url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://www.hfg.org/grant_summaries/legacies-of-the-past-and-support-for-terrorism-in-the-basque-country/
|
code
|
Why do people turn to terrorism? Social scientists have offered many insightful answers to this question ranging from education, poverty, and inequalities to the effects of political regimes. And yet, we are still far from providing a definite solution to this puzzle. Our project, funded by the Harry Frank Guggenheim Foundation, seeks to provide an answer to this question by focusing on the long-term historical legacies of political violence. We analyze how civil wars in the distant past (the nineteenth century) in the Basque Country in Spain could have left an imprint on beliefs and preferences that partly explain the outbreak of terrorism in the 1970s.
We use archival data from the three Basque provinces to collect information about political violence across villages in the nineteenth century. During the nineteenth century, there were two civil wars in Spain that were fought mainly in the Basque Lands. We have collected several indicators from archival and secondary sources of support for one of the warring factions, the one devoted to the defense of Basque autonomy and laws (the “Carlists”), across villages. These indicators include deserters of the Army, votes for Carlist candidates in elections immediately after the second civil war, and subscriptions to the main Carlist journal during the first civil war. We found a positive association between these indicators and support for political violence in the 1970s, which indicates that the legacy of political violence in the past has indeed affected the outbreak of terrorism one hundred years later.
Civil wars left a legacy of distrust and alienation toward the state that can persist through generations, paving the way to violent responses to perceived threats.
Our research has tried to go more in depth into the mechanisms connecting political violence in the nineteenth century and beliefs and preferences in the 1970s. We found that civil wars left a legacy of distrust and alienation toward the state that can persist through generations, paving the way to violent responses to perceived threats. The research also shows that the transmission of these legacies was especially strong in communities that have remained largely isolated in the century that separates the civil wars from the terrorism of the 1970s.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473871.23/warc/CC-MAIN-20240222225655-20240223015655-00877.warc.gz
|
CC-MAIN-2024-10
| 2,299 | 4 |
https://www.bachmann.info/en/products/c-c-developer?rootCatId=351
|
code
|
Modern automation systems solve complex tasks that go far beyond the controlling of a plant. Procedural or object-oriented programming in C and C++ languages makes it possible to solve a wide range of tasks in an efficient and structured way. The C/ C++ Developer supports the system programmer here through all phases of software development. System-level programming offers optimum flexibility with maximum performance.
Synergies in the SolutionCenter
The integration of the C/C++ Developer in the SolutionCenter gives users the synergies needed to create added value.
- By linking C/C++ projects in a Solution project with device configurations and templates, they can be combined to form a complete solution and managed as one.
- The C/C++ projects are processed in a predefined perspective containing editors and views arranged to meet the needs of the user.
- The integrated version management function using GIT and SVN enables the user to track code modifications easily and provides the basis for effective release management as well as working together in teams.
- The use of the integrated scripting framework or other extensions in the form of plugins, which can also be installed directly from the Eclipse Marketplace, simplifies engineering and programming.
- The use of SolutionCenter scripting API enables the application of modern software development methods such as continuous integration, model-driven development and test-driven development.
- Predefined project templates enable users to get started quickly in developing applications. Individual features, which can be compiled immediately, can then be selected, transferred to the controller and run.
Efficient programming and management
The clear and intuitive editors allow modern and efficient operation.
- The user-defined syntax highlighting increases here the readability of code in C and C++ programming languages.
- Thanks to the fully available code navigation and call hierarchy, it is also possible to easily identify interrelationships in complex applications.
- Efficient programming is particularly enhanced by the context-sensitive autocomplete function and the predefined and extendable code and file templates.
- Project management in a workspace enables all changes to the source files to be stored in a local history. These can be called again at a later time irrespective of whether the project is version managed.
- An extensive validation function immediately notifies the programmer of programming errors when the code is edited.
- Information on interfaces and the documentation of classes and functions or variables can be called and displayed via tooltips without leaving the editor.
- The project-wide changing of identifiers can be carried out easily and thoroughly, just like the formatting of source codes.
The C/C++ Developer has an open, flexible and transparent design, and thus brings the engineering to a new level.
- All sections of the source code are saved in text form in the project, thus enabling the user to generate entire source codes and configurations. Recurring operating steps can thus be automated and copy/paste errors prevented.
- The structuring of the program sections can be selected as required and thus enables the application to have a modular design.
- Programming is carried out irrespective of the target platform, which only has to be selected at the time of execution. After compilation, the created application can be transferred directly to an M1 controller and run.
- User-defined tags can be set for tasks in order to keep open issues better in view.
Higher quality through simple troubleshooting
The debug framework of the C/C++ Developer is extremely useful, particularly with the development of new applications and with troubleshooting.
- An application can be stopped at any position via a breakpoint and then executed in steps. Breakpoints can be managed jointly and activated or deactivated altogether.
- Conditions can be assigned to breakpoints so that the application can be stopped in specific circumstances.
- When the application is stopped, the stack frame is displayed by which it is also possible to navigate to the functions called.
- It is also possible to debug several applications and tasks simultaneously.
- The Disassembly view enables monitoring and debugging to be carried out in the assembler code. The source code is shown at the same time.
- Languages: ANSI C and C++
- Gnu compiler gcc
- Automatic adaptation and management of the computer environment
- Editor and debugger based on Eclipse CDT
- Intellisense: Automatic supplementation of structure elements
- Syntax highlighting
- Folding code ranges, e.g. for complete while loops
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474541.96/warc/CC-MAIN-20240224144416-20240224174416-00097.warc.gz
|
CC-MAIN-2024-10
| 4,702 | 37 |
https://beachnboat.com/refer-friends-and-win/
|
code
|
Refer Friends and Win!
Refer Friends and You Could Win!
Just login with your user name and password. Go to the bottom of the Tournament ID page (the one with your ID Card on it) and add your friends to the list. They don’t even have to sign-up for the tournament, you get chances just for referring them!
So what are you waiting for?
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806760.43/warc/CC-MAIN-20171123070158-20171123090158-00431.warc.gz
|
CC-MAIN-2017-47
| 335 | 4 |
http://msgroups.net/vc.mfc/javascript-generated-html/545209
|
code
|
Problem with saving form as html
I am trying to generate a html directory with clickable email addresses out
of my HR database. I created a from with the text field:
="<a href=""mailto:" & [UseEmail] & """>" & [UseEmail] & "</a>"
and save this form as a html file. When loading the html it shows:
instead of a clickable mail address.
The generated source code is:
How can I prevent...How to generate a cell reference from multiple cells
For example, to acquire the cell reference 'c5' the C is generated by a
formula in one cell, and the 5 is generated in a different cell
A1 = C
B1 = 5
Which evaluates to =$C$5
Microsoft Excel MVP
"Malters" <[email protected]> wrote in message
> For example, to acquire the cell reference 'c5' the C is generated by a
> formula in one cell, and the 5 is generated in a different cell
I like the abilith to use href=mailto:[email protected]?body=This is in the body
The problem is that I can not get the default e-mail tool (Outlook) to open
up in html format. It seems to only support plain text. If I do not add
the body part of the href, then it opens in the default format which for me
Any ideas? Thanks in advance.
As I understand it, this is a limitation of the way Windows passes the
mailto: command to the default email program.
Sue Mosher, Outlook MVP
Microsoft Outlook Programming - Jumpstart for
Administrators, Power Users, and Dev...Block Streamed Images in HTML Mail
There is an option in Outlook 2003 mail to not download embedded pictures in
HTML-formatted e-mail. One can make exceptions, such as if the mail is from
someone in your address book, etc.
In much Spam, however, the images are not embedded in the e-mail, but are
streamed to the mail from a web site.
Is there any way to block that? To not allow any streamed content in e-mail?
(There could be the same possible exceptions for mail from people you know,
I hope that's possible.
The option in Outlook 2003 is not for embedded images. It is for "streamed"
(web-based) images a...OAL Generator error 9325
I have ~105 names that are not being replicated to the GAL. For each, I am
getting the following error on my mail server:
Category: OAL Generator
OALGen will skip user entry 'Last, First' in address list '\Global Address
List' because the SMTP address '' is invalid.
- Default Offline Address List
I do not see any problems in looking at the mail and proxyAddresses
attributes on any of these accounts. Is there something else I ca...Using html newsletter
Do somebody know if there is a guide how to use publisher as a html
...Graphics in HTML Email
This is a multi-part message in MIME format.
I'm not sure how this works technically. However, I know that if you =
insert graphics into an HTML email in Outlook, Outlook keeps a copy of =
the graphic to be referenced as a separate part of the message. The =
problem I am running into is that this happens even when the graphic is =
referenced as a link to a file on a server (as opposed to being pasted =
How can I use XMLSerializer on the client side, and on the server side ?
I need an example, please.
Mr. x wrote:
> How can I use XMLSerializer on the client side, and on the server side ?
XmlSerializer (if you're talking about System.Xml.Serialization.XmlSerializer
class of .NET) requires .NET environment. On server side it's usually ASP.NET,
on client side - Windows forms or Web Forms.
http://www.tkachen...HTML code not correct?
Hi..I have a conceren..here it is:
The problem is in the type of code that Publisher 2003 is writing. Many
people don't realize that web pages aren't always written in HTML. Many
times other technologies such as XML and CSS are used, but
unfortunately the progam I nee dto oad this to will only accept,
specifically, HTML. What's happening is that Publisher is writing your
page in XML.
Does this make any sense?
I have been told to check Publisher's options, and see if there's an
option to have it write "strict" or "transitional" HTML (only).
opened in IE to see it run. I also put in a <NOSCRIPT> message.
When the page opened, I had the <NOSCRIPT> message displayed and a bar
across the top saying IE had blocked active content. I selected "Let
blocked content run". The <NOSCRIPT> messge went away, but the JS
still wouldn't run. I went through my IE settings (XP Pro, IE 7):
everything with Java is enabled.
What am I missing?
IE thinks you're...Generating docs from UML diagram
I've Googled this question with no success but maybe I don't know the
I'm using Visio 2002 to create a UML diagram to design some software.
The diagram has classes, which have properties and methods. For each
class and its properties and methods (and for the methods' parameters)
I filled in a description in the "Documentation" field, under
Properties. Now what I'd like is some sort of report of the text I
filled entered. I'd like to use this to help me write the code. Is
I need to make the tax field automated. Basically I want to have some
the tax textbox. Now I've read the other posts and on similar requests
saying this is not supported but Microsoft can't really rationally expect us
to have to enter the tax manually everytime we create a quote or order. This
is absurd, tax doesn't change, so why do we have to remember to work it out
everytime. Its likely that our staff will forgot and...Generate list
I have a spreasheet with over 25000 records, in one of the columns I have the
salesperson's name. There are over 60 different names in that column.
Is there a way (apart from creating a pivot table) that excel can generate a
list of the names contained in that column?
Basically what I'm asking is if it's possible to convert the "autofilter"
content into a list...
Use Advanced filter
Regards Ron de Bruin
"R4ym0nd" <[email protected] Assembly Generator (DAG) Errors
I added a field in the SOP Entry window using the Modifier.Now I want to
access it via the VS Tools. According to documentation, I have to create an
Application Assembly using the DAG tool.
But I am having trouble with the Dictionary Assembly Generator. I am in a
dos window, in the SDK folder and issuing this command : dag.exe 0
"C:\Program Files\Microsoft Dynamics\GP$GP10\Dynamics.set" /F
This command returns the following error : "Error: Cannot find
Application.MicrosoftDynamicsGp.dll before generating
Application....Convert excel table to HTML
Saving an excel file as html yield an html page with a lot of useless tags.
I had component called Microsoft Office HTML Filter 2.0 with Win2000 but it
does not install with XP. Can somebody help please ?
Not sure but check out
The Remove Hidden Data tool for Office 2003 and Office XP
There were at least 15 errors noted on Woody's Watch (now Office Watch)
see my xl2html.htm page.
Since you don't want the extra tags anyway, you may be used to doing your
own HTML coding and would rather do your own conversions under your
c...Average of Generated Data Results
Hello, I have a complicated model that spits out its results into one cell "Total Profit". Parts of the model use the RAND() function so if you hit f9 the result will change.
Trying to logically think thru this, I have to hit f9 300 times, record each result (300 rows of record), and then average those 300 results.
There has to be some way to automate this?? (There will end up being 300 rows of data that will change each time I hit f9, so this ending average will prove that the model is reliable...)
Try this set-up (using a 1 variable data table):
Set calculation mode to "...Need to convert an HTML file to a valid XTML file
I just found out I can edit my HTMLHelp in VS2005
I like it better that editing in the HTML Help Workshop
This is an old help file, actually generated when Win help was in vogue.
VS identifies many things that should be changed - line HTML not being lower
Much of it is cosmetic - a program could fix most of it.
Is there such a program.
That is, one that will read an HTML file and produce a valid XTML file?
Thanks in advance
> I just found out I can edit my HTMLHelp in VS2005
> I like it better that editing in the HTML Help Workshop
> This i...Outlook 2000 generating errors
As soon as I click on Find/Advanced Find in inbox of
Outlook 2000 I get the message "OUTLOOK.exe has generated
errors and will be shut down by windows". The same thing
happens when I select "find all related messages" for an
individual email. I'm running win2000 and have installed
all available updates for Office 2000. Present Outlook
version is SP-3. The Office software was pre-installed by
Dell. I've been really frustrated by this for some time.
Any ideas out there?
...PrintPreview in html
I have an MFC application.
I want that the 'print' feature (and the 'print preview' of course) will
devid the printer page into two sections (frames) : the first (upper) is a
'DC' frame (where I can print whatever I want with the DC). The second frame
(the lower one) is an html view (I want to write code in HTML and print it
under the DC frame).
Is it possible under VC6.0? or maybe 7.0?
It might be sort of advertisement but...
Has additional printing interface:
bo...hyperlinks to specific link don't work when published to html
I have a table of contents in excel where each line hyperlinks to a
specific sheet in another workbook. When I publish it ( i.e.convert to
html ) pressing the hyperlinks always gets me to the same sheet. How
can I get it to go to the correct sheet even after I publish it ?
(experts-exchange seems to have an answer but i can't afford the
I've been publishing by saving in the mhtml format.
...MO Generation for QTY Shortage
I would like to know if it is possible to auto generate MOs for sub
assembled item shortage.When a MO is generated for a Product and if the sub
assembled component of that product is in short qty.is there any way for the
system to generate auto MOs for the required Qty .Will it also give the total
time duration for the complete process includingg the full product
Thanks in Advance..
No. Sorry, but the auto generation of MO's from Sales Transaction Entry ONLY
creates MO's for the item being purchased/sold. Any other shortages such as
hi i have sub entity i.e., related entity called loan Details in case.In case
form i have an iframe i want to show the loan details scrren in the iframe is
it possible..how to write the code for it
http://www.stunnware.com/crm2/topic.aspx?id=JS14 gives you an overview how
to implement it.
Michael H�hne, Microsoft Dynamics CRM MVP
CRM Blog on http://www.stunnware.com
"harika" <[email protected]> schrieb im Newsbeitrag
> hi i have s...Wanted
I have trouble with users occasionally cutting, moving or deleting cells
that are referenced by formulas, so I get #REF! errors that I then have to
clean up. Ken Wright suggested I replace direct references to the editable
data cells in the formulas (e.g. A1) with INDIRECT references using a text
string (e.g. INDIRECT("A1"). Sounds like a great idea, BUT don't know if
it's achievable, because there are many formulas and many cells, and, since
I HAVE to use a text string for this method to work, I can't see a way to
change the formula in one place, then copy and p...Outlook.exe generating errors
Can anyone help me. Whilst in email, if I click on the
Outlook Shortcuts button and then click on My Documents
and attempt to open a document within My Documents, I get
the error message "Outlook.exe has generated erros and
will be shutdown". Originally this used to come up with a
Dr Watson log file error which I have managed to clear,
but this other one has flumoxed me.
...how can i make automated generated email account in my exchange
I hope all of u r fine by the grace of GOD , i want to know that how can
i make autogenrated email account in my exchange , i am using exchange server
2003(sp1) with server 2003(sp1) , i want to make the account by the name of
which reply automaticaly to the appliers .
thanks in advance ,
with regards ali.
GFI Mail Essentials will do that.
"mohammad ali" <[email protected]> wrote in message
> hi ,
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572516.46/warc/CC-MAIN-20190916080044-20190916102044-00444.warc.gz
|
CC-MAIN-2019-39
| 12,055 | 205 |
https://www.forensicfocus.com/forums/education-and-training/opinion-questionnaire/
|
code
|
This is it, the big one. Possibly the last public post regarding my dissertation.
I have created a form requesting opinion on certain documents that I haven't mentioned about earlier. I have no idea whether you guys refer to them so if it doesn't relate to you then these questions may not be for you.
To summarise, I would like opinions on
. ISO standards 17020, 27037, 27041, 27042, 27043
. The FSR Codes of Practice (I've been looking at it and it just looks like an ISO 17025 endorsement)
. Frameworks proposed and possibly used by those in digital forensics
You can answer these questions any way you like, it can be a short sentence or it could be a paragraph.
If you do wish to participate and you see a question that does not apply to you, just put 'N/A' (the questions require an answer)
If you have any questions or any other comments, feel free to send me a private message, or just comment below.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703530835.37/warc/CC-MAIN-20210122144404-20210122174404-00602.warc.gz
|
CC-MAIN-2021-04
| 908 | 9 |
https://forum.qiime2.org/t/regarding-manifest-file-in-qiime2/9261
|
code
|
Could you please give me a guidance regarding manifest file?
The content of my manifest file is as given below but I named it as manifest.txt instead of manifest.csv and used this file to import the data in qiime2 (to make artifact file for all the fastq files). Does it make any difference while making the artifact file? Note: I was able to run the command successfully.
Content of mainfest file
command used to import the data into qiime2
qiime tools import
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104683708.93/warc/CC-MAIN-20220707063442-20220707093442-00285.warc.gz
|
CC-MAIN-2022-27
| 460 | 5 |
https://soylentnews.org/article.pl?sid=17/05/21/0023217
|
code
|
from the the-whole-pantheon dept.
Submitted via IRC for TheMightyBuzzard
WikiLeaks has published a new batch of the ongoing Vault 7 leak, detailing a spyware framework – which "provides remote beacon and loader capabilities on target computers" – allegedly being used by the CIA that works against every version of Microsoft's Windows operating systems, from Windows XP to Windows 10.
Dubbed Athena/Hera, the spyware has been designed to take full control over the infected Windows PCs remotely, allowing the agency to perform all sorts of things on the target machine, including deleting data or uploading malicious software, and stealing data and send them to CIA server.
[...] According to the whistleblower organization, Athena has the ability to allow the CIA agents to modify its configuration in real time, while the implant is on target "to customize it to an operation."
"Once installed, the malware provides a beaconing capability (including configuration and task handling), the memory loading/unloading of malicious payloads for specific tasks and the delivery and retrieval of files to/from a specified directory on the target system," WikiLeaks claims.
The leaked documents suggest that Athena, written in Python programming language, was developed in August 2015, just a month after Microsoft released its Windows 10 operating system.
Interestingly, one document also suggests that the CIA agents have been advised to make sure that the spyware should not get caught by antivirus software programs, especially Kaspersky AV software.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487630081.36/warc/CC-MAIN-20210625085140-20210625115140-00456.warc.gz
|
CC-MAIN-2021-25
| 1,551 | 8 |
https://www.codeguru.com/windows/a-custom-mdi-client-class/
|
code
|
Environment: The code has been tested using VC5 and VC6 under Win98 and WinNT 4.0 and it works fine.
The CMDIClient is a quite simple CWnd-derived class that allows you to display any
bitmap image in MDIClient area or choose any background color. You can load the image from
file as well as from the resource and you can choose the mode what the image will be
displayed in. Available modes are: tile, center, stretch and custom. In the last mode you
can set manually left-top coordinates of the image and display it at any position you
wish. Additionally, the class provides two functions for saving/restoring current settings
to the registry. The saving/restoring can be done automatically (on WM_DESTROY and
PreSubclassWindow() ) if m_bAutoSaveRestore flag is set to TRUE (in fact, that’s set by
default). When the bitmap is loaded from the resource, you can map some colors to the
system colors using the COLORMAP structure, (e.g. you can map light gray to COLOR_3DFACE
and so on, see the demo project for more details).
The bitmap is drawn in CMDIClient’s OnPaint() message handler (the original OnPaint()
isn’t called at all). There’s no palette support in this version so don’t expect good
effects when you are in 256 (or less) color mode and you try to display a 256 color
bitmap. The demo project includes a simple dialog, which allows you to set all properties
at runtime, so just try it!
Set or get the background color. For painting the background we use FillRect (not
FillSolidRect for some reasons), so we need a brush. The brush is created based on a
supplied color when SetBkColor is called.
COLORREF GetBkColor() const;
void SetBkColor( COLORREF clrValue );
Load background bitmap from given file.
BOOL SetBitmap( LPCTSTR lpszFileName, UINT uFlags = LR_LOADMAP3DCOLORS );
Load background bitmap from resource. You can map some colors using the COLORMAP struct (see
LoadMappedBitmap in MSDN for details how to use it).
BOOL SetBitmap( UINT nBitmapID, COLORMAP* pClrMap = NULL, int nCount = 0 );
Set or get the current display mode (dispTile, dispCenter, dispStretch or dispCustom).
void SetDisplayMode( DisplayModesEnum eDisplayMode );
DisplayModesEnum GetDisplayMode() const;
Specify or retrieve the coordinates of image top-left corner. Used when dispCustom is selected. If
bRedraw is set to TRUE, the entire window is invalidated.
void SetOrigin( int x, int y, BOOL bRedraw = TRUE );
void SetOrigin( const CPoint& point, BOOL bRedraw = TRUE );
const CPoint& GetOrigin() const;
Return the current image size. If there’s no image, (0,0) is returned.
const CSize& GetImageSize() const;
Return the filename of the bitmap. Empty string if there’s no image or if the image was loaded from the resource.
const CString& GetFileName() const;
If set to TRUE, the current state is automatically saved on WM_DESTROY and restored on
PreSubclassWindow(). If you would like to control this manually, set it to FALSE and call
SaveState()/RestoreState() when you want.
void SetAutoSaveRestore( BOOL bNewValue );
BOOL GetAutoSaveRestore() const;
Restore original (system-wide) settings for the MDIClient and repaint the window.
Load/store current settings in the registry
For further information look at the CMDIClient header and implementation files.
How to use it?
First, add to your CMainFrame class implementation file a member
variable of type CMDIClient. A good practice is to keep the variables protected (or
private) and uses an inline functions to gain access to them, if needed. Then within
OnCreate() handler add a following code.
// Subclass the MDI client window
VERIFY( GetMDIClient().SubclassWindow( m_hWndMDIClient ) );
After that you can set the desired MDIClient properties by calling appropriate functions.
Date Last Updated: April 3, 1999
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363332.1/warc/CC-MAIN-20211207014802-20211207044802-00561.warc.gz
|
CC-MAIN-2021-49
| 3,772 | 56 |
https://stackoverflow.com/questions/30455036/how-to-copy-file-from-host-to-container-using-dockerfile
|
code
|
I faced this issue, I was not able to copy zeppelin [1GB] directory into docker container and was getting issue
COPY failed: stat
such file or directory
I am using docker Version: 17.09.0-ce and resolved the issue with the following steps.
Step 1: copy zeppelin directory [which i want to copy into docker package]into directory contain "Dockfile"
Step 2: edit Dockfile and add command [location where we want to copy]
ADD ./zeppelin-0.7.2-bin-all /usr/local/
Step 3: go to directory which contain DockFile and run command [alternatives also available]
Step 4: docker image created Successfully with logs
Step 5/9 : ADD ./zeppelin-0.7.2-bin-all /usr/local/
Step 6/9 : WORKDIR $ZEPPELIN_HOME
---> 3adacfb024d8 ....
Successfully built b67b9ea09f02
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103360935.27/warc/CC-MAIN-20220628081102-20220628111102-00642.warc.gz
|
CC-MAIN-2022-27
| 745 | 13 |
https://www.squash.io/how-to-resolve-javalangclassnotfoundexception-in-java/
|
code
|
A common issue encountered by Java developers is the “java.lang.ClassNotFoundException” error. This error indicates that the Java Virtual Machine (JVM) cannot find the class specified in the code during runtime. To resolve this error, you can follow the steps below:
1. Check the Classpath
The first step is to verify that the classpath is correctly set up. The classpath is a parameter that tells the JVM where to look for classes and packages. If the class you are trying to use is not in the classpath, the JVM will not be able to find it.
To check the classpath, you can use the following command in the command line:
java -classpath <main>
with the directory path where your JAR files are located, and
<main> with the name of your main class. If the classpath is incorrect, you can update it by adding the required JAR files or directories using the “-classpath” or “-cp” option.
2. Verify the Class Name and Package
Ensure that the class name and package in your code match the actual class name and package structure in your source code. The Java language is case-sensitive, so even a minor difference in the class name or package can result in a “ClassNotFoundException.”
For example, if you have a class named “MyClass” in the package “com.example”, make sure that your code references it correctly as “com.example.MyClass”.
3. Check the Class Loader
The ClassLoader is responsible for loading classes at runtime. It follows a hierarchical structure and loads classes from different sources such as the bootstrap classpath, extension classpath, and application classpath.
If you are using a custom ClassLoader or have modified the default behavior, ensure that the ClassLoader is correctly configured and can find the required class.
4. Check the Deployment and Build Process
If you are working on a project that involves building and deploying a Java application, make sure that the class causing the “ClassNotFoundException” error is included in the build and deployment process.
For example, if you are using a build tool like Maven or Gradle, ensure that the required dependencies are correctly specified in the project configuration files (e.g., pom.xml for Maven). Also, ensure that the class is included in the final artifact (e.g., JAR file) that is deployed to the runtime environment.
5. Examine the Exception Stack Trace
When the “ClassNotFoundException” error occurs, the JVM provides a stack trace that can help identify the root cause of the error. Examine the stack trace to determine which class is causing the error and where it is being invoked in your code.
6. Check for Missing Dependencies
The “ClassNotFoundException” error can also occur if the required dependencies are missing. If your code depends on external libraries or modules, make sure that they are included in the classpath or bundled with your application.
For example, if you are using Maven as your build tool, check the project’s dependencies in the pom.xml file and ensure that the required dependencies are correctly specified.
7. Verify the Java Version Compatibility
In some cases, the “ClassNotFoundException” error can occur due to a mismatch between the Java version used during compilation and the Java version used during runtime. If you are using a class or library that is not compatible with the Java version in your runtime environment, the JVM will not be able to find the class.
Ensure that the Java version used during compilation matches the Java version used during runtime. You can check the Java version by running the following command in the command line:
Make sure that the output matches the Java version you intend to use.
8. Consider Using a Build Tool
Using a build tool like Maven or Gradle can help manage dependencies and simplify the build process. These tools automatically handle the classpath and dependency resolution, reducing the chances of encountering a “ClassNotFoundException” error.
Consider integrating a build tool into your project to manage dependencies, build the project, and handle the classpath configuration.
9. Seek Community Support
If you have tried all the above steps and are still unable to resolve the “ClassNotFoundException” error, consider seeking help from the Java community. Online forums, developer communities, and Q&A platforms like Stack Overflow can provide insights and solutions to specific issues.
When seeking community support, provide relevant details such as the complete error message, stack trace, code snippets, and any additional information that may help others understand and diagnose the problem.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100135.11/warc/CC-MAIN-20231129173017-20231129203017-00637.warc.gz
|
CC-MAIN-2023-50
| 4,630 | 31 |
https://dabase.com/e/15015/
|
code
|
Testing by Go Playground example
Published: Monday, Nov 23, 2020 Last modified: Wednesday, Mar 29, 2023
I really like the test by example feature in Go. Not many people know this actually works in the Go playground like so: https://play.golang.org/p/UIYvV19R-H6
Furthermore the Go Playground has a Tests dropdown https://play.golang.org/p/kIZkoT2EvJX for Table driven tests!
If you like this tip, you might want to use a proper editor like vim as follow my video tips.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950110.72/warc/CC-MAIN-20230401160259-20230401190259-00231.warc.gz
|
CC-MAIN-2023-14
| 468 | 5 |
https://jobsuchmaschine.ch/en/jobs/0000369003271226cb355bdda491d38bfaf40f675d/
|
code
|
Please refer to JobSuchmaschine in your application
Relentless programming, bringing new ideas, validating new concepts and helping shape the future of the company in some interesting new domains.
As a communication software engineer, your prime responsibilities will be design, development and testing of embedded software. In collaboration with other team members, from time to time you may be required to coordinate external contractors and also interface with our customers on various fronts.
As an integral part of the core team, you will participate in product and solution brainstorming sessions and be required to take up some feasibility research on specific subjects. This could also include interfacing with external partners and associations in specific projects.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549425737.60/warc/CC-MAIN-20170726002333-20170726022333-00088.warc.gz
|
CC-MAIN-2017-30
| 775 | 4 |
http://ux.stackexchange.com/questions/tagged/addresses+localization
|
code
|
User Experience Meta
to customize your list.
more stack exchange communities
Start here for a quick overview of the site
Detailed answers to any questions you might have
Discuss the workings and policies of this site
Why are there two Address lines in Address forms?
Experience and a quick Google Images search suggests that it's standard to provide two fields for Address/Street. A colleague argues that it's perceived as two alternative addresses, and that the fact ...
Jul 10 '12 at 9:33
newest addresses localization questions feed
Announcing The Launch Of Meta Stack Exchange
Hot Network Questions
What does 'highly non linear' mean?
Thoughts on Tattoos in the Workplace
Do postdoctoral studies have official certificate?
Is there one word for both horizontal or vertical, but not diagonal, adjacency?
How to define a point between two points?
What happened when i "mv *" no errors shown and now only one folder left. Why?
How to learn inequalities and become good at proving them?
First night on a telescope questions
Am I morally obligated to pursue a career in medicine?
There is no register form but spams are sending register request in Drupal 7!
Shapeshifter Villain travelling with Party
Expected number of ratio of girls vs boys birth
Correct hyperlink to the index
How to explain Heartbleed without technical terms?
Opposite of the suffix -less
Kid's homework: 4 equations 5 unknowns? Going crazy!
Why does a nuclear explosion have directionality?
Is there a way to create a for loop with only two expressions in C?
Did Arwen actually die?
Output Pi without math
Why do people organize summer schools?
How to get the current upload and download speeds in terminal?
Force latex to show a square matrix as square
more hot questions
Life / Arts
Culture / Recreation
TeX - LaTeX
Unix & Linux
Ask Different (Apple)
Geographic Information Systems
Science Fiction & Fantasy
Seasoned Advice (cooking)
Personal Finance & Money
English Language & Usage
Mi Yodeya (Judaism)
Cross Validated (stats)
Theoretical Computer Science
Meta Stack Exchange
Stack Overflow Careers
site design / logo © 2014 stack exchange inc; user contributions licensed under
cc by-sa 3.0
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609537308.32/warc/CC-MAIN-20140416005217-00608-ip-10-147-4-33.ec2.internal.warc.gz
|
CC-MAIN-2014-15
| 2,166 | 53 |
http://lamehoo.blogspot.com/2010/02/parenting-fail_15.html
|
code
|
I would have done the same thing!
it's probably a completely self-sufficient hobo by now :L
That's DEFINITELY a troll.
I bloody hope it's a troll!
You've won the idiot award.The idiot award. You've won it.
That is fake and gay!
fake and gay. ahahahahah ray williams.
This is fucking hilarious :dAnd stop using that stupid word "Troll"It actually makes you kind of a Troll...if you think about it :)
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590199.42/warc/CC-MAIN-20180718135047-20180718155047-00248.warc.gz
|
CC-MAIN-2018-30
| 398 | 8 |
https://forum.rclone.org/t/obtain-new-token-without-no-cli-interaction/5707
|
code
|
I’m trying to create a config file that I can distributed to other users, and all they’d need to do is obtain a new token via Googles auth2 interactive web page. rclone will be run but a bat file so we’re after minimal user interaction, once they’ve authenticate their own Google Drive access our bat file will simply sync our pre-selected Team Drive folder.
To obtain the new users specific Google Drive token I have the following command:
rclone config update Token true --auto-confirm
The only issue with this is that the config tool still asks what Google Team Drive to use after the user has authenticated via the Google web page. Is there any way to avoid that question and simply obtain the new Token without any further questions?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663035797.93/warc/CC-MAIN-20220529011010-20220529041010-00797.warc.gz
|
CC-MAIN-2022-21
| 746 | 4 |
https://pythonpedia.com/en/knowledge-base/10672419/class-constants-in-python
|
code
|
In python, I want a class to have some "constants" (practically, variables) which will be common in all subclasses. Is there a way to do it with friendly syntax? Right now I use:
class Animal: SIZES=["Huge","Big","Medium","Small"] class Horse(Animal): def printSize(self): print(Animal.SIZES)
and I'm wondering if there is a better way to do it or a way to do it without then having to write "Animal." before the sizes. Thanks! edit: forgot to mention that horse inherits from animal.
Horse is a subclass of
Animal, you can just change
Still, you need to remember that
SIZES means "big", so probably you could improve your code by doing something like:
class Animal: SIZE_HUGE="Huge" SIZE_BIG="Big" SIZE_MEDIUM="Medium" SIZE_SMALL="Small" class Horse(Animal): def printSize(self): print(self.SIZE_BIG)
Alternatively, you could create intermediate classes:
BigAnimal, and so on. That would be especially helpful if each animal class will contain different logic.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400202007.15/warc/CC-MAIN-20200921175057-20200921205057-00598.warc.gz
|
CC-MAIN-2020-40
| 961 | 10 |
https://forum.facepunch.com/t/sever-not-responding-the-case-of-a-very-picky-server/218187
|
code
|
Our server seems to have a mind of it’s own.
Yesterday we tried to launch some new servers (3 gmod, 1 tf2). However, people started reporting that the servers were not responding. This struck me as odd, why would some people be unable to connect to the server while others can?
Well, some trial and error later, and it turns out that the servers are only visible when you’ve connected to another service on the machine (and very rarely otherwise). Doesn’t matter which service you connect to, could be teamspeak, web, even remote desktop works.
We’ve went through all the normal troubleshooting steps, and at this point we’re stumped. It’s going to be something simple that we’ve overlooked and will feel very stupid about, or it’ll be something so ridiculous we’d have no chance of guessing.
There are no notable errors in the server’s consoles. sv_lan is definitely 0. Firewall is correctly configured.
I even checked the ports while the server was not responding, everything is as expected.
Has anyone run in to this issue before? And if so, how was it resolved?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303717.35/warc/CC-MAIN-20220121222643-20220122012643-00159.warc.gz
|
CC-MAIN-2022-05
| 1,085 | 7 |
http://askubuntu.com/questions/137777/why-can-i-not-access-any-of-the-options-when-using-dconf-editor/137779
|
code
|
I recently installed dconf editor from the software centre. But when I launch it I am unable to navigate any of the options, clicking any of the entries in the tree on the left does not expand the menus.
Am I missing something really obvious?
yes you are missing something really obvious. You have to click on the arrows, to get to the sub items:
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
4 years ago
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257828322.57/warc/CC-MAIN-20160723071028-00105-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 435 | 7 |
https://pisquare.osisoft.com/docs/DOC-4045-exercise-ipisql-for-pi-sql-client-jdbc
|
code
|
Objective: The goal of this exercise is to demonstrate understanding of how to work with the IPISQL command line utility.
Notes about the example environment:
- The PI SQL DAS (RTQP) service is installed on the AF Server named AFSRV01
- The AF Server AFSRV01 has the NuGreen database imported
- The user account being passed to the PI SQL DAS (RTQP) service is student01
- Note: this is a domain account that has a mapping on the AF Server and PI Data Archive
Notes about your environment:
- Perform this exercise on a client machine with the PI SQL Client (JDBC) installed
- Replace the names of the AF Server, AF Database, and domain user as necessary to get the connections to work
- If you do not have the Nugreen database but would like to use it for this example, you can find it here
Given the following inputs and outputs from the example environment, use Read: How to Customize IPISQL for PI SQL Client (JDBC) to answer the following questions:
- What was the full JDBC url being used in this case?
- What was the query being executed in this case?
- What would the query become if we wanted to output the names of the first ten elements based on the 'Boiler' template?
- Implement the change in question 3 and recompile the IPISQL utility into IPISQLCustom. Demonstrate it working by rerunning the utility from the command prompt.
Have questions? Ask
When you are ready, compare your answers with the Solution: IPISQL for PI SQL Client (JDBC)
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400210996.32/warc/CC-MAIN-20200923113029-20200923143029-00150.warc.gz
|
CC-MAIN-2020-40
| 1,452 | 17 |
https://onlinecareer360.in/job/eaton-hiring-for-engineer-iot-at-hadapsar-pune-maharashtra-2/
|
code
|
Full Job Description
If you desire to be part of something special, to be part of a winning team, to be part of a fun team – winning is fun. We are looking forward to Engineer in Eaton’s business, based in Pune, India. In Eaton, making our work exciting, engaging, meaningful; ensuring safety, health, wellness; and being a model of inclusion & diversity are already embedded in who we are – it’s in our values, part of our vision, and our clearly defined aspirational goals.
This exciting role offers opportunity to:
Work with your team and others, contributing to the architecture, design, and implementation of an Internet of Things platform. Development will be primarily in Java, C#, and Python.
Author high-quality, unit-tested code.
Demonstrate and document solutions by using flowcharts, diagrams, code comments, code snippets, and performance instruments.
Provide work estimates and participate in design, implementation, and code reviews.
Execute agile work plans for iterative and incremental project delivery.
Expand job knowledge by studying software development techniques and programming languages. Participate in educational opportunities and read professional publications.
Work with test teams to ensure adequate and appropriate test case coverage; investigate and fix bugs; create automated test scripts.
1-4 years of progressive experience in software industry developing, designing, and deploying technology solutions shipping high quality products
1-3 yrs of experience on C# and .Net
2+ yrs of experience working with Azure
Proficient with Java or C# and .Net Technologies and associated IDE’s (Visual Studio, Eclipse, IntelliJ, etc.)
Understanding of Databases and concepts (relational and non-relational like sqlserver, cosmos, mongodb etc.)
Understanding of software design principles, algorithms, data structures, and multithreading concepts
Understanding of object-oriented design and programming skills, including the use of design patterns
Working knowledge of cloud development platforms such as Azure or AWS
Working knowledge of security concepts such as encryption, certificates, and key management
Working knowledge of networking protocols and concepts (http, tcp, websocket)
Working knowledge of network and distributed computing concepts
Experience utilizing best practices in software engineering
Experience with Agile development methodologies and concepts
Strong problem solving and software debugging skills
Knowledge of CI/CD concepts, tools, and technologies
Yes! Because you are the one we are looking for, we hope to hear from you now!
Job tag: #LI-SD1
We make what matters work. Everywhere you look—from the technology and machinery that surrounds us, to the critical services and infrastructure that we depend on every day—you’ll find one thing in common. It all relies on power. That’s why Eaton is dedicated to improving people’s lives and the environment with power management technologies that are more reliable, efficient, safe and sustainable. Because this is what matters.
We are confident we can deliver on this promise because of the attributes that our employees embody. We’re ethical, passionate, accountable, efficient, transparent and we’re committed to learning. These values enable us to tackle some of the toughest challenges on the planet, never losing sight of what matters.
Region: Asia Pacific
Organization: INNOV Innovation Center
Job Level: Individual Contributor
Is remote work (i.e. working from home or another Eaton facility) allowed for this position?: No
Does this position offer relocation?: No
Travel: Yes, 10 % of the Time
Graphic Designer cum Production Coordinator Must have full knowledge of Adobe InDesign Software, Coral & PageMaker. Minimum 02 Years of...Apply For This Job
Job Description About the company: Head Digital Works is now a well-funded and supported growth stage ‘start-up’ and prides itself...Apply For This Job
Full-time17 hours ago Full Job Description Position Description: General IT Infrastructure Systems Administration work focuses on installation, configuration, and maintenance...Apply For This Job
Full-time2 hours ago Full Job Description Full Job DescriptionWarehouse equipment operators operate stand-up reach trucks and assist stacking.What it is...Apply For This Job
Full-time2 hours ago Full Job Description Requisition ID: 272244 Work Area: Customer Service and Support Expected Travel: 0 – 10%...Apply For This Job
1 hour ago Full Job Description At Amdocs, our purpose is to enrich lives and progress society. With our creativity...Apply For This Job
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039603582.93/warc/CC-MAIN-20210422100106-20210422130106-00147.warc.gz
|
CC-MAIN-2021-17
| 4,596 | 41 |
https://globalreport.org/covid-pm-apologises-after-admitting-he-attended-downing-street-garden-party
|
code
|
COVID-19: PM apologises after admitting he attended Downing Street garden party
Sky, 12 Jan 2022
Boris Johnson has apologised after admitting that he attended a Downing Street garden drinks party during the first lockdown.
Addressing the Commons under intense pressure from MPs, the Prime Minister said 'I want to apologise', adding he 'must take responsibility' for events that took place.
SUBSCRIBE to our YouTube channel for more videos: http://www.youtube.com/skynews
Follow us on Twitter: https://twitter.com/skynews
Like us on Facebook: https://www.facebook.com/skynews
Follow us on Instagram: https://www.instagram.com/skynews
For more content go to http://news.sky.com and download our apps: Apple: https://itunes.apple.com/gb/app/sky-news/id316391924?mt=8 Android https://play.google.com/store/apps/details?id=com.bskyb.skynews.android&hl=en_GB
Sky News videos are now available in Spanish here/Los video de Sky News están disponibles en español aquí https://www.youtube.com/channel/skynewsespanol
To enquire about licensing Sky News content, contact [email protected]
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304915.53/warc/CC-MAIN-20220126041016-20220126071016-00417.warc.gz
|
CC-MAIN-2022-05
| 1,093 | 11 |
https://medium.com/@matus.vaclav1/picoctf-tab-tab-attack-5a9e9bc4e8fe?source=read_next_recirc---------3---------------------553e8fd0_8fd8_4854_ba6c_254d45f88daf-------
|
code
|
picoCTF: Tab, Tab, Attack
Hello friend! I am LunatiX. This is my write-up for picoCTF challenge
Tab, Tab, Attack. I will try my best to explain what I did and how i proceeded.
Using tabcomplete in the Terminal will add years to your life, esp. when dealing with long rambling directory structures and filenames: Addadshashanammu.zip
Download the attacked file.
This is GREAT! :)
- if you were not familiar with terminal or linux, this autocomplete is perfect new skill to learn.
Navigating to location of downloaded file. (Addadshashanammu.zip)
Unziping the file in terminal.
Creates tlong output with lot of directories.
Changing directory to the final sub-directory
NOTE: as there is only 1 subdirectory you can autocomplete with ‘TAB’, just start wrtiting the name of the directory.
NOTE 2: Linux is case sensitive!!
in last directory I found shell script (fang-of-haynekhtnamet).
Congratulation! Please let me know what I could do better in next write-ups in the comment section below or on twitter (@pad4van)
Follow me for more walkthrough’s.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573876.92/warc/CC-MAIN-20220820012448-20220820042448-00154.warc.gz
|
CC-MAIN-2022-33
| 1,053 | 16 |
http://www.wiley.com/WileyCDA/WileyTitle/productCd-0470479574,descCd-authorInfo.html
|
code
|
Kimball's Data Warehouse Toolkit Classics: The Data Warehouse Toolkit, 2nd Edition; The Data Warehouse Lifecycle, 2nd Edition; The Data Warehouse ETL Toolkit
This price is valid for United States. Change location to view local pricing and availability.
RALPH KIMBALL, PhD, founder of the Kimball Group, has been a leading visionary and innovator in the data warehouse industry since 1982.
MARGY ROSS, President of the Kimball Group, has focused exclusively on decision support and data warehousing since 1982.
BOB BECKER has been designing large-scale data warehouse and business intelligence solutions since 1990.
JOY MUNDY has designed and implemented data warehousing and business intelligence systems since the early 1990s.
WARREN THORNTHWAITE has concentrated on decision support, data warehousing and business intelligence solutions since 1980.
JOE CASERTA is the Founder of Caserta Concepts, LLC, a data warehousing consulting firm.
More By These Authors
Buy Both and Save 25%!
Kimball's Data Warehouse Toolkit Classics: The Data Warehouse Toolkit, 2nd Edition; The Data Warehouse Lifecycle, 2nd Edition; The Data Warehouse ETL Toolkit (US $145.00)
Total List Price: US $195.00
Discounted Price: US $146.25 (Save: US $48.75)
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368698222543/warc/CC-MAIN-20130516095702-00025-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 1,231 | 13 |
http://civilwarcavalry.com/?p=706
|
code
|
We’re watching a modestly interesting documentary on the History Channel called “Axe Men”. It’s about lumberjacks in the Pacific Northwest. Once I got beyond wondering when they would sing Monty Python’s Lumberjack Song (they didn’t, by the way), I started wondering about a much bigger and more important question.
This is a routine documentary on contemporary events, the sort of thing that has long been the staple of the Discovery Channel or the National Geographic channel. It’s NOT history. What is this doing on the History Channel? Or “Ice Road Truckers”? Again, interesting, but not history.
I can remember a time when the History Channel actually showed quality history programming. It carried the excellent “Civil War Journal” series. It has done some really interesting programming on the presidents of the United States. Or “History’s Mysteries”, another favorite of mine. There was a time when this channel was history, 24/7/365, and that’s what made it unique. You could always find something that was purely historical and often really interesting on the History Channel.
Now, it’s the UFO/paranormal channel, with lots of of programs about Adolf Hitler and Nostradamus, and these stupid documentaries that have nothing to do with history. Now, I completely understand that television programming is a business and that networks are going to air what makes money for them. I get that. It makes sense.
Here’s the description of another new series:
Gangland, the new series on The History Channel, takes you inside prisons and on the streets of America to view the most violent and influential gangs in our modern times.
The key to that description is the word “modern”. Again, it’s contemporary stuff and NOT history.
However, why not just be honest about it and give up the charade that this is still supposed to be a network that carries legitimate, serious programming about history. Just change the name and stop defrauding the public as to the nature of the content by calling yourself a “history channel” when it is now far, far from being that.
I miss the real History Channel, and I despise the crap that has taken its place.Scridb filter
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120694.49/warc/CC-MAIN-20170423031200-00008-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 2,205 | 9 |
https://tutorme.com/tutors/805944/interview/
|
code
|
Tutor profile: Diellza M.
Subject: SQL Programming
In SQL programming, what is a query?
An SQL query is a request for data or information from a database table or set of tables. A database query can either be a select query or an action query. #Example SELECT fname, lname /* select query */ FROM myDb.students WHERE student_id = 1; UPDATE myDB.students /* action query */ SET fname = 'Captain', lname = 'America' WHERE student_id = 1;
Subject: PHP Programming
What makes Python so popular these days?
Machine learning and data visualization have made Python popular for data analysis. In addition, it is popular as a language for operational management, making recurring tasks easier to automate. Additionally, it is well known for its ease of programming and strength as a general-purpose language.
Subject: HTML Programming
What is the difference between HTML tags and HTML elements?
An HTML element consists of a starting tag, some content, and a closing tag. For example, <h1>Heading 1</h1> is a HTML element but just <h1> is a starting tag and </h1> is a closing tag
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499790.41/warc/CC-MAIN-20230130003215-20230130033215-00461.warc.gz
|
CC-MAIN-2023-06
| 1,072 | 10 |
https://www.getyouonline.co.uk/bespoke-web-applications
|
code
|
Bespoke Web ApplicationsHave an idea in mind?
Building Your Tailor Made Application From The Ground Up
At getyouonline.co.uk, we design, code and deliver bespoke web applications for a wide range of industries. From advanced stock management and order placement systems, to CRM platforms and order handling facilities, we have provided many businesses with custom built web applications at an affordable price. From initial concept and design, to coding, system testing and support, getyouonline.co.uk provides valuable advice at every stage of the project to deliver an application that is dependable, robust and performs as intended.
Our custom built web applications can interface using various coding languages and data delivery formats:
PHP & MySql Database Websites
Our PHP programmers are experienced in developing bespoke, online database systems for a large number of web applications.
From a simple membership database to advanced recording and tracing of components online, we work hard to build reliable and flexible applications that are designed to meet a specific requirement.
Having years of experience designing and coding online applications systems, our PHP and MySQL developers a produce fast and efficient end result that is compatible with all internet browsers and platforms.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987833089.90/warc/CC-MAIN-20191023094558-20191023122058-00498.warc.gz
|
CC-MAIN-2019-43
| 1,298 | 8 |
http://stackoverflow.com/questions/5233078/rmi-transport-tcp-tcptransport-connectionhandler-consumes-much-cpu
|
code
|
i am running an third party RMI-Server app providing exactly one method
("getImage()" returns an image as byte). The implementation of this method (getting the image via a SOAP-WS) is provide by me.
The problem on running this RMI-Server is the high CPU consumption (measured with jvisualvm): 65% of cpu time go into
"sun.rmi.transport.tcp.TCPTransport$ConnectionHandler.run()" and on second place with 15% is
"sun.net.www.http.KeepAliveCache.run()". The "real" work (scaling the image) comes on 4th place.
The server is running on win 2003 server. i guess there is something wrong with resource/connection handling?? but is this an implementation problem or a windows configuration-problem?
another observation is: if cpu utilization is high the memory utilization goes also up - the question is: is this because the gc can't do its work or many images waiting to be delivered. all i can say the memoryis used for
so any ideas what to do?
thx in advance
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1419447550218.103/warc/CC-MAIN-20141224185910-00099-ip-10-231-17-201.ec2.internal.warc.gz
|
CC-MAIN-2014-52
| 954 | 9 |
https://bagoscoop.github.io/videos/watch/not-great-at-following-god-s-advice-pastor-steven-furtick
|
code
|
Not great at following God’s advice? | Pastor Steven Furtick
Official Steven Furtick
Published at : 12 Dec 2020
God said He’d be our guide, but it isn’t always easy to follow His advice.
Steven Furtick Facebook: ele.vc/5Fb3qR
Steven Furtick Instagram: ele.vc/kLuTvj
Steven Furtick Twitter: ele.vc/Uu9DZp
pastor steven furticksteven furtickfurtick steven
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487586390.4/warc/CC-MAIN-20210612193058-20210612223058-00420.warc.gz
|
CC-MAIN-2021-25
| 359 | 8 |
http://grammartechnologyforbetterorworse.blogspot.com/2015/02/the-next-time-you-assign-essay-dont.html
|
code
|
The next time you assign an essay, don't make any requirements about what students are able to use in the process of writing: Word grammar-check, spell-check, grammar software, whatever they want. Watch what they do. Watch carefully the process and what happens between when they think of something to say, and when they actually have something on paper. The computer is involved every step of the way, and you should be aware of how that influences the process.
Now of course, you could tell them NO. Don't use it, I don't want to see you using it, it's wrong (you could even disable the computers that they are using). What that means is, they would use it all the time, except when they are in your class. But then you might as well be teaching primitive hieroglyphics, because it would be just as useful - it would be primitive writing compared to what they would use every day. They would produce things that would look nothing like what they would normally produce. You would have a much clearer view of what they actually know. It also might be easier for you to figure out what they meant, since the computer would no longer alter what they write making it harder for you to interpret. So, sure, there would be advantages. But the biggest disadvantage is that you would be teaching them to write without using any of the tools they would normally use. It would be like teaching someone to drive a car, only using a Model T. One side of us says "that's the real driving, that's what driving was meant to be." But the other side says, "You were unable to teach the things they need the most," i.e. how to use the tools of the modern car.
Intuitively, there is something gratifying about teaching to drive on a Model T. That's the real thing, right? All the modern conveniences just get in the way, don't they? If you taught someone the true skill, unadorned, unchanged, wouldn't that be better?
No, they wouldn't let you, because it would be unsafe to put someone in a new car without the awareness of what the modern tools do. And the same with writing in the modern world. In the old days, it was harder to manage a clutch, make a turn, etc. so you spent more time mastering that stuff. In the modern world, if you spent a week learning how to use a clutch, you'd be wasting your time. You should teach them how to write as we know the process today.
That's why you should recognize the machine and its role. Tell them the difference between one grammar check and the other. Teach them how to use spell-check and avoid errors. Get them to use their memory for the stuff they need to memorize.
In the future, this might not include words. Why should they learn new words, when the machine can just provide them? Ah, but what the machine can't do, is construct them into simple, meaningful sentences. Only you can teach them that!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794869732.36/warc/CC-MAIN-20180527170428-20180527190428-00582.warc.gz
|
CC-MAIN-2018-22
| 2,836 | 6 |
https://www.capgemini.com/jobs/microstrategy-4-to-6-years-bengaluru-hyderabad/
|
code
|
- Design, Develop & Test the Reports/Dashboards with the MicroStrategy Components.
- Interact with business, ETL, and data architect teams to build models suitable for MicroStrategy
- Design and develop complex reporting solutions including reports, Report Services Documents and Enterprise Dashboards.
- Design and implement changes to schema of an existing MicroStrategy project for supporting new reporting requirements without affecting any of the existing reports
- Incorporate MicroStrategy best practices in the Projects.
- MicroStrategy, ETL
- Preferable to have a strong SQL/RDBMS hands on
- Ability to learn, evaluate and adapt tools/technologies to meet business and project objectives.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178365186.46/warc/CC-MAIN-20210303012222-20210303042222-00507.warc.gz
|
CC-MAIN-2021-10
| 697 | 8 |
http://jevois.org/qa/index.php?qa=2379&qa_1=using-older-jevois-versions&show=2382
|
code
|
Oh, yes, updates are always optional, you are welcome to just keep the old code forever. This is something you need to configure into Ubuntu, you can disable automatic updates or have it ask you, it is somewhere in the "settings" of Ubuntu. I usually disable all auto-updates on my Ubuntu desktop and server machines, otherwise new auto-updates to the linux kernel of Ubuntu always end up breaking the nvidia drivers and then all of the deep learning pipelines go down, etc.
- updates to jevois-sdk are made when some change in the linux kernel, opencv version, jevois operating system, etc are made. So those tend to be bigger system-level changes. You should get those updates if you want those new things (e.g., newer opencv).
- updates to jevois and jevoisbase sometimes just add new user features, new machine vision modules, etc.
Please don't hesitate to post here with any error you are getting after an update, we will help you.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506669.30/warc/CC-MAIN-20230924191454-20230924221454-00884.warc.gz
|
CC-MAIN-2023-40
| 936 | 4 |
https://czo-archive.criticalzone.org/luquillo/publications/pub/phillips-2014-the-control-of-grain-scale-mechanincs-on-channel-form-landsca/
|
code
|
Landscapes evolve over millions of years, through the complex interplay of climate and tectonics. Mountains in particular represent a staggering range of spatial and temporal scales, challenging our ability to understand how the landscape is sculpted. Mountains do not simply disappear by bulk denudation. The key process of river incision results from the entrainment, displacement, and collision of coarse particles with the bed; a phenomenon known as bed load transport. This dissertation seeks to elucidate how bed load transport in natural rivers is driven by floods, to provide a mechanistic connection between climate and landscape evolution. Field surveys of coarse particle displacement and channel geometry are combined with hydrological time series, to study the interaction between floods and bed load dynamics, and their implications for channel form. Results from tagged cobbles demonstrate that mean particle displacement is proportional to applied fluid momentum in excess of the threshold of motion, while dispersion of tracers is superdiffusive due to the burial and excavation of cobbles. These field surveys reveal that particle motion remains in a state of partial transport for a diverse population of flows, and that particle sorting and transport distances closely match theory developed from small-scale laboratory experiments. Analysis of hydrological time series shows that the threshold of particle motion truncates the distribution of applied stress, resulting in thin-tailed distributions of forcing for flows above the threshold of motion. This analysis further shows that, because a coarse-grained river adjusts its geometry so that the flow at the banks is at the threshold of motion, the probability of experiencing larger stresses diminishes exponentially. Field surveys of channel geometry and particle size reveal that the geomorphological impacts of urbanization are reduced for coarse-grained channels adjusted to frequent sediment transport events. Taken together, these observations indicate that the threshold of particle motion represents a first-order control on the influence of climate on river dynamics, and the landscapes through which they flow.
Phillips, C.B., Jerolmack, D.J. (2014): The Control of Grain-Scale Mechanincs on Channel Form Landscape Dynamics, and Climatic Perturbations in Gravel-Bedded Rivers. Earth and Environmental Science, University of Pennsylvania.
This Paper/Book acknowledges NSF CZO grant support.
(15 MB pdf)
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510967.73/warc/CC-MAIN-20231002033129-20231002063129-00846.warc.gz
|
CC-MAIN-2023-40
| 2,485 | 4 |
http://flytxone.com/Use_n_Care.htm
|
code
|
Never operate your starter in excess of 10 seconds per
starting attempt. Allow 20 seconds to allow starter to
cool between attempts. Repeat up to 5 more times (all
Sky-Tec starters can handle at least a total of 60 seconds of
combined cranking time per half hour - some far more - but
don't test it!). If engine fails to start, allow 30
minutes for starter to fully cool down before repeating (you
might want to talk with a competent mechanic as to why your
expensive aircraft engine didn't fire on 2-3 blades like the
good ones always do).
All Sky-Tec starters ship from the factory with this tag
affixed to the power terminal of the starter:
Click Image to Enlarge
here to see a side-by-side view of the Sky-Tec tag to
those of other manufacturers.
There are little to maintenance requirements for a Sky-Tec
starter. You may apply a very small amount of
dry-silicone type lubricant or light LPS (1) to the drive
pinion gear and/or shaft (Lycoming models) to minimize surface
corrosion. But typically the best maintenance for your
Sky-Tec starter is regular use.
Never pressure wash the starter with water or any form of
degreasing agent. Simply wipe it clean to remove any
The best thing you can
do for your Sky-Tec is USE IT!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891813803.28/warc/CC-MAIN-20180221202619-20180221222619-00137.warc.gz
|
CC-MAIN-2018-09
| 1,228 | 25 |
http://www.chamonix.com/stage-photographie,42-4845274-104649,en.html
|
code
|
30/10 in the morning: presentation of the course. Discover the technical bases of the photo and the material. Define our project and its agenda. Meeting of valley heritage personalities. Shooting.
31/10 in the morning: meeting of personalities of the heritage of the valley. Shooting. Assessment of the morning.
2/11: layout of the project for publication. An evening will be organized so that the public discovers the magazine created by the young people.
Equipment, cameras and consumables provided. 6 participants maximum.
House of Memory and Heritage
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825264.94/warc/CC-MAIN-20171022132026-20171022152026-00156.warc.gz
|
CC-MAIN-2017-43
| 554 | 5 |
https://jellyfin.org/docs/general/administration/port-bindings.html
|
code
|
This document aims to provide an admin with knowledge on what ports Jellyfin binds and what purpose they serve.
- 8096/tcp is used by default for HTTP traffic. This is admin configurable.
- 8920/tcp is used by default for HTTPS traffic. This is admin configurable.
- 1900/udp is used for service autodiscovery. This is not admin configurable as it would break client autodiscover.
- Completely random UDP port bind. It picks any UDP port that is unused on startup. It is used for Live TV setups involving HDHomeRun devices.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250606226.29/warc/CC-MAIN-20200121222429-20200122011429-00273.warc.gz
|
CC-MAIN-2020-05
| 523 | 5 |
http://www.pluginsfree.net/2013/12/miarmy-27-for-autodesk-maya.html
|
code
|
Miarmy 2.7 for Autodesk Maya
Basefount Technology has announced that Its Maya crowd-simulation system Miarmy 2.7 is now available and Miarmy 3.0 will come in Feb 2014
>> See Also: Maya tutorialV-Ray Procedural Primitives
With V-Ray Procedural Primitive DSO, we can render a huge number of agents in some minutes, also along with the other elements in your scene such as FX particles/fluids, and other scene geometries. All the geometries are calculated on the render time and it just need export a tiny description file. Additionally, we can render the scene on render farm without loading Miarmy.
Note: currently Miarmy already supports Arnold Procedural, RenderMan Procedural and Maya Procedural (Mesh Drive 3.0 system)
With the Miarmy Compound Bones Infrastructure, no matter how complex the bone tree structure of your character, we can get a good result of physical simulation. Suppose your character contain a lot of tiny and complex parts or bones such as fingers or tentacles, we can combine those bones together into a big bone, and make the physical simulation faster, non-problematic and more realistic.
Also, this feature has been expanded to collision detection, partial dynamics, cloth, detach-able dynamics, RBD emitter checking and all RBD system.
Servo Force Drive Joint Model
Servo force simulates the internal forces from agents itself. Instead of simple rag-doll "dead man", servo force simulate the muscle force and it can drive your agent to target animated pose after the agents enabling dynamics. And it can achieve more lifelike internal/external spontaneous physical simulation, such as some agents falling and struggling from cliff, self-restitution. Click below videos and check the results we can achieve by servo force.
(Body dynamics, struggling, and self-restitution)
With Combo Agent tools, one agent can grab/hold/throw other agents. For example, “Sword” and “Shield” are 2 types of agents, and they can be fetch/hold/throw from “Man” agent, also this “Man” agent can be attached to the “Horse” Agent, they can be link altogether and interactive with each other freely, just using our master/slave channels.
RBD Emitter Expanded
Agent can emit bomb and bullet-like RBD, so you can use it simulate wizard emit some magic and blast agents or you can simulate agent emit laser. Also Missile system can use the “delete” event to simulate the massively laser shots and hit the agents down.
Share Brain Infrastructure
Different agent types with different bone structures and actions can share some same decisions. This can save you a lot of time if you’re making many different types of agents but the similar logic, like avoid each other, adapt terrain etc. Additionally, this kind of sharing is partially implemented, more specifically, it means except some common decisions shared among agent types, we can still make some unique logic decisions for each specific agent type.
The channels with indexing techniques, like “bound[x].in” and “spot[y].d”, have been accelerated in this release, which can make the simulation several times faster based on the decision and the sentences number of this agent. Because those channels might be used frequently in many cases, this upgrade can save a lot of time of your simulation.
Small Upgrades and Fixes
-Reseed texture Manger
-Individual type modifier in Placement node editor
-End joint display/hide
-Physical partial detach, but resume animation pose again.
-Crash when huge number of agents in placement node
-Above Maya 2013, crash when Mental Ray conflict with place node
DownloadMiarmy 2.7 for Autodesk Maya here
More Maya Plugin
Miarmy 2.7 for Autodesk Maya Reviewed by CGRecord Team on 03:53 Rating:
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917127681.50/warc/CC-MAIN-20170423031207-00454-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 3,716 | 26 |
http://www.thetalldesigner.com/blog/2012/11/27/387
|
code
|
I just read an excellent declaration of the principals of UX, "Principles of User Interface Design"
Clarity is the first and most important job of any interface. To be effective using an interface you've designed, people must be able to recognize what it is, care about why they would use it, understand what the interface is helping them interact with, predict what will happen when they use it, and then successfully interact with it. While there is room for mystery and delayed gratification in interfaces, there is no room for confusion. Clarity inspires confidence and leads to further use. One hundred clear screens is preferable to a single cluttered one.
It's a good use of ten minutes.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573988.33/warc/CC-MAIN-20190920092800-20190920114800-00137.warc.gz
|
CC-MAIN-2019-39
| 694 | 3 |
http://meta.stackexchange.com/questions/118648/there-should-an-extra-code-type-for-error-message/118650
|
code
|
When I write a question sometimes I would like to distinguish the error messages from code and also from my description of the problem.
Is there a way for text to appear in a box like code but to not be syntax highlighted?
This already exists.
You need to prepend error text with
This is documented in the edit help under
Another option is to wrap the whole error in
Just Like This
You can use a code block and disable the syntax highlighting with a syntax highlighting hint.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257821671.5/warc/CC-MAIN-20160723071021-00034-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 475 | 8 |
http://ldp.linux.no/HOWTO/PPP-HOWTO/x1577.html
|
code
|
|Linux PPP HOWTO|
|Prev||Chapter 28. Setting up a PPP server||Next|
In order to simplify things for our dial up PPP users, we create a global alias (in /etc/bashrc) so that one simple command will start ppp on the server once they are logged in.
This looks like...
alias ppp="exec /usr/sbin/pppd -detach"
What this does is
exec : this means replace the running program (in this case the shell) with the program that is run.
pppd -detach : start up pppd and do NOT fork into the background. This ensures that when pppd exits there is no process hanging around.
When a user logs in like this, they will appear in the output of 'w' as...
6:24pm up 3 days, 7:00, 4 users, load average: 0.05, 0.03, 0.00 User tty login@ idle JCPU PCPU what hartr ttyC0 3:05am 9:14 -
And that is it...I told you this was a simple, basic PPP server system!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949355.52/warc/CC-MAIN-20230330163823-20230330193823-00655.warc.gz
|
CC-MAIN-2023-14
| 832 | 11 |
https://www.gsp.com/cgi-bin/man.cgi?section=3&topic=HTTP::Engine::Role::Interface
|
code
|
HTTP::Engine::Role::Interface - The Interface Role Definition
HTTP::Engine::Role::Interface defines the role of an interface in HTTP::Engine.
Specifically, an Interface in HTTP::Engine needs to do at least two things:
- Create a HTTP::Engine::Request object from the client request
- If you are on a CGI environment, you need to receive all the data from
%ENV and such. If you are running on a mod_perl process, you need to muck
In any case, you need to construct a valid HTTP::Engine::Request object so
the application handler can do the real work.
- Accept a HTTP::Engine::Response object, send it back to the client
- The application handler must return an HTTP::Engine::Response object.
In turn, the interface needs to do whatever necessary to present this object
to the client. In a CGI environment, you would write to STDOUT. In
mod_perl, you need to call the appropriate $r->headers methods and/or
Kazuhiro Osawa and HTTP::Engine Authors
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610704803308.89/warc/CC-MAIN-20210126170854-20210126200854-00003.warc.gz
|
CC-MAIN-2021-04
| 944 | 14 |
https://docs.mulesoft.com/mule-runtime/3.7/mule-concepts
|
code
|
|Mule Runtime Engine versions 3.5, 3.6, and 3.7 reached End of Life on or before January 25, 2020. For more information, contact your Customer Success Manager to determine how you can migrate to the latest Mule version.|
Based on the concept of Event Driven Architecture (EDA), Mule works by responding to messages initiated by external resources (i.e. events). At the simplest level, Mule applications accept and process events as messages through several message processors plugged together in a flow. Alternatively, large or streaming messages can be processed as records in a batch job. Understanding the basic flow architecture and batch job structure is key to understanding Mule. Essentially every Mule flow contains a series of message processors that accept, then process messages. Mule applications usually contain multiple linked flows and/or batch jobs, which, in combination, perform the integration required for your use case.
A flow is the construct within which you link together several individual elements to handle the receipt, processing, and eventual routing of a message. You can connect many flows together to build a complete application which you can then deploy on premise, on Mule or another application server, or in the cloud.
At the simplest level, flows are sequences of message-processing events. A message that enters a flow may pass through a wide variety of processors. In the example diagram below, Mule receives the message through a request-response inbound endpoint, transforms the content into a new format, and processes the business logic in a component before returning a response via the message source.
The units with which flows are constructed are known generically as building blocks (in Studio’s graphical representation of a flow) or elements (in XML configuration). In general, a building block corresponds to an icon in the Anypoint Studio GUI, which in turn represents a message source, processor, or component. A building block is a visual representation of an XML element within the Mule application’s configuration file.
The example below is a simple flow created in Anypoint Studio’s visual editor; click the XML Editor tab to view the XML version of the same flow.
Studio Visual Editor
<?xml version="1.0" encoding="UTF-8"?> <mule xmlns:tracking="http://www.mulesoft.org/schema/mule/ee/tracking" xmlns:json="http://www.mulesoft.org/schema/mule/json" xmlns:http="http://www.mulesoft.org/schema/mule/http" xmlns="http://www.mulesoft.org/schema/mule/core" xmlns:doc="http://www.mulesoft.org/schema/mule/documentation" xmlns:spring="http://www.springframework.org/schema/beans" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xsi:schemaLocation="http://www.springframework.org/schema/beans http://www.springframework.org/schema/beans/spring-beans-current.xsd http://www.mulesoft.org/schema/mule/core http://www.mulesoft.org/schema/mule/core/current/mule.xsd http://www.mulesoft.org/schema/mule/http http://www.mulesoft.org/schema/mule/http/current/mule-http.xsd http://www.mulesoft.org/schema/mule/ee/tracking http://www.mulesoft.org/schema/mule/ee/tracking/current/mule-tracking-ee.xsd"> <http:listener-config name="HTTP_Listener_Configuration" host="localhost" port="8081" doc:name="HTTP Listener Configuration" /> <flow name="Simple_Example_Flow1"> <http:listener config-ref="HTTP_Listener_Configuration" doc:name="HTTP" path="kittens"/> <set-payload doc:name="Set Payload" value="#[Kittens? Kittens!]"/> <logger message="#[payload]" level="INFO" doc:name="Logger"/> </flow> </mule>
A batch job is a top-level element in Mule which exists outside all Mule flows. Batch jobs split large messages into records which Mule processes asynchronously; just as flows process messages, batch jobs process records.
A batch job contains one or more batch steps which, in turn, contain any number of message processors that act upon records as they move through the batch job. During batch processing, you can use record-level variables (
recordVars) and MEL expressions to enrich, route or otherwise act upon records.
A batch job executes when triggered by either a batch executor in a Mule flow or a message source in a batch-accepting input; when triggered, Mule creates a new batch job instance. When all records have passed through all batch steps, the batch job instance ends and the batch job result can be summarized in a report to indicate which records succeeded and which failed during processing.
Mule processes messages (i.e. events) initiated in external resources. For example, a message can be initiated by an event such as a consumer request from a mobile device, or a change to data in a database, or the creation of a new customer ID in a SaaS application.
The first building block of most flows or batch jobs is a receiver which receives new messages and places them in the queue for processing. This message source – in the example above, an inbound HTTP endpoint – receives messages from one or more external sources, thus triggering the execution of a flow or batch job. Message sources in Mule are usually Anypoint Connectors, elements which provide connectivity to a specific external source, either via a standard protocol (such as HTTP, FTP, SMTP) or a third-party API (such as Salesforce.com, Twitter, or MongoDB.)
In Mule, message processors are grouped together by category.
Mule transformers are the key to exchanging data between nodes, as they allow Mule to convert message payload data to a format that another application can understand. Mule also enables content enrichment of messages which allows you to retrieve additional data during processing and attach it to the message.
Flows and batch jobs can also include filters, scopes, and routers. For example, you can use a filter to allow IP addresses from which your application accepts messages; you can use a scope to "wrap" around several message processors and cache the result of the processing they perform; you can use a router to send messages down different paths in your application depending on the content of the message payload. Mule includes a variety of filters, scopes, and routers to customize how a flow or batch job processes messages.
When you configure the individual elements that link together to make your flow or batch job, you can use Mule Expression Language to extract information about the message or its environment and instruct Mule to make processing decisions based on that information.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335424.32/warc/CC-MAIN-20220930020521-20220930050521-00719.warc.gz
|
CC-MAIN-2022-40
| 6,468 | 18 |
https://permies.com/t/68165/Natural-Raw-Vegan-Male-seeking
|
code
|
Truly Natural Raw Vegan Male seeking help for garden, permacutlure live in trade, Northeast, Wmass
posted 7 months ago
Single, Straight male who tries to follow a pure way without synthetic chemicals and goal is to get off grid. I'm a raw vegan, no smoke or synthetic chemicals or gasoline crap. The plan is be totally self sufficient on what we grow and no chemicals or animal fertilizers used or petro chemicals or machines like used on big farms or corporations. Going back to source and the true way. If you are a real, true female soul who is also on the same path and if we have a connection then let's make it happen.
Currently near the center of town with a garden in backyard but baby steps. The gol will be to be free of all pollution and liars, sellouts, regardless of where we are, and free of the corrupt banking/govt system.
It means our mission is in jeapordy! Quick, read this tiny ad!
This is an example of the new permies.com Thread Boost feature
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812871.2/warc/CC-MAIN-20180220010854-20180220030854-00348.warc.gz
|
CC-MAIN-2018-09
| 964 | 6 |
https://kerbal.curseforge.com/projects/kerbal-engineer-redux/files/2217017
|
code
|
UploadedOct 19, 2014
Supported Game Versions
UPDATE NOTICE: If you are updating from a previous version of Kerbal Engineer 1.0, please
delete the 'Settings/SectionLibrary.xml' file, or remove the old install first. This will
reset the Flight Engineer sections to their default values and enable the new HUD functionality.
Added: New reaouts to the vessel category:
- Suicide Burn Altitude (height above terrain to start burn)
- Suicide Burn Distance (distance to suicide burn altitude)
- Suicide Burn DeltaV (velocity change required to zero vertical speed)
*** F5 for safety and use at your own risk! ***
Added: HUD type sections to the Flight Engineer.
Added: HUD sections can have a smoked background for easy visibility.
Added: 'Switch to Target' button on the Target Selector readout.
Changed: The default installed readouts to reduce new user brain melt.
Fixed: Flight Engineer not saving its hidden state.
Fixed: Bug in the phase angle calculations.
Fixed: Bug where the Build Engineer would stay locked after hiding with the shortcut key.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998755.95/warc/CC-MAIN-20190618143417-20190618165417-00000.warc.gz
|
CC-MAIN-2019-26
| 1,046 | 17 |
https://magoosh.zendesk.com/hc/en-us/articles/203602629--3-Intersecting-Lines-Are-the-GRE-geometry-diagrams-drawn-to-scale
|
code
|
Are the GRE geometry diagrams drawn to scale? Without doing any calculation I looked at these angles and y is clearly bigger than x, so I picked y and it's wrong.
There are very few assumptions that can be made when it comes to diagrams and the size of angles is definitely not one of them. This problem was set up to catch people who assume a bit too much. (We're not being mean, it's just a great learning opportunity!) Here's a blog that covers a bit about diagrams:
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473871.23/warc/CC-MAIN-20240222225655-20240223015655-00184.warc.gz
|
CC-MAIN-2024-10
| 469 | 2 |
https://wordpress.stackexchange.com/questions/314658/query-posts-that-have-all-the-specified-tags
|
code
|
I have tried this one for example:
$query = new WP_Query( array( 'tag__and' => array( 37, 47 ) ) );
It doesn't seem to work. Am I wrong in thinking that category and tags are the same relative to the database eg. in the wp_terms table. Both Categories and Tags show up in there.
So I'm looking in wp_term_relationships and I see an object_id for the product that I want, it has the following example term_taxonomy_id's: 48, 45, 43, 38, 37, 33, 24, 23, 15, 8
So in my filter I want to return the product(s) that have all of those tags.
The query above seems to be like a partial(returns products that have some of those tags), I noticed there is also tag__in.
What am I doing wrong?
I don't really get the taxonomy type search, do I have to explicitly state a taxonomy like in the dashboard? I was trying to do this with just "straight SQL" too, I tried the IN operator with a comma separated tag int list in parenthesis and a DISTINCT select... it's ugly, I mean it works but I'm using a combination of SQL and PHP to do the sorting. There's also no pagination/offset so yeah I'm trying to improve this.
This is an off-hand question but I'm also wondering if this is built into WooCommerce by default. That is what this question pertains to but it is specifically about sorting. But I was wondering, I saw there is woocommerce_pagination or is it woo_pagination, but not sure if it just "works out of the box" eg. filter search, pagination with limits/sorting.
Thanks for any help, I'll keep searching/trying stuff.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107877420.17/warc/CC-MAIN-20201021180646-20201021210646-00080.warc.gz
|
CC-MAIN-2020-45
| 1,515 | 10 |
http://ffxiv.zam.com/forum.html?mid=128492203516477845&forum=319&howmany=50
|
code
|
We're working on several guides to pitch on launch day to help people out and I'm almost done with a crafting one, but need some feedback as well as some screenshot help.
Osarion mentioned to me something called Touching Up, which I haven't encountered myself since I haven't crafted any equipment. Can someone explain it to me so I can include it and if possible, send me a screenshot of the option in-game?
Let me know about anything else I missed. I have only heard of one way to gain Guild Marks, so any info there would help.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886112682.87/warc/CC-MAIN-20170822201124-20170822221124-00010.warc.gz
|
CC-MAIN-2017-34
| 530 | 3 |
https://www.horsepropertyclassifieds.com/reptile-well-being-and-care.html
|
code
|
Let me begin this article with a brief disclaimer. Your pet reptile will receive the very best care possible with the Zoological Medicine Service. As snakes change into extra in style as pets, a larger number of unique wild-caught species are becoming commercially obtainable. If you want to have turtles as pets, purchase turtles with shells longer than four inches from a trusted pet store.
Don’t catch wild reptiles or amphibians and preserve them as pets. With so many species of reptiles, every with their own issues and ailments, it is tough to select specifics in this brief overview. Heat lamps are best for heliotherms-these are reptiles which derive radiant heat from the sun and include diurnal species that bask in the solar.
Meanwhile, there’s PetAg Bene-Bac Useful Micro organism, which helps to promote a healthy gastrointestinal system for your pet reptile. Do not, and do not allow children, kiss reptiles or share food or drink with them. Not previously frozen dead animals have been sent when the reptiles confirmed medical indicators of ailments prior dying.
You may’t see stress in snakes the way you can see other health issues, resembling external parasites or a retained shed. In case you have any questions or concerns about your pet’s well being, please seek the advice of your veterinarian When you’ve got concerns about your well being, please seek medical attention out of your health care provider.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819089.82/warc/CC-MAIN-20240424080812-20240424110812-00166.warc.gz
|
CC-MAIN-2024-18
| 1,438 | 4 |
https://community.nxp.com/thread/459782
|
code
|
We are using DDR Stress Test Tool V2.7. as you know, it can be execute stress test via this tool.
Then, I got following log. It seems six or seven test cases executed.
What kind of test executed by this tool? Could you elaborate all test scenarios?
DDR Freq: 396 MHz
t0.1: data is addr test
t0: memcpy10 SSN x64 test
t1: memcpy8 SSN x64 test
t2: byte-wise SSN x64 test
t3: memcpy11 random pattern test
t4: IRAM_to_DDRv2 test
t5: IRAM_to_DDRv1 test
t6: read noise walking ones and zeros test
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573465.18/warc/CC-MAIN-20190919081032-20190919103032-00003.warc.gz
|
CC-MAIN-2019-39
| 490 | 12 |
https://www.upwork.com/job/Google-Script-For-Google-Sheets_~012657c052f408eabb/
|
code
|
I am looking for someone to automate the creation and saving of our monthly reports. The reports are built in Google Sheets and will update each month automatically. For the Google Script, I would like it to handle the following:
1) Create a Main PDF once with a dedicated URL that would never change (it would always have the most current report in it). This could be a one-time script.
2) Each time the script is run,
-make a copy of the Main PDF and save it as month-year-report.pdf
-save the tab on the workbook titled "final" over the Main PDF.
December 11, 2017
I am looking for a mix of experience and value
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583514443.85/warc/CC-MAIN-20181022005000-20181022030500-00082.warc.gz
|
CC-MAIN-2018-43
| 614 | 7 |
https://www.peopleperhour.com/hourlie/perform-meta-analysis-of-research-data-using-r-or-revman/627923?ref=member
|
code
|
- Views 142
- Sales 3
What you get with this Offer
I will do the following:
1- Perform a Meta-analysis of your research data (included studies) using R (metafor, dmetar, and esc packages) or Revman.
2- Calculate the needed effect sizes (e.g. OR, RR, SMD, MD) for the analysis
3- Pool the calculated effect sizes by fitting a random or fixed effects model using the appropriate weighing method and tau.
4- Interpret and provide a summary of the results
5- Provide forest and funnel plots of the analysis results
6- Assess heterogeneity within studies
1- A Microsoft word report that includes a summary of methods and results, forest plot(s), and heterogeneity testing results
2- R code or RevMan file used for the analysis
Get more with Offer Add-ons
I can extract the needed data for MA from the relevant studies
Additional 1 working day+$150
I can deliver all work in 1 working day+$300
What the Freelancer needs to start the work
- An excel or csv sheet with the needed data. The data can be in the following formats:
1- Effect size and SE
2- Raw data (mean/SD or OR and 95% CI) or any other outcome of interest
Alternatively I can can extract the data from the relevant articles from an extra fee
he did an outstanding analysis.
Very excellent and professional analyst
Exceptional statistician. Always a pleasure to work with Ahmed.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657147031.78/warc/CC-MAIN-20200713225620-20200714015620-00140.warc.gz
|
CC-MAIN-2020-29
| 1,335 | 24 |
https://developpaper.com/answers-of-front-end-interview-day-march-28-2020/
|
code
|
128. Three phases of JS event
127. Use of scroll-y
126. Uni combox
[125. [HTML] add scrolling effect to view]( https://github.com/webVueBlog…
[124. [CSS] HTML text exceeding part is shown as ellipsis]( https://github.com/webVueBlog…
123. Multi level linkage picker
[122. [HTML] what are the new JS APIs for HTML5?]( https://github.com/webVueBlog…
121. How to realize picture switching?
[120. [CSS] customize mobile phone UI components? How to achieve this? ] https://github.com/webVueBlog…
Punch in. The big guy who’s interested gives him a star
Interview Answer 1 + 1
Promote daily learning and thinking, and make progress every day! Senior front-end interview questions in large factories
Warehouse address: https://github.com/webVueBlog…
Welcome to issues exchange, encourage PR, thank star, exchange and discuss together!
Welcome to add my wechat jeskson(
xiaoda0423), pull you into the technology group, long-term exchange and study.
Scan code to pay attention to official account and subscribe to more exciting content.
Exchange and discussion
Welcome to discuss, if you think it is helpful to your study, welcome to order[Star]
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178389472.95/warc/CC-MAIN-20210309061538-20210309091538-00362.warc.gz
|
CC-MAIN-2021-10
| 1,156 | 19 |
https://searchenginetechs.com/seo/meta-tags-seo/
|
code
|
Meta tags are the most important page level factors. They play a vital role in the ranking of web page. They are important SEO factors. They help in the ranking of a web page. They shows relevancy of a page with keywords to the search engine.
Meta tags are basically HTML tags that give information about the web page. They are not visible on the web page but they are very crucial for SEO. Meta tags are present in the head section of the page HTML code. They control the look of a web page in the SERP (Search Engine Result Pages).
Here is the list of Meta tags that are important for SEO.
Title tag is like the headline of a newspaper. It shows that what would be in the page. Title tag is a major component of on-page optimization. Main keyword of page must be placed at the start of title tag and brand name at the end of title unless you became a big brand and you think that you would be recognized by your brand name.
Title tag syntax is:
<title> Title of your web page </title>
It will be in the head section of your page html code.
Best Practices for title tag
- Max length would be 55-60 characters
- Keyword at the start
- Use Keyword no more than twice
- Separate Keywords with hyphen (-)
- Separate brand name with pipe (|)
- Don’t use special characters
So while writing the title tag keeps these practices in mind. Utilize complete space of 60 characters. Don’t write short title and also not exceed the limit because Google cut down the extra characters. Write an attracting title tag because a fully optimized title tag will attract the users.
Meta Description Tag
Description also plays an important role in optimizing web page. Meta description tag shows an overview of a web page. While reading description user must understand the content that will be in the web page. So description tag must be informative and fully optimized to make user click on the link and read the post or whatever he/she is looking for.
Meta Description syntax:
<meta name=“description ” content=“ description will be here”/>
This tag will also be found in head section of html code of web page.
Best practices for Description tag:
- Max length would be of 160 characters.
- Use keyword at the start
- Use main keyword 3-5 times
- Use synonym and LSI keywords for support.
- Give information about the page
- No use of special character
So here we have 160 characters to tell about our web page. Utilize this to write a fully optimized description of a web page that will show relevancy to search engine and also attract the users.
Meta Keyword Tag
Although keyword tag is not used by Google as a ranking factor but it is still used by some other search engines (like Baidu). This tag was basically used to list the keywords related to the content of web page. But people started stuffing keywords in this tag to the cheat the search engine. So now it is not considered as ranking factor by Google.
Syntax of Keyword tag:
<meta name= “keyword” content= “Keyword1, keyword2, keyword3…….”/>
Just use 3-4 main keywords in this tag and separate the keywords with comma. As it is not useful, so there will be no effect even if it is left empty.
Meta Robot Tag
Meta robot tag is used to tell the search engine whether to index the page or not. It is same as robot.txt. It is normally used to prevent thee search engine robot from indexing a single page.
Syntax of robot tag is
<meta name= “robot” content=”noindex”>
By putting noindex prevent search engine from indexing the page. By removing this search engine, by default, will index the page.
So hope you enjoy it. These were some best practices for optimizing the meta tags. So comment below your reviews.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487643354.47/warc/CC-MAIN-20210618230338-20210619020338-00585.warc.gz
|
CC-MAIN-2021-25
| 3,682 | 39 |
https://community.wd.com/t/ssd-m2-locked-security-i-forget-password/271411
|
code
|
I have a ssd m2 WD Green and I can’t remember the password that was put on the disk. Is there a way to remove security even by erasing the contents of the disk?
The state in which it is like this. I would need to remove the security to be able to use the disk urgently. Thank you very much in advance
Please refer below link to know setting up and using WD Security:
Hope it helps!!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102469.83/warc/CC-MAIN-20231210123756-20231210153756-00796.warc.gz
|
CC-MAIN-2023-50
| 384 | 4 |
https://developers.ironsrc.com/ironsource-mobile/unity/unity-plugin-6-4-documentation/
|
code
|
Unity Plugin 6.4 and Below Documentation
If your app still has the ironSource SDK version 6.4 and below integrated, we recommend updating to our newest SDKs. Easy to integrate, SDKs 6.5+ include an array of features such as automated SDK & ad unit initialization, ad unit retry logic, optional userID, static API, and much more!
However, if you still need a reference to the SDK 6.4 documentation, you can find them below.
- Plugin & Change Log
- Getting Started
- Rewarded Video
- Mediation Networks
- Integration Helper
- Custom Parameters
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742666.36/warc/CC-MAIN-20181115095814-20181115121814-00453.warc.gz
|
CC-MAIN-2018-47
| 541 | 9 |
http://mathforum.org/kb/thread.jspa?threadID=2375544&messageID=7811398
|
code
|
> Then you could redefine f(p,q) over all of C as follows > > fnew(p,q)=f(p,q)+prod(b-A*q)
Thanks for this suggestion. Unfortunately, C is not easy to write out in that form. It would have a very large number of vertices which, with dimensions > 2, would lead to far too vast an "A" term for it to be computationally feasible.
C can be described in terms of an optimization process (e.g. I give it "p", the slopes of a hyperplane, and it is easy to determine the corresponding point(s) on C).
Sorry for not being explicit about this earlier, but I was trying to keep my post short.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125937074.8/warc/CC-MAIN-20180419223925-20180420003925-00598.warc.gz
|
CC-MAIN-2018-17
| 581 | 4 |
https://epccat.com/doc-t6/126680/
|
code
|
The AccuGrade System has three light bars:
- Two vertical light bars for cut/fill mode
- One horizontal left/right light bar
Each light bar can be used in any position, but the light bar must be individually set for that position. You set only one light bar at a time.
Note: If the light bars are removed from the machine, each light bar must be reinstalled in the same position. Otherwise, follow this set up procedure in order to set the connections for the light bars.
- Simultaneously press the "OK" key and the "Power" key on the display in order to access the Service mode.
- From the "Setup Menu - Configuration" dialog, press "Installation" in order to list the items under the "Setup Menu - Installation" dialog.
- Press the up arrow key or the down arrow key until "Light Bar Connections" is highlighted.
- Press "OK".
The "Light Bar Connections" dialog will be shown on the display.
- Connect the light bar for the required position. Disconnect all the other light bars.
- Press "SET" for the connected light bar. A pattern of lights on the LED Display are illuminated on the connected light bar. This should match the pattern that is shown in Illustration 1. If the LED Display on the light bar is illuminated at the wrong end, press "INVERT".
- Disconnect the light bar.
- Repeat Step 5 through Step 7 in order to set the next two light bars.
- Press "OK" in order to save the settings and return to the "Setup Menu - Installation" dialog.
- Press "ESC" in order to exit the "Setup Menu - Installation".
All changes take effect immediately.
- When all the light bars are set, reconnect all of the light bars.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510942.97/warc/CC-MAIN-20231002001302-20231002031302-00632.warc.gz
|
CC-MAIN-2023-40
| 1,621 | 18 |
https://m-luebbers.github.io/
|
code
|
Engineering Center, ECES 111
University of Colorado Boulder
Boulder, Colorado, USA
I graduated undergrad from Cornell University in 2018, where I majored in Computer Science, specializing in and conducting research into artificial intelligence and robotics in the Robot Personal Assistants Lab (RPAL).
Since 2016, I have spent six summers interning at NASA's Jet Propulsion Laboratory in Pasadena, California. I have contributed to the Instrument Data Subystem (IDS) and Rover Planning Subystem (RPS) of multiple Martian surface missions - the Curiosity rover, the InSight lander, and the Perseverance rover. Throughout my summers working on the RPS team, I have had the incredible opportunity to help drive both Curiosity and Perseverance across five solar-days worth of traverse sequencing, where I have accrued a career Martian odometry of 228 meters (86 m on Curiosity, 142 m on Perseverance)!
Some of my interests outside of work include observational astronomy, aviation and space travel, traditional animation, language learning, and distance running.
Robotics has traditionally been broken down into two distinct operational paradigms – autonomy and teleoperation. These approaches are inherently limited, however, by the respective weaknesses of autonomous systems and human operators. My research therefore focuses on a third paradigm, where human and robotic agents are treated as teammates working towards a common goal, whether the humans and robots are collocated (proximal teaming) or not (remote teaming).
Much like in human teams, demonstrating productive and collaborative behavior in these setups requires a degree of plan synchronization. Central to achieving this is establishing shared mental models between humans and robots – that is, creating formal knowledge structures that allow us to transform between robot planning spaces centered around mathematical optimization, and subjective, variable human planning spaces. This is often a challenging proposition, especially in real world domains with environmental uncertainty and time and safety constraints.
With this goal in mind, my research involves developing novel techniques for compactly communicating plan rationale and uncertainty to human collaborators through visual, natural language, and behavioral modalities, leveraging emerging technologies like augmented reality and counterfactual explanation to do so. In working to establish shared mental models interpretable by both human and robot, my work aims to improve the fluency, transparency, adaptability, and trust of human-robot teaming architectures across a variety of task types.
Asterisk (*) denotes shared first authorship
Aaquib Tabrez, Matthew B. Luebbers, and Bradley Hayes. (2020).
A Survey of Mental Modeling Techniques in Human-Robot Teaming.In Current Robotics Reports. Springer-Nature. Link.
Matthew B. Luebbers*, Aaquib Tabrez*, Kyler Ruvane*, and Bradley Hayes. (2023).
Autonomous Justification for Enabling Explainable Decision Support in Human-Robot Teaming.In Proceedings of Robotics: Science and Systems (RSS 2023). Daegu, South Korea. PDF.
Acceptance Rate: 31%.
Christine T. Chang, Matthew B. Luebbers, Mitchell Herbert, and Bradley Hayes. (2023).
Human Non-Compliance with Robot Spatial Ownership Communicated via Augmented Reality: Implications for Human-Robot Teaming Safety.In Proceedings of the IEEE International Conference on Robotics and Automation (ICRA 2023). London, England, UK. PDF.
Acceptance Rate: 43%.
Aaquib Tabrez*, Matthew B. Luebbers*, and Bradley Hayes. (2022).
Descriptive and Prescriptive Visual Guidance to Improve Shared Situational Awareness in Human-Robot Teaming.In Proceedings of the International Conference on Autonomous Agents and Multiagent Systems (AAMAS 2022). Auckland, New Zealand. PDF. Video.
Best Student Paper Runner-Up (Top 2 of 629 submissions). Acceptance Rate: 26%.
Matthew B. Luebbers, Connor Brooks, Carl L. Mueller, Daniel Szafir, and Bradley Hayes. (2021).
ARC-LfD: Using Augmented Reality for Interctive Long-Term Robot Skill Maintenance via Constrained Learning from Demonstration.In Proceedings of the IEEE International Conference on Robotics and Automation (ICRA 2021). Xi'an, China. PDF. Video.
Acceptance Rate: 48%.
Workshops, Symposia, & Posters
Carl L. Mueller, Matthew B. Luebbers, Aaquib Tabrez, and Bradley Hayes. (2023).
Augmented Reality and Proxy Grippers Improve Demonstration-based Robot Skill Learning.In Proceedings of the Workshop on Life-Long Learning with Human Help (L3H2 2023). London, England, UK. PDF.
Breanne Crockett*, Kyler Ruvane*, Matthew B. Luebbers, and Bradley Hayes. (2023).
Effective Human-in-the-loop Control Handover via Confidence-Aware Autonomy.In Proceedings of the Workshop on Life-Long Learning with Human Help (L3H2 2023). London, England, UK. PDF.
Yi-Shiuan Tung, Matthew B. Luebbers, Alessandro Roncone, and Bradley Hayes. (2023).
Improving Human Legibility in Collaborative Robot Tasks through Augmented Reality and Workspace Preparation.In Proceedings of the Workshop on Virtual, Augmented and Mixed Reality for Human-Robot Interaction (VAM-HRI 2023). Stockholm, Sweden. PDF.
Maciej K. Wozniak*, Christine T. Chang*, Matthew B. Luebbers*, Bryce Ikeda*, Michael E. Walker*, Eric Rosen*, and Thomas Groechel*. (2023).
Virtual, Augmented, and Mixed Reality for Human-Robot Interaction (VAM-HRI).In Companion for the ACM/IEEE International Conference on Human-Robot Interaction (HRI 2023). Stockholm, Sweden. PDF.
Matthew B. Luebbers*, Aaquib Tabrez*, and Bradley Hayes. (2022).
Augmented Reality-Based Explainable AI Strategies for Establishing Appropriate Reliance and Trust in Human-Robot Teaming.In Proceedings of the Workshop on Virtual, Augmented and Mixed Reality for Human-Robot Interaction (VAM-HRI 2022). Sapporo, Japan. PDF.
Matthew B. Luebbers*, Christine T. Chang*, Aaquib Tabrez*, Jordan Dixon*, and Bradley Hayes. (2021).
Emerging Autonomy Solutions for Human and Robotic Deep Space Exploration.In Proceedings of SpaceCHI: Human-Computer Interaction for Space Exploration (SpaceCHI 2021). Yokohama, Japan. PDF. Poster.
Aaquib Tabrez*, Matthew B. Luebbers*, and Bradley Hayes. (2020).
Automated Failure-Mode Clustering and Labeling for Informed Car-To-Driver Handover in Autonomous Vehicles.In Proceedings of the Workshop on Assessing, Explaining, and Conveying Robot Proficiency for Human-Robot Teaming. Cambridge, England, UK. PDF. Video.
Matthew B. Luebbers, Connor Brooks, Minjae John Kim, Daniel Szafir, and Bradley Hayes. (2019).
Augmented Reality Interface for Constrained Learning from Demonstration.In Proceedings of the Workshop on Virtual, Augmented and Mixed Reality for Human-Robot Interaction (VAM-HRI 2019). Daegu, South Korea. PDF.
Matthew B. Luebbers, Ramchandran Muthukumar, Madeleine Udell, and Ross A. Knepper. (2017).
Planning Aerial Survey Missions using Low Rank Approximation.Presented: Northeast Robotics Colloquium (NERC 2017). Boston, Massachusetts, USA.
- CSCI 5302: Advanced Robotics.
University of Colorado Boulder, Fall '21.
- CSCI 5722: Computer Vision.
University of Colorado Boulder, Spring '20.
- CSCI 1300: Introduction to Computer Science.
University of Colorado Boulder, Fall '19.
- CS 4700: Foundations of Artificial Intelligence.
Cornell University, Fall '17.
- CS 3410: Computer Systems Organization and Programming.
Cornell University, Fall '16 - Spring '17.
- CS 2110: Object-Oriented Programming and Data Structures.
Cornell University, Fall '15 - Spring '16.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506559.11/warc/CC-MAIN-20230924023050-20230924053050-00422.warc.gz
|
CC-MAIN-2023-40
| 7,473 | 55 |
http://avisynth.nl/users/vcmohan/Grid/Grid.html
|
code
|
In several applications of video image processing, coordinates along width (x axis) and height (Y axis) need to be specified with a fair degree of accuracy. Grid plugin facilitates this by superimposing a Grid on the frame.
Grid lines are drawn as dotted lines, while those specified as bold are drawn as dashed lines and very bold ones are drawn as full lines. Color of these lines can be specified.
In 2.5 and 2.6 versions origin of grid is left top corner. In addition or as an alternative graduated central axes lines can be displayed
In avisynth+ version if only grid is set true ( axis = false) then top left corner is used as origin. If both grid and axis are set to true, then frame center is used for grid. If only axis is set true then graduated central axes lines are displayed
|grid display to start from frame number||sf||integer||must be within clip.||0|
|grid display to end on frame number||ef||integer||must be within clip and not less than sf.||last frame of clip|
|grid line (dotted) interval in pixels||lineint||integer||Positive even number not less than 4||10|
|bold line( dashed) at every nth grid line||bold||integer||5|
|very bold line( solid) at every nth bold line||vbold||integer||2|
|color of grid line||color||integer||specified as RRGGBB||0|
|color of bold line||bcolor||integer||specified as RRGGBB||color|
|color of very bold line||vbcolor||integer||specified as RRGGBB||color|
|Whether grid lines to be displayed||grid||boolean||true / false||true|
|Whether axis lines to be displayed||axis||boolean||true / false||false|
Grid(last,24,200,25,4,5,$ff0000,$7f0000,$5f0000,true,false) #for grid lines and very bold lines only (vbold=1 ensures it) Grid(last,24,200,10,10,1) Grid(last,24,200,color=255) # vbold lines will not be displayed as large value ensures out of frame Grid(last,24,200,vbold=7000) Grid(last,24,200,grid=false,axis=true)Example:
|To my index page||To Avisynth|
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304287.0/warc/CC-MAIN-20220123141754-20220123171754-00038.warc.gz
|
CC-MAIN-2022-05
| 1,911 | 16 |
https://www.joesdollars.com/image-s1-1x-1/
|
code
|
My company is holding a free training webinar that you will find VERY interesting!
Specificaly we will be covering how to develop an income in 2019 by leveraging a new platform with:
- no mlm
- no websites
- no ppc/seo
- no inventory
- and in some cases, without selling ANYTHING (really cool stuff!)
There is no cost to attend but seats are limited so I highly advise you RSVP to attend right away
This is a FREE training event and just for registering, you get access to the FREE system!
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027319082.81/warc/CC-MAIN-20190823214536-20190824000536-00022.warc.gz
|
CC-MAIN-2019-35
| 489 | 9 |
https://www.rmcybernetics.com/science/diy-projects
|
code
|
DIY Science Projects & Experiments
The following pages are designed to help science and technology enthusiasts find ways of creating fun educational diy projects while learning the principles of how things work. This section gives details of many DIY science projects and equipment which can be made at home. The Experiments section gives details of interesting science experiments and demonstrations. The included projects range from beginner to advanced level. Projects and experiments may be dangerous and should be supervised by a competent adult.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474670.19/warc/CC-MAIN-20240227021813-20240227051813-00827.warc.gz
|
CC-MAIN-2024-10
| 551 | 2 |
https://julesrosser.com/blog/add-Dagger-to-a-simple-Android-app.html
|
code
|
23rd July, 2018
A simple guide for adding Dagger2 to a modern MVVM Android project.
Dagger is always one of the first libraries I add when starting new Android projects. Not only does is simplify the process of adding further libraries, it doesn’t have many pre-requisites and it forces you to think about project architecture early on in the setup stages.
However, it’s hard to find a source which covers the latest features like @ContributesAndroidInjector & DaggerActivity in a Kotlin code base. This article aims to walk you through the implementation step by step, explaining the how and why along the way.
The app structure was based on Rahul Singh’s Clean Architecture project, which is a great example of a modern Android app architecture. This post focuses on the dependency injection section of the architecture and I recommend reading his post for a better understanding of the rest of the components that make a modern Android application.
I’m using MVVM here, but you can easily apply the steps to an MVP project as the Dagger implementation remains largely the same.
Implementing Dagger is actually quite straight forward when you take the time to understand each step. I’ll begin by showing the starting project, but feel free to skip to the Dagger Setup section if you’re just looking for a reference guide.
To demonstrate the implementation of Dagger we’ll need a simple app that would benefit from the addition. Lets take a look at the starting app we’ll be improving with Dagger.
The app consists of an Application, MainActivity, MainViewModel and an AnalyticsHelper class. Analytics tracking is a common client request and can touch almost anywhere in your code base, so it’s a prime example of an object that would benefit from dependency injection — imagine changing the constructor of the AnalyticsHelper, then having to modify each class in which is was instantiated.
In our simplified project the AnalyticsHelper prints out the page parameter string along with the hash code of the object itself. We’ll use this hash code to demonstrate that we’re accessing the same instance of the object after implementing Dagger. Running the app at this point outputs the following logs:
Tracking page: 'Application-onCreate', from AnalyticsHelper: **757408072** 'MainActivity-onCreate', from AnalyticsHelper: **424961346** 'ViewModel-initialisation', from AnalyticsHelper: **315976019** 'MainActivity-observingData', from AnalyticsHelper: **424961346**
As you can see, Application, Activity and ViewModel each have a different instance of the AnalyticsHelper class. After implementing Dagger, the same object instance will be used. This is one of the simplest changes we can demonstrate with Dagger, but is a great starting point. Lets get started!
As always, we’ll need to add the required dependencies first. As we’re using Kotlin we need to ensure that kotlin-kapt is declared as a plugin so that annotation processing works correctly.
After a sync, we can specify our dependencies in a class annotated with @Module. We use the @Provides annotation on a function to do this, while @Singleton insures that the same instance is returned. Typically the function name is the class name prefixed with ‘provides’, but it’s not strictly necessary to do so.
Next, we’ll need to create an AppComponent interface. This is where we set module types, giving Dagger the dependencies it needs to build the object graph. We only have one custom module — AppModule, AndroidInjectionModule is an internal class which maps the graph to Activities (more about this later).
Now we need to modify our Application class, changing it’s super-class to DaggerApplication, implementing the applicationInjector function and using the @Inject annotation on the AnalyticsHelper parameter so that Dagger will construct the object for us.
In order to link MainActivity to the dependency graph, we’ll need a second Module which will contain individual Activity dependencies. Currently, we’re not declaring any specific dependencies, but we’ll create the structure now for future reference.
We use @ContributesAndroidInjector to set the modules for the MainActivity and will create a similar function for any additional Activities. These modules are submodules of AppModule, so any dependencies will only be available to the returned activity, whereas all AppModule dependencies will be available to the Activities.
Finally, ensure you add the ActivityModule to the list of modules declared in AppComponent
@Singleton @Component(modules = [(AndroidInjectionModule::class), **(ActivityBuilder::class)**, (AppModule::class)])
Now when we run the app, we can see that Dagger is returning the same AnalyticsHelper instance to Application and MainActivity!
'Application-onCreate', from AnalyticsHelper: **757408072**. 'MainActivity-onCreate', from AnalyticsHelper: **757408072**. 'ViewModel-initialisation', from AnalyticsHelper: **705483104**. 'MainActivity-observingData', from AnalyticsHelper: **757408072**.
The exception being the ViewModel, which is still creating a new instance of the object. This requires a few extra steps, which we’ll cover in the future! In the meantime, check out the project in it’s current state below. Modern-Dagger repository
Thanks for reading, please feel free to suggest changes or improvements!
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334802.16/warc/CC-MAIN-20220926051040-20220926081040-00560.warc.gz
|
CC-MAIN-2022-40
| 5,360 | 24 |
https://www.smalltechnews.com/archives/71322
|
code
|
Last week, Microsoft unveiled the Surface Duo SDK, along with windows simulation tools that fit the software. Today, however, Microsoft developer Guy Merin said on Twitter that the SDK is available for macOS. In addition, from the official download page, Microsoft also introduced software for the Linux platform.
(Instagram via Neowin)
The SDK’s configuration requirements are no different from what is on the Windows platform. Developers still need to install the latest version of Android Studio before they can run the SDK and emulator on it.
Last week, Microsoft said the Surface Neo/Windows 10X SDK and simulation tools will be officially available on February 11. It now appears that macOS and Linux versions are also expected to be available at the same time.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107892710.59/warc/CC-MAIN-20201026234045-20201027024045-00494.warc.gz
|
CC-MAIN-2020-45
| 769 | 4 |
http://www.caroler.ca/carole-robitailles-blog
|
code
|
Finally updating my Blog
Its been a long time since i have been keeping up with my website. These are recent paintings from past 8 months
While I am Home - paintings I have been doing while keeping isolated at home to prevent catching the Corona Virus
I have been staying home alone during this pandemic. Scary out there.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585196.73/warc/CC-MAIN-20211018031901-20211018061901-00345.warc.gz
|
CC-MAIN-2021-43
| 321 | 4 |
https://mail.python.org/pipermail/edinburgh/2011-June/000219.html
|
code
|
[Python Edinburgh] Pub Meetup Tonight
ed.hawkins at st.com
Tue Jun 21 16:44:39 CEST 2011
I guess the lucky ones in Florence had their heads so full of beer, sunshine and python, they forgot what day it was? LOL :-) Ed.
From: edinburgh-bounces+ed.hawkins=st.com at python.org [mailto:edinburgh-bounces+ed.hawkins=st.com at python.org] On Behalf Of Mark Smith
Sent: 21 June 2011 09:59
To: Python Edinburgh
Subject: Re: [Python Edinburgh] Pub Meetup Tonight
Yup, this is the fault of Dougal & Myself - we got the date wrong and
asked Mathew to intervene.
Sorry all - see you next week.
More information about the Edinburgh
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627999163.73/warc/CC-MAIN-20190620065141-20190620091141-00116.warc.gz
|
CC-MAIN-2019-26
| 619 | 12 |
https://automationdesign.ca/chatbot-tool-personal-assistant-positions.html
|
code
|
Semantic Machines solve conversational artificial intelligence. The conversational artificial intelligence interfaces by Semantic Machines will soon enable a natural communication between people and computers. Semantic Machines vision is paving way for conversational computing through development of fundamental artificial intelligence technology. Semantic Machines is currently developing language independent technology platform. The platform will enable computers collaborate, communicate, accomplish tasks and understand goals. Semantic Machines are developing the conversation engine. The conversation engine will extract semantic intent such as text or voice from a natural input. The engine then will spawn a self updating framework that will manage the content and end…
For at least the foreseeable future, chatbots won’t be replacing humans in contact center jobs. At this point, chatbots will only replace some of the tasks that people are now handling – especially lower-level requests, questions and complaints. The best chatbot systems can recognize customer frustration and switch the interaction to a human in the company’s support center. That said, chatbots are on their way to mainstream acceptance. Here are four ways AI and chatbots are creating a major impact in the customer service and CX world:
Overall: Botengine acts as our stand-in customer support agent on Sundays,which is a day when there are no human agents manning our Livechat ,either from the office or from home.Thus ,rather than have most website visitors simply opening a ticket ,they get attended to by our chatbot. And their issues get resolves and in cases when the issue is complex and can't be resolved by our chatbot,it guides the website visitor through the process of opening a ticket.
AIDS THE SUPPORT TEAM - Botengine basically aids our support team by helping address the most popular and simple questions ,which customers are likely to ask the support helpdesk team like ; what Iroko is about , our office address , our contact email ,how to subscribe to Iroko ,or where to find our smartphone apps etc This activity enable the human support team to focus on the most important and complex customer questions , which Botengine cannot respond to.
This chatbot is one the best AI chatbots and it’s my favorite too. Evidently it is the current winner of Loebner Prize. The Loebner Prize is an annual competition in artificial intelligence that awards prizes to the chatterbot considered by the judges to be the most human-like. The format of the competition is that of a standard Turing test. You can talk with Mitsuku for hours without getting bored. It replies to your question in the most humane way and understands your mood with the language you’re using.
Microsoft Bot Framework is an Open source Bot Builder SDKs that allow you to build simple to sophisticated dialogs; Cognitive Services enable your bot to see, hear, interpret and interact in more human ways.A bot is an app that users interact with in a conversational way. It can communicate conversationally with text, cards, or speech. The Microsoft Bot Framework is a platform for building, connecting, testing, and deploying powerful and intelligent bots. It helps you build and connect intelligent bots to interact with your users naturally wherever they are. They offer a conversational interface as a solution to your user’s…
DB: The last app I looked at was Talkspace, which provides online therapy with a licensed health professional at a significantly reduced rate. Similar to Joyable, it uses a variety of activity-based tools to make improvements in a variety of areas such as happiness, compassion, balance, self-awareness, and productivity. Users can communicate with therapists by leaving text, audio, and video messages at any time.
Life-Like 3D-Animated Avatar
Bold360 is the ultimate customer engagement solution delivering personalized interactions and the fastest time-to-value. Leveraging the power of AI, Bold360 helps personalize and enhance every engagement no matter where it takes place, allowing companies to deliver richer and more consistent customer experiences seamlessly across both AI and agent-based interactions. Bold360 delivers groundbreaking intelligence with out-of-the-box simplicity, allowing agents do what they do best – be human. For more information, visit www.bold360.com.
Botengine enable sales and customer care agents focus on the complex issues and complaints made by our customer on the website,while our Botengine focuses on tackling the little and simple issues faced by customers,whose answers for the most part even lies on sections of our website.Thus on most occasions,Botengine simply respond to customers with a web link.
But even though most chatbots can handle moderately sophisticated conversations, like welcome conversations and product discovery interactions, the if/then logic that powers their conversational capabilities can be limiting. For instance, if a customer asks a unique yet pressing question that you didn’t account for when designing your chatbot’s logic, there’s no way it can answer their question, which hangs your customer out to dry and ultimately leaves them dissatisfied with your customer service.
NGChat is a live chat that is fully dedicated to the e-commerce market. It is designed with sales representatives in mind. It provides you with all the information you need about your clients and their e-shop activity. It does this by tracking and monitoring the activity of your clients when they visit your shop, providing an accurate analysis of your client’s activities. This in turn gives you the information you will need to best support your sales strategy. NGChat is a solution that provides you with information which is vital for you as a seller and the e-commerce industry. NGChat…
chatter pal radio
It also has a number of templates, covering bots built for shopify, woocommerce, livechat, restaurants and other templates which helped me understand how the different blocks come together to build a complex chabot. Voice conversation integration with alexa echo/google home is also coming up, along with web widgets if the existing twilio, telegram, facebook integrations are not enough already.
Woebot also offers quizzes and videos, which are there to help you discover your thoughts that come automatically and contribute to your struggles. The exchange with the app takes 10 minutes, though you can stop chatting any time you wish before that. The advantage is that it feels like you’re speaking with a real therapist during your conversations with this digital robot.
Twyla is a messaging platform that uses artificial intelligence to place smart chatbot in live chat channels. Twyla simply educates chatbot to deliver more delightful service experiences. With Twyla, saves over 50% on phone calls by shifting support conversations from phone to call. Twyla provides the self service chat which tackles general customer queries. When using Twyla as a messaging platform for live chat you are guaranteed to get up to 30% higher customer satisfaction ratings. Beginning to use Twyla will require integrating it into your existing live chat or helpdesk platform. Twyla will then require to be assimilated to…
Pros: The visual bot builder makes building complicated bots really easy without loosing the greater picture. And with all the functions that are offered you are not limited by what the bot can do. And things you currently can't do are worked on by the developers immediately to make the product better. It is amazing how fast they pump out great updates!
Insomno bot is for night owls. As the name suggests, it is for all people out there who have trouble sleeping. This bot talks to you when you have no one around and gives you amazing replies so that you won’t get bored. It’s not something that will help you count stars when you can’t sleep or help you with reading suggestions, but this bot talks to you about anything.
3. Personalizing the customer experience: Chatbots excel at collecting customer data from support interactions. After all, it’s the computer that’s doing the work. The advantage is that live support agents can use this information to personalize their interactions with customers. Devine says chatbots serve as virtual assistants that can feed customer data to the agent in real time, so the agent can give the customer good information and solutions based on current needs as well as past interactions with the company.
Pros: Botengine eases the stress on our helpdesk team. Enabling our helpdesk staffs to focus on complex complaints from our customers ,while simple complaints like the address of our company ,email contact etc are taken care off by Botengine. Thereby eliminating the need to hire extra hands on the helpdesk team and saving us time and financial resource in the process.
Aivo powers your customer support with the help of AI bots. It helps you respond in real time with text or voice. You can optimize your resources and increase conversions. Aivo’s Agentbot understands the rules of each channel, and adapts automatically to respond. You can give your customers a personalized experience. It can integrate easily with third party integrations like Salesforce, Zendesk, WhatsApp, etc.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987823061.83/warc/CC-MAIN-20191022182744-20191022210244-00284.warc.gz
|
CC-MAIN-2019-43
| 9,342 | 21 |
http://bradfit.nl/apc7n/09b0e7-convolutional-autoencoder-pytorch
|
code
|
For this project, I have used the PyTorch version 1.6. The following is the complete training function. Convolutional Autoencoders are general-purpose feature extractors differently from general autoencoders that completely ignore the 2D image structure. Example convolutional autoencoder implementation using PyTorch - example_autoencoder.py Example convolutional autoencoder implementation using PyTorch. mattmcc97 (Matthew) March 15, 2019, 5:14pm #1. Any deep learning framework worth its salt will be able to easily handle Convolutional Neural Network operations. This part will contain the preparation of the MNIST dataset and defining the image transforms as well. AutoEncoder architecture Implementation. In this article, we will define a Convolutional Autoencoder in PyTorch and train it on the CIFAR-10 dataset in the CUDA environment to create reconstructed images. LSTM Autoencoder problems. Note: Read the post on Autoencoder written by me at OpenGenus as a part of GSSoC. autoencoder = make_convolutional_autoencoder() autoencoder.fit(X_train_noisy, X_train, epochs=50, batch_size=128, validation_data=(X_valid_noisy, X_valid)) During the training, the autoencoder learns to extract important features from input images and ignores the image noises because the labels have no noises. The following image summarizes the above theory in a simple manner. And many of you must have done training steps similar to this before. They have some nice examples in their repo as well. Let's build a simple autoencoder for MNIST in PyTorch where both encoder and decoder are made of one linear layer. With the convolutional layers, our autoencoder neural network will be able to learn all the spatial information of the images. A dense bottleneck will give our model a good overall view of the whole data and thus may help in better image reconstruction finally. Module ): self. We start with importing all the required modules, including the ones that we have written as well. And with each passing convolutional layer, we are doubling the number of output channels. The reparameterize() function accepts the mean mu and log variance log_var as input parameters. Along with all other, we are also importing our own model, and the required functions from engine, and utils. Again, you can get all the basics of autoencoders and variational autoencoders from the links that I have provided in the previous section. Figure 1 shows what kind of results the convolutional variational autoencoder neural network will produce after we train it. As discussed before, we will be training our deep learning model for 100 epochs. Autoencoders with PyTorch ... Feedforward Neural Network (FNN) to Autoencoders (AEs)¶ Autoencoder is a form of unsupervised learning. The above are the utility codes that we will be using while training and validating. We can clearly see in clip 1 how the variational autoencoder neural network is transitioning between the images when it starts to learn more about the data. Mehdi April 15, 2018, 4:07pm #1. Do take a look at them if you are new to autoencoder neural networks in deep learning. He holds a PhD degree in which he has worked in the area of Deep Learning for Stock Market Prediction. This helped me in understanding everything in a much better way. The training function is going to be really simple yet important for the proper learning of the autoencoder neural neural network. Instead, we will focus on how to build a proper convolutional variational autoencoder neural network model. We will try our best and focus on the most important parts and try to understand them as well as possible. Version 2 of 2. There can be either of the two major reasons for this: Again, it is a very common issue to run into this when learning and trying to implement variational autoencoders in deep learning. Copyright Analytics India Magazine Pvt Ltd, Convolutional Autoencoder is a variant of, # Download the training and test datasets, train_loader = torch.utils.data.DataLoader(train_data, batch_size=32, num_workers=0), test_loader = torch.utils.data.DataLoader(test_data, batch_size=32, num_workers=0), #Utility functions to un-normalize and display an image, TCS Provides Access To Free Digital Education, optimizer = torch.optim.Adam(model.parameters(), lr=, What Can Video Games Teach About Data Science, Restore Old Photos Back to Life Using Deep Latent Space Translation, Top 10 Python Packages With Most Contributors on GitHub, Hands-on Guide to OpenAI’s CLIP – Connecting Text To Images, Microsoft Releases Unadversarial Examples: Designing Objects for Robust Vision – A Complete Hands-On Guide, Ultimate Guide To Loss functions In PyTorch With Python Implementation, Tech Behind Facebook AI’s Latest Technique To Train Computer Vision Models, Webinar | Multi–Touch Attribution: Fusing Math and Games | 20th Jan |, Machine Learning Developers Summit 2021 | 11-13th Feb |. by Dr. Vaibhav Kumar 09/07/2020 Now, we are all ready with our setup, let’s start the coding part. Image: Michael Massi The following block of code does that for us. In the first part of this tutorial, we’ll discuss what autoencoders are, including how convolutional autoencoders can be applied to image data. In the next step, we will train the model on CIFAR10 dataset. As for the KL Divergence, we will calculate it from the mean and log variance of the latent vector. Pytorch Convolutional Autoencoders. The digits are blurry and not very distinct as well. Designing a Neural Network in PyTorch. All of this code will go into the model.py Python script. In this tutorial, you learned about denoising autoencoders, which, as the name suggests, are models that are used to remove noise from a signal.. But he was facing some issues. 1. This is also because the latent space in the encoding is continuous, which helps the variational autoencoder to carry out such transitions. If you want to learn a bit more and also carry out this small project a bit further, then do try to apply the same technique on the Fashion MNIST dataset. It is very hard to distinguish whether a digit is 8 or 3, 4 or 9, and even 2 or 0. PyTorch is such a framework. For the final fully connected layer, we have 16 input features and 64 output features. Generating Fictional Celebrity Faces using Convolutional Variational Autoencoder and PyTorch - DebuggerCafe, Multi-Head Deep Learning Models for Multi-Label Classification, Object Detection using SSD300 ResNet50 and PyTorch, Object Detection using PyTorch and SSD300 with VGG16 Backbone, Multi-Label Image Classification with PyTorch and Deep Learning, Generating Fictional Celebrity Faces using Convolutional Variational Autoencoder and PyTorch, We will also be saving all the static images that are reconstructed by the variational autoencoder neural network. He has an interest in writing articles related to data science, machine learning and artificial intelligence. Finally, we will train the convolutional autoencoder model on generating the reconstructed images. Pooling is used here to perform down-sampling operations to reduce the dimensionality and creates a pooled feature map and precise feature to leran and then used convTranspose2d to … You can hope to get similar results. He said that the neural network’s loss was pretty low.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506479.32/warc/CC-MAIN-20230923030601-20230923060601-00409.warc.gz
|
CC-MAIN-2023-40
| 7,305 | 1 |
https://ubuntuforums.org/showthread.php?t=1468376&page=50&highlight=T101MT
|
code
|
Well, I admit I have never used apt-get -b. In any case, you also have to change the version number and remove the patches from the package. I'll try out the Debian package later, I'm pretty sure a current one should also work in Ubuntu.
If you only tested the drivers from this thread, all you need to do is to go to the synaptics package manager, search for the term "egalax", remove the corresponding packages, then download the right ones and install them again. To remove all calibration information, simply delete the file /usr/lib/X11/xorg.conf.d/97-touchscreen-calibration.conf using the following command:
If you changed the file /etc/X11/xorg.conf, it's probably best if you also remove that file. After a reboot, everything should hopefully work then.
sudo rm /usr/lib/X11/xorg.conf.d/97-touchscreen-calibration.conf
If you tried other things like the proprietary EETI driver, it's more difficult to get rid of them.
When you swipe your fingers on the desktop, twofing simply emits Ctrl+Alt+Left and Ctrl+Alt+Right key presses. As they are also default in Metacity, this should also work when you don't use compiz (unless you have changed the key shortcuts). At least it works for me. The only problem is that you have to perform the gesture when the Desktop has the focus, thus no other window is active. Of course twofing can be modified to send these keycodes in all applications, but then you lose horizontal scrolling. Currently, you have to adapt the source code of twofing to achieve this: In profiles.h, simply change the scrollLeftAction and scrollRightAction of all profiles (also the default profile) to the value used in the profile for the window id "desktop_window" and compile twofing then. In the future, I plan to make the profiles configurable using configuration files, so you no longer have to change the source code.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501174157.36/warc/CC-MAIN-20170219104614-00111-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 1,848 | 6 |
https://spltech.co.uk
|
code
|
Welcome to Your AI, ML & Python Programming Hub
Discover the latest trends, tutorials, and resources in Machine Learning and Python programming.
Hello everyone, in this article I wanted to talk about a paper that is a follow-up of Wav2Lip:: Towards Generating Ultra-High Resolution Talking-Face Videos with Lipsynchronization. This paper makes an improvement of the Wav2Lip model so that it is able to generate lip-synching videos at 4K resolutions. And how does it manage to achieve that? […]
This is a short tutorial on how you can convert and train Pifu to convert a 2D photo to a 3D Model with color. Pifu is the predecessor to PIFuHD. PIFU in theory can be trained to create 3D Models for any type of object, not just humans, but of course, you will need to […]
When dealing with training data, you often need to resize images to a fixed size, according to the architecture of the machine learning model that you want to use. In Tensorflow we can use tf.image.resize() to resize images to different resolutions. The method controls the different algorithms that we can use for resizing. You can […]
nn.Conv2d is a class in the PyTorch deep learning framework that represents a 2-dimensional convolutional layer. Convolutional layers are a fundamental building block in Convolutional Neural Networks (CNNs), which are widely used for image processing, computer vision, and other tasks involving grid-like input data. The nn.Conv2d class is part of the torch.nn module, which provides […]
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817002.2/warc/CC-MAIN-20240415142720-20240415172720-00539.warc.gz
|
CC-MAIN-2024-18
| 1,499 | 6 |
https://serverfault.com/questions/557466/check-health-of-raid-array
|
code
|
I have a server with RAID 1.
Currently when I type in the following command:
Personalities : [linear] [raid0] [raid1] [raid10] [raid6] [raid5] [raid4] [multipath] [faulty] unused devices: <none>
What does this mean? The server works fine but why doesn't the RAID array show up here?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039375537.73/warc/CC-MAIN-20210420025739-20210420055739-00387.warc.gz
|
CC-MAIN-2021-17
| 282 | 4 |
http://www.greatlakes4x4.com/showpost.php?p=2226673&postcount=18
|
code
|
Originally Posted by GreaseMonkey
Then what is it used for?
Putting a bunch of people to work counting us so you can claim the government created a bunch of jobs, thus keeping the unemployment rate below 10%
It is supposed to be used to determine how many representatives each state gets in congress, and also how the districts are drawn up. Look up jerry mandering.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123530.18/warc/CC-MAIN-20170423031203-00207-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 366 | 4 |
http://forums.devx.com/showthread.php?139017-Exercise-help-please!!-(Graphs)&p=411041
|
code
|
Exercise help please!! (Graphs)
Can someone help me doing this exercice, I can do some parts but I don't understand how to do the whole thing.
File name: L6D.java
1. The driver contains only the main method.
2. Initialize a 2-dimensional array to represent a unweighted graph as an adjacency matrix. (The graph may be directed.) Use 1 to indicate an adjacency, and 0 to indicate no adjacency.
3. Initialize a local variable named numVertices with the number of vertices in the graph.
4. Create an instance of L6 and pass numVertices to the constructor. The instance of L6 contains a method named makeAdjList and a method called displayAdjList.
5. Call the method named makeAdjList. The argument to this method is the array that represents the graph. The method returns nothing.
6. Call the displayAdjList method to display the adjacency list representation of the graph (see Sample Output). The method returns nothing and has no arguments.
File name: L6.java
1. Declare an instance variable array of type Node for the adjacency list.
2. Declare integer instance variables named size, row, and column.
3. Define inner class Node
Inner class Node
Declare instance variables vertexId and next.
inner class constructor
This method has an integer argument that represents the data a node contains. This constructor assigns the argument to the vertexId member of the node and initializes next.
Calls the usual programmerInfo method. The argument to the constructor is the number of vertices in the graph (passed in from the driver program). This value is assigned to size.
This method is called by the driver program. The argument to makeAdjList is the 2-D adjacency matrix created in main. This method uses the data in the adjacency matrix to construct the adjacency list.
Create an array named adjlist of type Node using the value of size.
Use nested for- loops (row and column are the loop variables) to scan the 2-D adjacency matrix passed in and examine the value in each element. If the value is 1, create a new node, passing the column number to its constructor, and call insert (see below). If the value in the adjacency matrix is 0, examine the next element in the array.
The arguments to this private method are the row index from the 2-D adjacency matrix and the newly created node. This method inserts the node into the linked list associated with the row in the adjacency matrix.
This method is called from main to display the structure of the adjacency list representation (see sample output). If a given vertex has no adjacent vertices the word NULL is displayed, otherwise vertex identification numbers for the adjacent vertices are displayed in the order in which they occur. Use the display format shown in the sample output.
Sample Output (next page)
2: 1, 4
3: 2, 4
All you've done is post your coursework specification. As fun as doing your coursework for you is, I don't think you'll find anyone that'll do it for you.
What problem are you having?
-- Android Development Center
-- Cloud Development Project Center
-- HTML5 Development Center
-- Windows Mobile Development Center
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118743.41/warc/CC-MAIN-20170423031158-00537-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 3,094 | 32 |
https://dzone.com/articles/textillatejs-jquery-plugin?mz=46483-html5
|
code
|
The Web Dev Zone is brought to you in partnership with Mendix. Download this Forrester Report to gain a better understanding of the low-code platform market and how to make a strategic platform selection you won’t regret.
Textillate.js allows you to animate text with effects such as flash, bounce, shake and more. In all, Textillate.js contains more than 25 effects for you to apply to your text.
Requirements: jQuery, animate.css and lettering.js
Demo:http:/ / jschr. github. com/ textillate/
License: MIT License
The Web Dev Zone is brought to you in partnership with Mendix. Better understand the aPaaS landscape and how the right platform can accelerate your software delivery cadence and capacity with the Gartner 2015 Magic Quadrant for Enterprise Application Platform as a Service.
Published at DZone with permission of
, DZone MVB
Opinions expressed by DZone contributors are their own.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701154221.36/warc/CC-MAIN-20160205193914-00067-ip-10-236-182-209.ec2.internal.warc.gz
|
CC-MAIN-2016-07
| 897 | 9 |
http://unitylist.com/browse/physics/6
|
code
|
Games & Tutorials
Shaders & Effects
Importers & Exporters
A little physics based platformer, guest starring our favorite blue ball!
Unity Project to create cloth physics
A Google Cardboard app using Unity that visualises concepts in physics.
Randomation Vehicle Physics
Vehicle physics system for the Unity engine.
02 Newtons Laws
Newtons laws of motion explained through Unity 3D in C# as part of https://www.udemy.com/gamephysics.
AABB collision for Unity3D
4 Argon Assault
Detailed 2D UI, Unity's TileMap, sprites, collisions, enemy waves. C# classes, coroutines, delegates, lists and more. (R…
2d Physics Game
A small physics game made in Unity 5.3 with C#. It was created with the help of a short YouTube tutorial series.
Game .Guvncnyldz .Pulsus
This project represents my first game development project which is involves one of my friends and lot of physics actions…
A basis for side scrolling 2DController (Physics and Player Input) to use within Unity. Followed the astute Sebastian La…
Semester 2 group project. Roll-a-Ball physics based puzzle game made in Unity Personal, with a Carnival theme.
Proyecto Unity con el experimento de una colision elastica con dos pelotas sobre unos planos inclinados. Incluye interfa…
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806465.90/warc/CC-MAIN-20171122050455-20171122070455-00579.warc.gz
|
CC-MAIN-2017-47
| 1,236 | 20 |
https://opendata.stackexchange.com/tags/kml/hot
|
code
|
The definitive answer for any British administrative area is Ordnance Survey's Boundary Line product.
From Euro constituencies to council wards, Boundary-Line™ maps every administrative boundary in detail for you. And what's more, it's completely free to download and use.
Also please note that Wales and England are both countries and are completely ...
Tabular data about post code data is at MySociety.org:
ONS Postcode Directory (ONSPD), February 2012 edition (thanks dvdoug!). This include full UK (including Northern Ireland) postcode locations.
Those files don't include the headers, which is annoying. This page has a version from a different vintage which had a header added. If it's 47 columns, ...
The shading of shapes on a GIS map is a design choice; it's not a characteristic of the data. Not all choropleth maps are opaque, even if some that you've seen are. A designer made that choice.
In Google Earth, you can apply styles to a layer using the "Edit > Get Info" command. On that, choose the "Style, Color" tab and change the color and opacity in the "...
Some work is going to have to be put in here, but this should be what you seek:
Snow Load Information
Ground Snow Load by Location
Alot (if not all) of California's Snow Load Information should be accessible on each county's website/portal/etc.
Here is El Dorado County's Snow Load Information
Or you can contact California County Building Officials (...
geojson.io supports kml. it also allows you to import to github or gist.github
edit: it doesn't have all of your requirements but the integration into github should allow you to do most except for the gpx
end results in gists: all of these .geojson maps were rendered via kml files from geojson.io
step by step:
There isn't one currently available as open data. As Joe noted, NISRA has its own licence.
If you just need the whole BT area as one polygon, Doogal's postcode districts has it. All the 2008 BT district postcodes are available as KML points, but you'd have to do some analysis to approximate the areas. The folks on Geographic Information Systems Stack ...
There is a way...but its not a silver bullet; very time intensive and may require learning new skillsets.
You can search through data portals and collect them along the way:
Here's a search on data.gov for "School Boundaries", and
here is a search on ESRI's ArcGIS site for "School Boundaries".
But those are being optimistic; to @Kotebiya's point in the ...
I needed to look in the correct area of the census site. I went to the page:
and selected Virginia to download the place zip file for this state.
I opened the zip file and brought the first kml (the largest one, titled "cb_2016_51_place_500k.kml") into a text editor. I then searched ...
Polygeo's comment's link highlights some issues you may have. But as for a simple outline of Saudi Arabia GADM or DIVA-GIS will both be good sources. They won't be in KML (I believe their data come in .shp form) but you can easily convert to KML using a multitude of free tool.
You can look into the Sydney GTFS-Files: https://transitfeeds.com/p/transport-for-nsw/237
The stops.txt contains the coordinates of the stops and the shapes.txt should contain the shapes of the lines.
You can use gtfs2geojson to convert the GTFS-Shapes to GeoJSON
Is this what you are looking for ?
Not data but information about the country.
The Ordnance Survey recently released a new API and you should be able to get administrative boundary data, including post code boundaries: http://www.ordnancesurvey.co.uk/business-and-government/help-and-support/web-services/code-playground.html
As some comments to your question note, it's not entirely clear what you're looking for.
If you're looking for the CBSA geometries as KML, your best route would probably be to get the shapefiles from the Census and then convert to KML. (If you don't have tools to convert, googling shapefile to kml will turn up several online options.)
Shapefiles for ...
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038073437.35/warc/CC-MAIN-20210413152520-20210413182520-00429.warc.gz
|
CC-MAIN-2021-17
| 3,969 | 38 |
http://devs.mx/topic/738-inefficient-optimization/
|
code
|
First, exec() is disabled from host and they are not going to enable it. Why don'y you consider different method or compliment current implementation with some other backup image optimization technique like other plugins do? exec() is disabled by majority of host and doesn't seem to be a good choice.
Second, optimization is very low for desktop. For mobile, Lightning shows incredible results, 80-90+ when it was 60-70. For desktop, though, speed is still in range of 50-60s.
I like your plugin for single-click installation and using and liberal price policy, but some things are off or at least do not work in my case and I would like to solve them and eventually buy your product.
Edited by stivens, 14 February 2018 - 09:17 AM.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657143354.77/warc/CC-MAIN-20200713064946-20200713094946-00539.warc.gz
|
CC-MAIN-2020-29
| 733 | 4 |
https://forum.openwrt.org/t/wifi-card-driver-performance/131819
|
code
|
I've been scouring the interwebs trying to find a solution to my problem of packet loss using the ALFA AWUS036ACM (MT7612U) usb wifi card. I have come across a few people with similar issues with this exact card. I've tried many different configurations in order to get it working with my rpi4, and at this point I've given up on the card.
I'm just putting feelers out there. Do any of you also experience this 1-2 minute packet loss while using the same card or driver, or perhaps better said do any of you have a working 2x2 5g 80mhz AC config using the mt7612u driver? Do any of you have wifi card recommendations for something that works more reliably?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571584.72/warc/CC-MAIN-20220812045352-20220812075352-00654.warc.gz
|
CC-MAIN-2022-33
| 656 | 2 |
https://ha.yellow-bricks.com/introduction_to_ha.html
|
code
|
Introduction to vSphere High Availability
Availability has traditionally been one of the most important aspects when providing services. When providing services on a shared platform like VMware vSphere, the impact of downtime exponentially grows as many services run on a single physical machine. As such VMware engineered a feature called VMware vSphere High Availability. VMware vSphere High Availability, hereafter simply referred to as HA, provides a simple and cost effective solution to increase availability for any application running in a virtual machine regardless of its operating system. It is configured using a couple of simple steps through vCenter Server (vCenter) and as such provides a uniform and simple interface. HA enables you to create a cluster out of multiple ESXi hosts. This will allow you to protect virtual machines and their workloads. In the event of a failure of one of the hosts in the cluster, impacted virtual machines are automatically restarted on other ESXi hosts within that same VMware vSphere Cluster (cluster).
On top of that, in the case of a Guest OS level failure, HA can restart the failed Guest OS. This feature is called VM Monitoring, but is sometimes also referred to as VM-HA. This might sound fairly complex but again can be implemented with a single click.
Unlike many other clustering solutions, HA is a simple solution to implement and literally enabled within 5 clicks. On top of that, HA is widely adopted and used in all situations. However, HA is not a 1:1 replacement for solutions like Microsoft Clustering Services / Windows Server Failover Clustering (WSFC). The main difference between WSFC and HA being that WSFC was designed to protect stateful cluster-aware applications while HA was designed to protect any virtual machine regardless of the type of workload within, but also can be extended to the application layer through the use of VM and Application Monitoring.
In the case of HA, a fail-over incurs downtime as the virtual machine is literally restarted on one of the remaining hosts in the cluster. Whereas MSCS transitions the service to one of the remaining nodes in the cluster when a failure occurs. In contrary to what many believe, WSFC does not guarantee that there is no downtime during a transition. On top of that, your application needs to be cluster-aware and stateful in order to get the most out of this mechanism, which limits the number of workloads that could really benefit from this type of clustering.
One might ask why would you want to use HA when a virtual machine is restarted and service is temporarily lost. The answer is simple; not all virtual machines (or services) need 99.999% uptime. For many services the type of availability HA provides is more than sufficient. On top of that, many applications were never designed to run on top of an WSFC cluster. This means that there is no guarantee of availability or data consistency if an application is clustered with WSFC but is not cluster-aware.
In addition, WSFC clustering can be complex and requires special skills and training. One example is managing patches and updates/upgrades in a WSFC environment; this could even lead to more downtime if not operated correctly and definitely complicates operational procedures. HA however reduces complexity, costs (associated with downtime and MSCS), resource overhead and unplanned downtime for minimal additional costs. It is important to note that HA, contrary to WSFC, does not require any changes to the guest as HA is provided on the hypervisor level. Also, VM Monitoring does not require any additional software or OS modifications except for VMware Tools, which should be installed anyway as a best practice. In case even higher availability is required, VMware also provides a level of application awareness through Application Monitoring, which has been leveraged by partners like Symantec to enable application level resiliency and could be used by in-house development teams to increase resiliency for their application.
HA has proven itself over and over again and is widely adopted within the industry; if you are not using it today, hopefully you will be convinced after reading this section of the book.
Before we dive into the main constructs of HA and describe all the choices one has to make when configuring HA, we will first briefly touch on what’s new in vSphere 6.0 and describe the basic requirements and steps needed to enable HA. This book covers all the released versions of what is known within VMware as “Fault Domain Manager” (FDM) which was introduced with vSphere 5.0. We will call out the differences in behavior in the different versions where applicable, our baseline however is vSphere 6.0.
What’s New in 6.0?
Compared to vSphere 5.0 the changes introduced with vSphere 6.0 for HA appear to be minor. However, some of the new functionality will make the life of many of you much easier. Although the list is relatively short, from an engineering point of view many of these things have been an enormous effort as they required change to the deep fundaments of the HA architecture.
- Support for Virtual Volumes – With Virtual Volumes a new type of storage entity is introduced in vSphere 6.0. This has also resulted in some changes in the HA architecture to accommodate for this new way of storing virtual machines
- Support for Virtual SAN – This was actually introduced with vSphere 5.5, but as it is new to many of you and led to changes in the architecture we decided to include it in this update
- VM Component Protection – This allows HA to respond to a scenario where the connection to the virtual machine’s datastore is impacted temporarily or permanently
- HA “Response for Datastore with All Paths Down”
- HA “Response for Datastore with Permanent Device Loss”
- Increased host scale – Cluster limit has grown from 32 to 64 hosts
- Increased VM scale – Cluster limit has grown from 4000 VMs to 8000 VMs per cluster
- Secure RPC – Secures the VM/App monitoring channel
- Full IPv6 support
- Registration of “HA Disabled” VMs on hosts after failure
What is required for HA to Work?
Each feature or product has very specific requirements and HA is no different. Knowing the requirements of HA is part of the basics we have to cover before diving into some of the more complex concepts. For those who are completely new to HA, we will also show you how to configure it.
Before enabling HA it is highly recommend validating that the environment meets all the prerequisites. We have also included recommendations from an infrastructure perspective that will enhance resiliency.
- Minimum of two ESXi hosts
- Minimum of 5GB memory per host to install ESXi and enable HA
- VMware vCenter Server
- Shared Storage for virtual machines
- Pingable gateway or other reliable address
- Redundant Management Network (not a requirement, but highly recommended)
- 8GB of memory or more per host
- Multiple shared datastores
The following table contains the ports that are used by HA for communication. If your environment contains firewalls external to the host, ensure these ports are opened for HA to function correctly. HA will open the required ports on the ESX or ESXi firewall.
Configuring vSphere High Availability
HA can be configured with the default settings within a couple of clicks. The following steps will show you how to create a cluster and enable HA, including VM Monitoring, using the vSphere Web Client. Each of the settings and the design decisions associated with these steps will be described in more depth in the following chapters.
- Click “Hosts & Clusters” under Inventories on the Home tab.
- Right-click the Datacenter in the Inventory tree and click New Cluster.
- Give the new cluster an appropriate name. We recommend at a minimum including the location of the cluster and a sequence number ie. ams-hadrs-001.
- Select Turn On vSphere HA.
- Ensure “Enable host monitoring” and “Enable admission control” is selected.
- Select “Percentage of cluster resources…” under Policy and specify a percentage.
- Enable VM Monitoring Status by selecting “VM and Application Monitoring”.
- Click “OK” to complete the creation of the cluster.
When the HA cluster has been created, the ESXi hosts can be added to the cluster simply by right clicking the host and selecting “Move To”, if they were already added to vCenter, or by right clicking the cluster and selecting “Add Host”.
When an ESXi host is added to the newly-created cluster, the HA agent will be loaded and configured. Once this has completed, HA will enable protection of the workloads running on this ESXi host.
As we have clearly demonstrated, HA is a simple clustering solution that will allow you to protect virtual machines against host failure and operating system failure in literally minutes. Understanding the architecture of HA will enable you to reach that extra 9 when it comes to availability. The following chapters will discuss the architecture and fundamental concepts of HA. We will also discuss all decision-making moments to ensure you will configure HA in such a way that it meets the requirements of your or your customer’s environment.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947654.26/warc/CC-MAIN-20180425001823-20180425021823-00363.warc.gz
|
CC-MAIN-2018-17
| 9,238 | 46 |
http://javadoc.imagej.net/OMERO/ome/formats/model/PixelsProcessor.html
|
code
|
Processes the pixels sets of an IObjectContainerStore and ensures
that the physical pixel dimensions are updated if they were specified by
the user. If Image containers are present, Image.acquisitionDate is filled
out and that the Image name and description match that which was specified
by the user if the if provided either.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320362.97/warc/CC-MAIN-20170624221310-20170625001310-00520.warc.gz
|
CC-MAIN-2017-26
| 327 | 5 |
https://preview.aclanthology.org/author-url/L14-1651/
|
code
|
This work investigates how automated methods can be used to classify social media text into argumentation types. In particular it is shown how supervised machine learning was used to annotate a Twitter dataset (London Riots) with argumentation classes. An investigation of issues arising from a natural inconsistency within social media data found that machine learning algorithms tend to over fit to the data because Twitter contains a lot of repetition in the form of retweets. It is also noted that when learning argumentation classes we must be aware that the classes will most likely be of very different sizes and this must be kept in mind when analysing the results. Encouraging results were found in adapting a model from one domain of Twitter data (London Riots) to another (OR2012). When adapting a model to another dataset the most useful feature was punctuation. It is probable that the nature of punctuation in Twitter language, the very specific use in links, indicates argumentation class.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474690.22/warc/CC-MAIN-20240228012542-20240228042542-00556.warc.gz
|
CC-MAIN-2024-10
| 1,004 | 1 |
http://finance.yahoo.com/mbview/threadview/?bypass=true&bn=a9d5ba9a-15ba-3f4c-928d-c45c5c54ee92&tid=1191023827000-a2260450-5ed8-3cbe-8aad-2635ca9d16fe&tls=la%2Ca%2C4
|
code
|
permit was filled today . go to this url to see.https://www.dmr.nd.gov/oilgas/daily/2007/dr092807.pdf
just an infill well in an established field. nobody here has mentioned clr's woodford shale properties in OK, any thoughts?
I don't know much about woodford shale, but my curosity is of the discovery in south michigan about a month ago. if you are fimilar about woodford please share info .don
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982964275.89/warc/CC-MAIN-20160823200924-00009-ip-10-153-172-175.ec2.internal.warc.gz
|
CC-MAIN-2016-36
| 395 | 3 |
http://www.swtor.com/community/showpost.php?p=5071237&postcount=5
|
code
|
I think it was in one of their recent interviews, i am not sure, I keep seeing it stated on the forums.
I'd be really interested in seeing that interview if anybody could point me in the right direction. The above comment just made me notice that I had been taking comments about story being deprioritized for granted, and that after having spent the past few days catching up on dev news I hadn't actually seen anyone official say anything about that. I just spent like fifteen minutes doing searches on all of the TOR and general gaming blogs, and none of them really had anything recent about changes to story development that I could find. Honestly, the only thing close to a source for this seems to be comments on this forum from around June that had people asking if the increased priority of legacy content would mean story delays.
On the main thread topic; Personally, I don't think we'll see an Act 4 until there is a full expansion.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-18/segments/1461861735203.5/warc/CC-MAIN-20160428164215-00194-ip-10-239-7-51.ec2.internal.warc.gz
|
CC-MAIN-2016-18
| 943 | 3 |
https://www.boldreports.com/feedback/19830/provide-not-in-and-not-like-operators-support-in-report-data-filters
|
code
|
Welcome to the Embedded Reporting feedback portal. We’re happy you’re here! If you have feedback on how to improve the Embedded Reporting, we’d love to hear it!>
Thanks for joining our community and helping improve Syncfusion products!
Need to provide the "Not in" and "Not like" operator support in report table and dataset filters
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473370.18/warc/CC-MAIN-20240221034447-20240221064447-00564.warc.gz
|
CC-MAIN-2024-10
| 338 | 3 |
https://stats.meta.stackexchange.com/questions/3178/statistics-on-cross-validated-usage
|
code
|
Some of the sources of information:
The "Users" tab, which stares at you every time you use StackExchange:
That should be on screen every time your read or post on the main site.
If you investigate it, it has a wealth of information -
reputation shows how much net reputation (upvotes + acceptances + bounties received - downvotes - bounties awarded) a user has received over the last week or month or quarter or year or in all time (depending on which item you click on in the next row of links under the circled link)
new users gives reputation stats for new users
voters gives stats on the number of votes awarded (for the last week/month/ etc)
editors gives stats on the number of edits made (for the last week/month/ etc)
moderators tells you who the current diamond-moderators are
While still on the "Users" page, scroll down to near the bottom of the page:
This has similar (though slightly less accurate) reputation information as from the Users page -- but you can find it going back in time. You want to know who had the highest reputation-gain in December 2015, or the most reputation at the end of May 2013? That will tell you.
The Stack Exchange Data Explorer (SEDE). The one specific to CV is here
This is an interface to a queryable database of all the publicly available information about posts, posters and so on. If you know SQL (T-SQL) you can write your own queries. If you have no clue, almost any query you would care about has probably already been written. If you can write a little SQL you may be able to fork an existing query to modify it.
This database is updated each weekend (so unless you query it right after it updates it's not quite up to date -- if you look at it on Wednesday it won't have information about a post you made on Monday afternoon).
Of the questions you ask, many already have queries at SEDE you can look at; try a search there. I describe some examples of search terms I used and queries that they locate below.
Just over a week ago there was a SE-blog about SEDE here. Among other things it conveyed the important information that there's an introduction written by Monica Cellio here
You can even download the whole database SEDE uses and look at it at your leisure.
Numerous queries have been pointed to in questions or answers here. For example, this post points to some. This post points to some others.
If you gain sufficient reputation you get some direct summary information you can look at, but a lot of it can be had through SEDE.
Let's look at a few specific examples of getting information about things you mention, to get started:
number of registered users,
Go to SEDE/stats. Search "registered users". Click "popular". Top query link is "Total number of registered users over time"... sounds like a good start. Try it, once it has run* scroll down. A bit over 88000 registered users by late June.
* you'll need to answer the CAPTCHA first if you haven't made an account there
number of active participants,
I'd suggest looking at the Users tab for this -- for example:
as I post, there are 9 pages (9 x 36) + 4 users (=328) with more than 200 reputation this year. Not all are active, though some just have continued to gain rep from old answers. That's an upper bound.
What about SEDE?
In SEDE, go back to the search bar, search for (say) active users, and again choose the popular tab (popular queries tend to be better written).
On the first page of results is this query, for example:
Number of active users with >= 1 post in last 30 days
Which gives 289.
ave number of posts per day,
Again, in SEDE, type "questions and answers" as a search. Among the list of popular searches is this query:
Total Questions and Answers per Month for the last 12
which gives monthly figures. For example, for the month from 27 April to 27 May there were 2576 Q's and 1746 A's, or per day about 86 Q's and 58 A's were posted. (Note that a substantial fraction of new questions posted will close.)
no of Qs and As, by month, from past n yrs,
see above query. There are others that go back 2 or 3 years
the most prolific user,
In what sense? Reputation? Posted questions? Posted answers? Comments? Edits? Votes? Bounties? Total actions?
growth rate (based on any metric)
One measure can be computed from the Total Questions and Answers query above
Edit: There also appears to be a site that presents a variety of statistics for stackexchange sites (based on SEDE data by the look) -- CrossValidated's page is here.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575541294513.54/warc/CC-MAIN-20191214202754-20191214230754-00510.warc.gz
|
CC-MAIN-2019-51
| 4,465 | 42 |
https://icara.us/keynote.html
|
code
|
Prof. Jan Peters
Jan Peters is a full professor (W3) for Intelligent Autonomous Systems at the Computer Science Department of the Technische Universitaet Darmstadt since 2011, and, at the same time, he is the dept head of the research department on Systems AI for Robot Learning (SAIROL) at the German Research Center for Artificial Intelligence (Deutsches Forschungszentrum für Künstliche Intelligenz, DFKI) since 2022. He is also is a founding research faculty member of the Hessian Center for Artificial Intelligence. Jan Peters has received the Dick Volz Best 2007 US PhD Thesis Runner-Up Award, the Robotics: Science & Systems - Early Career Spotlight, the INNS Young Investigator Award, and the IEEE Robotics & Automation Society's Early Career Award as well as numerous best paper awards. In 2015, he received an ERC Starting Grant and in 2019, he was appointed IEEE Fellow, in 2020 ELLIS fellow and in 2021 AAIA fellow.
Despite being a faculty member at TU Darmstadt only since 2011, Jan Peters has already nurtured a series of outstanding young researchers into successful careers. These include new faculty members at leading universities in the USA, Japan, Germany, Finland and Holland, postdoctoral scholars at top computer science departments (including MIT, CMU, and Berkeley) and young leaders at top AI companies (including Amazon, Boston Dynamics, Google and Facebook/Meta).
Jan Peters has studied Computer Science, Electrical, Mechanical and Control Engineering at TU Munich and FernUni Hagen in Germany, at the National University of Singapore (NUS) and the University of Southern California (USC). He has received four Master's degrees in these disciplines as well as a Computer Science PhD from USC. Jan Peters has performed research in Germany at DLR, TU Munich and the Max Planck Institute for Biological Cybernetics (in addition to the institutions above), in Japan at the Advanced Telecommunication Research Center (ATR), at USC and at both NUS and Siemens Advanced Engineering in Singapore. He has led research groups on Machine Learning for Robotics at the Max Planck Institutes for Biological Cybernetics (2007-2010) and Intelligent Systems (2010-2021).
Title: Inductive Biases for Robot Reinforcement Learning
Abstract: Autonomous robots that can assist humans in situations of daily life have been a long standing vision of robotics, artificial intelligence, and cognitive sciences. A first step towards this goal is to create robots that can learn tasks triggered by environmental context or higher level instruction. However, learning techniques have yet to live up to this promise as only few methods manage to scale to high-dimensional manipulator or humanoid robots. In this talk, we investigate a general framework suitable for learning motor skills in robotics which is based on the principles behind many analytical robotics approaches. To accomplish robot reinforcement learning learning from just few trials, the learning system can no longer explore all learn-able solutions but has to prioritize one solution over others – independent of the observed data. Such prioritization requires explicit or implicit assumptions, often called ‘induction biases’ in machine learning. Extrapolation to new robot learning tasks requires induction biases deeply rooted in general principles and domain knowledge from robotics, physics and control. Empirical evaluations on a several robot systems illustrate the effectiveness and applicability to learning control on an anthropomorphic robot arm. These robot motor skills range from toy examples (e.g., paddling a ball, ball-in-a-cup) to playing robot table tennis, juggling and manipulation of various objects.
Speaker: Prof. Jan Peters
Affiliations: Technische Universitaet Darmstadt, Germany
Speaker: Prof. Angelo Cangelosi
Affiliations: University of Manchester and Alan Turing Institute, UK
Prof. Angelo Cangelosi
Angelo Cangelosi is Professor of Machine Learning and Robotics at the University of Manchester (UK) and co-director and founder of the Manchester Centre for Robotics and AI. He holds an European Research Council (ERC) Advanced grant. He also is Turing Fellow at the Alan Turing Institute London. His research interests are in cognitive and developmental robotics, neural networks, language grounding, human robot-interaction and trust, and robot companions for health and social care. Overall, he has secured over £38m of research grants as coordinator/PI, including the ERC Advanced eTALK, the UKRI TAS Trust Node and CRADLE Prosperity, the US AFRL project THRIVE++, and numerous Horizon and MSCAs grants. Cangelosi has produced more than 300 scientific publications. He is Editor-in-Chief of the journals Interaction Studies and IET Cognitive Computation and Systems, and in 2015 was Editor-in-Chief of IEEE Transactions on Autonomous Development. He has chaired numerous international conferences, including ICANN2022 Bristol, and ICDL2021 Beijing. His book “Developmental Robotics: From Babies to Robots” (MIT Press) was published in January 2015, and translated in Chinese and Japanese. His latest book “Cognitive Robotics” (MIT Press), coedited with Minoru Asada, was recently published in 2022.
Abstract: Growing theoretical and experimental research on action and language processing and on number learning and gestures clearly demonstrates the role of embodiment in cognition and language processing. In psychology and neuroscience, this evidence constitutes the basis of embodied cognition, also known as grounded cognition (Pezzulo et al. 2012). In robotics and AI, these studies have important implications for the design of linguistic capabilities in cognitive agents and robots for human-robot collaboration, and have led to the new interdisciplinary approach of Developmental Robotics, as part of the wider Cognitive Robotics field (Cangelosi & Schlesinger 2015; Cangelosi & Asada 2022). During the talk we will present examples of developmental robotics models and experimental results from iCub experiments on the embodiment biases in early word acquisition and grammar learning (Morse et al. 2015; Morse & Cangelosi 2017) and experiments on pointing gestures and finger counting for number learning (De La Cruz et al. 2014). We will then present a novel developmental robotics model, and experiments, on Theory of Mind and its use for autonomous trust behavior in robots (Vinanzi et al. 2019, 2021). The implications for the use of such embodied approaches for embodied cognition in AI and cognitive sciences, and for robot companion applications will also be discussed.
Prof. Gianluca Antonelli
Gianluca Antonelli is Full Professor at the ``University of Cassino and Southern Lazio''. His research interests include marine and industrial robotics, multi-agent systems, identification. He has published more than 60 international journal papers and 130 conference papers, he is author of the book ``Underwater Robots'' (Springer, 2003, 2006, 2014, 2018) and co-authored the chapter ``Underwater Robotics'' for the Springer Handbook of Robotics, (Springer, 2008, 2016). From 2016 to 2021 he has been member elected of the "IEEE Robotics & Automation Society" (RAS) Administrative Committee, he has been coordinator of the EuRobotics Topic Group in Marine Robotics, he has been secretary of the IEEE-Italy section, he has been chair of the IEEE RAS Italian Chapter, he has been Chair of the IEEE RAS Technical Committee in Marine Robotics. He served in the Editorial Board of the IEEE Transactions on Robotics, IEEE Transactions on Control Systems Technology, Springer Journal of Intelligent Service Robotics. He is Fellow IEEE since 2021. Since October 2020, he is top 1% in the field "Industrial Engineering & Automation" according to common metrics and the SCOPUS database. Since December 2021, he is top 100 Italian scientists according to google scholar h-index in the category "Electronics and Electrical Engineering".
Title: Marine robotics challenges and applications. Current research at the Italian center ISME
Abstract: This talk will present the Italian interuniversity center ISME, established in 1999. ISME is composed by 9 Universities and has its background mainly in Systems and Control Engineering, Applied Mechanics and Computer Science. The activities of the ISME researchers will be presented trough brief overviews of some current and recent projects funded by National calls, the Italian Defense and the European Union. Topics will cover, among the others, underwater intervention, multiple vehicles coordination for geophysical applications, asset surveillance.
Speaker: Prof. Gianluca Antonelli
Affiliations: University of Cassino and Southern Lazio, Italy
Speaker: Prof. Angel Pasqual del Pobil
Affiliations: Jaume I University, Castellon, Spain
Prof. Angel Pasqual del Pobil
Angel Pasqual del Pobil is a Full Professor of Computer Science and Artificial Intelligence at Jaume I University (Spain), where he is the founding director of the UJI Robotic Intelligence Laboratory. He was a Visiting Professor at Sungkyungkwan University, Korea (2009-2021). He holds a B.S. in Physics and a Ph.D. in Industrial Engineering, both from the University of Navarra. He has been Co-Chair of two Technical Committees of the IEEE Robotics and Automation Society and is a member of the Governing Board of the Intelligent Autonomous Systems (IAS) Society (2012-present) and EURON (European Robotics Research Network of Excellence, 2001-2012). He has over 330 publications, including 14 books, three of them published by Springer: Robot Physical Interaction through the combination of Vision, Tactile and Force Feedback (2013), Robust motion detection in real-life scenarios (2012), and The Visual Neuroscience of Robotic Grasping (2015). Prof. del Pobil was co-organizer of over 50 workshops and tutorials in major conferences in robotics and AI. He was Program Co-Chair of the 11th International Conference on Industrial and Engineering Applications of Artificial Intelligence, General Chair of five editions of the International Conference on Artificial Intelligence and Soft Computing and General Chair of the International Conference on Simulation of Adaptive Behaviour (SAB 2014). He is often Associate Editor for IEEE ICRA, IROS, RO-MAN, and ICDL conferences and has served on the program committees of over 240 international conferences, such as IJCAI, ICPR, ICRA, IROS, IAS, ICAR, etc. Prof. del Pobil has been involved in robotics research for the last 33 years, his past and present research interests include: humanoid robots, service robotics, internet robots, motion planning, mobile manipulation, visually-guided grasping, robot perception, robot physical and human interaction, robot learning, developmental robotics, and the interplay between neurobiology and robotics. Professor del Pobil has been invited speaker of 80 tutorials, plenary talks, and seminars in 14 countries. Since 2019 he is a Distinguished Lecturer of the IEEE Robotics and Automation Society. He serves as associate or guest editor for seven journals and as expert for research evaluation at the European Commission and the US National Science Foundation, among many others. His supervised Ph.D. Thesis include winner and finalists of the Georges Giralt EURON PhD Award. He has been Principal Investigator of 39 research projects.
Abstract: In 1998 I coined the term Robotic Intelligence in terms of physical interaction in the real world through perception and action. In my talk I will consider the present progress and hurdles towards full robotic intelligence, using assistant robots as a case study --since many forecasts predict a dramatic increase in this market in the coming years. For actual assistant robots to become consumer products, a leap in their robotic intelligence is called for --specially in their manipulation skills. This poses several challenges such as adaptability, autonomy, or resiliency. I will also consider the possibilities of a global intelligence by means of cloud robotics. Finally, I will compare them with robots in online shopping warehouses, with some lessons learned from our participation in the Amazon Robotics Challenge.
Prof. Haibo Liu
Haibo Liu, is professor and Ph.D. supervisor of school of mechanical engineering at Dalian University of Technology (DUT), China. He received his B.Eng. and Ph.D. degrees in Mechanical and Electrical Engineering from DLUT, in 2006 and 2012, respectively. He is IEEE member, ASME member, senior member of Chinese Society of Mechanical Engineering. He has served as the Guest Editor of the Frontiers in Mechanical Engineering, Frontiers in Materials and China Measurement & Testing Technology, and deputy secretary general of the SAC/TC22 International Standardization Working Committee. His main research interests include, Measurement-machining integrated manufacturing, On-machine measurement, Phase-change fixturing based adaptive machining, Industrial-robot aided manufacturing. He has published over 80 peer-reviewed SCI/EI journal papers like International Journal of Machine Tools and Manufacture, International Journal of Mechanical Sciences, and IEEE/ASME Transactions on Mechatronic, and over 100 authorized or pending patents. He holds over 20 major projects, including National Natural Science Foundation of China, the sub-project of the Science Challenge Project, the sub-projects of the National Key Research and Development Program and National Science and Technology Major Project of China, etc. He is the recipient of the 1st prize for Liaoning Science and Technology Progress Award (twice), the 1st prize for Science and Technology Progress Award of China Machinery Industry Federation. He was awarded the Young Changjiang Scholars Program of the Ministry of Education in 2022 and the Liaoning Provincial Outstanding Youth Fund Program in 2020.
Title: Phase-Transition Fixturing Based on MFR: Principle, Technology and Application
Abstract: The phenomenon of flutter and cutter back-off easily appear in the machining process of large complex thin-walled parts if the cutting area is not sufficiently rigid. The traditional rigid clamping method has poor adaptability to complex profiles, which can easily lead to uncontrollable deformation and vibration. Magnetorheological fluids (MRF) have the characteristics of solid-liquid transition and controllable damping, which provides a new approach for the flexible and reliable support. To achieve controllable support based on MRF, this study elucidates the macro and micro mechanical mechanisms of MRF excitation solidification under extrusion mode. The static response model of thin-walled components supported by MRF is established. To ensure the matching of support with complex external loads, the MRF support layout and magnet unit is designed. Besides, a machining vibration suppression method based on MRF damping control is proposed. Based on the above theories and technologies, an MRF support fixture for the integral head is developed, and the maximum local deformation of the part under a 50N load is 15μm. After that, experiments on knock excitation and milling of thin-walled parts is carried out. The cutting parameters are located within the stable region of the blade diagram. The results indicate that the proposed method effectively achieves modal control and vibration suppression of parts. This study supplements the theoretical basis for the performance of MRF, and provides a reference for achieving controllable support of large complex thin-walled parts.
Speaker: Prof. Haibo Liu
Affiliations: Dalian University of Technology, China
Speaker: Prof. Zhaojie JU
Affiliations: University of Portsmouth, UK
Prof. Zhaojie JU
Zhaojie Ju is Chair in Machine Learning and Robotics at the University of Portsmouth, Principle Investigator of EU Interreg Project, Director of Healthcare and Wearable Robotics Research, and Chair of IEEE SMC Portsmouth Chapter. He has attracted over €10 million research fund as PI/CoI and authored/co-authored over 250 publications in journals, book chapters, and conference proceedings (over 100 SCI-index papers). He has received 7 Best Paper Awards and 1 Best AE Award in ICRA2018. His research interests include machine intelligence, pattern recognition and their applications in human robot interaction/collaboration, robot skill learning and healthcare & wearable robotics.
Prof. Ju is an Associate Editor of several journals, such as IEEE TRANSACTIONS ON CYBERNETICS, IEEE TRANSACTIONS ON NEUROL NETWORKS AND LEARNING SYSTEMS and IEEE TRANSACTIONS ON COGNITIVE AND DEVELOPMENTAL SYSTEMS. He is JSPS Fellow and IEEE Senior Member.
Abstract: Autonomous interaction abilities are important for robot-assisted therapy systems to assess children with autism spectrum disorder (ASD). This talk presents a multi-modal sensing system that automatically extracts and fuses sensory features such as body motion features, facial expressions, and gaze features, further assessing the children behaviours by mapping them to therapist specified behavioural classes. Experimental results show that the developed system has a capability of interpreting characteristic data of children with ASD, thus has the potential to increase the autonomy of robots under the supervision of a therapist and enhance the quality of the digital description of children with ASD. The research outcomes pave the way to a feasible machine-assisted system for their behaviour assessment.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475897.53/warc/CC-MAIN-20240302184020-20240302214020-00845.warc.gz
|
CC-MAIN-2024-10
| 17,484 | 36 |
https://uk.answers.yahoo.com/question/index?qid=20071229222442AAYLAfL
|
code
|
What do you make of the latest bin Laden audio tape?
I am thinking of a few possible scenarios.
1. The audio tape takes a long time to reach its destination and therefore could not have included mentioning Bhutto. I find this to be the most probable scenario.
2. Bin Laden is dead and the release of this message is the first of many of planned releases of these very broad and run of the mill hate messages.
The last two I find to be least probable.
3. Bin Laden, from his location, had no knowledge and perhaps no involvement in the assassination. This one I find to be least likely
4. Bin Laden chose not to address Bhutto's death for whatever reason.
I find it odd because the tape's message is very broad and covers major, timeless themes. At the same time, it makes no mention of world events. In a way, this tape could be release 1 year from now and still be relevant.
What do you think?
For some reason I thought maybe I would get more versed responses. Oh well.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027313436.2/warc/CC-MAIN-20190817164742-20190817190742-00349.warc.gz
|
CC-MAIN-2019-35
| 970 | 10 |
https://dreamport.tech/events/event-rpe-018-binary-signature-diversity.php
|
code
|
RPE-018: Binary Signature Diversity
RPE-018: Binary Signature Diversity
Date: June 28-29, 2022 | Location: Virtual or DreamPort Facility in Columbia, MD
Though prior events in 2018 (RPE-001, "The Chameleon and the Snake") and 2019 (RPE-005, "The Chameleons and the Snakes") were successful, binary signature diversity remains a constant challenge. Worldwide, attackers and defenders play a cat-and-mouse game of altering signatures to avoid detection and detecting those altered signatures.
This RPE directly addresses the following U.S. Cyber Command technical challenge problems:
- 2020 1.6 CHALLENGE PROBLEM: Polymorphic Malware/Countering Adversarial Signature Diversity
- 2020 1.10 CHALLENGE PROBLEM: Survivability/Implementing Signature Diversity for Offense
Event Flow: Offense
Once registration closes, all offensive teams will be given a library of malware samples spanning the platforms above. This library will consist mostly of binaries/scripts in the public domain, but some novel "malware" (developed by DreamPort) will be provided in binary and source code form. Expect this library to comprise a couple dozen different malware families in total.
During the event, offensive teams will be challenged to:
- Create a tool (through integration, enhancement, or from scratch) that, given a sample, can generate modified samples that exhibit on-disk and in-memory signature diversity without modifying functionality.
- Use this tool to generate two modified samples for each round of the competition. Offensive teams are free to choose from any of the samples provided prior to the event, including the novel "malware" provided in binary and source code form.
Binaries for selected public domain malware, and both source code and binaries for DreamPort-created "malware", are provided to all offense teams to allow teams to demonstrate both binary and source code signature diversity techniques. Both types of techniques are interesting, but teams are not required to demonstrate both.
Event Flow: Defense
Once registration closes, defensive teams will be provided with at least one binary sample of each novel "malware" developed by DreamPort and given to the offense. Defensive teams are NOT provided with the public domain malware samples given to the offense.
During the event, for each of the one-hour rounds of the competition, defensive teams will be provided with a "security alert" containing a random mix of:
- modified samples generated by offensive teams
- public domain malware samples (known hash)
- slightly-permuted public domain malware samples (unknown hash)
- benign binaries (known hash).
Defensive teams are challenged to create (through integration, enhancement, or from scratch) a single tool for the fully automated classification of samples as follows:
- Identify samples as malicious or benign
- Attribute each malicious sample as a variant of a known malware sample
- Attribute each malicious sample to a known malware family
- Attribute multiple malicious samples to an offensive team (i.e., offensive teams' diversity tools may introduce their own signature, tying together original samples spanning different malware families)
Defensive teams are asked NOT to submit any competition samples to third-party Internet services, e.g., VirusTotal. However, searching the Internet for hash values is completely acceptable. Ideal solutions will be capable of operation on isolated networks, i.e., no dependencies on public cloud services.
Remote or In-Person Participation
Teams can participate in-person at the DreamPort facility in Columbia or virtually. In-person teams must bring their own equipment – DreamPort will provide Internet access via WiFi. Teams may not have more than five people on site at DreamPort, and on-site participants must be identified in advance. Lunch and light refreshments will be provided for in-person attendees.
Participants will be evaluated by the type of team they are bringing (or joining): offense or defense. A separate list of scores will be maintained for each side.
Defenders must submit an analysis report for each sample detailing answers to these questions:
- Is the sample malicious or benign?
- Is the sample a variant of a known malware sample?
- Is the sample a variant of a known malware family?
- Can the sample be attributed to other samples in previous competition rounds?
Offensive teams will be evaluated by:
- Can the defense attribute your modified sample to the original sample?
- Can the defense attribute your modified sample to its malware family?
- Is your modified sample excessively larger than the original sample (defined as more than 2.5x the size of the original sample)?
- Do you use a known technique for alteration? Did you invent your own?
- Does your modified sample require elevated privileges to invoke (where the original did not)?
- Does your modified sample require a separate process/approach to invoke?
- Does your modified sample run without any additional steps (e.g., unpacking)?
- Does your modified sample have a different in-memory signature than the original sample?
- Can the defense correctly identify your sample as malicious?
- Does your tool produce a unique hash for each run against a given input?
- Can your modified samples be attributed to the same actor, i.e., does your tool have its own signature?
- Did your team demonstrate both binary and source code modification techniques?
As in RPE-005, consideration will be given to any defensive team who can prove their use of machine learning (in a one-on-one interview) for the purposes of identification, classification, or attribution of submitted samples. We will not require teams to reveal details about their algorithms or features – just provide a demonstration.
This RPE requires participants to have at least intermediate-level skills in:
- ELF, PE, DEX/ODEX, JAR file format knowledge
- Malware Analysis
- Automated Analysis Systems (CRITs, Cuckoo)
- Sandbox Execution
- Reverse Engineering (IDA Pro, Binary Ninja, Ghidra, Radare)
There are two distinct technology paths that we are searching for here. For the offense, we are interested in a single technology that can alter the signature of multiple executable formats (e.g., ELF, PE) without altering functionality. For the defense, we are interested in an extensible, automated solution that can perform automated classification, at least triage-level analysis, and attribution for suspicious files or artifacts. We are especially interested defensive solutions which can extend their behavior with minimal design changes (e.g., plugins, scripts).
We have chosen the following schedule of events:
- 2 May 2022: RPE Announced Publicly
- 17 June: RPE Registration Closes
- 22 June: RPE Virtual Q&A Session
- 28 – 29 June: RPE Main Event
DreamPort will award the top offensive team and the top defensive team $12,500 each.
RPE-018: Congratulations to BigBear AI as the winning Blue Team and to Heilig Defense as the winning Red Team
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816070.70/warc/CC-MAIN-20240412194614-20240412224614-00148.warc.gz
|
CC-MAIN-2024-18
| 6,978 | 62 |
https://www.theburningofrome.com/trending/how-do-i-add-msrtcsip-primaryuseraddress-attribute/
|
code
|
How do I add msRTCSIP PrimaryUserAddress attribute?
Right-click the user, and then click Properties. Edit the msRTCSIP-PrimaryUserAddress attributes of the users so that the values are unique within the organization.
What is proxyAddresses attribute in Active Directory?
The proxyAddresses attribute in Active Directory is a multi-value property that can contain various known address entries. For example, it can contain SMTP addresses, X500 addresses, SIP addresses, and so on.
What is SIP address in Active Directory?
A SIP address is a lot like an email address in that it also serves as a locater of the user. SIP addresses even look very similar to email addresses. Like email addresses, they are comprised of two parts: a username, and a domain.
How do I change my SIP address in ad?
Use the EAC to change the primary or a secondary SIP address
- In the EAC, navigate to Recipients > Mailboxes.
- In the list view, select the mailbox for which you want to change a SIP address, and then click Edit .
- On the User Mailbox page, under Email address, select the SIP address you want to change, and then click Edit.
What is a SIP address in exchange?
The SIP address is used by Communications Server or Lync Server to route incoming calls and send voice mail to the user. You can use the EAC or Exchange Online PowerShell to add a primary or a secondary SIP address for a user.
How do I see Exchange attributes in AD?
Now, open Active Directory Users and Computers and double-click a user. Select the Attribute Editor tab. Scroll down to verify the Exchange attributes.
What does a SIP address look like?
A SIP address is written in [email protected] format in a similar fashion to an email address. An address like: sip:[email protected] As a SIP address is text, much like an e-mail address, it may contain non-numeric characters.
Can I join a zoom meeting via teams?
Zoom’s Microsoft Teams integration allows you to start an instant meeting or join a scheduled meeting through Bots commands. Meetings created in Teams will appear on your Zoom account. This integration has been moved to our Marketplace. You can find out more about the Microsoft Teams app and add the app here.
Is teams a SIP client?
Microsoft has just announced in a blog post that “Support for SIP phones will be available in the first half of 2021.”. It looks like any SIP-based phone will be supported, the blog mentions “Cisco, Yealink, Polycom, and others”.
Why are my msrtcsip attributes missing from onprem?
If you put them in your onprem AD, they cannot be updated by skype online, and then you will have problems. (I had to delete all of our msRTCsip attributes onprem).
Why is msrtcsipprimaryuseraddress missing from all users?
Get answers from your peers along with millions of IT pros who visit Spiceworks. Hi guys, I’m trying to get SfB to automatically login, but both proxyaddresses:SIP and msRTCSipPrimaryUserAddress are missing from all the users.
Why is Azure AD Connect not syching msrtcsip attributes?
I am trying to create a Hybrid between SFB On Prem and SFB Online. For this I am synching the msrtcsip attributes from On Prem to Online, however I find that these attributes are not syncing. In Azure AD Connect configuration, I am not restricting any attributes and syncing all the attributes.
Where is msrtcsip-userenabled missing from AD schema?
MMC has the “Enable Live Communications for this user” box checked. It user’s sip uri is also filled out appropriately. However, any export (msRTCSip-UserEnabled == True). for enabled users? MMC has the “Enable Live Communications for this user” box checked. It user’s sip uri is also filled out appropriately.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335304.71/warc/CC-MAIN-20220929034214-20220929064214-00221.warc.gz
|
CC-MAIN-2022-40
| 3,680 | 29 |
http://events.msdn.microsoft.com/?id=31b2f5b9-c03e-4b2b-ad82-3de63d6033b6
|
code
|
Come to this session to learn about new features in SQL Server 2014 geared towards private and hybrid cloud. This session is demo-heavy and you will walk away with great understanding on how the product team bake cloud features directly into SQL Server 2014.
Everything in the OWASP TOP 10 is covered in this session, including: Injections, Broken Authentication and Session Management, Cross-Site Scripting (XSS), Insecure Direct Object References, Security Misconfiguration, Sensitive Data Exposure, Missing Function Level Access Control, Cross-Site Request Forgery (CSRF), Using Components with Known Vulnerabilities, Unvalidated Redirects and Forwards.
Mobile app development has really exploded over the past few years. And with that, so have the number of options available to developers. Developers are looking for ways to maximize code reuse while being able to deploy to multiple platforms. In this session, David Totzke and Lori Lalonde talk about cross platform development, and the options available to developers - PhoneGap, Appcelerator's Titanium, Telerik's AppBuilder, Sencha Touch, and Xamarin, to name a few.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-42/segments/1414119647914.3/warc/CC-MAIN-20141024030047-00311-ip-10-16-133-185.ec2.internal.warc.gz
|
CC-MAIN-2014-42
| 1,126 | 3 |
https://github.com/kvs/znc-offlinemarker/blob/master/README.md
|
code
|
A (very) simple module, which when loaded will insert a "-- MARK --" line in all channel-logs when a client disconnects.
Requires ZNC v1.0+
Compiling and installing
Run the following on the box where ZNC is installed:
$ znc-buildmod offlinemarker.cpp $ cp offlinemarker.so ~/.zsh/modules/
Run the following from within your IRC program, which should be connected to ZNC:
/msg *status loadmod offlinemarker
- Configurable mark-message
- Don't log until all clients have disconnected
This project is licensed under the MIT license.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423716.66/warc/CC-MAIN-20170721042214-20170721062214-00396.warc.gz
|
CC-MAIN-2017-30
| 529 | 10 |
http://nateandjenna.com/employee-performance-review-form/
|
code
|
Employee performance review form template free peer templates format appraisal
We provide free employee forms for you to download. An employee is a term for workers and managers working for a company, organisation or community. These people are the staff of the organization. Generally speaking, any person hired by an employer to do a particular job is an employee, including this employee performance review form.
For more details, please take alook at these employee performance review form sample below!
Simple performance review form gse bookbinder co good performance appraisal form 831x1024 employee
Employee performance review form free template word doc sample
Employee performanceeview form template evaluation doc office short templates job sample
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125946314.70/warc/CC-MAIN-20180424002843-20180424022843-00090.warc.gz
|
CC-MAIN-2018-17
| 758 | 6 |
https://www.nexcess.net/cloud/open-source-software/
|
code
|
Build your next website on an open platform and host it with open-source experts
What is open source hosting?
Open source hosting is a service that uses open-source technologies to connect your website to the internet, such as servers, cloud infrastructure, and programming languages. These hosts typically support open-source software, such as WordPress.
Host your open-source project hassle-free
Choose hosting optimized for the most resilient open-source technologies in the industry
Nexcess gives you all of the features of proprietary software without the hassle and fees
Optimized for speed
We could drop a bunch of tech lingo like advanced caching and multiple CDNs, but what you really need to know is that we make your website really fast. Count on it.
Security that lets you rest easy
Not all updates are created equal. Our advanced security and plugin monitoring exposes vulnerabilities and prevents them from taking down your site.
Support that has your back, and then some
We love assisting our customers. It’s why so many trust us. Our expert staff is ready to help you day or night. And yes, you get to talk to a real, live human.
Open source hosting FAQs
Usually, open source refers to software that is available for everyone to use, modify and share. The open-source philosophy is that software source code should be “open” and available to everyone.
Source code is what powers your website. It uses a human-readable programming language to tell a website what to do. You can see an example of source code by right-clicking on a web page and clicking “inspect.”
Yes, but you can take precautions to make sure security is airtight. Choosing a strong hosting provider is essential. Nexcess hardens your website’s security by updating your software immediately, installing critical patches, and monitoring 24/7/365.
LAMP is an acronym that stands for Linux, Apache, MySQL, and PHP/Perl/Python. These are application stacks that power a very huge chunk of the internet. Every program within LAMP is open source.
It is any software platform (complete with an ecosystem and tools) that employs an open-source approach. Open-source platform examples include WordPress, Magento, Android, and CraftCMS.
When it comes to open source vs proprietary, it comes down to ownership. Proprietary software is copyrighted and can only be used by purchasing a license. Adobe Photoshop is proprietary software. Open-source software, on the other hand, has a free public license. Linux is open-source software.
You’ll find plenty of support in community forums, but that can eat up your time. For faster resolutions, Nexcess hosting has experts on deck 24/7/365 so you don’t have to spend hours combing through forums.
At the end of the day there are few things that provide a client with more peace of mind than knowing that when they encounter an issue, they will receive exceptional support from their service provider. The Nexcess team offers exceptional support. Very happy client here.
- Amy M
Real, Responsive, and
As an account manager it is always a pleasure working with Nexcess on client projects! The team at Nexcess is consistently reliable, responsive, and customer success oriented!
- Nicole P
Outstanding service from
beginning to end
Outstanding Service from beginning to end and every time I have any contact with them, they are ready to help with a virtual smile. We need more businesses like them and I highly recommend they for any and all hosting, etc. Thank you so much, you have a customer for life!
- R.J. J
With Fully Managed Hosting from Nexcess Better is Built In
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474700.89/warc/CC-MAIN-20240228080245-20240228110245-00255.warc.gz
|
CC-MAIN-2024-10
| 3,602 | 30 |
http://zoapi.com/insights/instant-meetings
|
code
|
Meetings are Needed
58% of daily meetings in any company, are conducted in person. Apart from weekly remote phone calls over internet, the middle and top management spend significant time attending in-person meetings. Time critical projects require the teams and their collaborators working together at one geographical location.
Meeting Costs are Significant
With multiple presenters plugging in and plugging out AV devices to their laptops, time consumed in handling cable connections cost almost 20 hours/year for one senior executive. 70% of the employees consider meetings to be a waste of time.
User Preferences in Meetings
Face-to-face meetings are most preferred by managers for co-creation. Managers and Project heads spend considerable time recording meeting minutes and following them up for actions or closures. Across user bands waste of time due to cable related issues are not well perceived or appreciated.
Why Screen Sharing Now?
H.264 Video encoding in hardware is supported by Intel from 2011 starting from “Sandy bridge” onward. 2011 was also the year when portables (Laptops, netbooks, tablets) overtook Desktop PCs by more than 2/3 volumes in the US alone. Today they constitute more than 80% of all computing devices sold in the US. 2013 was the year when WiFi alliance ratified WiFi direct (peer to peer) protocol, enabling a whole lot of use-cases with no formal network establishment. HDTVs came to prominence in 2013 and all these factors resulted in practical, cost-effective wireless presentation systems.
Matching Features to Preferences
Zoapi makes wireless screen sharing as simple as plugging in the HDMI cable and pressing a function specific key. It works well with Skype-for-business or any enterprise specific video communication software. It supports cross platform devices and ensures security by using encrypted streams.
Zoapi meetings means instant screen sharing with anyone in the room, be it an employee or a guest. Zoapi is an intelligent meeting collaboration product, with multiple client, wireless screen sharing technology at its heart. Its integration with Microsoft’s Skype for business (Lync) makes it relevant for both face-to-face meetings (screen-sharing) and remote party meetings (Skype). By integrating with existing enterprise software from Microsoft’s Online office 365 ecosystem, it ensures zero learning overhead. Zoapi guarantees “Instant meetings” without wastage of time in connections and cables.
Main Time Consumers
Some of the reasons for waste of time in face-to-face meetings are: Minutes of the meeting, Multiple presenters & Guest presenters. Zoapi tackles these main issues at a very reasonable cost.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125937113.3/warc/CC-MAIN-20180420022906-20180420042906-00048.warc.gz
|
CC-MAIN-2018-17
| 2,685 | 13 |
https://docs.vmware.com/en/VMware-Aria-Operations-for-Logs/SaaS/Using-Operations-for-Logs/GUID-AC91BC2B-850B-482E-9706-D0D1A5653C95.html
|
code
|
Content packs contain dashboards, extracted fields, saved queries, and alerts that are related to a specific product or set of logs. You can enable or deactivate a content pack, export or import a content pack, and remove a content pack.
To view the content packs that are loaded on your system, expand the main menu and select Content Packs.
Content packs are categorized into tabs as Public and Private. Public content packs are provided by VMware and third-party partners and are already installed. Private content packs are provided by external sources and you need to install them.
You can view content packs that have one or more enabled versions on the Enabled tab.
All tabs display only one version of each content pack. To select a different version, in the content pack card, click the version drop-down menu and select the desired version. The absence of a version drop-down menu indicates that the content pack has only one version.
To view the details of a content pack, locate the content pack on a tab in the Content Packs page. You can use the search functionailty to find the content pack. In the content pack card, optionally select a version and click Details. The information for the selected version of the content pack is displayed in the following subtabs:
- Detailed information about the content pack.
- The list of dashboards in the content pack. Click each dashboard to view it on the Content Pack Dashboards tab of the Dashboards page. Click each widget in the dashboard to view the query associated with the widget in the Explore Logs page.
- The list of queries in the content pack. Click each query to view the query details in the Explore Logs page.
- The list of alerts in the content pack. Click each alert to view the alert details in the Alert Definitions page.
- Agent Groups
- The list of VMware Aria Operations for Logs Agent configurations in the content pack.
- Extracted Fields
- The list of extracted fields in the content pack. Click each extracted field to view the query to which the field is added in the Explore Logs page.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474795.48/warc/CC-MAIN-20240229071243-20240229101243-00470.warc.gz
|
CC-MAIN-2024-10
| 2,070 | 14 |
http://ifonlyyouwood.blogspot.com/2009/07/what-comes-first-pins-or-tails.html
|
code
|
The first 'religious' discussion for this batch of postings is whether to cut the pins first or the tails first.
There is a reason to cut tails first in a production environment - you can stack half a dozen boards in the vise and cut the tails on all of the boards at once. This, arguably, saves you a bit of time. Not a lot of time, as the time spent cutting is not great compared to the time spent chopping, but in a production environment a bit of time saved can be important.
Rob Cosman - arguably the most influential of the current crop of dovetail gurus - tells us to cut the tails first.
Looks like there is plenty of reason to cut the tails first, eh?
Well... maybe not.
There is a drawback to cutting the tails first. A big one. That drawback is that you need to scribe the tails onto the end-grain of the pin board. There are three problems involved in scribing from tails to the pinboard. The first is that you are scribing onto end-grain, so it's much harder to see the resulting line even if the end-grain of the pin-board has been planed to perfection. The second is that you are trying to scribe inside a small cavity where there is not enough room for a pencil or even an awl, so you have to use a blade, and that leads us to the third problem. The third problem is that you have to use a thin blade to scribe, and that can be hard to do without taking a slice from your tail or taking the wrong angle, as the blade wants to follow the path its on whether that path is the right one or not.
If, however, you cut the pins first and use them to scribe the tails then you are marking onto face grain, and you have plenty of room to use a pencil or an awl.
I always get better results when I cut the pins first, and Frank Klaus, the Godfather of Dovetailing, says to do the pins first. So did Tage Frid, before his unfortunate passing.
For me my preference is, and will always be, to cut the pins first.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589634.23/warc/CC-MAIN-20180717090227-20180717110227-00505.warc.gz
|
CC-MAIN-2018-30
| 1,916 | 9 |
http://www.lawnsite.com/showpost.php?p=4581864&postcount=12
|
code
|
Originally Posted by DA Quality Lawn & YS
white, what do you use to block the ads? I use google chome as my browser.
Install the following two (free!) ad-ons to enjoy the internet nearly 100% advertisement free:
*learn how to use this before you turn it lose. Basically you can chose what does and does not get executed. It frequently breaks websites heavy with flash, so if something seems like it isn't working, check your noscript and see if it's preventing something from loading.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701152959.66/warc/CC-MAIN-20160205193912-00198-ip-10-236-182-209.ec2.internal.warc.gz
|
CC-MAIN-2016-07
| 484 | 4 |
http://www.linuxquestions.org/questions/linux-software-2/error-message-in-configure-during-the-installation-of-rosegarden-4-1-0-a-323087/
|
code
|
Originally posted by King_Loz
Do I really have to keep running variables in my commands so all the apps know where my libraries are stored or something?
checking for KDE... configure: error:
in the prefix, you've chosen, are no KDE headers installed. This will fail.
So, check this please and use another prefix!
you don't need such things for normal commands.
the configure-script needs to locate all libraries and header files that are needed to compile
you'll have to add smth. like : --with-extra-includes=/../kde/include,
and maybe also : --with-extra-libs=/../kde/lib
( /../kde is where kde is installed on your distro )
you also might want to add options wich tell the configure-script what sound driver to use,
like arts ( i don't use that ) , alsa or jack with alsa.
if you want to install more audio app.'s, "jack" ( with a gui "qjackctl " ) is a nice app. to
connect things together. ( like midi-sequencer, softsynth, etc... )
if you want to use jack, you'll have to install it before configuring rosegarden.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122955.76/warc/CC-MAIN-20170423031202-00361-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,019 | 15 |
https://www.funtrivia.com/trivia-quiz/Entertainment/Very-Monty-Python-Part-D-298161.html
|
code
|
Quiz Answer Key and Fun Facts
1. "The Golden Age of Ballooning" was one of two episodes never to have a title sequence. What was the other one?
2. Who was Queen Victoria pestering in the "rare" filming of her in her garden in the "Sex and Violence" episode?
3. What type of pet did Eric Idle adopt in the episode, "Michael Ellis"?
4. Which one of these actor/comedians never worked with the Pythons as a group? Not post-Python works.
5. Which was the first episode John Cleese did NOT appear in?
6. What type of bird kept pestering Beethoven when he was trying to compose a song in the "Archeology Today" episode?
7. Graham Chapman appeared in a music video for what band?
8. Which of these episodes was edited to about half an episode and had to be replaced with a compilation of previously filmed sketches?
9. In the "Woody and Tinny Sounding Words" sketch, what was Graham Chapman's character's name?
10. Which of these was NOT a character in the television series?
Source: Author C.A Gumby
This quiz was reviewed by FunTrivia editor linkan
before going online.
Any errors found in FunTrivia content are routinely corrected through our feedback system.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945473.69/warc/CC-MAIN-20230326142035-20230326172035-00017.warc.gz
|
CC-MAIN-2023-14
| 1,155 | 15 |
http://www.law.cornell.edu/category/lexcraft_articletype/howto
|
code
|
Here's what you'll need to run oai4courts:
- A database package that works with Rails (mySQL, Postgres, and Oracle should all work, but see here), and that you're comfortable pushing data around with it
- ruby, of course.
- You'll need some additional gems
- appropriate gems for connecting with your database from the utility scripts you'll use to populate it
- login_generator for authentication (don't think this packages itself with the app, but it might).
- possibly additional gems to use with whichever relational database you're running -- see the database-specific information below
- Ruby on Rails.
- Capistrano -- a configuration and deployment manager -- is recommended but not required.
- the oai4courts package itself
The long version:
Implementation scenarios: where does the metadata come from?
OAI-PMH repository implementations consist of request- and error-handling scripts that draw on a relational database (RDBMS) for the metadata they deliver. In practice, this is because implementations that relied on real-time extraction of metadata from documents in a file tree would be unacceptably slow. So for practical purposes the question becomes one of how the metadata finds its way into the RDBMS, and that in turn depends on the nature of the documents themselves,
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1387345762220/warc/CC-MAIN-20131218054922-00045-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 1,286 | 13 |
https://avesis.itu.edu.tr/yayin/7d161dec-7e52-4da7-b2e8-d2a8b52dc80c/a-novel-design-framework-for-generation-and-parametric-modification-of-yacht-hull-surfaces
|
code
|
This paper proposes a new design framework for the parametric design and shape modification of a yacht hull. In this framework, the hull is divided into three regions (entrance, middle and run) and each region is represented separately. In this way, a designer has better design flexibility so that higher design variations of the hull can be achieved. Each region consists of keel line(s), deck line, chine line(s) and station lines that are represented using Bezier curves and these lines are called feature curves. A 3D surface model of a yacht hull is obtained by generating Coons patches using feature curves. Shape operators are also introduced and implemented for the modification of the given hull shape while considering some quality criteria such as hull fairness. Experiments in this study show that a variety of hull shapes can be generated using the proposed design framework with the application of the shape operators.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100527.35/warc/CC-MAIN-20231204083733-20231204113733-00833.warc.gz
|
CC-MAIN-2023-50
| 933 | 1 |
https://community.ivanti.com/thread/9075
|
code
|
You can open object designer and edit the object. Once the object is open make sure you click on the top level of the attribute tree. There will be a property on the right side for the image that is used to represent this object. You can change that to whatever you want.
Hello Nephi - thank you for your reply.
I changed the attribute that you are talking about. It did not amend the icons used for the CI types in my list - I also tried an IIS reset just in case.
In this instance the object is called 'Servers' - I was hoping that all created CI types under 'Servers' would adopt the new icon. I also created new test CIs to test whether the icon would start working for new items - it did not.
The icons are, however, reflected within the 'CI Structure' within Configuration Management (this is a seperate list of CIs from which you can drag and drop onto a diagram view for things like service mapping) - which is most odd.
Any ideas what might be going wrong?
The object icons aren't used universally, as you've discovered they are used on CI structure diagrams but not in the CI Management component. You'll also find that they are used in knowledge search resuts, if you set icons for things like Articles and Incidents they will be used when you do a knowledge search so you can at-a-glance identify what kind of results you're getting.
If you would like the icons to be used in other components please raise an enhancement request.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647758.97/warc/CC-MAIN-20180322014514-20180322034514-00738.warc.gz
|
CC-MAIN-2018-13
| 1,441 | 8 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.