or even a text editor, to create our target part ordering list file (stylized for clarity, click to view larger version):
Here is the actual csv file (targetpartorderlist_pS8c-umuD_gfpuv_sig.pep.csv):
Step 5 - Create the Eugene rules list file:
Now we need to define, in a Eugene rules list file, a list of design rules that j5 will check prior to designing the assembly. For this particular assembly, we won't need to define any special rules. For more information about how and when enforce Eugene design specification rules, please see the Eugene rules list file documentation.
Since we don't need any Eugene rules for this assembly, we'll just use an effectively empty rules list (myeugenerules.eug):
Step 6 - Collect the master plasmids list, master oligos list, and master direct syntheses list files (or create new ones) for the assembly:
If you have already used j5, you should already have your own master plasmids, oligos, and direct syntheses list files (they would have been contained within the j5 results zip file you last downloaded; alternatively you can just "Re-use last updated" on the j5 Golden Gate assembly design web page entry form, see below).
If you're new to j5, you can easily create new (blank/empty) versions of these files. To do this, download the following three template input files:
Master plasmids list file (j5_plasmids_0.csv):
Master oligos list file (j5_oligos_0.csv):
Master direct syntheses list file (j5_directsyntheses_0.csv):
Since j5 will use the first three characters of the file names when naming the designed plasmids, oligos, and direct synthesis pieces, it would probably be preferable for you to rename these files, replacing the first three characters (e.g. "j5_") with your initials (e.g. "NJH") or another three characters of your choosing. Also, you could easily do without the "_0" at the end of the file names, so you could chop that off while you are at it. If you are new to j5 but you want to start numbering your plasmids at a certain number (e.g. start at "pNJH00099" instead of the default "pNJH00001"), if you'd like to provide j5 the opportunity to re-use oligos that you already have, or you are interested in other related options, please see the master plasmids list, master oligos list, and master direct syntheses list file documentation for more information.
Step 7 - Make any modifications to the j5 assembly parameters that you require:
For the majority of assemblies (such as this particular example, which uses BsaI as the Golden Gate type IIs endonuclease), the default values for the j5 assembly parameters are perfectly fine. If you would like to use a type IIs endonuclease other than BsaI, you will need to make at least two changes to the default j5 assembly parameters. For example, to change from BsaI to AarI:
Change to (for AarI):
Change to (for AarI):
Since BsaI and AarI cleavage both result in 4 bp overhangs, it is not necessary to change the parameter GOLDENGATEOVERHANGBPS. However, if the type IIs endonuclease that you would like use results in overhangs longer or shorter than 4 bp, you will need to adjust that parameter accordingly as well.
Another important reason to modify the j5 assembly parameters is if you would like to construct a linear, rather than a circular piece of DNA.
If you would like to make modifications, download the following template input file:
j5 parameters file (j5_parameters.csv):
You can use MS Excel, another spreadsheet program, or even a text editor, to modify the j5 parameters, as you see fit. See the j5 parameters file documentation for more information.
Step 8 - Use j5 to design the Golden Gate assembly:
Follow the directions on the stand alone simplified web interface documentation page for using j5 to design a Golden Gate assembly. For the purposes of this example, the input files you will upload are (assuming the default j5 assembly parameters and the master plasmids, oligos, and direct syntheses lists that resulted from the previous SLIC/Gibson/CPEC/SLiCE example; note that following the directions above you likely have renamed the master plasmids, oligos, and direct syntheses lists file names with your own initials instead of "j5_"):
j5 parameters file (j5_parameters.csv):
Sequences list file (myseqlist_pS8c-umuD_gfpuv_sig.pep.csv):
Zipped sequences file (myseqs_pS8c-umuD_gfpuv_sig.pep.zip):
Parts list file (partslist_pS8c-umuD_gfpuv_sig.pep.csv):
Target part order list file (targetpartorderlist_pS8c-umuD_gfpuv_sig.pep.csv):
Eugene rules list file (myeugenerules.eug):
Master plasmids list file (j5_plasmids_1.csv):
Master oligos list file (j5_oligos_1.csv):
Master direct syntheses list file (j5_directsyntheses_1.csv):
If you have used j5 previously, you will have the option to "Re-use last updated" master plasmids, oligos, and direct syntheses lists files, as described in the stand alone simplified web interface documentation, if you so wish.
Here is a representative zip file resulting from this particular Golden Gate example (j5_J5_20100723135152.zip):
Step 9 - Check to make sure that the resulting assembled plasmid is really what you wanted:
Unzip the j5 zipped results file, and open the assembled DNA sequence file with a vector editor such as VectorEditor.
For this particular example (using the identical input files as listed above), the assembled DNA sequence file is (pj5_00002.gb):
Here is the plasmid map of the assembled DNA sequence:
Note that this plasmid map matches our design scheme (see the very top of this page), and that there are no BglBrick restriction sites (EcoRI, BglII, BamHI and XhoI) in the vector, so we are good to go for our downstream processes.
Step 10 - Check the resulting j5 assembly file for any primer design or Golden Gate type IIs endonuclease restriction site or other warning messages:
The possible warning messages are described in the j5 Golden Gate assembly output file documentation.
Open the j5 assembly file with a spreadsheet program such as Excel or OpenOffice, and check for any likely mis-priming events or other sequence characteristics that will likely lead to PCR or assembly problems. If there will likely be PCR or assembly problems given the current assembly design, it would be advised to use the information provided by j5 to guide you in developing a refined design strategy to mitigate the problems. Similarly, check for a warning message that details if any Golden Gate type IIs endonuclease recognition site sequences were found in the final assembled vector sequence, which could potentially drastically reduce the assembly efficiency.
For this particular example (using the identical input files as listed above), the j5 assembly output file is (pj5_00002.csv):
For the example assembly described above, there are no likely mis-priming events, but there are several primer design warning messages, such as not being able to satisfy the minimum primer Tm constraint for one of the primers. These warning messages are useful troubleshooting starting points if the designed PCR reactions do not perform as well as expected, but in most cases they should not be considered show-stoppers.
Step 11 - Order the designed direct DNA synthesis fragments and DNA oligos, and perform the assembly:
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649177.24/warc/CC-MAIN-20230603064842-20230603094842-00634.warc.gz
|
CC-MAIN-2023-23
| 13,745 | 70 |
https://beta.groups.io/g/main/message/17443
|
code
|
It seems to be happening again. I have a pending member using outlook whose confirmation email seems to have been rejected.
Mark, should I send the info to you at support, or do you already know this is happening again in general? I am planning to contact the member outside of groups.io. Should I suggest that they try to use a different email address for the group?
Messages are the sole opinion of the author, especially the fishy ones.
I wish I could shut up, but I can't, and I won't. - Desmond Tutu
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303729.69/warc/CC-MAIN-20220122012907-20220122042907-00004.warc.gz
|
CC-MAIN-2022-05
| 504 | 4 |
https://wiibrew.org/wiki/Special:MobileDiff/14322
|
code
|
Hi, I'm still trying to run a Wireless Nunchuk on WiiUse and WiiYourself!. One problem is that the address areas where the calibration data normaly stored is for write-only on the wireless nunchuks. But the weird thing about this wireless nunchuk from snakebyte:[http://www.amazon.de/Wii-Nunchuk-Controller-schnurlos-wei%C3%9F/dp/B0013F4W9Q/ref=pd_bxgy_vg_img_a]is that I get no response at all until I played MetroidPrime3 or Zelda with it. I am not kidding !!! After playing one of this Games I get all Data only without the Calibration, so I can't really use the data because I don't know how to Calibrate the Accs and the Joystick.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585537.28/warc/CC-MAIN-20211023002852-20211023032852-00600.warc.gz
|
CC-MAIN-2021-43
| 635 | 1 |
http://bicycles.stackexchange.com/questions/tagged/trails+29er
|
code
|
to customize your list.
more stack exchange communities
Start here for a quick overview of the site
Detailed answers to any questions you might have
Discuss the workings and policies of this site
What Cannondale bikes compare to a Specialized Crosstail or Hardrock?
I don't know much about bike parts, so I don't really know which make is better, So I hope you can help out here. As I said I don't really know how they are, but I've always had a thing for how ...
Aug 29 '11 at 0:54
newest trails 29er questions feed
Hot Network Questions
Do +1/+1 counters accumulate?
How many required fields are too many?
Can anyone identify the manufacturer of this golden lens?
Has any reference been made to Earth or the Milky Way in Star Wars EU?
Fibrations and Cofibrations of spectra are "the same"
SQL percentage calculation
The Rock, Paper, Scissors, Lizard, Spock Tournament of Epicness
In a 85.6mm x 54mm business card, what is an ideal font size?
Code Tests as part of the interview
How can we revoke all ssl certificates issued for our domain?
Does spyware exist for ubuntu?
Apple ID for employees having no credit card
Was the American Civil War the “bloodiest civil war in history”?
Character differentiation (through sub- and crafts talents) in Dungeon World
How to number the letters of a sentence?
"Reason to visit" or "Reason for visit"
The sun is a large object, WHILE having a diameter of nearly a million miles
What is the natural way of using Dataset to get a FittedModel?
What Does The White Number In The Blue Hexagon Mean?
Why are magnetic fields so much weaker than electric?
Examples of "Non-Logical Theorems" Proven by Logic
What happens during "big" inserts on a table with a clustered composite key?
Why does this C# code return what it does
more hot questions
Life / Arts
Culture / Recreation
TeX - LaTeX
Unix & Linux
Ask Different (Apple)
Geographic Information Systems
Science Fiction & Fantasy
Seasoned Advice (cooking)
Personal Finance & Money
English Language & Usage
Mi Yodeya (Judaism)
Cross Validated (stats)
Theoretical Computer Science
Meta Stack Exchange
Stack Overflow Careers
site design / logo © 2014 stack exchange inc; user contributions licensed under
cc by-sa 3.0
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510267729.10/warc/CC-MAIN-20140728011747-00376-ip-10-146-231-18.ec2.internal.warc.gz
|
CC-MAIN-2014-23
| 2,203 | 51 |
https://cloudonaut.io/serverless-consulting/
|
code
|
We are software engineers and consultants focused on AWS and DevOps. Our Serverless expertise covers Automation, Data Pipelines, REST APIs, Node.js/Java/Scala, and the Serverless Framework. You can hire our expertise to boost your project.
- gain confidence in AWS by doing Proof of Concept projects like:
- implementing a Serverless data processing pipeline prototype (e.g. S3 -> Lambda -> Redshift)
- developing a Serverless API prototype
- leverage the benefits of AWS by:
- developing Serverless applications in Node.js, Java, and Scala
- setting up Continuous Delivery pipelines to automatically push code into production
- engineering (real-time) big data processing pipelines with S3, Kinesis, Lambda, DynamoDB, Redshift
- automate continuous checks of internal security requirements
- optimize their AWS environments by:
- doing architecture reviews and redesigns of not Cloud Native applications
- doing cost optimizations
As certified AWS Solution Architects - Professional Level we have deep knowledge of all AWS services. Our daily work as AWS consultants adds practical experience on top of our theoretical knowledge.
Launch your Serverless project! Hire us!
Andreas Wittig, Software Developer & Cloud Architect
Michael Wittig, Software Developer & Cloud Architect
Cloud architect and software developer. Interested in data, programming, web and finance. Enthusiastic about exploring new technologies in real world projects. Author of Amazon Web Services in Action.
Published on and updated on
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988775.80/warc/CC-MAIN-20210507090724-20210507120724-00095.warc.gz
|
CC-MAIN-2021-21
| 1,506 | 18 |
https://community.mindjet.com/mindjet/topics/shcore-dll-taking-up-cpu-cycles
|
code
|
this post below describes my problem.
I run procmon.exe to see what is taking up a larger than normal portion of cpu activity.
MindManager.exe is looking for shcore.dll and not finding it.
I am running Win7 64bit. MindManager 17.2.208
Anyone else having this issue?
I created a dummy file c:\program files\mindjet\mindmanager 17\shcore.dll
It is a text file with nothing in it except a note to myself stating that I created it on this date. I ran procmon.exe again and at least mindmanager.exe is not searching all over my hard drive trying to find the file. Once found mindmanager.exe does its create file / close file digital gymnastics which appears to reduce the number of cpu cycles it chews up. I'll report back if what I did improves or degrades performance.
BTW I did the sfc thing as suggested in the ms TechNet thingy in my previous post. The log file did not mention shcore.dll so I guess that was a non-factor in trying to understand this problem.
I think this is more related to Windows than to MindManager, normally MindManager is not looking for specific files for these type of functions but just calls high levels functions so Windows can figure out which libraries to load.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107910815.89/warc/CC-MAIN-20201030122851-20201030152851-00548.warc.gz
|
CC-MAIN-2020-45
| 1,191 | 9 |
http://blog.iqbar.co.uk/index.php/2018/12/22/easy-prop-ideas/e73f138ec6b2407587857f3f5c4684ba/
|
code
|
About the authorIQBar Education
IQBar is an online education website based in the UK with students all across China. Students, or Breadies in our lingo, can study a range of courses, from our engaging Picaro course for young learners, to exam help, to grammar. You name it, we've got it! Our teachers are all across the world with a range of backgrounds. If you're interested in applying, join today at iqbar.co.uk.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986673250.23/warc/CC-MAIN-20191017073050-20191017100550-00080.warc.gz
|
CC-MAIN-2019-43
| 415 | 2 |
http://creators.ning.com/forum/topics/killer-tip-add-facebook-comment-box-to-every-forum-page
|
code
|
Edited: If you use the old code then only members can see the facebook plug-in comment box and they can comment. Please use the new code, both members and non-members can see the facebook plug-in comment box and both members and non-members can comment using facebook account.
Hope you will be very happy after successfully using my killer tip.
Instruction is very simple: Just copy and paste the following code into Custom Code. You may want to change data-width follow jay's instruction here.
Live Preview: Here
hiiii Bernard Lama
This is beautiful
Thank you, creator
After I've added the code, where and when would I see this effect? I'm not sure I understand.
Does it only show if someone "shares" to Facebook first?
You would see it at the bottom of your content as Bernard has illustrated above. It's called a Facebook plugin, and It shows regardless of whether the item is "liked" or not.
Oh, I see it now. It took a while to show up.
EDIT: Oh shoot, now it's gone again. It then showed up again in two places on the same page (below the original post and reply field, and then at the bottom of the thread below that reply field. Now it's gone again. LOL D'oh!
If I could get it to show up consistently, and maybe in one place or the other, I would love this! The big warning below the field is also unsightly.
I love this idea, though, so I'll check back in on it again!
Yeah, I forgot to mention that. When I first installed the one I use on my music page, the same thing happened. It's been stable since.
You have to keep in mind that it is linked to Facebook's API, and just as there are occasional "hiccups" in their platform, anything app linked to them will experience the same.
Thanks for this tip, Bernard. This is a nice temporary solution until Ning releases theirs.
My question to you is, would this affect the one I currently have installed on my music page? Should I remove the one I installed there and install this code instead?
Hey kopper! I posted a discussion about it here. Had a problem with it at first, but I worked it out.
If I´m not in FB, is there a way to moderate those comments?
You can't moderate the comments, but you should be able to delete them.
Ok, thanks. I prefer Disqus in the future, and only in blog posts.
I used to use Disqus on my old network years ago. I never did get it to work for blogs. You're saying you have?
No. I´m saying that I hope that the improvements in the blog functionality (see the roadmap) will give to us the ability to put Disqus (we have a debate about this improvement here).
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698090094/warc/CC-MAIN-20130516095450-00097-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 2,550 | 24 |
https://www.ucl.ac.uk/mssl/research/astrophysics/space-missions/xmm-newton/introduction-xmm-suss2
|
code
|
XMM-SUSS2 contains source detections drawn from 6604 XMM-OM observations in up to three UV and three Optical broad-band filters made between 11th March, 2000 and 16th January, 2013. All datasets included are publicly available but note that, due to screening criteria, not all public observations are included in this catalogue. Taking account of substantial overlaps between observations, the net sky area covered independently is 19−105 deg2, depending on filter. The primary content of the catalogue is filter-dependent source positions and magnitudes. The catalogue consists of two tables. The first one contains the sources, with positional and photometric data (count rate, magnitude and flux) and quality flags for each measurement. In the second table we give a summary of the observations from which the sources have been detected and measured (see Description of format of XMM-SUSS2).
Improvements in XMM-SUSS2 over the previous version are:
- more data, including the period from 2007 to 2013.
- all observations are included, even those that have only optical data and no UV. (In the previous version an observation required at least one UV-filter detection for inclusion.)
- source detection is performed on stacked images to obtain detections of fainter sources.
- improvements in error calculation and flagging.
The XMM-OM SUSS2 catalogue contains 5,595,331 source detections above a signal-to-noise threshold limit of 3-σ which relate to 4,008,879 unique objects of which 692,223 (17.3%) have multiple entries in the source table, corresponding to different observations. A significant fraction of sources (ranging from 15% in B to 19% in V) are visited more than once per filter during the lifetime of XMM. Consequently, the scope for science based on temporal source variability on timescales of hours to years is broad.
The positional accuracy of the catalogue detections is typically 1.0 arcsec (1σ confidence radius) with a mean positional error of 0.67 arcsec. The mean AB magnitude of the catalogue detections in the three UV bands is 18.97 (UVW2), 19.82 (UVM2) and 20.31 (UVW1). 20% of sources have AB magnitudes fainter than 20.06 (UVW2), 20.90 (UVM2) and 21.36 (UVW1). UVW2, UVM2 and UVW1 refer to the filter bandpasses defined in the Source Properties: Filter Set section.
The processing used to generate the catalogue is based on the SAS14.0 pipeline developed for the pipeline reduction of all XMM-Newton observations. This version includes a number of significant improvements over the previous data processing system (as used by the SSC in routine processing of XMM-Newton data on behalf of ESA). These improvements include a more robust detection scheme for sources close to the limit of sky background, refined quality flagging and a higher success rate (90%) for refined aspect corrections.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488259200.84/warc/CC-MAIN-20210620235118-20210621025118-00621.warc.gz
|
CC-MAIN-2021-25
| 2,828 | 9 |
https://mmoculture.com/2009/09/mytheon/
|
code
|
Mytheon is an upcoming F2P MMORPG, due to be released in the first half of 2010. Players will be able to go through several mythological realms from all over the world, starting with ancient Greece and Egypt. See below for more information regarding the key features and announced 3 classes.
Here are some screenshots of the game:
Official English website: http://www.mytheongame.com/
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500080.82/warc/CC-MAIN-20230204012622-20230204042622-00742.warc.gz
|
CC-MAIN-2023-06
| 384 | 3 |
http://ldt.stanford.edu/~johnwong/
|
code
|
Hello. This site is mainly a portfolio of my work and experiences while attending
Stanford University for my MA in Education. The program
I went through is called Learning, Design, and Technology.
The time spent at Stanford was truly a blast and I am
grateful that I was able to meet some of the most talented
people I have ever known. You will also find my resume
and portfolio of my most recent projects while working
at Cisco Systems and Sun Microsystems. Enjoy!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865809.59/warc/CC-MAIN-20180523200115-20180523220115-00336.warc.gz
|
CC-MAIN-2018-22
| 465 | 8 |
https://github.com/anatolinicolae
|
code
|
Sign up for your own profile on GitHub, the best place to host code, manage projects, and build software alongside 50 million developers.
Hide content and notifications from this user.
Learn more about blocking users
Contact Support about this user’s behavior.
Learn more about reporting abuse
Hopefully Online—Learn the proper way to stay online.
👨👨👧👦 Gravity Forms and Ultimate Member bridge that links user to chosen group on registration.
🤖 A Telegram bot to fetch whois data
🤖 A bot to fetch DNS records
🔨 Envato Marketplace API
Unofficial Instagram Desktop App.
Seeing something unexpected? Take a look at the
GitHub profile guide.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439735881.90/warc/CC-MAIN-20200804161521-20200804191521-00598.warc.gz
|
CC-MAIN-2020-34
| 662 | 13 |
https://github.com/sequelize/sequelize/pull/1244
|
code
|
Join GitHub today
GitHub is home to over 28 million developers working together to host and review code, manage projects, and build software together.Sign up
New queries hang when a client connection is closed after the 100 ms period of inactivity #1244
I'm experiencing some issues with queries that hang up randomly. I'm developing a RESTful API with sequelize (using MySQL) and until now I have not experienced any problems at all. Last month we updated sequelize to the latest stable version (1.6.0) and now when I run our API test suite (which is predictable and constant), there is a specific test case that hangs up sometimes. I've tracked down the issue and I think I've found the problem (or problems).
The thing is that sequelize closes a connection after 100 milliseconds of inactivity, all good so far. But when a query is issued after that 100 ms period of inactivity, it happens to be sent to the mysql module after calling the
The thing is that in this short period of time a query may be issued and the client instance is still available in the connection-manager, but it is already closed to new queries. In this situation, the mysql module emits an error in the
This only happens when pooling is disabled.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827281.64/warc/CC-MAIN-20181216051636-20181216073636-00242.warc.gz
|
CC-MAIN-2018-51
| 1,223 | 7 |
https://picsart.com/i/image-326817944006201
|
code
|
#freetoedit #ArianaGrandeButera #ArianaGrande #StuckWithU #stuckwithu
Long time no see...
I'm sorry that I haven't been posting I wanted to take a break to think new ideas. I wanted to post it but PA didn't let me...But anyways here I AM!
So I'm going to restart and I'm going to do and an new... AESTHETIC THEME!
Well I have made some (with a really good app) but I don't if there are good or not you will tell me
Also be prepared for Abel edits (for those who don't know Abel is The Weekend)
Quarantine has has brought my love for him back.
I was a fan before and now I am I bigger one
See you soon!
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107879537.28/warc/CC-MAIN-20201022111909-20201022141909-00053.warc.gz
|
CC-MAIN-2020-45
| 601 | 9 |
https://support.microbit.org/support/solutions/articles/19000106820-reset-the-micro-bit
|
code
|
The micro:bit has a reset/power button located on the back on the device, that you can use to restart the program or put your micro:bit to sleep to conserve power.
- Reset the current program
- Stop the current program
- Send the micro:bit to sleep
- Erase the program
- Reset the micro:bit to the factory or Out of the Box Experience
Reset the current program
If you want to reset the micro:bit program that is running, you can press the reset button on the back of the micro:bit device and the current program will start again.
Stop the current program
If you want to stop the program running, you can put the latest micro:bit to sleep by pressing and holding the reset button for 5 seconds. The micro:bit will then enter a sleep and can be woken by pressing the reset button again.
You can also just disconnect or switch off the power source to the micro:bit. The micro:bit will start running it’s program again when you reconnect the power.
Erase the program
If you want to erase the current program completely, simply flash the micro:bit with a new program via USB.
Reset the micro:bit to the ‘factory’ or ‘Out Of the Box’ experience (OOB)
When you first plug in a new micro:bit, it runs a special demonstration program that shows off some of its features. We call this the 'Out Of the Box experience' program.
If you want to restore the micro:bit to it’s OOB state, for example when starting a new class or issuing a micro:bit to a student, you can follow the OOB instructions on microbit.org
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510575.93/warc/CC-MAIN-20230930014147-20230930044147-00704.warc.gz
|
CC-MAIN-2023-40
| 1,510 | 16 |
https://resources.qt.io/development-topic-application-development/qt-scxml-and-state-chart-support-in-qt-creator
|
code
|
Qt has provided support for state machine based development since introduction of Qt State Machine Framework in Qt 4.6. With the new functionality introduced in Qt 5.8 and Qt Creator 4.2 state machine based development is now easier than ever before.
Qt 5.8 introduces fully supported Qt SCXML module that makes it easy to integrate SCXML based state machines into Qt. Previously SCXML has been imported to Qt from external tools, which is still possible. Now Qt Creator 4.2 introduces a new experimental visual state chart editor that allows creation and modification of state charts directly with Qt Creator IDE. Together with the new editor and other improvements in Qt Creator, state machine based development can be done completely within Qt Creator.
Here is a short screen cast that shows these new features in action. For demonstration purposes, the simple state machine driven example application with Qt Quick user interface Traffic Light is being recreated from scratch.
Note that the the editor is still experimental with Qt Creator 4.2 and the plugin is not loaded by default. Turn it on in Help > About Plugins (Qt Creator > About Plugins on macOS) to try it.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337836.93/warc/CC-MAIN-20221006124156-20221006154156-00563.warc.gz
|
CC-MAIN-2022-40
| 1,172 | 4 |
https://reference.wolfram.com/language/ref/PolynomialQuotientRemainder.html
|
code
|
gives a list of the quotient and remainder of p and q, treated as polynomials in x.
Examplesopen allclose all
Basic Examples (2)
The resulting polynomials will have coefficients that are rational expressions of input coefficients:
Polynomial quotient and remainder over the integers modulo :
PolynomialQuotientRemainder also works for rational functions:
The quotient and remainder of division of by are and , where :
and are uniquely determined by the condition that the degree of is less than the degree of :
Properties & Relations (2)
Use Expand to verify identity:
PolynomialQuotient and PolynomialRemainder:
PolynomialReduce generalizes PolynomialQuotientRemainder for multivariate polynomials:
Wolfram Research (2007), PolynomialQuotientRemainder, Wolfram Language function, https://reference.wolfram.com/language/ref/PolynomialQuotientRemainder.html.
Wolfram Language. 2007. "PolynomialQuotientRemainder." Wolfram Language & System Documentation Center. Wolfram Research. https://reference.wolfram.com/language/ref/PolynomialQuotientRemainder.html.
Wolfram Language. (2007). PolynomialQuotientRemainder. Wolfram Language & System Documentation Center. Retrieved from https://reference.wolfram.com/language/ref/PolynomialQuotientRemainder.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943484.34/warc/CC-MAIN-20230320144934-20230320174934-00355.warc.gz
|
CC-MAIN-2023-14
| 1,249 | 15 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.