url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://lfaidata.foundation/projects/lakesoul/
code
LakeSoul is an end-to-end realtime Lakehouse framework for both BI and AI applications. LakeSoul includes a centralized metadata layer on PostgreSQL to manage large scale of tables, partitions and files on data lakes with supports of concurrent row-level upserts and ACID control. LakeSoul also provides tools to ingest data from RDBMS CDC streams and Kafka log streams in realtime, with automatic table/topic discovery and DDL synchronization. Data managed by LakeSoul is stored in Apache Parquet format and is accessed via a native Parquet IO layer optimized for cloud storages. Access layers are provided for big data engines like Spark and AI engines like PyTorch, so that both BI and AI applications can benefit from realtime Lakehouse. LakeSoul implements incremental upserts for both row and column and allows concurrent updates. LakeSoul uses LSM-Tree like structure to support updates on hash partitioning table with primary key, and achieve very high write throughput (30MB/s/core) on cloud object store like S3 while providing optimized merge on read performance. LakeSoul scales metadata management and achieves ACID control by using PostgreSQL. LakeSoul provides tools to ingest CDC and log streams automatically in a zero-ETL style. LakeSoul is a Sandbox-stage project of LF AI & Data Foundation. Contributed by DMetaSoul in May 2023.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100531.77/warc/CC-MAIN-20231204151108-20231204181108-00826.warc.gz
CC-MAIN-2023-50
1,348
4
https://unsuccessfulstudent.com/5-things-coding-taught-me/
code
I’ve learned a lot from picking up how to code. It goes without saying that I’ve learned new skills in web development, problem solving, and even, learning how to learn. While the first year will always feel the most eye-opening (and confusing), I think the biggest changes have come in the past year. Coding has ultimately changed the way I think. It has taught me new habits and given me new ways to leverage technology. I always said that, “the worst thing that could happen is that I would learn a new skill”. Well, the boat certainly sailed that direction. It’s nice to feel like I’ve reached that special tipping point. Even if I walk away from this field now, I have transferable skills that completely change the way I think and how I apply myself in the future. So what have I learned besides the obvious? Well, I’m glad you asked! Here’s another top 5 because well.. I can only do lists with 5 things on it. 1. Automate anything you can Lots of code that is written involves automation; everything from server configurations, deployment to extracting data relates to automation. Anytime I do something tedious or repetitive, I now think to myself, can I automate this? Will I need to do this again in the future? In other words, can I write myself a script to do it a lot quicker now and in the future. Even if I don’t write it myself, I’m infinitely more aware that someone has probably solved a similar problem, making me much more likely to go looking for such a solution. Nowadays, If I do something more than two times, alarm bells start going off now. Sometimes it’s a trade-off between investing in automation and waiting until the annoyance level is greater than the time spent. Nonetheless, coding has taught me to automate as much as possible. 2. Use typical code tools outside of coding A perfect example of using typical “coding tools” outside of code is something like version control (e.g. Git). I fricken love Git. It’s probably one of my favourite tools in development. While tools such as Dropbox offer cloud syncing and some history tracking, Git allows me total control of recording my history and backtracking as needed. While it doesn’t track everything, there are still lots of use cases with tracking documents, especially when we’re concerned with pure content changes. Another example might be using scripts to handle importing records or manipulating repetitive data. Coding taught me to think more creatively about uses outside the world of development. 3. Read the documentation Documentation is essentially instructions and most people tend to dislike instructions. In fact, the stereotype of guys is that we don’t read instructions; we will “figure it out” because we are “just that smart”. When it comes to code, it’s time to check that ego. Documentation isn’t the most exciting thing, but quite often, it has 90% of what you need. When I’m in a rush to find an answer, I do tend to skim more than read, but when I have extra time, it’s always good to read about how to get full functionality out of your tools, libraries and everything in-between. Coding has taught me to RTFD – read the fucken documentation. 4. Document yourself Following up on point 3, I think it’s equally important to learn the skill of documenting yourself. Whether it’s for your own project or for others, there is a good chance you will forget key steps or information that only you may know. To save future you and others from struggling to “figure it out”, do everyone a favour and document at least the bare minimum (e.g. Getting started). I’m decently good at documenting as needed but coding taught me that documenting should be essential. 5. Stay modest and humble while learning The more you know, the more you realize how much there is to know; it’s the roller coaster challenge that you embark upon in coding. As you venture further into this world, I think one of the biggest traits to keep in check is to have a sense of modesty and humility as you grow in skill and knowledge. Regardless of your level, you should never feel that you can’t learn something or receive advice from someone. I suppose the attitude is to consider yourself a life long student; good advice for any profession I imagine. Coding constantly reminds me to stay modest, even as I have transitioned into positions of teaching and mentorship. Don’t miss a post by following on the right hand side of the blog or via Twitter @chestertus
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315809.69/warc/CC-MAIN-20190821043107-20190821065107-00396.warc.gz
CC-MAIN-2019-35
4,504
15
http://www.wrensoft.com/forum/archive/index.php/t-146.html
code
View Full Version : Categories 03-10-2005, 05:16 PM I am trying to figure out the best way to make my categories. Basically My main requirement is to make the main search category that PDF's and DOC's don't display. And I would also like to change the "All" to different wording. Right now I have: PDF / *.pdf / PDF's Only DOC / *.doc / DOC's Only Entire Website inc PDF & DOC / *.pdf, *.doc / Everything Note that you don't need the * (asterick) character in your category patterns. You will only need two categories defined: Category name: PDF Category name: DOC You will also need to name a catch-all default category for all the pages that don't belong in the two above, eg. "Webpages only" To rename the "All" category (for "Entire website"), you will have to either modify the search script (which requires familiarity with the scripting platform in question), or you can define your own search form in HTML and rename it as you like: The above FAQ doesn't provide the HTML for the category search box, as this varies depending on your category setup. It would be easiest to just allow the script to generate a search form, open the page in a browser, click on "View Source" in the browser, and copy+paste the HTML for the form required. Then once you have done that, you can disable the search form in the script and use your own HTML form. Powered by vBulletin® Version 4.1.12 Copyright © 2013 vBulletin Solutions, Inc. All rights reserved.
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163053865/warc/CC-MAIN-20131204131733-00075-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
1,450
14
http://freecode.com/tags/linguistic?page=1&sort=created_at&with=888&without=
code
libalinga-java is a Java native interface to libalinga. It provides C++ and Java wrappers, as well as Java classes. It also provides control files to generate them from the libalinga interface using the program swig. The major and minor versions of this JNI will track that of libalinga, but its bugfixes are independent of libalinga bugfixes. libalinga is a C++ implementation of a multi-stream codec for the ALingA (Aligned Linguistic Annotation) format. It makes use of libogg++. Each ALingA stream holds at least one stream of annotation data, which is in the LingA format. It may also interleave the signal stream(s) against which the LingA streams are aligned, or it may simply reference such streams. It also provides metadata about the underlying manifold for the signals and the annotations. The metadata is ordered for runtime parsing of the number and type of signal and LingA codecs to enable decoding of the multiple logical streams in one pass. rospell is a UTF-8 text editor for programmers and general use. It features syntax highlighting, a code beautifier for C and C++, and support for gdb, ctags, grep, diff, and merge. It includes spellers for English, French, German, Spanish, and Romanian languages. Romanian aspell and hunspell dictionaries are also available. LinkGrammar-WN is a lexicon expansion for the Link Grammar Parser. The Link Grammar Parser is a syntactic parser of the English language that is capable of handling a wide variety of syntactic constructions and is considered quite robust. The LinkGrammar-WN project aims to import lexical information from WordNet in an effort to increase the size of the LGP lexicon. This project is of interest to anyone interested in NLP (natural language parsing) of English text. kdrill helps people learn Japanese 'Kanji' characters. Its includes a multiple-choice Kanji quiz program that helps people learn Japanese characters with different guess formats and history options. It also has a suite of dictionary lookup functions. Words can be found using a variety of methods including Romaji, SKIP, four-corner, cut-n-paste, radical lookup, and English search.
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609532573.41/warc/CC-MAIN-20140416005212-00408-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
2,135
5
https://blogs.sap.com/2016/03/01/concurrency-control-using-etags-in-a-sapui5-application/
code
Concurrency Control using ETags in a SAPUI5 application Dear UI5 Developers, in a SAPUI5 application concurrent editing of resources leads to a lost update problem. This means when two users edit the same resource at the same time one of the users will lose his changes. This paper describes how to use ETags within a SAPUI5 application in order to manage this scenario: thx for sharing. Thanks for sharing. I might be wrong but I believe if we use the OData version 2 (sap.ui.model.odata.v2), the pages 4 and 6 will be wrong or unnecessary when you wrote: As I understand the data.v2 is always async=true and the default update method is Merge. Also the V2 API does not have both parameters. See: SAPUI5 SDK - Demo Kit
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943562.70/warc/CC-MAIN-20230320211022-20230321001022-00322.warc.gz
CC-MAIN-2023-14
719
8
https://www.examsnap.com/certification/98-381-microsoft-introduction-to-python-beyond-mta-98-381-exam-from-python-to-sql-using-databases-to-store-data-part-2/
code
98-381 Microsoft Introduction to Python – Beyond MTA 98-381 Exam: From Python to SQL – Using Databases to Store Data Part 2 Delete Data with Delete Statements And we will go on with the delete query. So I’ll make a new query editor and delete from students where name is equal to Chris. So again, I right-click “open table.” Here are the records. I will delete the record where the name is equal to Chris. So I will execute this query. And if I’m going to open it again, the table here is there, but it is cast. So, please, refresh. And here it is. This is the only team present. So… And we will go on with the delete query. So I’ll make a new query editor and delete from students where name is equal to Chris. So again, I right-click “open table.” Here are the records. I will delete the record where the name is equal to Chris. So I will execute this query. And if I’m going to open it again, the table here is there, but it is cast. So, please, refresh. And here it is. This is the only team present. So if you want to delete all the records from the students table, you just do not need to use the workloads, and the Delete query will delete all the records. So simply delete from students. Delete from students is executed. And as you can see, this is a cast refresh. Nothing is here. This was my previous condition for two students, and I’ll use student two for the next example. So the delete is really very easy to use. If something happens, remove the conditions from the table name. So let’s see how the SQL looks up close. I will create a new query right here. The SQL-like operator “close” is used to compare a value to other values that are similar using Wildcard operators. So there are two wildcards used in conjunction with the like operator. The first is that I’d like to choose students from I’m sorry; I should always say what to select from students to now select (asterisk). So, if I’m going to say that name is synonymous with something, it should be either Chris Mall or team. If I would like to fetch some records from this table, I can say that I would like to use the percentage. And the percentage means that I would like to tell all the students that there are three letters (Ma) and some other letters before and some other letters after this M in the name. So Chrismal has mal in the name, some other characters before it, and some other characters after this one. So I don’t have to use the exact value, but I’d like to find any values that have mal in any position. So I will use this one. And there is an error. And the error is that I used like instead of equal. So I’ll use that the name should be something like mal. And here it is the same. You can do it if I use, for example, Chris. But if I would like to search for any values that start with Chris, I have to delete this percentage. So it will start with Chris, and any other characters will follow him. So it is okay. The result will be the same. So this is one great example. So I will go back to the insert statements. I will copy these two insert statements. I will create a new query editor, I will paste it, I will change students to “students too,” and I will use different names. I will add to numbers three and four. I will change Chris Mall from George’s team to Michael’s. I will run it. So, if I’m going to open two students, I’ll add two more now that I have four records. I’ll add Maria to five and six, and Jorophy to twelve and 610 and four. I will also run these two statements. So if I would like now to use the top-level selector to fetch a top-level n number or x percent of records from a table, So it is important to know that all the databases do not support the top-down closure. For example, MySQL supports the limit close to fetch a limited number of records, while Oracle uses the ronum command to fetch a limited number of records. But it follows exactly the same logic. Exactly the same logic So I could, for example, select the top three asterisks from students if you’re going to use a Microsoft SQL Server, but here on a MySQL server, I could say, “Select an asterisk from students, limiting it to three.” And if you select this one, then in students, I do not have records, but in students too, I will get only the top three results. So if you’re going to use midscale, this is the syntax. If you’re going to use Oracle, it is almost the same. Choose an asterisk from students whose rowNUM is less than or equal to three. So this is for Oracle, and the result will be exactly the same. You will get only the top three records from the table. Students two. So, if you need a specific number of records from a table, use Limit from SQL, Top for Microsoft SQL Server, or Ronan for Oracle Server. Oracle. So we will go on and see the order by clause that is used to sort the data in ascending or descending order based on one or more columns. As a result, some databases cut the query results in the sending order. By default. But if you would like to use it, I would create a new query editor. I could say, “Select all students from students.” I will execute this query, but if I would like to sort the results by AIDS, Then I could say “order by AIDS.” And then you will have all the students in an ascending order according to their HIV status. So you can use more than one column in the order of byte loss. But make sure that whatever column you are using to shorten that column should be in the column list. So order by AIDS. Sort by AIDS and name. So both Team and Michael have the same AIDS, but Michael should be first because his name starts with M. Well, the team starts with T. So if I’m going to run this query, then the result changed. So this was a good example to show you how you can use the order by selecting a column list from a table. Multiple conditions should be ordered in ascending order by column name (one column name, two column names). And finally, we will see the group up close. So the SQL group by is used in collaboration with the select statement to arrange identical data into groups. As a result, this group generally follows. When you use the word close in a select statement, it comes before the order by close. As an example, we could ask students to name some AIDS. I apologies for the parentheses. From students to group by group by name. So if I’m going to select the statement, I’ll make an appointment with the AIDS organization. So this is similar to the select asterisk that students use. But imagine that I could also have I will go back and add these two values again. I will change only the seven and the eight. So, if I group by name, that means I’ll have two students named Maria who are twelve years old. So, if I add up the ages, Then I will have Maria and 24. when I’m going to use this group by name. This is because I have two students with the name Maria and will have two students with the name Dorothy. So if I’m going back, I have only six records because they are grouped by name. And Maria has 24 right now because I have two Marias with 12 AIDS and I have two Dorothy’s with 10 AIDS ten. So you can use it right here. If we would like to count the names, I will say that I have two Dorothys and two Marias right here. So it was grouped again by name, and I can see that I have two Dorothys, two Marias, one George, one Michael, one Tim, and, of course, one Chris Mall. So this was a good example to understand how you can group your results. As a result, the group must closely follow. By a certain date, the work conditions must have preceded the order. So you can say right here, group by name, order by name. Sorry. by name. And here it is. Okay, I used some of your font’s beginning. If you would like to change the font actually in Escalade, go to Tools Preferences and just change here if you would like the size to be bigger. This was the group by a long shot, and I’ll continue now and show you the distinct keyword. I’ll continue, create a new query editor, and write right here that I could have selected asterisks from students so that I could have all of student two’s names. But here I have, as I said before, two Marias and two Dorothys. So, if I wanted a list of names, I could also choose names from the students. And if I would like to have only distinct records to eliminate the duplicate records, then I will use the keyword distinct. So I would like to have only the records that are not duplicated. So the SQL distinct keyword is used in conjunction with the select statement to eliminate all duplicate records and fetch only unique records. So, for example, you could have multiple duplicate records in a table, as shown here. And while feting such records, it makes more sense to fetch only the unique records instead of feting duplicate records. Selectdistinct column name one or column name two, columnname n from table name where conditions are true is the basic syntax of the distinct keyword. So this was a good example of how we can use distinct to ensure that we don’t have any duplicate entries. And finally, we will see how we can use some commands to delete complete data from an existing table. I will create a new query editor, and either you can say delete from student two, and this will delete all the records from student two as we did before, or you can say that you would like to use transform Please transcribe table students two and then delete all the records. You delete complete data from an existing table. So you can also use drop table to delete a complete table. However, if you only want to remove the data from the database and not the entire table structure, and you want to recreate this table again if you want to store some data, So actually, you should truncate the table by students two, and I will select the statement; click right here. One success. And two things are clear now, students. I do not have data for students 2 and 3. The student’s two tables are truncated, and the output from the select statement is totally null. I have an empty set, so if I’m going to use select asterisks from students too, I do not have any data. So I think this was a good example for the traced table command to use to delete complete data from an existing table. And with this statement and this command, I think you have an overview of the basic commands of SQL. So there are some more advanced commands that we will add in the following lectures in the future. But for now, I think that you have a good overview of the basic logic and the basic concepts of SQL. So I am really happy that we saw together all these commands, all the statements, and the logic of SQL. And these lessons are actually to help you understand the basic concepts related to all SQL languages for Microsoft, SQL for MySQL for Oracle, and how You can use SQL to connect it with your application so that you can store data, manipulate data, and do some queries to fetch some results. So I would be really happy to ask if something is not clear to you, and I would be really happy to help you clarify these complex things. So I’m looking forward to seeing you in the next lesson, and I’m waiting for your messages. Bye-bye for now.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100800.25/warc/CC-MAIN-20231209040008-20231209070008-00100.warc.gz
CC-MAIN-2023-50
11,243
18
https://www.evilmadscientist.com/2008/business-card-avr-breakout-boards-version-1-1/
code
We’ve just released a new version of our super-handy business card sized target board for programming 28-pin AVR microcontrollers like the ATmega168 and ATmega328. These are just the thing for programming these chips through an ISP programmer like the USBtinyISP. We use these for a lot of our simple microcontroller projects; Tennis For Two and the Lissajous POV come to mind. The new version has basically the same design but adds some extra prototyping area and makes the holes big enough to accept a ZIF socket: Like the original version of this target board, this circuit board is a fully open source hardware design. For much more information– including the detailed design files– please see the update that we’ve added to the end of our original article about this project.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948223038.94/warc/CC-MAIN-20240305060427-20240305090427-00485.warc.gz
CC-MAIN-2024-10
788
3
http://xtelsio.com/hlp/en/srv_mgmt/pp_devices.htm
code
Here all TAPI drivers which are registered in the system are listed. With selection of a TAPI driver all accompanying devices are listed below. Delete: The xtelsio CTI Server stores the names of all TAPI drivers installed one day. If a driver is not visible for the Server, it can be that the driver was uninstalled or is not available only temporarily. If the driver was uninstalled, you can remove it by the Delete button in xtelsio CTI Server too. The button is only enabled if none of the driver's devices is available. In the lower list all devices of the current selected TAPI driver are shown. Possible states of the TAPI devices: Available The properties of the TAPI device could be queried via the TAPI interface. The does not mean, however, yet that the device can be also opened successfully. Not Available The properties of the TAPI device could not be queried via the TAPI interface. Then the TAPI driver is not available either or the TAPI driver couldn't establish a connection with its hardware (phone or PBX). Opened At least one Client has opened this device. Then it should work. Open Error License problem in the TAPI driver (TAPI for Asterisk or TAPI for Snom) Open Error Error message after a click on the button [Test Open]. Device could not be opened. Open OK Successful message after a click on the button [Test Open]. Device could be opened. Special selection "Non-CTI Lines": These Devices are probably useless for CTI. This rating is carried out by the xtelsio CTI Server with the help of the driver's name. Some drivers supports only the data communication and are useless in connection with CTI Server. The rating "probably useless" is only a hint, you can still try it of course. - <Owner>: Number of the Clients who have owner rights on this device. The counters in parenthesis indicates the number of active clients and the number of clients with offline-monitor. - <Monitor Clients>: Number of the Clients who have only monitor rights on this device. The counter in parenthesis indicates the number of active clients. - <J - Journal>: If checked, this device can log call in main journal. However, logging only takes place if the device has also been opened (either by a tick in the "M - Monitoring" column or by a client). Hint: Click the columns header to set/remove all ticks. - <M - Monitor>: If checked, the server keeps the device open permanently. This ensures that the clients can always display the current device state after login. Hint: Click the columns header to set/remove all ticks. - <Computer name>: The Clients can automatically obtain permissions for the TAPI device based on the computer / terminal name. Double-clicking on a TAPI device opens the configuration dialog for assigning the computer name. For more information see:Client Privileges Refresh: A click on this button updates the view. All devices are queried once again from the server. If a client has just opened a device, here this is visible only after a Refresh. Test Open: With click on this button it is tried to open the device in the Server. With success "Open OK" is shown or "Open Error" in the negative case. You can take defailed information about the reason of "Open Error" from the file "server\trace.txt" if the suitable trace option was activated under State. Device Settings ...: Opens a setting dialog for the selected devices. Driver Settings ...: Opens a Setting Dialog for the selected TAPI driver. The settings refer to all Lines of the driver. Clean up: This button is only enabled if a TAPI driver is specially selected above and zombie entries for this driver are contained in the TAPI device list (with locking disk). Clicking on the "clean up" button removes the zombie entries.
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103036363.5/warc/CC-MAIN-20220626010644-20220626040644-00555.warc.gz
CC-MAIN-2022-27
3,720
18
http://superuser.com/questions/222823/cant-use-nvidia-geforce-only-integrated-intel-graphics
code
I just bought a new Asus N53J XE-1 laptop that comes with a NVIDIA GeForce 425M. But when I check my graphics card with dxdiag, I can see only the Intel HD graphic. When I try to set a game with a graphic card I also get only one option, the Intel HD. All the drivers for NVIDIA are installed , but I can't use it for some reason. Any ideas whats going on?
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049275764.90/warc/CC-MAIN-20160524002115-00214-ip-10-185-217-139.ec2.internal.warc.gz
CC-MAIN-2016-22
356
4
https://cloudblogs.microsoft.com/dynamics365/no-audience/2007/04/17/bio-dominic-pouzin/
code
Dominic Pouzin is a senior software development engineer lead working on CRM’s integration with Office and email systems. Prior to joining the CRM team, he was a developer / lead working on Windows & Exchange components such as the Active Directory connector, Exchange clustering, Key Management Server, SMTP queue management, Exchange system policies, etc. Prior to this, Dominic worked in the nuclear / military field where he designed statistical models for nuclear detection devices, and access control systems for nuclear plants. He is a graduate of INSA Lyon (France), but also studied at IIT Delhi (India). He spends his spare time playing with his daughter, learning about foreign cultures, keeping an aquarium, reading sci-fi, and checking out new computer games (without enough time to seriously play them).
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945433.92/warc/CC-MAIN-20230326044821-20230326074821-00621.warc.gz
CC-MAIN-2023-14
819
2
https://www.beey.io/en/beey-bug-report/
code
—Please choose an option—Always occursOccurs occasionallyOccurred once —Please choose an option—HighMediumLow Fill in the Project ID where the bug occurred, or 0 if the bug does not concern a project. What is a project number? An explanation of the bug and when it occurs Additional details that describe the bug. 1. What did you do? 2. What did you expect to happen? 3. What happened instead? A screenshot or video that illustrates the bug’s behavior Your email address you use to sign in Your reply email address (if different)
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500273.30/warc/CC-MAIN-20230205161658-20230205191658-00745.warc.gz
CC-MAIN-2023-06
539
12
https://www.sqlshack.com/different-ways-to-start-a-sql-server-single-user-mode/
code
In this article, we will review different ways to start SQL Server in single user mode. Many DBA’s might have a situation like restoring a master database or other system databases from the backup that needs SQL Server to be started in single user mode. There are different ways to start SQL Server single user mode. Let us discuss them one by one. Starting SQL Server single user mode using SQL Server Configuration Manager Open run by pressing Windows and R keys together. As I am using SQL Server 2016, I typed sqlservermanager13.msc to open the SQL Server Configuration Manager. Please refer to the below list for other SQL Server versions: - SQL Server 2012 (11.x) – sqlservermanagr11.msc - SQL Server 2014 (12.x) – sqlservermanagr12.msc - SQL Server 2016 – sqlservermanager13.msc - SQL Server 2017 – sqlservermanager14.msc You can also open it by clicking on start and search for SQL Server Configuration Manager as shown in the below image and click on SQL Server Configuration Manager (version) to open it. Once you open configuration manager, click on SQL Server Services which will show SQL Server Services for all the instances along with SQL Server Agent services. Select the SQL Server service of the instance that you want to start in single user mode. Right-click on the service and click on Properties as shown in the below image: Navigate to the Startup Parameters tab. Type -m and click on Add as shown in the below image: Click on the Apply button which adds the startup parameter -m to the startup parameters list of that SQL Server instance. Click on the OK button on the warning window. Right-click on SQL Server service and click on the Restart to restart the SQL Server instance. SQL Server will start in single user mode. Now connect to SQL Server using SQL Server Management Studio or SQLCMD. You may receive login failed error as shown in the below image. This is due to the SQL Server Agent service running and consuming only available connection. Make sure you stop the SQL Server Agent service of the SQL erver instance as the SQL Server Agent and try connecting to SQL Server using SQLCMD or SQL Server Management Studio (SSMS). It is advisable to use SQLCMD when you want to query SQL Server that is started in single user mode as connecting directly and query using SQL Server Management Studio that uses more than one connection. To query SQL Server single user mode using SQL Server Management Studio, open SQL Server Management Studio, and do not connect to SQL Server directly. Close the connection window and click on New Query as shown in the below image which opens a query editor in SQL Server Management Studio: All the users who are part of the Local Administrator group can connect to SQL Server with privileges of sysadmin server-level role. To start SQL Server in multi-user mode, remove the added -m start parameter from properties of the SQL Server service and restart the SQL Server service. Starting SQL Server single user mode using Command Prompt We can also start SQL Server single user mode using the Command Prompt. Navigate to Start and search for services as shown in the below image. Click on Services which will open Services window. In the Services window, locate the SQL Server instance service that you want to start in single user mode. Right-click on the service and click on Properties as shown in the below image: In the Properties window, you can see the name and display name of the service. Now copy the name of the service which will be used in Command Prompt to start the SQL Server instance in single user mode. Open run by pressing Windows and R keys together. Type cmd and press enter button that opens the Command Prompt. Execute the following command to stop the SQL Server service. In this case, MSSQLSERVER is the name of the SQL Server service. Replace it with yours: NET STOP MSSQLSERVER Enter Y to continue by stopping the SQL Server Agent service as shown in the below image: Once the services are stopped successfully, start the SQL Server service by passing m parameter. Open the Command Prompt and execute the following command to start SQL Server service in single user mode. Please refer to the below image: NET START MSSQLSERVER /m Starting SQL Server single user mode using the executable file Open the Command Prompt and navigate to the folder where sqlservr.exe is located. As I am using the default instance the path is as below: C:\Program Files\Microsoft SQL Server\MSSQL13.MSSQLSERVER\MSSQL\Binn Run sqlservr.exe with -m as a parameter as shown in the below image: In this article, we explored how to start SQL Server single user mode using SQL Server Configuration Manager by adding -m in startup parameter and using Command Prompt as well. In case you have any questions, please feel free to ask in the comment section below. - Geo Replication on Transparent Data Encryption (TDE) enabled Azure SQL databases - October 24, 2019 - Overview of the Collate SQL command - October 22, 2019 - Recover a lost SA password - September 20, 2019
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653071.58/warc/CC-MAIN-20230606182640-20230606212640-00711.warc.gz
CC-MAIN-2023-23
5,041
38
https://extensions.joomla.org/extension/timeline-slider/
code
timeline slider is slider period for joomla Extension. It allows you to easily add and manage part. This extension will provide user with an ability to create any number of slide data, which can be easy called using admin part. - auto loading time - use time period - responsive all device - support all conflict
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473738.92/warc/CC-MAIN-20240222093910-20240222123910-00541.warc.gz
CC-MAIN-2024-10
312
7
https://www.freelists.org/post/luajit/Interested-in-lua2exe,7
code
Hello,I have just found the solution to modify all those libraries which require lua5.1.dll unstead of lua51.dll. For example, it works with luasocket but not with wxlua. Be careful, dirty hacking. local file = io.open('something.dll', 'rb') local data = file:read('*a') file:close() file = io.open('someting2.dll', 'wb') file:write(data:gsub('lua5.1.dll', 'lua51.dll\0')) file:close()Windows don't see any problem with that modification if the DLL isn't signed (of course it invalidates the signature if any). A chance that "lua51.dll" is shorter than "lua5.1.dll" ! Ah, a question, in fact: why having chosen lua51.dll and not lua5.1.dll when building luajit by default ? Luajit is the only one to have chosen lua51.dll, or even in the lua 5.1.5 community the name of the DLL was not completely clear at the time luajit was created ?
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670731.88/warc/CC-MAIN-20191121050543-20191121074543-00501.warc.gz
CC-MAIN-2019-47
835
3
http://gamedev.enigmadream.com/index.php?topic=1638.0
code
I think v6v mostly answered your questions, but I'll comment too in case my comments can add further benefit. I would encourage you to use DrawCounterWithLabel to get the score displayed, and then you would only need to figure out how to get the value of one counter to represent the score based on the value in another counter (if you even need two separate counters). Is there any reason you couldn't simply update the score directly with the ChangeCounter function? If you need to update it more slowly, you can use ChangeCounter to change an invisible counter, and have it loop and use it with "If" to change another counter only once every time it loops. That way you could make the score change more slowly in relation to a counter that increments on every frame. I suspect whatever you want the score to do could be done without writing any code, but I'd need to know more about what you're trying to do to the score. You may have to be more specific about what you mean by "text based counters". A counter implies a number, so I don't understand what you're asking for. There are a couple ways to use C# code once you have it in the project. One way is to do as v6v suggests (if you are adding code to SpriteBase.cs, PlanBase.cs or GeneralRules.cs). Such functions, when added with a Description, will then show up in the Function dropdown list (if you don't have any errors) for the Sprite editor, Plan editor, or both respectively. The other way is to edit one of the other .cs files in the SourceCode folder of your project (in the IDE) and just call the function from other code that is already running at the time you want your code to be called. For example, if you write a function in MapBase.cs that writes some debug info to a file, you could call it from the DrawAllViews function in MapBase.cs, and then your function would run once on every frame. Not sure if that fully answers your questions, but hopefully gives you some idea. Also, keep in mind that if you want your project to run as HTML you can't just add C# code, you would also need to add .js code.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218190295.65/warc/CC-MAIN-20170322212950-00374-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
2,078
5
https://www.sitefinity.com/developer-network/forums/general-discussions-/stop-the-spam-in-forum
code
23 Apr 2003 20 Mar 2012 Link to this post As Telerik develops the Forums in future versions they will need to add a rule-based approach to manage spam from the backend. This is especially important for Community-based sites. We've seen an increase in spam on the Telerik Forums recently but still not huge, in part because these are primarily tech support forums and not as attractive for spammers. Also the Telerik Forum users (in this case us), as Web Developers we are much more forgiving about this than the average site user will be in seeing spam. I also run Telligent Community (a Sitefinity competitor) on one of my sites. I hope that the Telerik staff don't take offense, but one of the reasons that I use Telligent is that they have a much more sophisticated backend for managing users and spam. This includes being able to set a general spam point scores for Forums, Blog Comments, etc. When something is over the spam point score it is marked as spam and not visible. Then spam postings can be reviewed by the Administrator and the User Profile can be banned for a period of time as well as deleted all from an integrated backend. Behind the general spam score are a series of rules all which are user configurable. Known Spam Terms Spam often times uses common terms such as 'viagra', those words can be managed here User Account Age Gives points based how recently a user's account was created User Account Status Add or subtract points based on whether poster is anonymous or a registered user. User Creation IP Frequency Determines if the user being created is coming from an IP address that is repeatedly creating users. Status Message Duplicates Detects recent duplicate status messages and replies Status Message Flood Measures how many status messages a user has recently created. Requires comments meet a certain minimum length IP Address Frequency Used to determine if a given IP address attempts to make repeated posts Emails in Comments Looks for regex matches in the blog comment body and assigns points if they are found. This rule will check the subject, body, username, trackback name, and title url if available. Recent Duplicate Spam Rule This rule will check for duplicate username, body, trackback name, and title url in recent comments. This rule will check for regex matches in the subject, body, username, trackback name, and title url if available. Links in Comments Based on number of links (web addresses) in the post.
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806768.19/warc/CC-MAIN-20171123085338-20171123105338-00560.warc.gz
CC-MAIN-2017-47
2,456
28
https://www.dk.freelancer.com/projects/mobile-phone-iphone/cibiya-application-manager/
code
application manager like installous that can connect to our database (with API) and users can explore [category/filter/search/QR code reader] all the apps [in our database] and install our purchase them, they can update their applications [it will be compare with our database application version]. also the program will be sync with itunes and have a local sharing system [wifi] like airdroid on Android for manage and explore theirs owned application [application which installed/purchased] and we have notification system like ready to update, application new version, and customized message [from site api] also it have a place for advertising that connect to site api and get ads from that and have a place for login/logout [profile system] and charging their account online and recent news of site and help system. and a good settings like install apps automatically our manually, and sequence or simultaneity downloading, and simple features like page orientation, universal application [run in iPad and iPhone], download resume/pause, and install later or now. i want it in Persian Language for persian users (like translate strings), and i can present english document and api and api document for developer.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267865145.53/warc/CC-MAIN-20180623171526-20180623191526-00091.warc.gz
CC-MAIN-2018-26
1,217
7
https://forum.thinkpads.com/viewtopic.php?f=2&t=122412
code
Currently, my ThinkPad runs perfectly fine on Linux with the configuration you see in my signature. However, I have decided to give a different use to this machine, essentially I want to use it to run the diagnostic software for my car, so that I have a dedicated laptop for this purpose. Unfortunately, the software only runs on the following Windows OS: - WXP Pro I do not think I would be able to get W10 to install, therefore, the choice would be between WXP and W7. Also, do you think upgrading the CPU would be beneficial for my purpose? If yes, which one would you suggest considering that I want to keep the same fan?
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655878519.27/warc/CC-MAIN-20200702045758-20200702075758-00274.warc.gz
CC-MAIN-2020-29
625
7
http://www.saraproft.net/blog/?cat=6
code
A Voronoi diagram is created from a set of points by dividing the plane into regions, where each region consists of the area closest to one of the points. Ken Shirriff published a paper about voronoi fractals ten years ago. Frederik Van Houtte from Belgium created a nice applet with the processing language to generate online voronoi fractals. Click the applet to generate a new fractal. A description of the project and the source code are published on Frederiks weblog under a a Creative Commons license. The tags “embed” and “applet” are deprecated and even dropped in the new browser standards like XHTML 1.1. To embed objects within a document, the tag “object” should be used. The main attributes of “object” are: classid : This attribute contains a URL for an object’s implementation. The URL syntax depends upon the object’s type. With ActiveX controls (Internet Explorer), the value of this attribute is not a URL, but an object-id with the prefix clsid. The way to access a Java applet is to use classid=”java: classname.class”. The pseudo-URL java: is used to indicate a Java applet. data : This attribute contains a URL for data required by an object. archive : This attribute contains a URL for the location of an archive file. An archive file typically is used to contain multiple object files to improve the efficiency of access. codebase : This attribute contains a URL to use as a relative base to access the object specified by the classid attribute. codetype : This attribute specifies an object’s MIME type. type : This attribute specifies the MIME type for the object’s data. declare : This attribute declares an object without instantiating it. This is useful when the object will be a parameter to another object. name : Under the Microsoft definition, this attribute defines the name of the control so scripting can access it. standby : This attribute contains a text message to be displayed while the object is loading. width, height : the size of the object The tag “param” specifies the parameters that are needed by the object to run. Most attributes exist also as parameter elements, but should never be used duplicated, except for the codebase attribute. In the ”object” tag, the codebase attribute represents the location from which to download the object (for instance the Java plugin) when it is not found on the local machine. In the “applet” tag, the codebase attribute represents the location from which to download additional class and jar files. To resolve this conflict, the codebase attribute is mapped into a “param” codebase in the “object” tag. Specific parameters are the following: code : Specifies the name of the Java applet or JavaBeans component witout the extension “class”. It cannot be used with “param” element “object” nested inside the same “object” tag. Microsoft Internet Explorer handles the “object” tag differently than other browser like Firefox, mainly due to the different implementation of the “classid” attribute. To provide multiple browser support, it is necessary to program a conditional settings of the “object” tag by nesting the tags for IE and for other browsers. An example is shown below with the tiny Julia applet (128 bytes) created by the russian programmer Konstantin Victorovich Morshnev (alias MoKo). A detailed tutorial about (Multiple Browser Supported) Java applet using XHTML ‘object’ tag is given by Shayne Steele. A user guide to embed applets in documents with the “object” tag is published by Sun. Filmer is a front-end program for Fractint that generates amazing fractal animation. Fractint is a program for calculating still fractal images (you need Fractint installed to use Filmer). Filmer uses Fractint parameter (.par) files to specify the coordinates and other parameters of a fractal. It then calculates the intermediate frames and calls Fractint to make a continuous animation. Filmer also has many options for pallete rotation and generation. The Persistence of Vision (POV) Raytracer is a high-quality, totally free tool for creating stunning three-dimensional graphics. It is available in official versions for Windows, Mac OS/Mac OS X and i86 Linux. The source code is available for those wanting to do their own ports. About 20 years ago, I used POV on my Atari Computer to render my first 3D scenes.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368697745221/warc/CC-MAIN-20130516094905-00063-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
4,388
22
http://sakura.nu/tokyo/index.php?rules
code
Your name, email, and country are required. Please use your real name or a valid nick. Anything inappropriate will be edited. You do not have to have a website to be listed here. If you do have a website, and you want it linked by your name, you must link back to this fanlisting using a text link or a code. Obviously you must be a fan of Tokyo, Japan. Now, if you are ready, go ahead and join the fanlisting.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819971.86/warc/CC-MAIN-20240424205851-20240424235851-00277.warc.gz
CC-MAIN-2024-18
410
6
https://www.claudiokuenzler.com/blog/129/apache-processes-big-load-googlebot-close_wait
code
This is pretty much the summary of my research for the last couple of days. For several days now I have a weird behavior of Apache where suddenly the load increases and some Apache child processes use up to 100% of the CPU. Top shows that there are 3 Apache processes which use the most % of CPU: PID USER PR NI VIRT RES SHR S %CPU %MEM TIME+ COMMAND 5439 www-data 20 0 626m 170m 64m S 76 4.3 51:43.32 apache2 4355 www-data 20 0 680m 173m 58m S 43 4.4 34:08.04 apache2 3522 www-data 20 0 630m 205m 64m S 39 5.2 39:03.98 apache2 If we take a detailed look of open connections by using the lsof command, we can see the following: # lsof -i :80 COMMAND PID USER FD TYPE DEVICE SIZE NODE NAME apache2 3522 www-data 26u IPv6 1210315466 TCP server:www->crawl-66-249-71-78.googlebot.com:54107 (CLOSE_WAIT) apache2 4355 www-data 39u IPv6 1210322237 TCP server:www->crawl-66-249-66-136.googlebot.com:36722 (CLOSE_WAIT) apache2 5439 www-data 26u IPv6 1210335205 TCP server:www->crawl-66-249-66-136.googlebot.com:62305 (CLOSE_WAIT) apache2 5439 www-data 30u IPv6 1210345350 TCP server:www->crawl-66-249-66-136.googlebot.com:40885 (CLOSE_WAIT) apache2 13904 www-data 3u IPv6 1210044289 TCP *:www (LISTEN) apache2 14633 www-data 3u IPv6 1210044289 TCP *:www (LISTEN) apache2 14633 www-data 28u IPv6 1210440119 TCP server:www->188.8.131.52:17518 (ESTABLISHED) apache2 16314 root 3u IPv6 1210044289 TCP *:www (LISTEN) Surprise, surprise. We find the same processes found in the top output again. And we also see that they're not listening to new http connections anymore (meanwhile 3 new child processes were spawned). But the old processes are still open due to a CLOSE_WAIT status between Apache and the Googlebot. The problem now is: What can I (and anyone else who experiences this problem) do? By definition a CLOSE_WAIT means that the remote side has closed the connection, but the local process still kept it open. Why does it only happen with Googlebot (which could prove an improper CLOSE from the remote side)? If anyone has a solution for that problem, please let me know. And no, blocking Googlebot is not an option. As of now the only temporary solution is to kill the affected child processes. This is not dangerous since all other http connections are managed by the new spawned processes, but it is not nice (remember, killing is not nice). Update February 7th 2011: I was able to identify the reason and solve this, see Googlebot and Apache CLOSE_WAIT's: SOLVED! No comments yet. AWS Android Ansible Apache Apple Atlassian BSD Backup Bash Bluecoat CMS Chef Cloud Coding Consul Containers CouchDB DB DNS Database Databases Docker ELK Elasticsearch Filebeat FreeBSD Galera Git GlusterFS Grafana Graphics HAProxy HTML Hacks Hardware Icinga Icingaweb Icingaweb2 Influx Internet Java KVM Kibana Kodi Kubernetes LXC Linux Logstash Mac Macintosh Mail MariaDB Minio MongoDB Monitoring Multimedia MySQL NFS Nagios Network Nginx OSSEC OTRS Office PGSQL PHP Perl Personal PostgreSQL Postgres PowerDNS Proxmox Proxy Python Rancher Rant Redis Roundcube SSL Samba Seafile Security Shell SmartOS Solaris Surveillance Systemd TLS Tomcat Ubuntu Unix VMWare VMware Varnish Virtualization Windows Wireless Wordpress Wyse ZFS Zoneminder
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100232.63/warc/CC-MAIN-20231130193829-20231130223829-00798.warc.gz
CC-MAIN-2023-50
3,218
24
http://waterwitch.tv/blog/2019/battleship-%282012%29---123movies-5428a6
code
I know nothing about the Unity platform so was confused by each mention of it. Leave a comment on paragraph 62 0 Leave a comment on paragraph 48 0 Digital Pedagogy in the Humanities A Modern Language Association Book Project. 1 Sept 2015. Albany, NY: SUNY Press, 2009. Issue 13 of the journal Hyperrhiz, themed “Kits, Plans, and Schematics,” curated nine projects that combined DIY maker culture with humanities scholarship. It allows visitors to guide themselves through the 3D recreation of the township and learn about the historical significance of various places in Soweto. @tgirlinterruptd, et al. Nakamura, Lisa and Peter Chow-White (eds). Similar to Invisible Australians, this is an artifact that represents activist technology through making these narratives visible and available. Leave a comment on paragraph 72 0 Nakamura, Lisa and Peter Chow-White (eds). The selection of artifacts that follow are meant to represent broadly the kinds of coursework, projects, and work spaces comprising the pedagogical shift to making and maker culture in the digital humanities. “The Maker Movement in Education.” Harvard Educational Review (Winter 2014): 495 – 504. Print. ¶ 76 Leave a comment on paragraph 46 0 It also provides a useful index of scholars working on this topic, many of whom are people of color. All Sources Forks Archived Mirrors. Leave a comment on paragraph 57 0 Modern Language Association ¶ 71 As a sign of the eclecticism of many makerspaces, it is not uncommon to find a white board covered in anything from technical diagrams, storyboarded drawings, and lines of code, to poetic verse, mathematical equations, and wireframe mockups. https://www.adafruit.com/educators/, ¶ 45 Alexander & Davis. Or Rethinking the Histories of Race and Computation" Debates in the Digital Humanities ed: Matt Gold. ¶ 57 ¶ 48 http://dhdebates.gc.cuny.edu/debates/text/29. Each keyword will have a curator who will briefly introduce a particular term in the context of teaching and learning and then provide ten pedagogical artifacts, such as syllabi, prompts, exercises, lesson plans, and student work drawn from actual courses, classrooms, and projects across the humanities. It also draws upon Jesse Stommel’s concept of “critical digital pedagogy,” which “centers its practice on community and collaboration; must remain open to diverse, international voices […]; will not, cannot, be defined by a single voice but must gather a cacophony of voices; must have use and application outside traditional institutions of education.”, ¶ 9 ¶ 25 This artifact represents scholarly activist technology in that it encourages students to be pulled into a larger network of Afrodiasporic knowledge production, and to discover that faculty of color are plentiful throughout the academy. Sample assignments: 1) students could be tasked with creating a literature review on topics within Atlantic African diaspora history through researching this directory. Race After the Internet New York: Routledge, 2011. Boston: Beacon Press, 1997. ¶ 72 ¶ 50 Makerspaces are a locations in which the profound excitement about which Ramsay wrote can be found. ¶ 12 Minneapolis: University of Minnesota Press, 2012. 84:4 (Winter) 2014. Web. Student intern Kevin Xiao (Hamilton ‘15) participated in this project as a modeler and virtual environmental artist for two years, using blueprints and architectural drawings to model accurate recreations of the traditional homes of the Soweto township in Johannesburg, South Africa, which were then imported into the Unity game engine. These projects included, among others, an arduino-powered tone-typing QWERTY keyboard exploring textual and aural modalities of composition, an arduino-powered surveillance book that registered motion and location, and a Makey Makey powered conductive tape and Play Doh keyboard embedded in an old thesaurus challenging participants to consider algorithmic text input. Web. 1 March 2016. ¶ 4 Leave a comment on paragraph 4 0 Makerspaces are an increasingly important location for digital pedagogy in the humanities for several reasons. https://twitter.com/search?f=realtime&q=%23thistweetcalledmyback&src=typd 3 Apr. There seems to be a bit of a disconnect here right now between the definition of communicative competence that language learning relies on and further discussion of resourcefulness and usefulness of digital tools. Digital Pedagogy in the Humanities: Concepts, Models, and Experiments is an open, collaborative digital humanities project focused on the intersections of digital technologies with teaching and learning. ¶ 38 Another Reason: Science and the Imagination of Modern India. Leave a comment on paragraph 76 0 Everett, Anna. Leave a comment on paragraph 70 0 ¶ 55 ¶ 64 ( Log Out / A possible assignment might be for students to work on the archive demo along with Google maps to compare how Soweto has changed since 1976, and to discuss the implications of these changes. You are currently reading Digital Pedagogy in the Humanities at Rebecca Frost Davis. since there is no aspect of language not included in “linguistic.”.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300805.79/warc/CC-MAIN-20220118062411-20220118092411-00112.warc.gz
CC-MAIN-2022-05
5,148
4
https://github.com/mdevan
code
- Joined on Jul 2, 2008 - java-memcached-client 1 A simple, asynchronous, single-threaded memcached client written in java. - gcm 0 Google Cloud Messaging for application servers implemented using the Go programming language. - go-http-auth 0 Basic and Digest HTTP Authentication for golang http - go-sqlite3 0 sqlite3 driver for go that using database/sql - go-v8 0 Go binding for v8
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257828314.45/warc/CC-MAIN-20160723071028-00202-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
384
7
https://slackalaxy.com/2019/07/14/disk-cloning/
code
Disk cloningPosted: 2019-07-14 Filed under: system | Tags: clone, dd, disk Leave a comment About half a year ago, I needed more space for my ThinkPad x230 laptop. I had a 256 GB SSD, running Slackware 14.2, so I bought a new SSD of 1 TB. I did not want to go through all the hustle of repartitioning, reinstalling and reconfiguring, therefore I also bought a Fujitech Clone Dock 2. It is fairly simple to use, just place the disks in the correct order: Disk 1 (256 GB) to be cloned onto Disk 2 (1 TB), turn it on and click the Clone button twice. However, there is no way to tell the device to clone a specific partition only. Therefore, I decided to use the dd tool. I have used it only for preparing a booting USB stick, so I searched a bit and found nice instructions in the excellent Arch Linux Wiki. There’s this warning, I have to quote: As with any command of this type, you should be very cautious when using it; it can destroy data. Remember the order of input file (if=) and output file (of=) and do not reverse them! Always ensure that the destination drive or partition (of=) is of equal or greater size than the source (if=). I used the Fujitech device to have both disks connected to my computer by USB3 and the system saw Disk1 and Disk2. To clone a specific partition, sda1 (from Disk1) to sdb1 (from Disk2), I used the following command: dd if=/dev/sda1 of=/dev/sdb1 bs=64K conv=noerror,sync status=progress Then, I wanted to clone an entire hard disk (Disk 1), as well as the MBR, to another (Disk 2). That’s what the Fujitech device does, but I wanted to do it by dd. Following the instructions of the Wiki for cloning an entire hard disk, I did as root: dd if=/dev/sda of=/dev/sdb bs=64K conv=noerror,sync status=progress The Arch Wiki has the options explained, so let’s put them here, too: bs=sets the block size. Defaults to 512 bytes, which is the “classic” block size for hard drives since the early 1980s, but is not the most convenient. Use a bigger value, 64K or 128K. ddto continue operation, ignoring all read errors. Default behavior for dd is to halt at any error. syncfills input blocks with zeroes if there were any read errors, so data offsets stay in sync. status=progressshows periodic transfer statistics which can be used to estimate when the operation may be complete.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948867.32/warc/CC-MAIN-20230328135732-20230328165732-00765.warc.gz
CC-MAIN-2023-14
2,318
19
https://community.sdl.com/ideas/translation-productivity-ideas/i/trados-studio-ideas/source--target
code
I would like to propose a display filter for Studio in which source = target. In most cases, these have been created inadvertently and therefore it would be great if you could plainly see if there are any such segments in a file. Sometimes we receive prepared files from clients in which by default source = target. These were created by another program. It would be a good idea to create a batch task which deletes all target segments. This could also be an option for project preparation. It would also be nice to be able to remove all TUs in a TM in which source = target. In addition, I would like a TM filter that searches for true duplicates, not multiple translations for the same segment. I believe these were created in the past by a bug in Studio. Setting to delivered partially - see comment
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912203991.44/warc/CC-MAIN-20190325133117-20190325155117-00029.warc.gz
CC-MAIN-2019-13
802
3
https://www.cnet.com/forums/discussions/how-do-i-get-rkill-to-run-380327/
code
exeHelper works like Rkill and you can download two format: Also, please use the guide in http://www.bleepingcomputer.com/virus-removal/remove-malware-defense There's a method to do before using Rkill. If you've done that, see below: See if exeHelper will run or if the guide will help. If not, I suggest posting your log in http://www.bleepingcomputer.com/forums/forum22.html Please mention to them the tools you've tried, including Rkill. Hi. I have Windows Vista and am trying to run rkill because I have Malware Defense. I had Internet Security 2010 as well, but I was forced to do a system restore and that went away (I think). When running Windows normally, it would not let me run any version of rkill because it said, "pev.exe has stopped working, windows will try find a solution" etc. I have tried all four. I thought I would try to run it in safe mode, but now the black screen will pop up and then immediately disappear. Can I run the mbam program without doing rkill first? Or is there another way to run rkill? I don't know if these things are also important, but I have also tried the "exterminate" from the PC Pitstop program, and it will not run either. Also, whenever I log in it says, "Windows Defender User Interface has stopped working" and at one point I got a message that said "MSASCui.exe failed to initiate (0x80000003)" Thanks for the help in advance! Erin
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501173872.97/warc/CC-MAIN-20170219104613-00389-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
1,383
6
https://www.csusb.edu/academic-technology-innovation/news-events/blog/524783
code
Workshop recordings: Zoom and alternate teaching modalities Zoom and alternate teaching modalities: In this 30-minute basic-to-intermediate workshop we will demonstrate how to set up and schedule a Zoom meeting through MyCoyote; how to link a Zoom room to your Blackboard course; and how to record and share a Zoom session with your students. In addition, we will cover some additional Zoom tools which may be useful in instruction and communication, such as the Participant Panel (how to manage users); the Chat Panel (how to “text” users); Share Screen (sharing content and facilitating student sharing); and Breakout Rooms (creating groups among Zoom participants for virtual group work). We will also touch on Zoom’s Polling feature and its Closed Caption function. Zoom and alternate teaching modalities, 3/11 am: https://csusb.zoom.us/rec/share/3ucrDK3O51lIfa-dtEr6XIclF4j8aaa813NNq_sIyUn_OrX2Eg2jHKLO-XLHruL4?startTime=1583943143000 Zoom and alternate teaching modalities, 3/11 pm: https://csusb.zoom.us/rec/share/4pxSbLDe5F1ISc_kw2SFS5QqHrnDeaa813JP-PBbzktRyzQqs9yOXSjVxy50b4en Zoom and alternate teaching modalities, 3/12 am: https://csusb.zoom.us/rec/share/xf1nAK7f9W1JWZGdwRH9Bf4ODqH4aaa813RN_vZczR0BmuKRaCFdTrxZqFXbl529
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400210996.32/warc/CC-MAIN-20200923113029-20200923143029-00311.warc.gz
CC-MAIN-2020-40
1,237
5
https://community.atlassian.com/t5/Bitbucket-questions/When-several-branch-permission-patterns-are-matched-what-is-the/qaq-p/186856
code
Bitbucket's branch permissions will first find all matching branch permission rules, then check if for any of those rules an exemption exists for the user attempting the action. If no exemptions exist, the user is prevented from carrying out the action. If an exemption exists, the action is allowed to carry on. For example if you have a rule preventing all writes to all branches for everyone, and another rule preventing all writes for the pattern 'bugfix/*' with the user 'admin' exempt, 'admin' could write to all branches and tags that start with 'bugfix' (and nothing else). I hope that answers your question, This community is celebrating its one-year anniversary and Atlassian co-founder Mike Cannon-Brookes has all the feels.Read more Bitbucket Pipelines helps me manage and automate a number of serverless deployments to AWS Lambda and this is how I do it. I'm building Node.js Lambda functions using node-lambda ... Connect with like-minded Atlassian users at free events near you!Find a group Connect with like-minded Atlassian users at free events near you! Unfortunately there are no AUG chapters near you at the moment.Start an AUG You're one step closer to meeting fellow Atlassian users at your local meet up. Learn more about AUGs
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125947705.94/warc/CC-MAIN-20180425061347-20180425081347-00293.warc.gz
CC-MAIN-2018-17
1,250
11
http://www.terraforums.com/forums/reptiles-amphibians-and-other-terrarium-dwelling-animals/92405-giant-snake.html
code
I know alot of people here are going to say this is another joke. After the last April fools joke I pulled I seem to have lost creditability here. I swear every word of what I am going to post here is true. Look at the date, it's not April 1st. I have always had this memory, I have always known that this had to be a real event but I had no proof or anybody else to back it up. First I will tell what I remembered. I have no idea how old I was. I'm guessing about 5 or 6, I may have been younger. I remember being taking in my moms car to my step grandparents house. (Yes the ones that were married 71 years) The road in front of their house is a curve. I remember being taken to the curve. There was a snake on the curve. I remember this snake as being huge. I remember the snake reaching from one side of the curve over half way to the other. From one side of the curve to the other is about 25 ft. It was about a big around as 3/4 the size of a soccer ball. I remember it being alive and moving. There were people standing around this snake. That is my memory. I have often thought about this memory and I have tried to make sense of it, and I have tried to explain it in my own mind. Since I thought there was no known snakes that would be that size native to the area, I had come up with two possibilities. One, this was a dream or a figment of my imagination, even though it seemed very real and I have no history of remembering things that never happened. Or two, It was an adult python or boa that had escaped from somewhere. Now the second part of the story. While I was at home this week, I was talking to my mom and the topic came to snakes. I thought of the memory that I have had so I asked her about it. She told me that there was a huge snake that was caught and killed in a swamp in Abbottsburg, NC (about 5 miles from where I remember this). The snake was brought to the same place that I had remembered it. It was stretched from one side of the road to the other. She was told it was a rattlesnake. She said it was over 15ft. long and about as big around as my leg. The only difference from what I remember and what she told me is that the snake I remember was alive. I want to know what everybody else thinks about this story.
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719566.74/warc/CC-MAIN-20161020183839-00194-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
2,246
8
https://networklibraryapkt.web.app/c-programming-language-full-version-free-software-download-179.html
code
Download Borland C++ PC-Software for Windows. it is a C and C++ programming environment for MS-DOS and Microsoft Windows. It was the successor to Turbo C++. C Software | Download C Programming Software | Soft 32 C programming software is available for download at Soft32. Visit the site today to see all the c software that can be downloaded and get started! Software Free Download | Soft32.com DEV-C++ 5.11 Free Development Environment (IDE) for the C/C++ programming language. Updated: April 1 st 2016 . 584,755 total downloads. 146 last week. C Programming Language Software - Free Download C C Programming Language Software - Free Download C Programming Language - Top 4 Download - Top4Download.com offers free software downloads for Windows, Mac, iOS and Android computers and mobile devices. Visit for free, full and secured software’s. C/C++ software (Free download) - Windows - CCM Apart from Visual Basic, C + + can also be used to design visual programs. However, developers can use any programming software. Visual C + + Express can design interactive visual applications. Visual C + + Express is integrated with License: Free OS: Windows XP Windows Vista Windows 7 Windows 8 Windows 10 Language: EN Version: 2017 Download C-Free 5.0 C Programming Tutorial (KR version 4), M. Burgess. This is a C Programming Tutorial for people who have a little experience with an interpreted programming language, such as Emacs Lisp or a GNU shell. Its aim is to teach C to a beginner, but with enough of the details so as not be outgrown as the years go by. Download Python | Python.org The official home of the Python Programming Language. Notice: created in the early 1990s by Guido van Rossum at Stichting Mathematisch Centrum in the Netherlands as a successor of a language called ABC. Guido remains Python’s principal author, although it includes many contributions from others. On the version-specific download pages C Programming Language - Free Books at EBD (6039 views) An Introduction to the C Programming Language and Software Design by Tim Bailey - University of Sydney, 2005 This textbook is a thorough introduction to the C programming language, with an emphasis on software design and code organisation. The author shows how to apply the language features to build scalable modular software systems. Free programming language - Learn More - Just BASIC Just BASIC v2.0 - Easy and free programming! Just BASIC is a programming language for Windows. It is completely free and it is suitable for creating all kinds of applications for business, industry, education and entertainment.. Where does Just BASIC come from? Just BASIC is a simplified version of our Liberty BASIC software. . Liberty BASIC has been a popular language since autoclicker free download. AutoClicker A full-fledged autoclicker with two modes of autoclicking, at your dynamic cursor location or at a p Raspbian is the Foundation's official supported operating system. You can install it with Noobs or download the image below. A list of awesome applications, software, tools and other materials for Linux distros. - luong-komorebi/Awesome-Linux-Software software - Free download as PDF File (.pdf), Text File (.txt) or read online for free. useful materials DebugTooluser - Free ebook download as PDF File (.pdf), Text File (.txt) or read book online for free. Lua was originally designed in 1993 as a language for extending software applications to meet the increasing demand for customization at the time. Harbour code using the same databases can be compiled under a wide variety of platforms, including Microsoft Windows, Linux, Unix variants, several BSD descendants, Mac OS X, Minix 3, Windows CE, Pocket PC, Symbian, iOS, Android, QNX… Welcome to Python.org Download. Python source code and installers are available for download for all versions! Latest: Python 3.8.1. The mission of the Python Software Foundation is to promote, protect, and advance the Python programming language, and to support and facilitate the growth of a diverse and international community of Python programmers. C (programming language) - Wikipedia C (/ s iː /, as in the letter c) is a general-purpose, procedural computer programming language supporting structured programming, lexical variable scope, and recursion, while a static type system prevents unintended operations. By design, C provides constructs that map efficiently to typical machine instructions and has found lasting use in applications previously coded in assembly language. How to Learn C Programming for Free The recipe for learning C programming for free. Alison is the best outlet to start learning C programming through video tutorials. Learn C is the best outlet to start learning C programming through an interactive course. Learn C Online is the best outlet to start learning C programming through a text-based tutorial. Languages: English, Swedish, German, French, Greek This version of Pelles C supports Windows Vista/7/8/10. Please uninstall any older version of Pelles C
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103347800.25/warc/CC-MAIN-20220628020322-20220628050322-00457.warc.gz
CC-MAIN-2022-27
5,024
6
http://rickrainey.com/2013/04/12/new-role-new-blog/
code
New Role, New Blog Last month, I changed roles in Microsoft, realizing a long-time ambition to join the Developer and Platform Evangelism (DPE) organization working in a technology that I’m very passionate about. It is a distinct privilege to join such a talented group. In this role, I will be working with Commercial Software Vendors (CSV’s) who are building amazing applications on the Windows Azure Platform. The innovation in cloud computing is enabling development of applications that previously has been very difficult, cost prohibitive, or impossible. It’s exciting to simply ponder the thought of how our industry has transformed and will continue to as a result of cloud computing. It’s even more exciting to be in the middle of it as it is happening. Leading up to the start of my new role, I began thinking about how I want to contribute to the success of Windows Azure and the developer community. One obvious choice is to blog about it which I’ll do here. What will the theme of my blog be? I decided it will be about things I’m learning in cloud computing and Windows Azure. And since I come from a developer background, it will have developer influences (of course) with code samples when possible. This is my passion and that is what I will try to stick too. I decided to title my blog Developer Learnings in Cloud Computing and Windows Azure. You would think with my last name being “Rainey” that I could come up with something clever. But, that’s not really my style. First post coming shortly…
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891814292.75/warc/CC-MAIN-20180222220118-20180223000118-00740.warc.gz
CC-MAIN-2018-09
1,534
6
https://forums.nasioc.com/forums/showpost.php?p=23242141&postcount=1
code
Hey guys, had posted up awhile back but I just moved to Utah. I'm living in Ogden just wanted to say hello. Seen a lot of Subies out this way. I drive a blue bugeye w/V7 wheels. Don't know anyone west of the Mississippi really so if you are up for anything just let me know. I love to dirtbike, ski and generally be outdoors and have fun so hopefully I'll fit in. Also if anyone knows of a tuner that can help me out I'd appreciate it. I think I should get a new tune since now I'm on your crappy 91 octane stuff. Car seems to be running fine as of now but I don't want to take a chance. I'd rather stay opensource since thats what my tune is now. Any suggestions would be appreciated.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218191405.12/warc/CC-MAIN-20170322212951-00490-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
685
2
https://www.slideshare.net/kynbit/nicovideo-239920
code
Abstract : Recently, User Generated Content(UGC) Video on Demand(VoD) services such as YouTube become popular all around the world. In Japan, Nicovideo which is one of UGC VoD service gathers more attention than YouTube. Users in Nicovideo make new contents by adding new features to exisiting contents and categorize contents by using shared tags. These tags cleary represent what the content is. In this paper, we analyze tag co-occurring networks on Nicovideo and extract characters and relations of contents. As a result, it is obserbed that not only category tags but also user defined tags appear as a center of contents. In additon, we can categorize tags using relations between tags.
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827727.65/warc/CC-MAIN-20181216121406-20181216143406-00143.warc.gz
CC-MAIN-2018-51
692
1
https://review.tumbleweed.boombatower.com/2018/11/22/release.html
code
no relevant mails 1116995: packagekit leaking file descriptors (and huge log file) ? 1117045: Option “shell” in linuxrc fallback menu fails with “sh: line 0: exec: setctsid/setsid: not found” 1117063: systemd.spec: the test for figuring out if /etc/machine-id is writable is incorrect 1117095: vc4: Failed to allocate from CMA, graphics freezes 1117113: ruby2.5: make: invalid option – ‘x’ in build 1117121: [METABUG] Update guile to 2.2 on Tumbleweed 1117208: Yast2-country Keyboard Settings are Erroneous - 1117214: Out of date package: openSUSE:Factory/libblockdev is out of date - 1117215: Inconsistent Results from External Displays using Energy Saving mode 1117216: Snappy: cannot determine nfs usage in generateSystemKey 1117217: rpcbind fails to start (tumbleweed snapshot 20181120) 1117223: package bpftrace 1117224: ACPI Warning: SystemIO range 0x0000000000000428-0x000000000000042F conflicts with OpRegion 0x0000000000000400-0x000000000000047F (\PMIO) (20180810/utaddress-213) 1117235: online_update patches instead of dup on tumbleweed rendering it useless The release was either never snapshotted or has been removed.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337731.82/warc/CC-MAIN-20221006061224-20221006091224-00755.warc.gz
CC-MAIN-2022-40
1,144
6
https://www.actdental.com/ce
code
GET YOUR CE CREDITS! In order to receive your CE CREDITS you must attend the course and complete this form. Please enter the START and END code for each course to prove that you have completed the course. We will submit CE CREDITS in the coming weeks. YOU WILL NEED TO DO THIS FOR EACH COURSE!Enter Course Code
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107878879.33/warc/CC-MAIN-20201022024236-20201022054236-00273.warc.gz
CC-MAIN-2020-45
310
4
https://www.ubuntugeek.com/how-to-install-psx-1-13-on-ubuntu-lucidmaverick-i386amd64-using-deb-package.html
code
How to install pSX 1.13 on ubuntu Lucid/Maverick (i386/amd64) using deb package pSX emulates the Sony Playstation, pretty much everything is emulated (to my knowledge) and most games run perfectly. It runs under Windows and Linux.One thing that should be noted is that pSX DOES NOT use plugins.The emulator is completely self contained. The emulator has been designed to be as easy and unobtrusive to use as possible -- in most cases you will not need to configure anything to use it (except maybe the controls). Install pSX 1.13 on ubuntu Lucid/Maverick Download deb packaged from here Please also note that lib32gtkglext1_1.2.0-3.2-amd64.deb (included in amd64 compressed file) must be installed for 64bit/amd64 systems. This is not needed for 32bit systems. NOTE: While running, due to a conflict with pSX and pulseaudio, pulseaudio is disabled while running pSX. This may make any program using it crash and will probably make the mixer/sound volume control unavailable while pSX is running. It should return to normal when pSX is closed. If not, close any program currently using sound. If that doesn't work, hit alt+f2 and type in "pulseaudio" (without quotes). If the mixer does not start up next time you start Ubuntu, add the pulseaudio command to the startup applications or to /etc/rc.local
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100781.60/warc/CC-MAIN-20231209004202-20231209034202-00067.warc.gz
CC-MAIN-2023-50
1,301
8
https://viralchop.com/top-10-best-horror-movies-of-2020/
code
Hello guys! In this video we'll be counting down our picks for the Top 10 Best Horror movies of 2020 so far.Our countdown includes “The Invisible Man", “Gretel & Hansel”, “Swallow”, Color Out of Space ”, and more! What is your favorite Horror Movie of 2020? Let us know in the comments! Thanks for watching Top 10 video.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039526421.82/warc/CC-MAIN-20210421065303-20210421095303-00243.warc.gz
CC-MAIN-2021-17
332
2
https://www.rozee.pk/ZH/oma-pakistan-private-limited-jr-software-developer-karachi-jobs-1177194.php
code
Position: Software Engineer (C,C++) Experience : Entry Level/ Fresh B.E/ B.TECH/ B.S (Computers) - We have multiple openings for Software developers to work with us on different local and international payment projects. - Candidates with exceptional expertise and Good Knowledge: C, C++ are encouraged to apply. Required Skills & Qualifications - Should be computer science graduate (BS/BCS/BE(Software Engineering)/MS(Software Engineering)/MCS) - Should know good programming concepts of C / C++,Data Structures, Strong OOP concepts. - Experience on IDEs (Eclipse or Visual Studio) - Good communication, coordination and interpersonal skills - Strong analytical ability - Should be quick learner - Team Player with positive attitude
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585025.23/warc/CC-MAIN-20211016200444-20211016230444-00319.warc.gz
CC-MAIN-2021-43
733
12
https://blog.vconsultants.be/
code
Deleting the datastore where a Content Library is hosted is probably not the best idea but it is resolvable. I recently experienced an issue within a HPE environment where vSphere Lifecycle Management fails to upgrade the firmware on a HP FlexFabric 534FLR-SFP+ Adapter. I’ll request Let’s Encrypt certificates via a ControlScript on two types of Virtual Services. My kubernetes app wouldn’t deploy because the default storage class was not specified when I created a TKG cluster on vSphere with Tanzu. Update Manager throws an error on a default vCenter 7 U1 install.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571502.25/warc/CC-MAIN-20220811194507-20220811224507-00668.warc.gz
CC-MAIN-2022-33
574
5
http://www.tomshardware.com/answers/id-2021859/wont-boot-past-bios-stuck-bios-screen-boot-menu-manuall-select-drive-boot-windows.html
code
I have just cloned my original HDD and installed a new SSD everything worked find, so i closed my pc started back up and adjusted the bios and it worked, however now when i try to start up my pc it just gives me the bios logo and options to press del, F12 and so on and in order to boot my pc i have to go into the boot menu in the bios and select the drive and then it boots just fine but for some reason it simply wont boot from the drive any suggestions so i unplugged my original drive which i had already formatted and it booted straight away so now im confused seem to have solved this but staring my pc without my old harddrive booted just fine turned off plugged back in my olf hard driver and no it booted just fine if anu1 has any suggestions as to what caused this and what to do if it happens again let me no More about :wont boot past bios stuck bios screen boot menu manuall select drive boot windows just sounds like your boot order got messed up. best way to prevent that is allways have boot drive hooked up to lowest sata port number (usully port 0 but sometimes 1). the bios will always look at port 0 first for boot device unless you change bios settings but to me its allways best to leave bios settings default and hook boot device to that port. im guessing when you changed bios settings the first time something didn't save right.
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049282327.67/warc/CC-MAIN-20160524002122-00093-ip-10-185-217-139.ec2.internal.warc.gz
CC-MAIN-2016-22
1,354
5
https://community.traefik.io/t/how-to-use-a-plugin-with-go-dependencies/11882
code
I am quite new to golang and had to develop a simple traefik plugin that sets a Header from a jwt claim. I am using github.com/golang-jwt/jwt for that. My problem is that when I launch traefik using the docker image and mounting /plugins-local/src I receive the following error. import "GitHub - golang-jwt/jwt: Community maintained clone of https://github.com/dgrijalva/jwt-go" error: unable to find source related to: "GitHub - golang-jwt/jwt: Community maintained clone of https://github.com/dgrijalva/jwt-go" I found in yaegi#656 that yaegi does not support yet dependencies. Is there a way to specify the GOPATH? so that I could do some go get in my image or mount a go env in the traefik image. Thanks for any hint or help.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662625600.87/warc/CC-MAIN-20220526193923-20220526223923-00036.warc.gz
CC-MAIN-2022-21
729
10
http://www.m3post.com/forums/showpost.php?p=11671250&postcount=48
code
Wow! This looks awesome. Love ITG filters...surprised no one has used them until now; at least branded as such. That plenum design, from a purely aesthetic point of view, is gorgeous. I'm sure it is functional also of course ; ) Brackets, integration, etc. looks very elegant! Very cool to see a screen capture here or there of the modeling, airflow, etc! I'm not a SC guy, but look forward to seeing these on some cars! Good luck with the final development gents!
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189031.88/warc/CC-MAIN-20170322212949-00078-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
464
7
https://forum.allaboutcircuits.com/threads/hi.14421/
code
Discussion in 'General Electronics Chat' started by javed8431, Sep 17, 2008. hi please i want to chargeing of an induter What do you mean with an induter? It doesn't ring a bell. Do you mean inductor? For inductors you can take a look at this page of teh EDUCYPEDIA.
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463612036.99/warc/CC-MAIN-20170529072631-20170529092631-00221.warc.gz
CC-MAIN-2017-22
266
5
https://www.nyjcecg.com/edlumni/simon-julian-lauw
code
Simon Julian Lauw Computer Science with minor in entrepreneurship ASEAN Merit Scholarship Chat with me My university application journey Well, being from H2 Computing class, I have known my goal for a long time. There are a few reasons why I am being so laser focused on this course. Firstly, the notion of coding, computing and mathematics really amaze me. Secondly, you can build cool apps, websites and products. Lastly, being in IT industry always excites me. It is tantamount to being int the frontier of cutting edge technology and research ( if you are able to do research ) which is pretty fun and amazing. You can even collaborate with other fields such as physics, designs and arts. Of course, to apply and getting accepted into this course may be challenging nowadays. But if you work hard, join a lot of events and really put your thoughts into it. Im pretty sure you can get it. While grades are important for being accepted, for me the more important things are experiences such as internship, projects and passions for computer science. Not only does one require talent, it is also a battle of hardwork and willingness. Life after NYJC Well I am yet to matriculate in August 2020. I am currently a research assistant at Bioinformatics Institute A*STAR Singapore, doing research about computational physics and computer vision. I also do part time teaching for whoever that might be interested ! I am really happy and willing to share my experience. Even the country is in a semi-lockdown mode due to COVID-19, working from home is surely an interesting and fruitful experience for me. My Future Plans Study at NUS, study QF if I have extra time. Tips for Juniors Do projects ! if you really like doing something, put a lot of efforts into it and be serious about it. Whether its photography, academics, sports or whatever field it is, what counts is your experience at the end.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474686.54/warc/CC-MAIN-20240227184934-20240227214934-00347.warc.gz
CC-MAIN-2024-10
1,892
12
https://docs.lightup.ai/docs/failing-records-query
code
Most metrics support a failing records query. A failing records query is a query that represents the set of records you want to see when analyzing an incident. If you enter a failing records query, when an incident is generated, you will see the query and the result of that query on the Failing Records tab of the incident. Note that Null % and Conformity metrics each have a default failing record query already set up, which displays rows associated with the incident. There's no need for you to create a failing record query for Null % and Conformity metrics unless you want something different from the default. You add a failing records query on the Configure Metric tab of a metric. Note that you cannot add an ORDER BY clause to a failing records query. - Find the Failing records query section and select Add +. The button text changes to Validate Query and a box appears for you to enter the SQL. - Enter the SQL for the failing records query in the box. When you are done, click Validate Query. If you are entering a query for a Null % or Conformity metric, it will replace the default failing record query. If you remove your custom query in this case, it will revert back to the default. - After you validate your query, save the metric. Updated 8 days ago
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100184.3/warc/CC-MAIN-20231130094531-20231130124531-00223.warc.gz
CC-MAIN-2023-50
1,269
7
http://www.karpa-cuxhaven.de/wordpress/2018/05/16/cappel-neufeld-timelapse/
code
Last test on this before vacation. The problem with manual mode during evening/morning hours is that the light drops resp. kicks in so drastically. After some further reading on the topic, the best way to avoid such is to switch to Aperture-priority mode during capture. However, this will introduce flickering which can be very annoying. After doing some tests with deflicker-software, I am pretty much satisfied with the output of TDLF. Of course, the direct light in the sun will still cause issues, but not as much. For the video I used the D2x with the Sigma 30f/1.4 all mounted on the AllView head.
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247522457.72/warc/CC-MAIN-20190222180107-20190222202107-00387.warc.gz
CC-MAIN-2019-09
604
4
https://excel.uservoice.com/forums/304921-excel-for-windows-desktop-application/suggestions/13778928-the-function-vba-format-should-be-part-of-the-exce
code
The function VBA.Format should be part of the Excel object model and not only the VBA language The Format (or VBA.Format) function is part of the VBA language, not the Excel object model. This means that this function is not available to .NET COM addins (VSTO, AddinExpress, Excel DNA). This can be a problem for the development of new addins using .NET or upgrading existing VBA addins to COM. Note that .NET has string.Format() and Microsoft.VisualBasic.Strings.Format() but neither of those has the same behavior as the VBA Format function especially with regards to dates. Note that there is a similar function that is part of the Excel object model: WorksheetFunction.Text(). However, this function still differs from the VBA Format() function. It would be nice if the Format function could also be included in the excel object model as WorksheetFunction.Format() so that it can be accessed from .NET addins
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154126.73/warc/CC-MAIN-20210731203400-20210731233400-00695.warc.gz
CC-MAIN-2021-31
912
4
https://techdocs.genetec.com/r/en-US/Security-Center-User-Guide-5.9/Triggering-one-time-actions-in-Security-Center
code
In Security Center, you can trigger a one-time, manual action from the notification tray. Although actions are usually triggered through event-to-actions, you can also trigger them manually from the notification tray if needed. What you should know For the following actions, only users who are online are available as recipients: - Clear tasks - Display an entity in Security Desk - Play a sound - Send a message - Send task - In the notification tray, click Hot actions (). - In the Hot actions dialog box, click Manual action. - In the Configure an action window, select an action type, and specify the additional settings required for the action. - Click OK. The manual action is triggered.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100508.53/warc/CC-MAIN-20231203193127-20231203223127-00393.warc.gz
CC-MAIN-2023-50
694
14
https://community.adobe.com/t5/acrobat-reader-discussions/obtaining-acrobat-reader-dc-msi-for-distribution-to-our-organization/td-p/13557910
code
We are trying to obtain an Adobe Reader DC .msi for distribution to our organization. Has anyone had success finding an .msi? Some of the links posted led to blank pages or led to dead ends. We have tried to extract the DC Reader .msi from the .exe and were unsuccessful. Any help would be appreciated. Thank you. Copy link to clipboard I thought you would get a link when granted a redistribution license. Am I wrong?
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100286.10/warc/CC-MAIN-20231201084429-20231201114429-00229.warc.gz
CC-MAIN-2023-50
418
3
https://biotapestry.systemsbiology.net/faq/FAQ-Data.html
code
Go to Main FAQ Question Page Note: This version of FAQ Answers: Experimental Data Entry and Presentation shows reduced-size screen shots. You can click on any image and see the full-size image in a separate window. To get the version with full-size images, go here. Although the raw perturbation data tables in BioTapestry are tagged as being "QPCR" data because of the original application to sea urchin studies, the framework is actually relatively generic, and should be able to store and present a variety of types of perturbation data. Please contact us if you think that some modifications to the framework would make it match your needs. No. While you can enter and edit raw perturbation ("QPCR"), temporal/spatial expression, and temporal input data using dialogs (available off the Data option on the main menu), the picture below highlights that there are several data file import options you can use instead. If you have raw perturbation ("QPCR") data, you can import it using either an XML data format or using two different comma-separated value (CSV) formats. The temporal/spatial expression and temporal input data can be imported using XML data files. To learn about this, work through the Dynamic Submodels Tutorial. Unfortunately, there is currently not a formal file format definition for these two files (e.g. a DTD). The two sample data files that come with the tutorial, the Time Course Data File and the Temporal Input Data File, provide good examples of these input files that you can use to build your own, though the latter does not show how to specify a repression input. The following file snippet shows how to do that: <temporalRange name="Gene 6" note=""> <inputTimeRange input="Gene 4"> <range region="A" minTime="4" maxTime="5" sign="repress" /> The experimental data display that appears when you right-click on a gene and select Experimental Data is configured using a "plug-in" architecture that can be customized by the user. Without modification, BioTapestry will use its built-in plugins to display: Raw perturbation ("QPCR") data Temporal/spatial expression data Temporal input data Plain text (actually very simple HTML: it supports italic, bold, paragraph, and line break tags). To enter this text, right-click on a gene, choose Properties..., and select the Text Annotations tab. Very simple web pages specified by URLs (described below) The first four of these different types of built-in displays are shown below: As the last entry above indicates, starting in Version 3, the Experimental Data display can show very basic web pages. To enter a series of URLs, right-click on a gene, choose Properties..., and select the Data URLs tab as shown below: The web page specified by the URL will then appear in the data display. As shown below, the left window is a web browser, the right window shows how this web content is incorporated into the BioTapestry Experimental Data window: The dialog notes there are certain web page restrictions, which are listed below. The design intent is that a lab using this feature would set up a web server that hosts a very basic page or set of pages for each gene or node of interest. It is not intended to provide a mechanism to show arbitrary pages off the web, as it is unlikely that the following restrictions would be met. Embedded images in the page should be specified using absolute URLs. There should not be any embedded hypertext links. The Experimental Data display does not support even basic web navigation, so clicking on a link is a one-way trip. If you are creating a set of pages to be used by a network that you are going to share over the web using the BioTapestry Viewer (as opposed to the Editor), they must be located on the same web server as the one hosting the Viewer. There are security restrictions imposed by Java that prevents an unsigned program (such as the Viewer) from accessing any web server except the one it originated on. Since the BioTapestry Editor is signed, it is not restricted in this fashion. The new URL option probably provides you with enough flexibility to display what you need, but if you want to add additional custom data displays to the experimental data window, there are example plug-ins in the source code tree, which is available here. Starting with version 2, users are no longer restricted to using hours for the time units. Units from seconds to years are available. Also, the user can specify numbered or customed named stages as the time units. Before you enter any time-dependent data, you are required to set these units. You can do this by selecting Data->Set Time Units... from the main menu: There are a few different methods for tagging genes and individual links with graphical symbols that can be used to indicate confidence levels and/or experimental evidence, as the following picture shows: As shown above by the links that are inbound to the gene Target 1, individual links can be assigned ten different "evidence level" tags. The ten available "levels" have no predefined semantics; the user can use these designations to mean anything they wish. To assign a level to a link, right-click on the link tree, select Properties... from the pop-up menu, and go to the Cis-Reg. Evidence column of the table on the Model Properties tab. Then you can set the evidence from None up to Level 10 for each different link in the tree. When you are done, click OK: Note that the display of the different link evidence levels can actually take two forms: target diamonds and thick links. Which of these methods is used to show link evidence can be configured as a display option. From the main menu, select Edit->Set Display Options.... In the dialog, as shown below, set the Link Evidence Display to the desired setting. In this case, the setting Show diamonds and thick links uses both methods, as shown in the network pictured above. You can also choose either method, or hide the evidence display completely. Genes, such as Target 2 in the above network, can also be tagged with an evidence glyph, which again can be used to mean anything the user wishes (though BioTapestry uses the term Isolated when the glyph is selected). To set the evidence level for a gene, right-click on the gene, and set the Evidence level on the Model Properties tab: . Finally, if you have defined cis-regulatory regions for a gene, you can tag each region with an evidence tag. Region b of the Target 3 gene in the above network has been tagged in this fashion. To set the evidence level for a region, right-click on the gene, and set the Evidence level for each row in the Subregions table on the Model Properties tab: Go to Main FAQ Question Page
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100427.59/warc/CC-MAIN-20231202140407-20231202170407-00756.warc.gz
CC-MAIN-2023-50
6,670
28
https://news.povray.org/povray.binaries.images/message/%3Cweb.613bf6e0756c3d5acb705ca46e741498%40news.povray.org%3E/#%3Cweb.613bf6e0756c3d5acb705ca46e741498%40news.povray.org%3E
code
Alain Martel <kua### [at] videotronca> wrote: > > Op 09/09/2021 om 03:24 schreef Samuel B.: > > Unfortunately, the bump maps appear to be 8-bit grayscale, not 16-bit. (...) > It could be in 16 bits format, but with the lower byte zeroed. > zeroed lower byte, then, you'll see sharp spikes instead of a curve. Well, something's going on, as you can see in the attached image. I just tried it out in Blender, and it looked okay at /first/, but it's hard to tell since for some reason Blender inverts the bump map for half the moon. (The problem areas lay within the more null areas inside the inversion zone, and are thus difficult to examine.) Post a reply to this message Download 'moon-bittest.jpg' (75 KB) Preview of image 'moon-bittest.jpg'
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585231.62/warc/CC-MAIN-20211019012407-20211019042407-00646.warc.gz
CC-MAIN-2021-43
743
13
http://mathhelpforum.com/trigonometry/139959-making-trig-identity.html
code
Ok so I have to make up a trig identity The instructions are to start with a statement that I know is true, and than keep changing both sides to equivalent equations until it is complex So far I have: cos²x = cos²x 1-sin²x = cos2x + sin²x I need 2 more lines of changing them until the final identity.. But I don't know how to keep going!
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122955.76/warc/CC-MAIN-20170423031202-00351-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
342
7
https://www.computing.net/answers/hardware/w8-laptop-hdd-smart-error-error-remains-after-replacement/88520.html
code
|Did you do an actual clean installation, a restore from recovery DVD set, or clone the old drive with its errors onto the new drive?| Before installing the OS on the new drive, make sure that it is properly recognized in your BIOS. Run Memtest via a bootable CD to see if memory errors are being reported as hard drive errors. Let it run through all tests. Any errors are cause for replacing the memory. Rerun the test for one stick of memory at a time to determine and confirm the bad stick. Modern systems run memory in dual channel mode and for that to run at its most efficient, memory should be replaced as a matched set. Run the hard drive manufacture's hard drive test utility via bootable CD to verify the hard drives integrity. (Seatools for Seagate, etc.). This will give you the most reliable proof of a bad drive and the fastest possible way to get it replaced without charge. Original drives should be covered on the machines warranty for the first year (or extended period if you took that option) and other drives you purchased are covered by the drive manufacturer. Assuming that your laptop is under warranty (Windows 8), contact HP support with the results of the tests if the memory, like the drive is bad (unless you prefer to purchase more or better memory anyway). You have to be a little bit crazy to keep you from going insane.
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560281226.52/warc/CC-MAIN-20170116095121-00142-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
1,352
6
https://docs.uniqode.com/en/articles/8661656-why-did-uniqode-s-malware-detection-system-flag-my-link-as-a-threat
code
Uniqode uses Google Web Risk to detect URLs. Google Web Risk is an enterprise security product that helps Uniqode check URLs against Google's constantly updated lists of unsafe web resources. It’s like a big list of all the known dangerous places on the internet. Social engineering sites, like phishing and deceptive sites, and sites that host malware or unwanted software all come under unsafe web resources that Google Web Risk flags. If your QR Codes point to a URL found on this list, it is considered unsafe by Uniqode. As a result, your Uniqode account will be disabled. Here is a list of threat types that Google Web Risk categorizes unsafe web resources under.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817819.93/warc/CC-MAIN-20240421194551-20240421224551-00026.warc.gz
CC-MAIN-2024-18
671
3
http://ggftw.com/forum/833907-post39.html
code
Hi guys, I signed up on this site just to post here after the SDGO guides I found.. very excited to be able to play, even if being unable to read Chinese is a PITA even with said guides. I'd love to play with you guys some time, my MSN/Windows Live Messenger account is listed for those who'd like to contact me via that, and my IGN is Caserin (on Taiwanese SDGO, of course) in case I happen to be on when anyone else interested in playing together is too. I could use the help and company, especially since I apparently can't quest solo like I'd like to. Hard to work in a team when you can't understand a thing they say or most of the instructions just yet. =P Last edited by Zakerii; 05-16-2009 at 06:28 PM.
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988717954.1/warc/CC-MAIN-20161020183837-00039-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
710
2
http://www.webmasterworld.com/printerfriendlyv5.cgi?forum=49&discussion=4109864&serial=4110453&user=
code
-- The Macintosh Webmaster ---- Apple May Build a Search Engine to Shield iPhone Data From Google - 1:54 am on Apr 6, 2010 Apple doesn't have the RESOURCES? Are you saying that only PetroChina and ExxonMobil can even attempt to buy a bunch of cheap computers and write an algorithm to crawl the web? A bunch of cheap computers and an algorithm does not a modern search engine make :-) In this case resources actually means: hands on experience, research and years of trial and error (along with the reams of code that comes out of that). And before you say they can just steal some experienced people from Google or Bing... Think Cuil. Brought to you by
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394011278480/warc/CC-MAIN-20140305092118-00095-ip-10-183-142-35.ec2.internal.warc.gz
CC-MAIN-2014-10
653
8
https://www.techonia.com/619/enable-administrator-user-account-windows
code
By default the Administrator account (the super user) is disabled on Windows 7 and you have to create a general account (with Administrator privilege) during installation. It will make your system is not harmful this way. However, sometime you need to edit a file located in ‘C’ drive or system files and it would not be done if you are not using Administrator account. So how to enable the Administrator account on Windows 7? Here are the steps by step: Click Start menu (bottom-left Windows logo) and then ‘Control Panel’. Then click System and Security > Administrative Tools On the ‘Administrative Tools’ window, double click ‘Local Security Policy’ On the ‘Local Security Policy’ window, expand the ‘Local Policies’ and click on ‘Security Options’. On this window you can see whether the Administrator account is disabled or enabled. You need to create a password for the Administrator account to have the account able to log in to the system.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506329.15/warc/CC-MAIN-20230922034112-20230922064112-00798.warc.gz
CC-MAIN-2023-40
976
8
https://www.theverge.com/2014/3/12/5499904/onenote-for-mac-web-clipper-features
code
Microsoft is planning to release a OneNote for Mac app later this month. Sources familiar with Microsoft’s plans tell The Verge that the Mac application is part of a broader effort to expand the features and functionality of OneNote. While Microsoft originally released OneNote more than 10 years ago, the company has largely limited its note-taking app to Windows. Versions for iOS, Android, and the web have debuted in recent years, but the full desktop version has always been a paid app available for Office on Windows. That’s about to change too. We understand that Microsoft will release the OneNote for Mac app for free, and the company is also planning to make the Windows desktop version available at no extra cost. This marks a significant change in the way Microsoft manages OneNote, unbundling it fully from the cost of Office. We’re told part of this free approach is targeted at competitors like Evernote, but Microsoft is also adding additional features to entice people away from the competition. New web clipper feature also on the way A new web clipper feature is coming to OneNote soon that will allow users to clip parts of webpages directly into a OneNote. We’re told that Microsoft is creating browser extensions to allow clipping directly from the web browsers like Chrome, Internet Explorer, and Firefox. The feature is very similar to Evernote’s own web clipper, and we understand Microsoft will also allow OneNote users to email notes to its service to be included in a notebook.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476413.82/warc/CC-MAIN-20240304033910-20240304063910-00163.warc.gz
CC-MAIN-2024-10
1,515
4
http://www.myfconline.com/?do=view&type=member&member_id=36648
code
Name: Some name, just guess. Age: Old enough to subtract, already overaged to play those stupid barbies (Ew.), already old enough to go to a rock concert without my parents... But still not in the right age to drink (altough I do drink, he!) So yeah, guess. If you're smart enough, you'd know how old am I. Hobbies: Sleeping, fangirling Lucas Grabeel, Pete and Patrick Stump, Joel Madden, Narumi-sensei, read mangas of Naruto, KKM, Gakuen Alice (NarumixMisaki kiss rocks!), listen to music, sleep, reading labels of bottles, not sleeping during night (which is supposedly the time I should sleep), drinking cafe (Starbuck's Coffee to be more specific), watching TV. Music/Bands: Rock, pop, hip-hop, metal, a lot actually. And for the bands, Good Charlotte, Fall Out Boy, Linkin Park, 30 Seconds to Mars, Panic! At The Disco, Three Days Grace, The Academy Is..., Saliva... There's plenty more that I'm not gonna bother to put. I am not usually mean or hateful to others, but if people actually dare to tell me off, scream curses at me, and insult me then I'll explode.
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540501887.27/warc/CC-MAIN-20191207183439-20191207211439-00427.warc.gz
CC-MAIN-2019-51
1,067
6
https://www.knowprogram.com/python/sum-list-python/
code
How to Find the Sum of a List in Python | There are several methods to find the sum of a list in python. As we know the list is a container that stores elements of similar data types. Finding the sum of elements in a list python is an easy task. We will see these below Python program examples:– - Sum Of Two List In Python - Sum Of Two Elements In List Python - Sum Of All Elements In List Python - Python Sum List Of Strings - Python Sum List Of Numbers - Sum Of a List In Python Using For Loop - Sum Of a List In Python Using Function Find the Sum of Two List in Python Here, we find the sum of two lists and store it in a third list. # Python program to find the sum of two list # take list list1 = [3,6,7,8] list2 = [5,3,7,9] print("List 1:", str(list1)) print("List 2:", str(list2)) # find sum of a list result = for i in range(0, len(list1)): result.append(list1[i] + list2[i]) # print sum of a list print("Sum:", str(result)) We take three lists list1, list2, and result and initialize list1 and list2 with some elements and initialize the result as an empty list, use a for loop to iterate over the elements, and add corresponding elements. Sum of Two Elements in List Python Previously, we saw how to add two list elements. Now, we will demonstrate the python code, to sum up, two elements in the same list. We can add particular elements to the same list. The code is as follows. list = [0,8,6] list = list + list print(list) Here, our aim is to find the sum of two elements in the list. In the above code, we add the second element and the third element hence we get the result as 14. Sum of All Elements in List Python Now, we find a sum of all elements in a list. We have implemented this by using a while loop. sum = 0 elements = 0 list = [55, 33,22] while(elements < len(list)): sum = sum + list[elements] elements += 1 print("Sum of all elements:", sum) Sum of all elements: 110 First, we initialize sum to 0 and elements to 0 then we initialize list to sum array we iterate to while loop to add each element. Python Program to Sum List of Strings Now, we add a list containing integers, the python behavior of the data type will not change. def sum_list(list): return sum([int(i) for i in list if type(i) == int or i.isdigit()]) l1 = [5, 'know', 8, 'program'] l2 = ['python', 7, 'code'] print(sum_list(l1)) print(sum_list(l2)) The above program finds the digits in the list and then returns the sum. Python Program to Sum List of Numbers We use sum() to add a list of numbers, sum() reduces the code length and hence makes for the programmer. The sum() is a function in python that adds the given parameters. list = [6,5,4,3,2,1] total1 = sum(list) print(total1) total2 = sum(list , 11) print(total2) Sum usually takes two parameters: the list and a start that is sum(list, start), the start is the optional parameter when specified start the sum function adds the specified start number to the sum of the list. In the code, the sum of the list will be 21 but when the start is added we 32. Sum of a List in Python using For Loop We sum all the list elements using a for loop. i = [4,6,7,9] sum = 0 for number in i: sum = sum + number print("Sum of the list:", sum) Sum of the list: 26 The for loop iterates over each and every element and adds all the list elements. In the code, we have initialized i to list and sum to 0 then iterated in for loop to add each element. Sum of a List in Python using Function We define our own function to find the sum of the list. That is we use pre-defined functions to find the sum. def sum_of_list(list): Sum = 0 for i in range(len(list)): Sum = Sum + list[i] return Sum list = [3, 5, 4, 0] sum = sum_of_list(list) print("Sum of the list:", sum) Sum of the list: 12 We have defined sum_of_list() which takes a list as a parameter. In the function, we initialize the sum to 0 and use a for loop to iterate over the list and return Sum. Also See:- How to Swap Elements in List of Python If you enjoyed this post, share it with your friends. Do you want to share more information about the topic discussed above or do you find anything incorrect? Let us know in the comments. Thank you!
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100583.13/warc/CC-MAIN-20231206031946-20231206061946-00135.warc.gz
CC-MAIN-2023-50
4,142
42
https://www.omgubuntu.co.uk/2020/09/microsoft-edge-linux-preview-october
code
You won’t have to wait too much longer to try Microsoft Edge on Linux — a preview version of the browser will be available to download next month. Microsoft only confirmed its plan to bring Edge to Linux desktops late last year and had thus-far remain tight-lipped about precisely when and how the browser would be made available to users of Linux distros like Ubuntu. In blog post Microsoft reveal Linux users will be able to download a preview version of Edge for Linux from October. This is in keeping with their stated plan to release it ‘sometime in 2020.’ Microsoft CEO Satya Nadella reiterated the plan. Speaking at Microsoft Ignite Live he said: “We’re bringing Edge to Linux next month so we can now use it across every major platform, including Windows, macOS, iOS, Android, and Linux.” Where from? Well, Microsoft says you can get it from the Microsoft Edge Insiders site where it’ll be available in traditional Linux package formats ( .deb) and will support a wide range of distros, Ubuntu included. Since a handful of Microsoft apps (Skype, VSCode, etc) are available on the Snap store (and snapd is available on most Linux distros) I had been hoping that, like Firefox and Chromium, the browser would be available there. Perhaps in the future. Devs plan to make every Microsoft Edge feature available on macOS and Windows available in the Linux port. However, a handful of features (including sync, read aloud, and differential updates) won’t be available to start with. So there you have it: we now have a release date for Microsoft Edge on Linux. The only question now is: will anyone use it? Let me know your plans down in the comments!
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100575.30/warc/CC-MAIN-20231206000253-20231206030253-00428.warc.gz
CC-MAIN-2023-50
1,671
11
https://swift.libhunt.com/material-components-ios-changelog/119.0.0
code
Material Components for iOS v119.0.0 Release NotesRelease Date: 2020-11-06 // 4 months ago 🚀 This major release removes a deprecated MDCFloatingButton API, deprecates MDCTabBar, and provides ✨ enhancements to MDCButton and Tabs. 💥 Breaking changes setVisibleAreaInsets:forShape:inMode:API has been removed. Use 🆕 New deprecations 🗄 MDCTabBar has been deprecated. Please use MDCTabBarView instead. 🆕 New features MDCFloatingButton now has a shapeproperty that can be used to change the button's shape. MDCButton now has a visibleAreaLayoutGuideproperty that can be used to align content against the button's visible area using AutoLayout. - Add shape API to allow changing FAB's shape after it is initialized. (Wenyu Zhang) - Add visibleAreaLayoutGuide for providing anchors to the visible area when centerVisibleArea is set to YES. (Yarden Eitan) - ⚡️ Apply centerVisibleArea to a FAB with default shape example to reproduce shapeGenerator not getting updated issue on FAB. (Wenyu Zhang) - ⚡️ Fix cornerRadius change not triggering the update on shapeGenerator when centerVisibleArea is YES. (Wenyu Zhang) - 🗄 Migrate deprecated visibleAreaInsets API to centerVisibleArea API in FAB typical example. (Wenyu Zhang) - 🚚 Remove deprecated setVisibleAreaInsets:forShape:inMode: API. (Wenyu Zhang) - ⚡️ Update note on visibleAreaInsets to indicate it will be deprecated explicitly to prevent future usage. (Wenyu Zhang) - Fallback to scrollable when scrollableCentered is set and VoiceOver is running (Andrew Overton) - 🗄 Mark MDCTabBar as deprecated. (Alyssa Weiss) - 💅 Update handling of ripple so that, for non scroll layout styles, it shows ripple on touch down rather than touch up. (Alyssa Weiss) - ✅ add RTL snapshot tests (Andrew Overton)
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178351454.16/warc/CC-MAIN-20210225182552-20210225212552-00130.warc.gz
CC-MAIN-2021-10
1,784
24
https://jp.ifixit.com/Answers/View/368047/screen+won't+light+up
code
screen won't light up Laptop worked this am, but when I did a shutdown it took about 10 mins. Then tried to boot later and no display would light up. I tried all the solutions on the web I could find: Took out battery, tried powering up with just ac cable, no good. Tried powering up without ac cable, no good. Tried holding down power button for 30 secs. plugging in only ac cable, no good. Put battery back in and ac cable in, no good. Reseated the RAM (and blew out a lot of dust that was on the fan), still no good. Is it the motherboard? graphics card? Any help appreciated
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499826.71/warc/CC-MAIN-20230130165437-20230130195437-00777.warc.gz
CC-MAIN-2023-06
578
9
https://crystalshards.org/shards/github/84codes/k8s-syslog
code
Add the following code to your project's shard.yml under: to use in production - OR - development_dependencies to use in development Forwards logs from kubernetes to a (udp or tcp+tls) syslog server. It uses the Kubernetes pod log API to stream the logs from each container in each pod. A ServiceAccount with pod read access is required, but can also use kubectl proxy eg. for local development. See deployment.yml for an example. An environment variable named SYSLOG_ADDRESS is required, with the format
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711114.3/warc/CC-MAIN-20221206192947-20221206222947-00691.warc.gz
CC-MAIN-2022-49
504
9
https://news.ycombinator.com/item?id=1905291
code
* divergent, evolving VMs can't agree (not all NIH, see third bullet); * IPR concerns; * lowering from source over-constrains future implementation, optimization, and language evolution paths; * view-source still matters (less, but still). A binary encoding of JS ASTs, maybe (arithmetic coders can achieve good compression; see Ben Livshits' JSZap from MSR, and earlier work by Michael Franz and Christian Stork at UCI). But this too is just a gleam in my eye, not on TC39's radar. Meanwhile, we are making JS a lot better as a target language, with things like ES5 strict mode, the ES-Harmony module system and lexical scope all the way up (no global object in scope; built on ES5 strict), and WebGL typed arrays (shipping in Firefox 4). We have a Mozilla hacker, Alon Zakai, building an LLVM-based C++-to-JS compiler. Others are doing such things (along with good old SNES emulators and the like). So being a good mid-to-high-level, memory-safe compiler target language is on TC39's radar. Not to the exclusion of other JS desiderata, and never in a way that compromises mass-market usability or buy-by-the-yard rapid-protoyping "scriptability". But one among several goals.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243992514.37/warc/CC-MAIN-20210513204127-20210513234127-00245.warc.gz
CC-MAIN-2021-21
1,177
8
https://jacobsschoolofengineering.blogspot.com/2015/07/alumni-from-computer-science-research.html
code
|Bill Griswold during a talk.| After an introductory chapter about creating modifications, or “mods,” within Minecraft, the majority of their book focuses on learning programming concepts by building games inside of Minecraft, including: - Spleef: build an arena paved with blocks, which disappear every time every time players step on them. The goal is not to fall. Players can add other challenges to the game, such as creatures blocking their way. - Monster Arena: build an arena full of monsters. Players need to avoid the monsters to get through to the other side of the arena, where they break a block. They are then sent back to the starting point of the game, which gets even harder. - Capture the flag: create magic wands that can emit exploding projectiles. Players then need to use the wands to destroy their adversaries’ flags, while protecting their own. More info here. Android App Development" is in its third edition. The book's author, Michael Burton, earned a bachelor's in electrical engineering and a master's in computer science at UC San Diego--also in Griswold's research group. He is now director of mobile engineering at Groupon. His book includes easy-to-follow access to the latest programming techniques that take advantage of the new features of the Android operating system. Plus, two programs are provided: a simple program to get you started and an intermediate program that uses more advanced aspects of the Android platform. Learn more about Burton in this Q&A.
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578656640.56/warc/CC-MAIN-20190424194348-20190424220348-00064.warc.gz
CC-MAIN-2019-18
1,501
8
https://docs.uniot.io/uniot-core/scheduler/taskscheduler
code
Central Scheduler for Managing Tasks SchedulerTaskclasses form the core of time management within the Uniot Core. They are central to scheduling, executing, and managing tasks, thereby playing a vital role in the overall functioning of the system. The heartbeat of Uniot Core's time management, TaskSchedulermanages and orchestrates the execution of multiple tasks. It maintains a queue of SchedulerTaskobjects and is responsible for their scheduled execution. Static Factory Methods: static TaskPtr make(SchedulerTask::SchedulerTaskCallback callback): Creates a shared pointer to a SchedulerTaskwith a given callback. static TaskPtr make(IExecutor *executor): Creates a shared pointer to a SchedulerTaskwith a given executor. TaskScheduler *push(TaskPtr task): Adds a SchedulerTaskto the scheduler's queue for execution. TaskScheduler *push(ISchedulerKitConnection *connection): Enables the scheduler to add tasks via the ISchedulerKitConnectioninterface, providing flexibility in task sources. virtual uint8_t execute() override: Implements the IExecutorinterface. Executes all the tasks in the queue and returns the count of attached tasks. ClearQueue<TaskPtr> mTasks: A queue of scheduled tasks. using TaskPtr = SharedPointer<SchedulerTask>: Type alias for a shared pointer to a SchedulerTask. Used in the TaskSchedulerclass for managing individual task objects.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510319.87/warc/CC-MAIN-20230927171156-20230927201156-00255.warc.gz
CC-MAIN-2023-40
1,366
20
https://logotyp.us/logo/stacks/
code
Stacks (STX) Logo Stacks Logo Preview Learn more about the Stacks brand, find out the Stacks (STX) colors, and download a Stacks vector logo in the SVG file format. Stacks is a layer-1 blockchain solution that is designed to bring smart contracts and decentralized applications (DApps) to Bitcoin (BTC). These smart contracts are brought to Bitcoin without changing any of the features that make it so powerful — including its security and stability. These DApps are open and modular, meaning developers can build on top of each other’s apps to produce features that are simply not possible in a regular app. Since Stacks uses Bitcoin as a base layer, everything that happens on the network is settled on the most widely used arguably the most secure blockchain in operation — Bitcoin. The platform is powered by the Stacks token (STX), which is used for fueling the execution of smart contracts, processing transactions and registering new digital assets on the Stacks 2.0 blockchain. The platform was formerly known as Blockstack, but was rebranded to Stacks in Q4 2020 in order to “separate the ecosystem and open source project from Blockstack PBC” — the company that built the original protocols. The mainnet for Stacks 2.0 launched in January 2021.
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711552.8/warc/CC-MAIN-20221209213503-20221210003503-00723.warc.gz
CC-MAIN-2022-49
1,266
8
https://wetlook.biz/product/tasha-wetlook-set-5-2018/
code
Gorgeous Tasha today is just incredible! She dressed and with a book decided to swim in the pool. And after bathing, she will show us the elastic forms of her body. 152 hight quality wetlook photos and 05:58 min backstage video Subscribe to our channel and put like! Ahead is a lot of interesting! Thank you all for viewing!
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100551.2/warc/CC-MAIN-20231205140836-20231205170836-00332.warc.gz
CC-MAIN-2023-50
324
7
https://groups.io/g/RaspberryPi-4-HamRadio/message/8831
code
Re: New member David Ranch <dranch@...> Welcome to the group. For Fldigi, you're going to want to read this on how to compile your own version: http://www.w1hkj.com/doku/doku.php?id=howto:building_on_debian-ubuntu-mint There are LOTS of other websites that cover this topic as well. Basic searches like "Fldigi Raspberry Pi" will bring up nice sites such as: http://oh8stn.org/blog/2018/05/24/wsjt-x-fldigi-on-raspberry-pi/ For WSJT-X, binaries are already available: and an installation guide at https://physics.princeton.edu/pulsar/k1jt/Quick_Start_WSJT-X_2.0.pdf On 04/24/2019 01:39 AM, Randy Davenport wrote: Thanks for the add. I am interested in getting a pi for wsjt-x and fldifli. I am disabled and low income. Any help is appreciated.
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057787.63/warc/CC-MAIN-20210925232725-20210926022725-00532.warc.gz
CC-MAIN-2021-39
743
9
https://experienceleaguecommunities.adobe.com/t5/adobe-experience-manager/package-manager-issue/qaq-p/257368/comment-id/47065
code
I have a strange issue: cannot install or uninstall any package: Install Package: /etc/packages/my_packages/footer.zip Wed Jul 12 2017 12:32:45 GMT+0300 (FLE Daylight Time) Error during processing: So, somehow it looks for "bom/sun/org/apache/xerces/internal/xni/parser/XMLInputSource" But it should be "com/sun/org/apache/xerces/internal/xni/parser/XMLInputSource" I believe. Does anybody know why it happened and what how to fix it? AEM restart didn't help. But then I reboot my PC, the issue has gone. Have not idea what that was...
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141727782.88/warc/CC-MAIN-20201203124807-20201203154807-00262.warc.gz
CC-MAIN-2020-50
535
8
http://coollibrarianblog.blogspot.com/2006/08/providence-public-library-branches.html
code
When I started library school, I was offered a Prism Fellowship - I am probably the only person to ever turn it down. My main reason for doing so, at the time, was that it would have forced me to take only 2 classes per semester, and I didn't want it to take me 3+ years to finish my degree. Also, at the time, I wasn't overly sure that I wanted to work for Providence Public. Don't ask me why - that should have been my dream job. But some weirded out feeling told me to stay away from there. That was the first, and only, time in history that my intuition would serve me well. If you are not in/from Rhode Island, you may not be aware of the problems Providence Public has had in the past 2-3 years; in a nutshell, jobs have been drastically cut, branches closed, and leadership questioned. The "media coverage" link on this site will help you fill in the blanks... Today I received a link to a great site that talks about the condition and perhaps fate of the Branch Libraries of PPL - Not About The Buildings. Take a look - there's some moving, and important, stuff here.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676592636.68/warc/CC-MAIN-20180721145209-20180721165209-00587.warc.gz
CC-MAIN-2018-30
1,075
4
https://medium.com/@benediktlechner_32692/starbucks-coffee-discounts-63933c3c0ba2?source=read_next_recirc---------2---------------------34179847_7919_49c5_ac62_0a7008ece7f5-------
code
Starbucks coffee discounts The project provides data in order to analyze the effects of different kinds of offers, like discounts or adverts, on the behaviour of consumers. The main question is, what person should be provided with which offers to maxime their spendings. The main goal is that each customer is provided with an ideal set of offers, in order to maxime their spendings. For that, different approaches can be taken. I had a deeper look into two different ways. The first way I am going to look at the problem is using a neural network. I am going to feed it with the personal data provided (age, income and gender) as well as the personal history of each individual. Since the duration of each offer differs, and there are timeframes where no offer is active, the outcome I am trying to predict is the average amount of money spent per hour, given the current status of a person (which offers is that person provided with). The second approach will pe a purely statistical model. I am going to devide the data into several age and income bins and then have a look at the spendings for each group depending on the offer type they are provided with. The main metric to measure the neural network is the mean squared error. Since this is a regression model, it is the standard loss to take into account. To rate the model, I will take the R2_Score, which is 1 for a perfect model and can also be negative for a very bad model. A constant model would get a scor of 0. Data Exploration and Visualization Starbucks released a dataset, which could give an impression of that. It contains the data of 17,000 customers, 10 different kinds of offers and over 300,000 actions. The personal data given is age, gender and income. 2175 of these people in the dataset did not provide any personal data. The distribution of the other 14825 is shown in this graphic. There are ~8500 males, 6100 females and 200 with “other ”as gender. The general distribution looks like expected, with older people having in average a higher income than younger once. The offers in the dataset can be separated into three groups: informational, discounts and bogo (buy one get one free). There are 2 informational, 4 discounts and 4 bogos. Each offer as a duration it is valid, a difficulty and a reward (for the informational the reward is 0). There are also four times of events recognized. “Offer received”, “Offer viewed”, “Offer completed” and “Transaction”. The goal is to find out how much an individual will spend depending on the offers it received and viewed. The distribution of offers can be seen below: The number of times each offer was received does not differ much, which is a good starting point. What is quite interesting is that the view rates differ a lot. From ~35% for offer 4 up to >95% for offers 1, 5, 6, 8. Since offer 4 has the highest difficulty this raises the question, whether there is some sort of preview of the offers that is not recognized in the data. Unfortunately I cannot answer that. Looking at the completion of offers, there is quite a big difference as well (informationals cannot be completed). It looks like, that the main influence on total completion is the difficulty, with the exception of offer 6 who has many completions although it is rather difficult. In addition the offers with a lower reward seem to have a lot more completions than the once with higher rewards, which is quite interesting. My first approach to analyzing the data was to train a model, which takes the personal data like income, age and gender into account, but also the personal history of each individual. I split the data in a way, that each new status a person has (new offer viewed, offer expired or offer completed) will serve as a new datapoint. Therefore, over time for each person there will be a step-by-step history. I split the income and age into seven bins each. After that, I normalized the data between 0 and 1 for each column. All columns refering to time, all columns refering to money and all columns refering to numbers of viewing and offer, having an open offer or completing an offer were normalized together by the same values, in order to keep them consistant. The data was split into training and testing data with 25% of the users serving as testing group. Using this data I trained a Neural Network and tried to predict, how much money/h a certain person would spend, considering their current status (which offers are viewed and active), personal details (age, gender, income) and personal history (how much was already spent during which offer). The neural network is implemented using a scikit-learn MLPRegressor. The input vectors size is 69 (7 income bins, 7 age bins, 3 gender bins, number of times an offer was viewed, number of times an offer was completed timeperiod an offer was active, money spent while an offer was active, how many times the offer is open (all of them for each offer), the time spend while no offer is active and the money spent while no offer is active). The output is the average amount of money spent per hour given the current status. In order to get good results I did a gridsearch with three parameters to search: learning rates: 0.01, 0.005, 0.001, layers: (100, 100), (50), (50, 50), (50, 50, 50), (25) activation: tanh, relu The statistical model only takes those persons into account that provided personal data. It is devided into the three genders, 7 income and 7 age groups, being: age: < 30, 30–41, 42–53, 54–65, 66–77, 78–89, >89 income: <43k, 43k-55k, 56k-68k, 69k-81k, 82k-94k, 95k-107k, >107k Due to certain correlations, especially between age and income, not all combinations are having the same amount of data, as the plot below shows: Of course, the more data there is available, the more accurate the model can be assumed to be for each respective group. Results and Refinement of Neural Network Since the first model of the neural did not work out well, having an R2_score of 0.025, I tried to refine it. In a first step I removes the outliers. This resulted in a slightly worse model, having an R2_score of 0.022. In a third step I then tried to remove the people who did not give any personal background and also focused on the datapoints where already some personal history is given. The downside of this was that the dataset available reduced to 1/4 of its original size, resulting a little better model with an R2_score of 0.071, but nevertheless not good at all. But it looks like, that with a growing personal history the model could get better over time. Results of statistical model After the neural network did not give the results I was hoping for, I looked at it from a different angle and made a statistical model. For that, I removed the users with no personal data and split the rest into groups. 7 different ages, 7 different income groups and 3 different genders. I also split the offers into the three groups; bogo informational and discount. Then I could have a look at how much each group spent on each type of offer per time, and how much they spend if they don’t receive an offer. The downside however is, that for some combinations there are many different users available as reference, while for others there are little to none, especially for the other gender. The charts below show the distributions of points, and hence are also a measure for how well the model will perform for each group. It can be seen, that the distribution varys a lot between groups. Especially for high incomes and young age there is barely any data available. Also for the oldest group, the data is very sparse. This of course does have a negative impact for the prediction quality of this model in these areas. Some examples for certain groups are shown below: While older females with a high income spend about 3 times as much when they receive a discount, very old females with a medium income don’t seem to be affected at all by any offer. Males with a rather high income and aged between 52 and 65 seem mostly influenced by informationals, but in general by all kinds of offers, whereas males with the same income between 77 and 89 seem to rather reject offers and spend even less if they receive offers, no matter of what kind. To tackle this problem, a statistical model seems to be much better than a neural network. Maybe the dataset was to short and small, and having a lot more persons and a lot longer timeframe (and therefore much more personal history) will improve the predictions, but that would have to be evaluated. For the given dataset the statistical model served best, although it does have some weaknesses. One weakness is that the data available differs a lot between groups. Especially for people who feel neither female nor male. The second shortcoming is that it only works, if personal data is available. If personal data is available it does provide a good starting point. If not probably, the offers which were completed most often would provide a good starting point. Maybe there is a better way to include personal history and make predictions more personal than just on being in a certain group. This could then be combined with the statistical model, to get even better results. Also a neural network might work, if the timespan and group size get bigger. Maybe there could also be found a way to seperate the users into groups not primarily by personal data, but rather by spendings at different offer types. Then this could be used for future predictions. A downside of that approach would be the cold start problem, but there the statistical model could come in. Then with a growing personal history the weights are shifted from the statistical model to the one that categorizes by personal history.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335444.58/warc/CC-MAIN-20220930051717-20220930081717-00233.warc.gz
CC-MAIN-2022-40
9,756
52
https://nl.mathworks.com/products/sensor-fusion-and-tracking.html
code
Track multiple objects using data from active and passive sensors such as radar, ADS-B, and EO/IR sensors. Customize trackers to handle maneuvering objects. Track multiple spaceborne objects using data from radar sensors to generate space situational awareness. You can configure the trackers to use a Keplerian motion model or other orbital models. Track extended objects with a centralized tracker that fuses data from multiple sensors and sensor modalities. Use a probability hypothesis density (PHD) tracker to estimate the kinematics of moving objects, along with the objects’ dimensions and orientation. For complex urban environments, implement a random finite set (RFS) grid-based tracker to track each grid cell’s occupancy as well as its kinematics. Estimation Filters and Data Association Estimate object states using a rich library of estimation filters, including linear and nonlinear Kalman filters, multimodel filters, and particle filters. Find the best or k-best solutions to the 2D assignment problem or the S-D assignment problem. Assign detections to detections, detections to tracks, or tracks to tracks. Integrate estimation filters, assignment algorithms, and track management logic into multi-object trackers to fuse detections into tracks. Convert your sensor data into a detection format and use a global nearest neighbor (GNN) tracker for simple scenarios. Easily switch to a joint probabilistic data association tracker (JPDA), a multiple hypothesis tracker (MHT), or a PHD tracker for challenging scenarios such as tracking closely spaced targets where measurement ambiguities exist. Extended Object and Grid-Based Trackers Use a PHD tracker to track the kinematics, size, and orientation of extended objects. Using high resolution sensor data such as lidar and radar point clouds, track with grid-based, RFS trackers to estimate the dynamic characteristics of grid cells in complex urban environments. Explore tracker architectures and evaluate design trade-offs between track-to-track fusion, central-level tracking, or hybrid tracking architectures. Use static (detection) fusion to combine detections from angle-only and range-only sensors such as IR, ESM, or bistatic radars. Generate sensor reports to test tracking systems. Define multiplatform scenarios and generate motion profiles for each platform using waypoint-based and kinematics-based trajectories. Attach sensor models and signatures to each platform and simulate their reports statistically. Use a simulated ground truth in Monte Carlo simulations to verify and validate tracking systems. Object Trajectory and Pose Generation Define scenarios interactively with the Tracking Scenario Designer app and generate MATLAB scripts that define and convert the true position, velocity, and orientation of objects in different reference frames. Active and Passive Sensor Models Model active sensors (including radar, sonar, and lidar) to generate detections of objects. Simulate mechanical and electronic scans across azimuth, elevation, or both. Model radar warning receiver (RWR), electronic support measure (ESM), passive sonar, and infrared sensors to generate angle-only detections for use in tracking scenarios. Model multistatic radar and sonar systems with emitters and sensors. Perform IMU, GPS, and altimeter sensor fusion to determine orientation and position over time and enable tracking with moving platforms. Estimate orientation and position for inertial navigation systems (INS) over time with algorithms that are optimized for different sensor configurations, output requirements, and motion constraints. INS Sensor Models Model inertial measurement unit (IMU), GPS, altimeter, and INS sensors. Tune environmental parameters, such as temperature, and noise properties of the models to emulate real-world environments. Estimate pose with and without nonholonomic heading constraints using inertial sensors and GPS. Determine pose without GPS by fusing inertial sensors with altimeters or visual odometry. Plot the orientation and velocity of objects, ground truth trajectories, sensor measurements, and tracks in 3D. Plot detection and track uncertainties. Visualize track IDs with history trails. Sensor and Track Metrics Generate track establishment, maintenance, and deletion metrics including track length, track breaks, and track ID swaps. Estimate track accuracy with position, velocity, acceleration, and yaw rate root-mean square error (RMSE) or average normalized estimation error squared (ANEES). Use integrated OSPA and GOSPA metrics to summarize performance in a single score. Analyze inertial sensor noise using Allan variance. Tuning Filters and Trackers Tune parameters of multi-object trackers such as the assignment threshold, filter initialization function, and confirmation and deletion thresholds to maximize performance. Compare results across trackers and tracker configurations. Automatically tune INS filters to optimize noise parameters. Generate C/C++ and MEX code for simulation acceleration or desktop prototyping using MATLAB Coder™. Apply cost calculation thresholds to reduce time spent on calculating the assignment cost.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500758.20/warc/CC-MAIN-20230208092053-20230208122053-00157.warc.gz
CC-MAIN-2023-06
5,165
24
http://www.sevenforums.com/backup-restore/278802-win7-ultimate-x64-srclient-dll-file-missing.html
code
It seems that either trojan or MBAM deleted some system files on my PC. When I reboot, I get error message: "There was a problem starting srclient.dll, The specified module could not be found." I browsed both System32 and SysWOW64 folder. It is missing indeed. I thoroughly cleaned my computer out with all recommended tools...OTL, MBAR, MBAM, JRT, TFC, AdwCleaner, Combofix, RogueKiller, Windows Repair, CCleaner, you name it... Eventually, I run a deep scan using Super AntiSpyware and I am pretty sure it is clean now. To cut a long post short: due to the missing srclient.dll my System Restore does not work. It can not be started from the Services. I'd appreciate if someone with the same OS could upload that file somewhere or attach it in the message... Thx in advance.
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164737564/warc/CC-MAIN-20131204134537-00044-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
776
7
https://reasonml.chat/t/status-and-maturity-of-reasonml/2490
code
I currently teach our univ 3rd year students FP using an F#/FABLE/elmish/electron toolchain. The idea is show them the merits of declarative programming plus strong typing, but with this allow fun web UI style project work. So they learn a pure subset of the FP language and then work with nearly pure web code. I’d love to do this using OCamL / reasonML (or whatever it is called) / some MVU skeleton / electron. OCaml is a better fit for what I want to teach than is F#, and is better tech. But, for teaching, I need stuff to be working quite well without too many rough edges. Where is the “ocaml on the web” project vs the “F# on the web project” now do people think? F#/FABLE seems incredibly complex, and is very slow to compile, but it does all work and has lots of infrastructure. From my POV OCaML is the best of the sweet spot Hindley-Milner mostly FP languages, and perfectly suited for teaching, just it does not quite have all that is needed now… Best wishes, Tom
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499919.70/warc/CC-MAIN-20230201081311-20230201111311-00209.warc.gz
CC-MAIN-2023-06
988
4
https://www.evidence4health.org/publications-multimedia/grade-guidance-24-optimizing-the-integration-of-randomized-and-non
code
GRADE guidance 24 optimizing the integration of randomized and non-randomized studies of interventions in evidence syntheses and health guidelines Background and Objective This is the 24th in the ongoing series of articles describing the GRADE approach for assessing the certainty of a body of evidence in systematic reviews and health technology assessments and how to move from evidence to recommendations in guidelines. Guideline developers and authors of systematic reviews and other evidence syntheses use randomized controlled studies (RCTs) and non-randomized studies of interventions (NRSI) as sources of evidence for questions about health interventions. RCTs with low risk of bias are the most trustworthy source of evidence for estimating relative effects of interventions because of protection against confounding and other biases. However, in several instances, NRSI can still provide valuable information as complementary, sequential, or replacement evidence for RCTs. In this article we offer guidance on the decision regarding when to search for and include either or both types of studies in systematic reviews to inform health recommendations. This work aims to help methodologists in review teams, technology assessors, guideline panelists, and anyone conducting evidence syntheses using GRADE.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476137.72/warc/CC-MAIN-20240302215752-20240303005752-00248.warc.gz
CC-MAIN-2024-10
1,313
6
https://farmermods.com/6016-quick-camera-mod-by-decker_mmiv-for-fs22.html
code
Download Quick Camera Mod v1.1 By Decker_MMIV for FS22 | Farming Simulator 22 game. With this QuickCamera mod for FS22, you can use keys to make the vehicle camera: - Peek left/right - Flip 180° to quickly look behind/forward - Snap 45°/90° left/right - Zoom in/out quickly Changes in v1.1: - Fixed mod-conflict with 'Realistic Cab View' - Added control action for doing both Change Direction and Flip Camera - Modified back/forth rotation of inside/in-cabin camera to work more like head-turning - Some translations updated Also when player is 'on foot', it is possible to: - Flip 180° (almost like having eyes in the back) - Snap 45° left/right - Run even faster (player speed) using mouse-wheel up/down when in run-mode. In multiplayer this is only available for players with the 'Farm Manager' role. Tested on game version v1.3.x This document refers to links to third-party content/website, from both our website(s) and our official Social Media pages. External links are selected and reviewed when a page/post is published. However, we are not responsible for the content of external websites. If you would like us to remove a link to your website from NHS Choices, please Contact us (Admin) Note that unless you have a legal right to demand removal, such removal will be at our discretion.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510208.72/warc/CC-MAIN-20230926111439-20230926141439-00836.warc.gz
CC-MAIN-2023-40
1,301
17
http://forum.linksprite.com/index.php?/topic/11-mechanical-dimensions/
code
Does anyone know of a drawing (auto cad or such) with the dimentions of the display. Including things like button heights and positions, hole positions(maybe standard arduino), display position and height. Thank you in advance. 1 reply to this topic 0 user(s) are reading this topic 0 members, 0 guests, 0 anonymous users
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826530.72/warc/CC-MAIN-20181214232243-20181215014243-00356.warc.gz
CC-MAIN-2018-51
321
5
https://forum.framework7.io/t/creating-a-new-app-using-framework7-cli/14255
code
I am trying to create a new Framework7 App using command Framework7 create --ui But I am getting the following errors: For Vite it is recommended to have modern and latest Node.js and NPM. Make sure you have at least Node.js v14 and NPM v7 installed on your system. (node:10636) [DEP0128] DeprecationWarning: Invalid ‘main’ field in ‘C:\Users\Administrator\AppData\Roaming\npm\node_modules\cordova\node_modules\objectorarray\package.json’ of ‘dist/index.js’. Please either fix that or report it to the module author node --trace-deprecation ... to show where the warning was created) Failed to fetch plugin [email protected] via registry. Probably this is either a connection problem, or plugin spec is incorrect. Check your connection and plugin name/version/URL. CordovaError: CordovaError: Could not determine package name from output: added 2 packages, and audited 3 packages in 2s found 0 vulnerabilities I have tried it on three machines, I still get the same results. What might be wrong?
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103355949.26/warc/CC-MAIN-20220628050721-20220628080721-00258.warc.gz
CC-MAIN-2022-27
1,007
14
http://www.hackthissite.org/forums/viewtopic.php?f=19&t=775
code
BhaaL wrote:Tbh, there *was* a prog 10 once, featuring kind-of stego to be read in-time. It was clearly broken, so it was simply moved out of the way. Not too far away for some people tho yourmysin wrote:Alright, the problem was during the time of programming 9/10/11 we were having staff troubles. After programming 9 was completed FrozenFire had began working on programming 10. While he was working on 10, I wrote programming 11. Rather then forcing him to reconfigure his challenge we agreed mine would be 11 even though 10 was not yet complete. After a while he gave up, the challenge was completely busted. Any suggestions for a challenge are appreciated. Users browsing this forum: No registered users and 0 guests
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119080.24/warc/CC-MAIN-20170423031159-00495-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
721
4
https://mindcurv.com/en/partners/microsoft/
code
What can Microsoft do for your Business? Microsoft enables digital transformation for the era of an intelligent cloud and an intelligent edge. Its mission is to empower every person and every organization on the planet to achieve more. The Azure cloud platform is more than 200 products and cloud services designed to help organizations bring new solutions to life—to solve today’s challenges and create the future. Build, run, and manage applications across multiple clouds, on-premises, and at the edge, with the tools and frameworks of your choice. Gold Cloud Platform Gold Data Analytics Gold Application Development Silver Application Integration
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649343.34/warc/CC-MAIN-20230603201228-20230603231228-00195.warc.gz
CC-MAIN-2023-23
655
6
https://math.stackexchange.com/questions/1472821/parallel-transport-convergence
code
So I was working on a problem and I got stuck. The question is as follows. Let $\pi:E\rightarrow M$ be a vector bundle of rank n with a metric and a metric connection on E. Now suppose that we have a set of curves $\gamma_i:[0,1]\rightarrow M$ such that $\gamma_i(0)=p$ and $\gamma(1)=q$ and let us assume that they converge to a curve $\gamma$.What I want to show is that the associated parallel transports converge. Here is what I have so far. Let $s_i$ be a sequence of sections over $\gamma_i$ such that $s_i(0)=v$ for all $i$. And so what I did was first selects a local parallel frame $s^i\in\Gamma E$, so that each $s_i$ can be written as Since these are parallel sections we know that the coefficients are constant. Since the smooth curves converge we know that $s^i\circ\gamma_i$ converges to $s^n\circ\gamma$. What I don't know is how the coefficients are determined relative to the curve so I can use the fact that the curves converge. Any suggestions for what I am not seeing? Also we can assume that the curves are converging in $C^1$ by taking coordinate patches.
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986697760.44/warc/CC-MAIN-20191019191828-20191019215328-00310.warc.gz
CC-MAIN-2019-43
1,077
3
https://forums.visual-paradigm.com/t/how-to-relate-sequence-diagrams-and-class-diagrams/13646
code
Hi, thanks for this great tool! I’ve created a test sequence diagram like in this video https://www.youtube.com/watch?v=18_kVlQMavE Now I start drawing a class diagram. I was hoping that the names of the lifelines would show up as suggestions for class names but this is not the case. Is there any way of relating sequence diagrams and class diagrams? How about others like state machine diagrams? You can create the class from your lifelines, and visualize those classes into your class diagram. You can use sub-diagram for Class & its State Machine Diagram. Great! Many thanks.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886476.31/warc/CC-MAIN-20180116164812-20180116184812-00285.warc.gz
CC-MAIN-2018-05
581
6
http://forums.pinstack.com/f9/browser_is_disabled_by_it_policy_message-115639/
code
I have installed the Poynt ( www.mypoynt.com ) application on my Bold device. When ... Server Admins forum Browser is disabled by IT policy message I have installed the Poynt (www.mypoynt.com) application on my Bold device. When trying to view a movie trailer get the messages "Browser is disabled by IT policy" "Uncaught exception; java.lang.null.Pointer.exception" Device: Bold with OS 4.6 Connected to BES with no restrictions (has full BES Admin group rights). My BES administrators cannot figure it out. Works fine, can view the movie trailer, when connected via WiFI - All other functions of Poynt work fine Everything else works fine, browsing, Telmap GPS, google via WiFi or not. Poynt support suggested to speak to my BES admin Any ideas how to resolve this issue would be greatly appreciated Well that is a pretty generic error message. Try this though... Delete the service book: "Blackberry Help! [Browser Config]" and then press and hold ALT and then press L G L G and this will bring up your Event Log. Press the BlackBerry button and bring up the menu and clear the event log. Then do a reboot of the device and try your website again. Post back if this doesn't resolve anything and we'll keep troubleshooting.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118310.2/warc/CC-MAIN-20170423031158-00193-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,225
16
https://jobs.lever.co/thread/e1b85d37-7318-4d9c-8f8b-6b6a73fce3bd
code
Software Engineer, Machine Learning London, UK / We’re looking for a talented engineer to work on the algorithms at the heart of Thread. At Thread, we’ve set out to rethink the shopping experience from the ground up, helping people feel happier and more self-confident in the process. Using a combination of expert stylists and machine learning algorithms, we bring people a small, highly personalised selection of the perfect clothes just for them – in their size, budget and taste. By doing so we simplify the shopping process, help people to feel more comfortable in their own skin, and allow them to go out into the world with a spring in their step. It also removes the need to spend Saturday afternoons frustrated by busy high street stores, or spend ages browsing the overwhelming number of options available online. We believe having an intelligent assistant in your pocket is how the majority of people will shop in the future, and we’re looking for a talented engineer who wants to help millions of people discover its value. This is a fantastic opportunity to join us and become Thread’s first dedicated algorithms engineer! We’re looking for an engineer to focus on Thread’s recommendation algorithms, our recommendation service “Thimble”, and our many other algorithmic data-products. You’ll work with our Data Scientists to improve and iterate our personalisation algorithms which are core to our product, so that we can serve high quality AI-driven clothing recommendations to men and women in the UK and internationally. The role will report into and work closely with our Head of Data, Ed Snelson and also work cross-functionally as part of our wider Product org alongside our talented product designers, product managers, frontend & backend developers. The purpose of your role will be to enable much faster iteration cycles when upgrading the capabilities of our production algorithms, and to support our wider Product org in enabling completely new algorithm-driven product experiences. Examples of this might include a new type of recommendation for our users, or new way for our users to interact with and discover our products & outfits. What you'll be doing: - Working closely with our Data Scientists to iterate and improve our core recommendation algorithms - Implementing new algorithm driven product experiences - Improving and upgrading “Thimble” as a recommendation service via better: monitoring of live algorithms (quality diagnostics), monitoring of latencies and latency improvements; interfaces between ML models & services and observability & explainability of algorithmic results - Working on diagnostics tooling to enable us to discover causes of common algorithm related UX problems and iterate on recommendations much faster - Working on infrastructure to enable us to deploy richer model features (e.g. user / item embeddings)Working on improving the quality, reliability and monitoring of our model-training pipelines - Improving our real-time data pipeline integration for easier event-based feature development What we are looking for: - Have a minimum of 2 years experience in industry as a software engineer - Are passionate about engineering with a focus on algorithms / numerical code - Have past experience working with numerical libraries, data, optimisation, latency-sensitive code, algorithmic monitoring etc - Have a strong interest in machine learning / AI and want to learn more!Have some knowledge and ideally experience of “ML-ops” i.e. building, deploying, maintaining & monitoring ML models & algorithms in production - Care deeply about the craft and quality of engineering, whilst at the same time being pragmatic and excited by working in a fast-paced startup environment and the trade-offs that entails Talented engineers can work anywhere, so why choose us? - Opportunity to become recognised as one of the leaders in your field through playing a key role in the future growth of a high-profile startup - Learn from some of the best product people in the industry by working directly with our exceptional team: Kieran O’Neill (CEO) has built two products that scaled to millions of users; Ed Snelson (Head of Data Science) worked on some of the hardest machine learning challenges at Bing; Tom May (Head of Product & Growth) led growth at Songkick; Alexandra Allcott (Head of Brand) helped build some of the world’s biggest brands at Wieden+Kennedy; Terry Betts (Head of Business Development) ran the £500m menswear business at Selfridges and co-founded Mr. Porter; etc. - Be part of a values-led team that are working hard to create one of the highest quality cultures in the world. Learn more about what we’re trying to do in our culture deck. - Informal, non-hierarchical, non-political, sociable work environment with lots of autonomy and independence - We’re looking for people who want to help shape the broader company and culture. Being part of the Thread team is an interactive experience – we all help to evolve the culture. We don’t want passengers - Gain first-hand experience of how to start, grow, market and raise funding for startups (perhaps useful for your own company one day)Even when we’re not fully remote, we offer working-from-home opportunities and flexible working hours, to help you develop a healthy work-life balance - A competitive salary and a generous equity stake in the company (you’re working hard to make the company successful, so we believe you should share generously in the reward!)
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703550617.50/warc/CC-MAIN-20210124173052-20210124203052-00450.warc.gz
CC-MAIN-2021-04
5,531
27
https://support.sbg-systems.com/sc/kb/latest/underlying-maths-conventions/reference-coordinate-frames
code
This article is a simplified version of the geodesy skills needed for inertial navigation. Should you want further information, we recommend you visit geodetic sites such as: https://itrf.ign.fr/general.php Geodetic reference system A geodetic reference system is a group of elements that enables to locate points using coordinates. Elements are: - Origin of the coordinates system - Orientation of axis - Scale of axis - Reference ellipsoid The most important geodetic reference systems are the different realizations of the ITRS (International Terrestrial Reference System) which are realized by the international scientific community. These realizations are produced at the same time than technologies progress and the number of data increases to improve results. It is then better to use the latest realization to get the best accuracy. Currently it is the ITRF2014 (International Terrestrial Reference Frame 2014). As the GNSS technology has been created by the US defense, they developed their own geodetic reference system that corresponds to the different realizations of the WGS84 (World Geodesic System 1984). Initially, all positions obtained by GNSS measurements were expressed in WGS84. It explains it is the most known one. The latest realization, G1674, is aligned with the ITRF2014 but some small differences make them agree at the centimeter level only. For example, the reference ellipsoid of the two systems have 0.1mm variation for the semi-minor axis. Coordinate reference frame vs Augmented GNSS solution The solution obtained by GNSS depends on the type of measurements. For RTK or PPK positioning, the solution is in the base station coordinates system. For PPP positioning or using orbits and clock corrections from IGS, coordinates are expressed in ITRF2014. ITRF2014 vs WG84 As the two geodetic reference systems (ITRF2014 and G1674) are really close, there is no transformation parameters given and it’s possible to consider that they are the same system (positions obtained by GNSS are rarely more accurate than one centimeter). Type of coordinates For each geodetic reference system, it is possible to use three types of coordinates : Cartesian, geographic or projected. It is the easiest way to locate a point in a 3D space. It uses the three orthogonal axis (commonly X, Y, Z) of the geodetic reference system. For example, the ITRF2014 has for origin the center of mass of the Earth including oceans and atmosphere. The Z axis is pointing to the north rotation pole. The XOY plane coincides with the equatorial plane. Orientation of the X and Y axis are more difficult to understand and have no real interest here. The scale is chosen to correspond to the meter. ECEF (Earth Centered Earth Fixed) If the origin of the coordinate system is close to the Earth center of mass, and the X and Y axis rotate around the Z axis with the Earth (so it can't be used as an inertial reference frame), this system type is called ECEF (Earth Centered Earth Fixed) cartesian frame. Although this type of coordinates is very easy to use, it’s principally utilized by the scientific community. Most users prefer the geographic coordinates. Geographic (or geodetic) coordinates Coordinates above can be also express in geographic form. By using the reference ellipsoid associated to the geodetic reference system, a point with Cartesian coordinates is projected on the surface of the ellipsoid to calculate two coordinates : longitude (λ) and latitude (ϕ) which are angles. Then a distance can be determined from the center of the ellipsoid: ellipsoidal height. The longitude (λ) is the angle in the equatorial plane from the origin meridian to the projection of the point of interest onto the equatorial plane. The latitude (ϕ) is the angle in the meridian plane from the equatorial plane to the ellipsoid normal. Note that, in most situations, the ellipsoid normal will not intersect with the center of the Earth. The ellipsoidal height (he or h) is a simple distance between the point and its projection on the ellipsoid. Projection (or plane coordinates) When working on a small area, it is possible to use a defined projection for a geodetic reference system. This type of coordinates refers to a 2D space where all the points of the reference ellipsoid are projected on a plane (there are many ways to do a projection with different effects on the result). The advantage of a such a coordinates system is its ease of use for map creation. However, as the reference surface is a transposition from an ellipsoid to a plane, some deformations appear. The commonly used coordinates are E, N (East, North). It’s important to understand that a projection is associated to a geodetic reference system so two projections don't always have the same base. The NED frame (North East Down) In some cases requiring relative positioning, a local specific Geodetic frame is used in order to ensure best accuracy. In navigation this local frame refers to the North, East, Down rectangular frame (NED). This frame is obtained by fitting the local ellipsoid shape in a tangent plane at the current position. This coordinate frame is attached to a fixed point relatively to the Earth surface. The X axis is turned toward North, the Z axis turned down, along the local ellipsoid normal, and the Y axis completes the right hand rule, pointing East. As it's impossible to perfectly fit the ellipsoidal shape in a plane, this frame is only suitable for local measurements. Navigation algorithms Reference frame The navigation algorithms internally account for this frame rotation when the vehicle moves at high speed in order to ensure best navigation performance. Notion of altitude The altitude (H) is a notion extremely complex, so it's will be briefly developed here. To be defined, it’s necessary to explain what is the geoid (which can be understood as the Mean Sea Level). The geoid is an equipotential surface of gravity. It means it is a surface where the norm of each point corresponds with the local gravity direction. The latest world model is the EGM2008 (Earth Gravity Model). As the local gravity depends on a lot of things, its surface is absolutely not regular as the ellipsoid can be, so they are not equal. Altitude is then a distance between a point and its projection on the geoid with distance following the gravity direction. It's a physical definition. It is possible to convert ellipsoidal height into altitude by using the gravity model. In the schema below, he is the ellipsoidal height, H is the altitude and n is the geoid undulation. So it's easy to deduct the relation: he = H + n. The INS provides both altitude referenced to the Ellipsoid and Mean Sea Level using a built in EGM96 model with 15 arc sec resolution. Transformations between different geodetic reference systems and different types of coordinates Sometimes, you can have positions expressed in several geodetic reference systems or different types of coordinates so you need to make them all compatible. For this, the graphic below shows the steps to go from one system to another. You will notice there are multiple ways to convert coordinates to an other geodetic reference system but the best to keep accuracy is to use the transformation with seven parameters (three rotations, three translations and a scale factor). This can only be done with the Cartesian coordinates so you have to start by transforming your coordinates to their Cartesian form. 14 parameters Datum shifts If the geodetic reference system takes in consideration the tectonic plates movement, the 7 parameters transformation becomes a 14 parameters transformation (velocity of all translations, rotations and scale factor are added).
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711200.6/warc/CC-MAIN-20221207153419-20221207183419-00717.warc.gz
CC-MAIN-2022-49
7,714
45
https://forum.videohelp.com/threads/402513-RSA-whitebox?s=86cf1a459aea997dc0639327308eed2f
code
This is a Python implementation of the RSA whitebox used in widevine. It might be useful for obtaining new keys. This is not my work, I'm just sharing, but I will still go to hell for this. + Reply to Thread Results 1 to 3 of 3 I wouldn't share something like this on public sites, since this will make this useless. Better to keep something only for some users than ruining it for everyone. Moreover isn't your work so, why would you share it? Last edited by Hammer; 18th Jul 2021 at 15:15. that file is useless
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057615.3/warc/CC-MAIN-20210925082018-20210925112018-00026.warc.gz
CC-MAIN-2021-39
512
7
https://multimedia.cx/eggs/googles-youtube-uses-ffmpeg/
code
Controversy arose last week when Google accused Microsoft of stealing search engine results for their Bing search engine. It was a pretty novel sting operation and Google did a good job of visually illustrating their side of the story on their official blog. This reminds me of the fact that Google’s YouTube video hosting site uses FFmpeg for converting videos. Not that this is in the same league as the search engine shenanigans (it’s perfectly legit to use FFmpeg in this capacity, but to my knowledge, Google/YouTube has never confirmed FFmpeg usage), but I thought I would revisit this item and illustrate it with screenshots. This is not new information– I first empirically tested this fact 4 years ago. However, a lot of people wonder how exactly I can identify FFmpeg on the backend when I claim that I’ve written code that helps power YouTube. How do I know YouTube uses FFmpeg to convert multimedia? Because: - FFmpeg can decode a number of impossibly obscure multimedia formats using code I wrote - YouTube can transcode many of the same formats - I screwed up when I wrote the code to support some of these weird formats - My mistakes are still present when YouTube transcodes certain fringe formats Longer Answer (With Pictures!) Let’s take a video format named RoQ, developed by noted game designer Graeme Devine. Originated for use in the FMV-heavy game The 11th Hour, the format eventually found its way into the Quake 3 engine as well as many games derived from the same technology. Dr. Tim Ferguson reverse engineered the format (though it would later be open sourced along with the rest of the Q3 engine). I wrote a RoQ playback system for FFmpeg, and I messed up in doing so. I believe my coding error helps demonstrate the case I’m trying to make here. Do you see how the canyon walls bleed into the sky? That’s not supposed to happen. FFmpeg doesn’t do that anymore but I was able to go back into the source code history to find when it did do that: FFmpeg fixed this bug in June of 2007 (thanks to Eric Lasota). The problem had to do with premature colorspace conversion in my original decoder. I tried uploading the video again to see if the problem persists in YouTube’s transcoder. First bit of trivia: YouTube detects when you have uploaded the same video twice and rejects the subsequent attempts. So I created a double concatenation of the video and uploaded it. The problem is gone, illustrating that the backend is actually using a newer version of FFmpeg. This surprises me for somewhat esoteric reasons. Here’s another interesting bit of trivia for those who don’t do a lot of YouTube uploading– YouTube reports format details when you upload a video: So, yep, RoQ format. And you can wager that this will prompt me to go back through the litany of unusual formats that FFmpeg supports to see how YouTube responds.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473735.7/warc/CC-MAIN-20240222061937-20240222091937-00236.warc.gz
CC-MAIN-2024-10
2,873
15
https://www.randstad.pt/empregos/qa-automation-engineer_lisboa_RP-2023-131746/
code
Have sound knowledge on black box testing, testing methodology Well versed with Quality engineering/testing concepts and processes Ability to support testing efforts, test estimation, test plans & executions and test automation Experience on one of the Test & Defect management tools (eg: MicroFocus ALM) Experience with one Test Automation tool (eg: Tosca Tricentris) Enthusiastic to learn new technologies/tools as per the project needs Provide recommendation on test tools, process techniques and methodologies needed to enhance productivity and quality College degree in Computer Science, Information or other related discipline. Equivalent experience may be acceptable 4+ years of experience in Information Systems/technology or related area preferred using service and hosting solutions such as private/public cloud Experience working in Follow the Sun, Onshore-Offshore Operations model Testing experience in CPG domain/Commercial business applications on ERP (such as Inventory Managements, Supply Chain, Sales and Invoicing, Accounts Receivable, Accounts Payable) Exposure to all types of SDLC and Testing Lifecycle Knowledge in security testing, performance testing, performance tuning is a definite plus. Passion for achieving excellence in technical, process, product quality and reliability. Knowledge on Test Audit, Test Governance process SQL and RDBMS skills desirable
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945182.12/warc/CC-MAIN-20230323163125-20230323193125-00138.warc.gz
CC-MAIN-2023-14
1,384
16
https://www.computing.net/answers/networking/virtualization-best-setup-for-my-network/46130.html
code
Would like some advice please on how I should be setting up virtualisation on my network. Will be using one HP Proliant ML350 G6 server with 2 processors and 24GB of RAM, will use Hyper-V for virtualisation. The setup I was going to go for is as follows: Physcial server: VM host, not on domain, not fulfilling any roles, just hosting the vms. VM1: AD DC, hosting network shares, DHCP, DNS. This will do the bulk of the work on the network so will allocate 12-14GB of RAM to this server. VM2: Dedicated SQL database server only. This will do far less work so will allocate around 6GB of RAM to this server. This setup will leave around 6GB of RAM to the physical server. My questions are as follows: 1. Not being extremely experienced with virtualisation, am I going about this all wrong? 2. I have used a very similar setup before but on an ML360 G7 server which has 4 NICs, allowing me to assign a physcial connection to all 3 servers present. This server only has 2. Am I going to be able to do the above on this server? What happens when I need to update things on the host that requires a network/internet connection? Is there a practical solution to this? Is this server not really suited to virtualisation of this sort? 3. Would I be better off just putting the roles of VM1 on to the host directly and not even using a vm for that? Thereby only having VM2 (which would become VM1 if you know what I mean) as a virtual server for the dedicated sql database? The reason I designed the setup as above is because I often have to perform tasks on the sql database server during the day and it then needs a restart, which is fine for the small number of users that use that database, but I would not be able to put the sql databse on the main server as it would then disrupt the rest of the network during daytime restarts. Like wise, if the above VM1 roles were on the physcical server and not virtualised at all, in the event of that server needing a restart it would obviously disrupt my sql server. 4. If I were to actually go for a design as above with one physcial host and 2 vm's on that host, would the host actually need 6GB of RAM or would it get along fine with less considering it only has to boot up and then allow the other 2 hardware virtualised servers to take over? Or does it still require a large amount of RAM?
s3://commoncrawl/crawl-data/CC-MAIN-2017-04/segments/1484560282926.64/warc/CC-MAIN-20170116095122-00442-ip-10-171-10-70.ec2.internal.warc.gz
CC-MAIN-2017-04
2,332
11
https://blog.geralexgr.com/tag/vstsnugetpush-exe
code
When you try to push a nuget package from a DevOps pipeline on Artifacts feed you may face the below error. ##[error]Error: An unexpected error occurred while trying to push the package with VstsNuGetPush.exe. Exit code(1) and error(Error: Microsoft.VisualStudio.Services.Common.VssServiceException: User 'xxx' lacks permission to complete this action. You need to have 'ReadPackages' This error could be resolved by editing the settings of the feed. In more detail under permissions you can find which users or service account can perform actions based on their role. By default I could locate the Project Collection Build Service (Organization) with the Contributor permissions but did not work. As a solution I removed that and added "Project Name" Build Service (Organization). This is the build service for the project on which I have created the pipeline specifically.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817206.54/warc/CC-MAIN-20240418124808-20240418154808-00818.warc.gz
CC-MAIN-2024-18
874
7
https://forbiddenplanet.com/299877-we/
code
In a glass city composed of absolute straight lines, ruled over by the all-powerful ‘Benefactor’, the citizens of OneState live their lives without passion or agency. That is until D-503, a man tasked with bringing the Revolution to the stars, meets a remarkable woman . . . Supressed in Russia for decades, Zamyatin’s dystopian masterpiece prophesized the worst excesses of the Soviet Union, while creating an enduring and vivid vision of what future societies might look like - a vision that would inspire George Orwell’s 1984 and many subsequent dystopias. - Cat. No.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401604940.65/warc/CC-MAIN-20200928171446-20200928201446-00021.warc.gz
CC-MAIN-2020-40
578
3
https://askubuntu.com/questions/910956/able-to-disable-intel-turbo-boost-by-configuring-etc-rc-local-on-14-04-but-not
code
This question already has an answer here: I want to disable Intel "turbo boost" on startup of my system. For reason of this, as well as my laptop details, please refer to my Stack Overflow thread: Why can't my CPU retain peak performance in HPC? In an answer I made myself, I used the following line inside echo 1 > /sys/devices/system/cpu/intel_pstate/no_turbo This solution is partly motivated by this thread: Disabling Intel Turbo Boost in ubuntu, and was working just as expected, before I upgrade my Ubuntu system from 14.04 to 16.04 in February. But after that it no longer works: the no_turbo value is still 0 and that line has no effect at all. Of course, I could manually do the following later: sudo su echo 1 > /sys/devices/system/cpu/intel_pstate/no_turbo exit However, I can't remember doing this every time, and it is very discouraging when I realized that I had forgotten to do so and have to rerun a long benchmarking (like what I am doing now). Is there an explanation why the same solution fails in 16.04? Or how can I achieve this automatically on startup? Note I have other lines in rc.local, like for turning off Intel hyperthreading and setting backlight, they all work. It is just this particular line for "turbo boost" that fails. So the problem is not that rc.local is not run. My machine has UEFI boot loader. Though there is an entry for the so-called legacy BIOS, there are few options there to set. Neither hyperthreading nor "turbo boost" can be configured. In case someone wonders: the systemctl enable rc-local.service does not solve the issue.
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195525974.74/warc/CC-MAIN-20190719032721-20190719054721-00450.warc.gz
CC-MAIN-2019-30
1,576
17
http://www.mrflakey.com/?p=197
code
MonoMIDI is a step sequencer to be controlled via the monome. It’s based on manipulating Live MIDI clips, rather than using live.step or other means. So in my opinion, it fits the workflow better where one might use a keyboard next to a monome or an MPC. Part of the code base was taken from the Ableton Clip Step sequencer, thx for that. Unfortunately, the monome isn’t recognized as a control surface by Live which was one of the reasons for developing it. The features in a nutshell: - support for MIDI clips with up to 64 steps (1 step = 1/16 note, which makes it 4 bars) and 49 drum pads (or 7 octaves when using scales) - Full scale support including chromatic mapping and other custom scales - Scale conversion - advanced duplication facilities for partial note sequences - multisample mode (device chooses out of 8 samples based on weighted probability) - MIDI clip navigation mode - extensive humanization options (velocity and timing randomisations) - Adjustable note length - Playhead visualisation - works standalone and integrated into MonoLive The detailed documentation can be found below, as well as the device.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122629.72/warc/CC-MAIN-20170423031202-00016-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,131
14
https://community.powerbi.com/t5/Service/DATA-FLOWS-INTERNAL-ERROR-RUN-TIME-INVALID-DATE/m-p/681354
code
I have a data flow which will not refresh in the service. Note the invalid date in the runtime error logs attached. The query is using the Web.Contents function to return a json file. The data source itself is an on premise API web source to an accounting system. Refreshes function normally on demand or as a scheduled refresh when the data is imported as a dataset. The same query as a Data flow will refresh inside power query and return valid results however once the query is saved and refresh is tried the refresh will fail per attached spreadsheets. I use multi-factor authentication (MFA) on my account. I have tried disabling the MFA but this is not ideal and would make the data flow functionality limited. Disabling it however did not resolve the problem however some have expressed that disabling, re-enabling after a day fixed the issue. I tried but still no luck Anyway, hope that is enough information to get a solution! Data flow Refresh Error Log I have the same problem, and I have not found the solution until now. @agnaldocarmo okay what was the secret sauce to fix the problem then? For other interested in this error, MS has identified a null in the code causing the problem. Have been advised fix to be deployed midweek by the engineering team. Kudos to you if you earned one of these! Check your inbox for a notification. Learn about the award-winning innovation that was implemented across Microsoft’s Business Applications Communities. Find out where you can attend!
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540499439.6/warc/CC-MAIN-20191207132817-20191207160817-00364.warc.gz
CC-MAIN-2019-51
1,494
15
http://techforums.nintendo.com/message/30334
code
Hi not sure but you might want to try cleaning the connectors? maybe something got stuck in there or it is too dusty. Make sure to turn the power off first though. also see if there are any prongs on the connectors and check to see if they are bent. missing or worn down. I don't see it really being an electrical issue but more with the actual port itself.
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701157443.43/warc/CC-MAIN-20160205193917-00273-ip-10-236-182-209.ec2.internal.warc.gz
CC-MAIN-2016-07
357
1
https://www.instructables.com/Pizza-Button/
code
Introduction: Pizza Button Sophomore college men, New Yorkers, late-night techies, and the truly lazy: welcome to your fantasy. Introducing the ultimate upgrade in gastronomical technology, the Pizza Button. No need to pick up the phone to order pizza anymore. Simply press this button and wait while it orders delivery pizza to your address. The Pizza Button uses a BeagleBone Black (BBB) board to do the heavy-lifting in this project. A button press triggers the board to run a web scraper. The web scraper logs into your Grub Hub account and orders pizza from the famous San Francisco North Beach Pizza (meaning that currently this button only works in San Francisco, but honestly, would you really want to be anywhere else?) It orders a large cheese pizza, pays for the pizza, and has it delivered right to your door. This project is very simple to make and irresistible to use! Future updates to this project include: - Internal GPS - Pizza Smell to only enhance your appetite - (x3) pizza boxes from your favorite pizza shop - (x1) Massive Arcade Button with LED - 100 mm White Adafruit 1187 - (x1) Proto Cape Kit for the BeagleBone Adafruit 572 - (x1) 470 ohm 1/4 W resistor RadioShack 271-1317 - (x1) 1 k-ohm 1/4 W resistor RadioShack 271-1321 - vinyl or LC Glossy Inkjet Photo Sticker Paper (8.5" x 11") Amazon B000VKV2H4 Step 1: Print the Pizza Sticker Find a mouth-watering picture of a pizza and print it out on sticky paper. I used a vinyl cutter, but a standard printer would work as well. Step 2: Take the Arcade Button Apart The arcade button comes with a switch locked into its base. Simply twist the switch counterclockwise and feel it unlock. Pull the switch out from inside the button's tapped neck (tapping is the grooves you see in objects like screws). There will be an LED attached to the switch. Next, unscrew the small black ring from the tapped neck so the button's base can be pulled away. Inside the neck are two white tabs. Push them inward and down to push the plastic button face away from the neck. Now all that is left is the clear button face attached to the white platform with the tabs. Use a small screwdriver to pry the button face off the white platform. Step 3: Apply the Sticker and Reassemble the Button Cut the sticker out and attach it to the smooth white platform. This way, it will be seen through the clear button face. Reassemble the button. Step 4: Make the Box I started with flat pizza boxes I bought from the container store. However, feel free to use your favorite pizza boxes! This base requires three pizza boxes stacked on top of each other, which will accommodate the rather larger arcade button and house the electronics. Begin with the bottom box. Find and mark the box's center with a ruler, and use a cup to draw a circle around it. Cut the hole out with an X-Acto knife. Cut a hole on the top of the bottom box, and holes on both the top and bottom of the middle and top boxes. Stack the boxes together and glue them together with a hot glue gun. Place the button on the top to make sure the switch fits through the hole. Step 5: The Circuit This circuit is fairly straight forward. When pressed, the arcade button triggers both the code to run and the LED inside the button to light up. Step 6: Communicating With the Beagle Bone Black This project is my first experience with the BeagleBone Black Board. In my opinion, the BeagleBoard is quite similar to the RaspberryPi board but with more gpio pins. Read more about the BeagleBoard at its official community site and discover the main differences between the BeagleBoard and Raspberry Pi here. This project uses a Rev C BeagleBone Black board running off a 16G micro SD card flashed with the Debian environment. You can use any size micro SD card greater than 8G. Although the new BeagleBone Black Board has a 4G onboard processor, Debian's desktop environment requires more storage space. To interact with the board, simply plug it into your computer with the micro HDMI to USB cable that comes with your board. The 'user leds' located next to the ethernet port should flash in a pattern programmed to mimic the human pulse (the beagle makers are cool, right?) and the board's icon should pop onto your Desktop. If you are using a mac, you can program your board two different ways: METHOD 1: THE TERMINAL Open the terminal and type into the command line ssh [email protected] when you are prompted for a password, type ** If this doesn't work because of an "offending ssh key" ** Type into the command line rm -f .ssh/known_hosts ssh [email protected] ** If this still doesn't work ** Type into the command line sudo ssh [email protected] METHOD 2: DEBIAN ENVIRONMENT You can also vnc into the board's desktop environment and program it from there. Follow the steps below to do this. - Download Remote Desktop Connection for mac from here. - Open Remote Desktop Connection and in the input box for 'Computer' type '192.168.7.2' - Inside the remote desktop pop-up, type 'root' for both the username and password. - You will be presented with the Beagle Board's desktop. Step 7: The Code This code automatically signs into your personal GrubHub account, navigates to the menu for North Beach Pizza, and orders a large cheese pizza. It's all trigger by a press of a button! It does all this with by interacting with webpages with Selenium using a headless web browser PhantomJS. What's selenium? It's a software package that does all the clicking through webpages for you (remember, this project is for the ultimate lazies out there). What's a headless web browser? Learn more here, but in short, it's a web browser (think of Safari, Firefox and, dare I say, Netscape) without a graphical user interface. This makes automating web page navigation MUCH faster (you're hungry for pizza, so you want your order to be sent as fast as possible). Things you will have to edit within the code: - GrubHub login information, which includes your username and password - Credit card info Step 8: File Transfer From Your Computer to the BBB You can transfer files like 'code.py' from your computer to the BBB with simple commands in the terminal environment. Generically, the way to transfer a file from your computer to the BBB looks like scp /home/filename.file user@IPAddress:/directory Breaking this down: - 'scp': The command 'scp' allows files to be copied to, from, or between different hosts. It uses ssh for data transfer and provides the same authentication and same level of security as ssh. - '/home/filename.file': The file location on your computer. - 'user@IPAddress:/directory': The BBB's login information and where on the board you want to copy the file to. For example, let's say I downloaded and saved 'code.py' to my computer's Desktop. Now I want to transfer it to the BBB's Desktop. I will open my computer's terminal and type scp /Users/dot/Desktop/code.py [email protected]:/home/root/Desktop/ Don't copy this example word for word, since the paths on your computer and BBB will be different than mine. I found this information from a useful website here, where you can also learn how to transfer folders of content. Step 9: Installing the Proper Libraries Onto the BBB You'll have to install a few libraries for the code to work properly. To install anything on your BBB, it must: - Be plugged into ethernet - Powered by your computer (if you are communicating to your board through the terminal) - Powered by a 5V wall wart (if you are connecting the board to a monitor) I personally powered my board through my computer and programmed it via the ssh command, which was previously described in "Communicating With The Beagle Bone Black". You will have to install: - Adafruit's GPIO python library - PhantomJS headless web browser Step 10: Installing Python and Adafruit's I/O Library The Beaglebone Black Board has lots of gpio pins, 65 in total, making it unique amongst the many mini computers and microprocessor boards on the market. Two gpio libraries compatible with the Beagle's gpio pins are BoneScript's built-in library and Adafruit's Python GPIO library. Because I am personally more comfortable with Python, I decided to use the Python GPIO library. The library is fairly simple to download. First, ssh into the Beagle Board and install the following dependencies: sudo ntpdate pool.ntp.org sudo apt-get update sudo apt-get install build-essential python-dev python-setuptools python-pip python-smbus -y Then type the following command into install the python gpio library sudo pip install Adafruit_BBIO Step 11: Installing Selenium To install selenium, ssh into the BBB and type into the command line > sudo pip install selenium Step 12: Using Selenium With a Headless Webbrowser To install PhantomJS so you can use the PhantomJS headless web browswer, ssh into the BBB and type into the command line sudo apt-get install build-essential chrpath git-core libssl-dev libfontconfig1-dev git clone git://github.com/ariya/phantomjs.git cd phantomjs git checkout 1.9 ./build.sh These instructions came from the PhantomJS website here. I ran into many problems trying to install PhantomJS, but was finally successful following these commands. Step 13: Pizza Time Now sit back and enjoy your pizza.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304835.96/warc/CC-MAIN-20220125130117-20220125160117-00500.warc.gz
CC-MAIN-2022-05
9,260
81
https://blog.dandelarosa.net/2020/01/03/putting-github-pages-site-on-custom-domain.html
code
GitHub Pages is a very convenient service. If you’re a programmer you can create a static website as a code repository on GitHub and GitHub will host the content for you. Moreover, with the Jekyll framework you can write a blog using plaintext files instead of having to sign up for a blogging service or pay for a database. All you need is experience writing Markdown and just enough familiarity with Ruby on Rails to run Jekyll on your computer. Moreover, what if you wanted to host your site on a custom domain (or subdomain) rather than the typical username.github.io? GitHub Pages will let you do that too! GitHub has comprehensive documentation on using custom domains at this page but here I’ll write a simpler step-by-step guide on hosting your site on your own domain. Getting a Domain Name Before you can transfer your site to a different domain, make sure you actually own a domain name to move to. Hover (referral link) is my preferred domain name registrar since their pricing model is straightforward, they don’t try to upsell additional features, and they provide WHOIS privacy for free. Configuring Your Site Go to your site’s repository on GitHub and head over to the Settings tab. Scroll down to the section titled “GitHub Pages”. You’ll want to focus on where it says “Custom domain”. Enter in your domain name in the text field and tap Save. GitHub might indicate that the site hasn’t been set up correctly - that’s because your site’s DNS settings haven’t been updated yet. We’ll cover that in the next step. Modifying Your DNS Settings You’ll need to add a CNAME record that maps your custom domain to your site on GitHub Pages. It’ll look something like the following: I use Amazon Route 53 for managing DNS records; click here for the guide on configuring them. If you’d rather configure DNS on Hover go to this guide instead. DNS records may take up to 48 hours to fully propogate across the Internet. Securing Your Site With HTTPS Once your domain name is linked with GitHub Pages, GitHub will automatically start setting up HTTPS support. Securing your site with HTTPS is a must-do nowadays since it assures users that they’re going your actual site and not a malicious wannabe. GitHub says you’ll need to wait 24 hours for them to set up HTTPS but in my case they had it ready in a matter of minutes. Reload your site’s settings page to check on its progress. As an optional step, you can enforce HTTPS usage. Personally I choose to allow HTTPS connections only, which can be done by marking the checkbox on the page. I hope this article helped you set up your GitHub Pages site on your custom domain.
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571210.98/warc/CC-MAIN-20220810191850-20220810221850-00765.warc.gz
CC-MAIN-2022-33
2,669
17
https://www.worldranklist.com/preview/article/167869/Binance-Coin---Live-Binance-Coin-price-and-market-cap-LargeCoinMarket
code
Binance Coin - Live Binance Coin price and market cap | LargeCoinMarket Live Binance Coin prices from all markets and Binance Coin coin market Capitalization Stay up to date with the latest Binance Coin price movements and forum discussion Check out our snapshot charts and see when there is an opportunity to buy or sell Binance Coin. The ASCII text the file of Bitcoin is open, anyone will consult it. The attention index affects Bitcoin cash worth through an acceptable dependence on the drift and diffusion coefficients and a doable correlation between the sources of randomness diagrammatical by the driving Brownian motions the model is fitted on historical knowledge of Bitcoin costs. Author Signature : by - khan fiza. im student studying in 11th commerce. i am a seo worker also...
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363327.64/warc/CC-MAIN-20211206224536-20211207014536-00384.warc.gz
CC-MAIN-2021-49
790
6