url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://playxem.com/videos/whats-in-the-box-challenge-lexi-rivera-andrew-davila-c6w4p4i5l6y4d64346z586.html
|
code
|
What's In The Box | Lexi Rivera & Andrew Davila
Find us on IG and TikTok!
Follow The FAM!
Brent Rivera - @Brent RIvera
Ben Azelart - @Ben Azelart
Lexi Hensler - @Lexi Hensler
Stokes Twins - @Stokes Twins
Lexi Rivera - @Alexa Rivera
Jeremy Hutchins - @Jeremy Hutchins
Andrew Davila - @Andrew Davila
Dom Brack - @Dominic Brack
Pierson Wodzyinski - @pierson
I ALMOST WENT BROKE IN THIS VIDEO... Thanks to Epic Games for sponsoring this video! Craft weapons, hunt wildlife and do everything it takes to surviv...
I'm moving away and broke the news to my friends... GET THE MERCH! https://staywildshop.com Don't forget to SUBSCRIBE to my channel for NEW videos e...
PANCAKE ART CHALLENGE SpongeBob Edition | Alan Stokes & Andrew Davila vs Lexi Rivera & Alex Stokes / Who Will Win??? COMMENT DOWN BELOW RIGHT NOW!!! F...
I threw Loren Gray's phone into the ocean, dared her to confess her love for Brent Rivera, made her prank call her mother and eat very gross food. If ...
This was so fun, they never expected it! Thank you guys so much for watching, don't forget to LIKE the video and SUBSCRIBE!! @Ben Azelart @Andrew Da...
EATING THE WORLD"S MOST SOUREST CANDY!!! | Sour Candy Challenge Ben Azlart and Jeremy Hutchins Today Ben Azlart and Jeremy Hutchins are Trying The Wo...
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038074941.13/warc/CC-MAIN-20210413183055-20210413213055-00560.warc.gz
|
CC-MAIN-2021-17
| 1,273 | 18 |
https://rahulmookerjee.com/index.php/blog/itemlist/tag/Well,%20well,%20well
|
code
|
Displaying items by tag: Well, well, well
Interesting, my friend, interesting.
I just recieved yet another "nth" notice from a courier company (delivery company, express company, kuaidi, whatever you call it, hehe) - to the notice of one of my books "Gorilla Grip (Advanced)" supposedly been stuck at custome somewhere, and them wanting the "import duty" or what not applicable from me.
This message and the emails came to me for months, then stopped.
Now, I have no idea why.
The book was supposed to be sent to a customer from the US - but at the last minute, we changed how it was sent - and it never crossed any borders, let alone into Asia.
But apparently the "canceled" order on Amazon or whatever it was never reflected globally.
One of those things, and today, I received some "long overdue notice" from some "import export adminstration" or some nonsense, some "non official" committee or something (beats me how they got my address???) ... stating that the "professional and technical manual" would be put on auction if I didnt retrieve it or some nonsense.
I've even got the photo. HEhe.
Much like I still have the photo somewhere of being served with a notice by my management in China and being threatened "we call police for breaking you peace!" and "creating mess" - all for what?
Tossing beer bottles in the trash. Hehe.
Some broke, which caused a catastrophe (personally, a cranky neighbor complained - PLUS, of course in Chinese... hehe. If I had done the same if it happened to me, literally no-one would care! and of course, the cleaning lady who couldn't sell the bottles for a profit or what not) ...
Hey, it wasn't like I was tossing them down from the 11th floor like the Bozo was, bringing women of ill repute back home (Bozo was, he was paying them to -ugh, you know what) ...
So his notice was warranted, mine maybe not...
(though yes, plenty of "women" came, but I never got the ill repute thing served to me, hehe).
But it's interesting.
THey never told me where the book would be auctioned and "proceeds would be used to pay something off".
No amounts mentioned!
So, some lucky dude will get it - except where, how and when - I have no idea!
I'll keep y'all posted.
Last I did auctions was on She-Bay, I dont particularly enjoy them either.
(nothing against 'em, just a hassle the way I see it).
Anyway - I wonder what'll come of that!
Will keep ya'll posted, but in the meantime, remember, my friend - building your grip is paramount to fitness at any level.
And the Gorilla grip series is one you simply must have.
Pick it up now, either individually, or in compilation format, you'll love it - and benefit like never before.
PS -And do NOT forget the book on tips - Volume two, yes, on it's way, maybe in a few months!
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585322.63/warc/CC-MAIN-20211020152307-20211020182307-00494.warc.gz
|
CC-MAIN-2021-43
| 2,751 | 27 |
https://asvab-prep.com/question/the-formula-for-the-area-of-a-circle-is-which-of-the-6534261567913984
|
code
|
The formula for the area of a circle is which of the following?
\(\pi r^2 \)
\(\pi d^2 \)
The area of a circle is \(\pi r^2 \).
Take more free practice tests for other ASVAB topics with our
Get all 1000+ ASVAB exam-like questions with our mobile apps!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100599.20/warc/CC-MAIN-20231206130723-20231206160723-00592.warc.gz
|
CC-MAIN-2023-50
| 251 | 6 |
https://h-w.fun/en/energy-recovery-x3/
|
code
|
Triple Energy Recovery Amount
- The amount of energy recovered is tripled for a specified period of time.
- The recovery increment remains the same at 6 minutes.
- In other words, instead of recovering 1 energy within 6 minutes, you will now recover 3 energy within the same time frame.
- Normally, the energy recovered over a 24-hour period is 240.
- With this bonus, the energy recovered over 24 hours increases to 720.
- Additionally, while the buff is active, the maximum energy accumulation limit is increased by +50. This allows a total accumulation of up to 240 energy.
- As a result, a player with a team level of 130 can fully recover all energy within 8 hours.
- Considering the conditions of a team level 130, the 24-hour buff provides an equivalent value of 480 energy, assuming the player can log in within 8 hours.
Also, a couple of notes on the “Energy Recovery x3” bonus
- If you will collect two “Energy Recovery x3” bonuses at once, The Energy Recovery rate will remain x3: if you activate two or more Energy Recovery bonuses at the same time, then only their duration will be summed up.
- If you forget to collect the “Energy Recovery x3” bonus before the Season ends, you will receive the bonus via the in-game mail as well as other unclaimed rewards. Note: the bonus will be activated right after you collect it from the mail.
- 24 hours : Total 720 Energy Recovory ( + 480 Energy Recovory)
- 2 days : Total 1,440 Energy Recovory ( + 960 Energy Recovory)
- 3 days : Total 2,160 Energy Recovory ( + 1,440 Energy Recovory)
- 4 days : Total 2,880 Energy Recovory ( + 1,920 Energy Recovory)
- 5 days : Total 3,600 Energy Recovory ( + 2,400 Energy Recovory)
- 6 days : Total 4,320 Energy Recovory ( + 2,880 Energy Recovory)
- 7 days : Total 5,040 Energy Recovory ( + 3,360 Energy Recovory)
- 8 days : Total 5,760 Energy Recovory ( + 3,840 Energy Recovory)
- 9 days : Total 6,480 Energy Recovory ( + 4,320 Energy Recovory)
- 10 days : Total 7,200 Energy Recovory ( + 4,800 Energy Recovory)
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511424.48/warc/CC-MAIN-20231004220037-20231005010037-00139.warc.gz
|
CC-MAIN-2023-40
| 2,016 | 22 |
https://www.donationcoder.com/forum/index.php?topic=52314.0;prev_next=next
|
code
|
I really like this application. Very cool!
I am curious how difficult it would be to make this so that it could open other types of files (video, audio, documents) or even from a list of links. I am using this as a reminder to stretch and exercise during the day. The sound triggers me to refer to a list of stretches/exercises I have as various different files on my PC. It would be nice for the file to be pulled up from a list of different exercises or stretches I have videos, jpegs of the exercises/stretches I am suppose to do.
Even better if I could track which stretches I have done in a spreadsheet, though that seems like a different program all together. This is a great help, just wondering how easy it would be to tweak to my use case.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474569.64/warc/CC-MAIN-20240224212113-20240225002113-00628.warc.gz
|
CC-MAIN-2024-10
| 748 | 3 |
https://lists.debian.org/debian-user/2014/06/msg01705.html
|
code
|
Re: is this sensible?
On 2014-06-29 12:52:40 +0200, François Patte wrote:
> Le 29/06/2014 12:35, Brian a écrit :
> > If that is what you really want to do you are not going about it in
> > the right way.
> > https://lists.debian.org/debian-user/2014/05/msg01042.html
> Not sure of what you mean here...
Not sure either what Brian meant.
> If it is that systemd is unavoidable, [...]
The systemd package is not needed by gthumb's strict dependencies
(by "strict" I mean that you need to disable recommends explicitly).
But you may have other packages that, once upgraded to satisfy
dependencies, now depend on systemd (I would not be surprised).
You could first try to remove all GNOME-related packages (since some
major GNOME components now depend on the systemd package[*]), then
upgrade your system to unstable, then reinstall gthumb without
However gthumb 3.3.x is broken without the GNOME desktop:
(I still use gthumb 3:3.2.6-1+b1, which is no longer in Debian
distributions, but can be retrieved from the snapshots.)
[*] Using the sysvinit system is still OK, though.
Vincent Lefèvre <[email protected]> - Web: <https://www.vinc17.net/>
100% accessible validated (X)HTML - Blog: <https://www.vinc17.net/blog/>
Work: CR INRIA - computer arithmetic / AriC project (LIP, ENS-Lyon)
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496665726.39/warc/CC-MAIN-20191112175604-20191112203604-00477.warc.gz
|
CC-MAIN-2019-47
| 1,298 | 23 |
https://nation.marketo.com/t5/product-discussions/unable-to-approve-template-even-after-validating-html/m-p/40181
|
code
|
Getting this error when attempting to approve a template: "One or more mktEditable sections have errors. Make sure you have at least one and that they all have valid IDs."
Each area has a different ID and the HTML is valid.
Can I nest the DIVs outside the table tag?
Here is some sample code from my template, using the ZURB Ink format:
<td class="wrapper last">
<div class="mktEditable" id="image-left">
<table class="twelve columns">
<td class="four sub-columns text-pad">
<img src="http://placehold.it/200x155" alt="" class="center">
<small class="show-for-desktop">caption here</small>
</td><td class="eight sub-columns last left-text-pad">
<p>A fairly common use case for the container is to give your text a white background to separate it from a colored email body. To assist with this design pattern, we've included three helper classes with Ink: .text-pad, .left-text-pad and .right-text-pad.</p>
Any help would be great!
Solved! Go to Solution.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991224.58/warc/CC-MAIN-20210516140441-20210516170441-00396.warc.gz
|
CC-MAIN-2021-21
| 954 | 14 |
https://lists.01.org/hyperkitty/list/[email protected]/message/KWCQFLGV5QXMKJTRL257LIHFQADMC3IL/
|
code
|
>> We are facing a problem in oFono when using 3G modems:
>> A CDMA2000 modem can have same PID with WCDMA modem, or TDS-CDMA
>> modem -- 3G modem vendors already confirm they do that.
>> That's to say, if following current strategy, it will be a problem to
>> install proper driver for this kind of 3G modem.
>> So, is it feasible to find out a solution such as to probe the modem
>> firstly, find out what kind of network modes it supports, and then
>> install the driver?
>> The way to probe the modem could be some action as to read the
>> capability or get system mode, or issue some specific AT command that
>> only response to certain network mode?
> Indeed, we could use for Huawei modems for instance the AT^SYSINFO
> command and retrieve the sys_mode field and parse it, I have found
> this in public Huawei specifications:
> <sys_mode>: System mode. The values are as follows:
> 0 No service.
> 1 AMPS mode
> 2 CDMA mode
> 3 GSM/GPRS mode
> 4 HDR mode
> 5 WCDMA mode
> 8 CDMA/HDR HYBRID mode
> Thus we can chose accordingly the drivers to create oFono atoms.
After some investigations, it seems SYSINFO won't be enough to get the
modem type because with this AT command we will have to be registered to
the network to get the system mode.
The only way I found until now is using the AT+GCAP to check whether the
modem is CDMA or GSM type.
However if we do the AT+GCAP request for each constructor plugin
(huawei, zte, ...) it will bring some duplicated code.
Does someone see any better solution?
I like to see that we do proper homework here. The first question is
actually can you execute AT+GCAP if not SIM card has been inserted or is
actually locked? And if not does, ATI provide an extra +GCAP response.
Without a SIM atom you will not be able to unlock the modem. And you can
only create the SIM atom if you know what modem technology you are
using. Additionally of course additionally, what are the responses for
various modem models and manufactures. Are they doing this actually
We need OFONO_AT_DEBUG traces for all the various permutations of this
behavior. This needs to be documented first. Feel free to send patches
to add the results to doc/ directory inside oFono.
Just randomly hacking around will get us in trouble and will make well
behaved modems like MBM or IFX fail or suffer for no apparent reasons.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703549416.62/warc/CC-MAIN-20210124141945-20210124171945-00084.warc.gz
|
CC-MAIN-2021-04
| 2,334 | 43 |
https://benhay.es/posts/hands-on-edge-ai/
|
code
|
Table of Contents
Why is there so much hype around edge AI (and AI in general, see ChatGPT) and the potential it has to bring? Ask yourself what if supply chains were more efficient and predictable, transporation networks were more safe and reliable, and energy systems were more secure and sustainable. Edge AI has the potential to radically improve all of these industries along with others thanks to advancements in AI technology, accessibility of tiny compute devices, and growing interest in making our planet better. Understanding edge AI is an important first step to generating value.
What is Edge AI?
Folks in the field will give you different definitions of edge AI and mine won’t be the ultimate or conclusive one. By taking advantage of relatively cheap compute, low-power/field-ready devices, and AI algorithms, edge AI enables companies, governments, or individuals to deploy smart systems anywhere. But why take it from me? Here’s how one AI, ChatGPT, describes edge AI:
Edge AI refers to the deployment of artificial intelligence (AI) algorithms on edge devices, such as smartphones, cameras, sensors, and other embedded systems. By processing data locally on edge devices rather than sending it to a remote server, edge AI enables faster and more efficient real-time processing of data, as well as greater privacy and security of sensitive data.
Why is it important?
Many smart people tell you to answer “why” before “how” and that’s exactly what we need to do with edge AI. So you have AI applications running today or maybe you’re considering them? Why should you consider deploying to embedded or edge devices? Here’s why.
Common use cases include predictive maintenance, equipment efficiency, defect detection, fall detection, retail customer habits, automated retail checkout systems, visual security (verifying identity or checking if PPE is being worn)… and many more. Essentially, any repeatable decision in the field can be improved by applying AI. Value is generated by pushing decisions closer to real-time and minimizing the data processing needs. Additionally, the closer the use case is to the field, the easier it is to understand and maintain.
Another commonly overlooked advantage is the rising power consumption and cost of advanced computing (CPUs, GPUs). There’s a strong correlation between the performance of the best AI models today and their power consumption or draw. While the value per watt is still economical, this cost is something to consider.
How does it work?
Understanding how it works requires some knowledge of the fields that intersect and form edge AI: microcontrollers and AI. Let’s quickly recap these topics:
- AI and deep neural networks - If you’re familiar with this topic, just recall that these models typically require mountains of data and powerful hardware for both training and inferencing. Advances are changing that today. If you’re less familiar, check out my previous post on the topic.
- Microcontrollers - These low-power devices are becoming more common each year by offering flexibility and tiny form-factors. A significant portion of the community is guided in open-source channels which leads to some confusion when getting started.
In this demo, we will be detecting (classifying) whether or not a street parking space is available. While this is a toy example, the use cases mentioned above (defect detection, preventative maintenance, etc.) can all be solved for by repurposing this example.
Let's take a peek at the training data - take a look at this image showing 9 examples (out of ~400) of both a "free" (or available) and "taken" parking space. Red boxes indicate a parking space that has been taken by a car. Green boxes indicate a parking space that is free. You'll notice in a few examples there are trash cans, pedestrians, other parked cars, and even cars in motion. The keen observer you are may have also noticed variations in time of day, cloud cover in the background, and snow on the ground. Our model must be able to account for these scenarios.
We'll be using a trio of tools to accomplish this parking detection use case.
- Nicla Vision - A device equipped with a camera, microphone, motion sensor, distance sensor, and Wi-Fi and Bluetooth Low Energy connectivity
- Edge Impulse - A platform to help developers create, train, and deploy models for edge devices
- OpenMV IDE - An IDE that bridges your workstation and the Nicla Vision (among other devices)
As with most AI/ML problems, there will be a core training and evaluation step. However, with edge AI, there are extra considerations to take in to account. What problem are we solving? What type of device do we have/need - and what specs? What quantity and quality of data do we have/need? How do we deploy and maintain the solution? Understanding these questions at the start will get you off on the right foot. Here's an over-generalized, simplified approach for this type of solution:
- Step 0: Understand the problem - What’s the value? Who benefits? Who cares? How much uplift can we expect?
- Step 1: Frame the problem in terms of AI/ML and consider edge constraints
- Step 2: Define your data and data needs
- Step 3: Model and Evaluate (train, test, metrics, etc.)
- Step 4: Deploy and Maintain - Do you need to minify the model to run on your microcontroller?
In the parking detection case, the problem is a toy one - so step 0 doesn’t carry much weight. The problem is image classification/detection which will require labeled training data. The training data is supplied by me (approximately 400 120x68 pixel images, though a “good enough” model was trained using about 200 images during testing). We’ll be using Edge Impulse to train and quantize the model. We’ll leverage OpenMV to deploy the model on the Nicla Vision.
The code running on the Nicla device is quite short (less than 100 lines) but relies on tools in the micropython ecosystem. The process is essentially only 3 parts:
- Import minimal amounts of resources (sensor, image, time, etc)
- Load the trained model
- Loop and process sensor data with the model
This code can be extended to perform more robust checks on the image, to aggregate the data over time, or to report back to a centralized platform. You can even integrate with Twilio to send a text message when an event occurs. In this example, knowing a car has left the parking space could be valuable when planning where to park.
1# Edge Impulse - OpenMV Image Classification Example 2 3import sensor, image, time, os, tf, uos, gc 4 5sensor.reset() # Reset and initialize the sensor. 6sensor.set_pixformat(sensor.RGB565) # Set pixel format to RGB565 (or GRAYSCALE) 7sensor.set_framesize(sensor.QVGA) # Set frame size to QVGA (320x240) 8sensor.set_windowing((160, 160)) # Set 240x240 window. 9sensor.skip_frames(time=2000) # Let the camera adjust. 10 11net = None 12labels = None 13 14try: 15 # Load built in model 16 labels, net = tf.load_builtin_model('trained') 17except Exception as e: 18 raise Exception(e) 19 20 21clock = time.clock() 22while(True): 23 clock.tick() 24 25 img = sensor.snapshot() 26 27 # default settings just do one detection... change them to search the image... 28 for obj in net.classify(img, min_scale=1.0, scale_mul=0.8, x_overlap=0.5, y_overlap=0.5): 29 print("**********\nPredictions at [x=%d,y=%d,w=%d,h=%d]" % obj.rect()) 30 img.draw_rectangle(obj.rect()) 31 # This combines the labels and confidence values into a list of tuples 32 predictions_list = list(zip(labels, obj.output())) 33 34 for i in range(len(predictions_list)): 35 print("%s = %f" % (predictions_list[i], predictions_list[i])) 36 37 time.sleep(0.25) 38 39 print(clock.fps(), "fps")
When running the model connected to OpenMV, you can see in the top right corner of the image below, a pedestrian walking in the lower portion of the frame. This pedestrian did not trigger any “sense” of the parking space being taken. Obviously more evaluation would be required but that is a good sign that the model is robust and not overly susceptible to noise (pedestrians, waste management bins, etc.). In the bottom-left portion of the screen capture, you’ll notice the weight given to “free” and “taken” labels in real-time. These values are intentionally slowed down using
time.sleep() to avoid flooding the terminal.
Just to recap, we reviewed edge AI as a concept, discussed the potential value, and demonstrated how a simple device/sensor in the field can be taught to use powerful tools like artificial intelligence. We used a Nicla Vision board equipped with a 2MP color camera to detect whether a parking spot is free or taken. Of course, this use case is a toy example that only affects me, but with a little imagination, this approach can be extended to use cases including preventative maintenance on critical equipment or infrastructure affecting millions of people.
Considerations and Next Steps
This space is new but maturing. Next steps for the model include building pipelines to make the training data set more robust and large (filled with plenty of examples not already included), and developing best practices around deployment strategy to make this approach durable, repeatable, reliable. Next steps for edge AI are understanding the potential value, the limitations, and what the edge, IoT, and AI spaces will bring in the near future. Start thinking through how edge AI can help unlock value for you, your organization, and your community.
- Arduino Store - Nicla Vision
- Edge Impulse - Arduino Nicla Vision Overview
- Edge Impulse: Adding sight to your sensors
- Getting started with Nicla Vision
- NVIDIA Blog: What is Edge AI?
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511055.59/warc/CC-MAIN-20231003060619-20231003090619-00248.warc.gz
|
CC-MAIN-2023-40
| 9,685 | 42 |
http://stackoverflow.com/questions/14186525/2d-graphic-how-to-make-a-metronome-clock-hand
|
code
|
I'm new to android. I have a metronom application and I want to put a graphic illustrating ticking cycle. (just a line that is fasten at one end and it's angle is changing) something like this: http://dir.coolclips.com/Entertainment/Music/Professional_Audio_Equipment/Metronomes/metronome_CoolClips_vc005895.jpg . Anybody knows how to make this?
The equation you are looking for is based on metronom (pendulum) frequency.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783393332.57/warc/CC-MAIN-20160624154953-00067-ip-10-164-35-72.ec2.internal.warc.gz
|
CC-MAIN-2016-26
| 421 | 2 |
https://glossarytech.com/terms/cloud_computing/elastic_load_balancing
|
code
|
Follow us on:
Elastic Load Balancing distributes incoming application or network traffic across multiple targets, such as Amazon EC2 instances, containers, and IP addresses, in multiple Availability Zones.
© Copyright 2023 Relocateme. All Rights Reserved
Development by Synergize.digital
Leave your email and we'll notify you as soon as the term is added.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500158.5/warc/CC-MAIN-20230205000727-20230205030727-00015.warc.gz
|
CC-MAIN-2023-06
| 356 | 5 |
http://matiaswilkman.blogspot.com/2016/06/webhack-2016.html
|
code
|
Friday, June 17, 2016
This week, I participated in Solita Webhack, an information security event where we got to try our hacking hand at real-world web applications. I'm under a Non-Disclosure Agreement about the specifics, but fun was had and some holes were poked. The timing was great, as I've been studying the Web Application Hacker's Handbook, which helped me uncover a lead on a potential vulnerability relating to session cookies. I even picked a physical lock while I was there!
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607726.24/warc/CC-MAIN-20170524001106-20170524021106-00052.warc.gz
|
CC-MAIN-2017-22
| 487 | 2 |
https://www.biztalk360.com/blog/biztalk-360-biztalk-application-dashboard/
|
code
|
The BizTalk application is a feature of Microsoft BizTalk Server that makes it quicker and easier to deploy, manage, and troubleshoot BizTalk Server business solutions. A BizTalk application is a logical grouping of the items, called “artifacts,” used in a BizTalk Server business solution. There are various artifacts present in a BizTalk solution, which includes
- Receive ports/locations, send ports, send port groups and orchestrations
- BizTalk Assemblies and BizTalk specific resources that they contain – Orchestrations, pipelines, schemas, and maps
- .NET assemblies that do not contain BizTalk specific resources
- Other items that are used by the solution like policies, certificates, scripts, COM components etc.
A more detailed explanation of BizTalk application can be found in this article http://msdn.microsoft.com/en-us/library/aa560585(v=bts.70).aspx
When it comes to monitoring and supporting a BizTalk solution, it typically will relate to managing one or more BizTalk applications and the artifacts that’s grouped into that application. It’s important to give the support person a clear view of what’s happening inside the application to facilitate better management and easy diagnosis of problems.
solves this challenge by providing an application level dashboard as shown below
BizTalk360 application dashboard provides a single view of all the important runtime artifacts and their status. As shown in the above picture, there are 5 important sections highlighted in the application dashboard
- Status of any suspended instances and last suspended time
- Status of all the receive ports/receive locations
- Status of all send ports
- Status of all Orchestrations, and
- Status of host instances related to the application
If there are any suspended instance for the particular application, a red bar with the number of suspended instances count and last suspended date time in simple English text will appear on the top. This just gives clear indication for the support person, there is something wrong in the application. By clicking the “Query Instance” link inside red bar, will take the user directly to the query instances window, where more details about the suspended instances can be found as shown below:
ReceivePort/Location, Send port, Orchestration Status
When it comes to BizTalk applications there are three main runtime artifacts receive ports/locations, send ports and orchestrations. For a healthy functioning of the BizTalk applications, its essential to make sure these artifacts are in proper running state. Example: Receive locations shouldn’t be disabled, orchestrations shouldn’t be in stopped state etc.
BizTalk360 application dashboard highlights the statuses of these runtime artifacts in a single place. They are colour coded to hint the application support person any potential issues. Ex: If one of the send ports in the application is in stopped state, and not transmitting any messages to external vendors then it will be highlighted in red as shown below.
Grouped receive locations:
A receive port can have one or more receive locations. BizTalk360 groups them together and displays it in the application dashboard to give a better understanding of receive ports and receive locations relationships as shown below
Clicking on the “Detail” link, will take the user to corresponding tab with more details about the artifacts.
Host Instances Status (related to the application)
It’s one of the great challenges to identify the relationship between the application and the host instances required to successfully run the application. In order to work out the relationship, its essential to understand the concepts of host/host instances/handlers/artifacts/applications and their relationship between them. BizTalk360 addresses these challenges by its internal algorithm and present the host instances required to run the application directly on the dashboard.
This helps the support person to check whether the corresponding host instances required for the application are in a healthy state as shown below.
BizTalk360 application dashboard also allows the end user to see the general properties of the application like their status, description, some statistics, references etc as shown in the below picture.
Hide unused artifacts tabs
Not all the BizTalk applications will make use of all the BizTalk artifacts. Example: If it’s a pure messaging only application then there won’t be any orchestrations. To reduce the confusion for BizTalk support person, BizTalk360
gives the option to hide unused artifacts, by clicking the “Hide unused link”. You can see the before and after screen shots below to get the idea.
PS: If in case you haven’t noticed BizTalk360
is a web based (RIA
) application, built using Microsoft SilverLight. The above screens are accessible via browser. There is no necessity to install anything on the client PC except Microsoft SilverLight
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818474.95/warc/CC-MAIN-20240423095619-20240423125619-00346.warc.gz
|
CC-MAIN-2024-18
| 4,952 | 31 |
https://forum.bubble.is/t/bubble-veterans-how-would-you-approach-this/39669
|
code
|
I’m currently attempting to schedule a notification to be sent to a specific user at a future date, without the user ever having to visit the page that the scheduled notification is coming from. The current way I’m attempting to accomplish this just won’t work, no matter how I try to do it. I’m frustrated and need a new possible angle to work.
So, I’m looking for a new approach. All the veterans here, how would you approach this?
User-created a product and paid for the product to be posted until 10/11/2018. When the time for his/her posted product has expired an automated notification needs to be sent to him with a call to action.
Note: I already have a notification system that works. It’s automating the notification for a future date that’s throwing me for a loop. I have a paid plan with the ability to do API workflows.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583516194.98/warc/CC-MAIN-20181023132213-20181023153713-00001.warc.gz
|
CC-MAIN-2018-43
| 846 | 4 |
https://cruxsolablog.com/2014/02/19/sign-up-for-ecclesia-ethics-conference-online-march-1-8-gupta/
|
code
|
Last year (2013) I was honored to be a part of the inaugural online conference called “Ecclesia-and-Ethics.” I gave a paper and there was lots of great interaction afterwards.
Now, in 2014, the conference is happening again – you can “attend” from the comfort of your couch, office, or bed! Great speakers and for registration you pay $10 towards one of the charities the conference supports (like World Vision) or towards a charity of your choosing.
The dates in 2014 are two Saturdays – March 1 & 8. Here is a sampling of some of the speakers:
Michael F Bird
To be honest, for $10 it is totally worth it. My impression was that the attendees/participants last year found it to be very rewarding experience (I know I did!), especially interacting with people from all over the world.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250608062.57/warc/CC-MAIN-20200123011418-20200123040418-00040.warc.gz
|
CC-MAIN-2020-05
| 796 | 5 |
https://www.pcwizardsinc.com/pacific-computer-wizards-repository/office-0710-suite-crashes-on-2008-terminal-server
|
code
|
Office 07/10 - Suite Crashes on 2008 Terminal Server
Post date: May 10, 2012 3:23:28 PM
If you are having Word or Excel Crash consistently on your 2008 x64
Terminal Server, and you are running MS Office x86 edition of 2007 or
2010, you are experiencing a known issue with DEP. That's right, even
though it's a Microsoft product that is the problem. Turn on DEP for
all programs except those I list... and in the list, put them in...
word.exe, excel.exe, etc. Reboot. Once back up, your issue should be
Note: Another way to resolve the DEP issue is to install the x64
version of Office on your x64 Terminal Server. There are no issues
with that setup.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571996.63/warc/CC-MAIN-20220814052950-20220814082950-00602.warc.gz
|
CC-MAIN-2022-33
| 650 | 11 |
https://ec2-54-174-39-122.compute-1.amazonaws.com/AJRimmer/posts/391383
|
code
|
This tea has dessert-related words in the name, so it was an automatic buy from me. While I’m too lazy to time my steeps, I did make sure to keep it short to avoid bitterness, and that worked. It tastes kind of like a fruit-flavored candy. It did get bitter as it sat on my desk, as most green teas seem to, so I was trying to drink it quickly. This is definitely one of the best fruity green teas I have had, though I would not call it custard tart. If it said berry candy green, then that would be very accurate.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154053.17/warc/CC-MAIN-20210731043043-20210731073043-00715.warc.gz
|
CC-MAIN-2021-31
| 516 | 1 |
http://frostinschronicles.blogspot.com/2006/09/bad-computer.html
|
code
|
I'm posting late today because Bob said his computer got corrupted and would not go on the web this morning. He fixed it now though. It is nice to have a pet that knows how to keep the computers working.
My friends Blogs
More Links of Interest
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917127681.84/warc/CC-MAIN-20170423031207-00008-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 243 | 3 |
http://stsdas.stsci.edu/cgi-bin/gethelp.cgi?fgauss
|
code
|
fgauss -- Fit a Gaussian.
This task fits a Gaussian function of the form:
Y = AMPL * EXP -((X-LOCN)**2 / (2*SIGMA**2)) + BASELINE
to two-column data in an ordinary text file. If the input to this task is the output file from the fsquares task, then Y has the units of the data squared, and X is refoc mirror position. LOCN is the location of the focus (see the locn parameter below).
A plot of the input data and the fitted curve can be generated. It is not necessary to actually fit a curve in order to plot one. If all parameters are held fixed, the curve defined by the parameters given in the par file will be plotted.
The downhill simplex method is used to fit the curve. The fitting is done by calling the Numerical Recipes AMOEBA subroutine (renamed "FAMOEB" because of a change in the calling sequence). See the help for the fhyper task for further information.
If you would like to modify the function to be fit or write code for another function, here are the files and routines that depend on the function.
fgauss.x: procedure fgauss This is the task itself. procedure f_4g_save This saves the parameter values (that were determined by the fit) in the task par file. fcsinit.x: procedure f_4g_init This gets the initial values for the parameters, either from the par file or from the data. procedure f_4g_range This gets an estimate of the range of values for each parameter. The range is not intended to be the maximum possible range but rather a guess as to a reasonable range. fcsfunk.x: real procedure fcs_gauss This evaluates the Gaussian at one point. It is called from f_gaus_funk and also by the plotting routine. real procedure f_gaus_funk This is the function to be minimized.
- infile = "" [string]
- Name of input ASCII file. This file contains two columns, the independent variable values and the dependent variable values.
- (init = "data") [string, Allowed values: data | par]
- The initial values for the parameters can be taken either from the par file or estimated from the data. The values of parameters that are to be held fixed are always gotten from the par file.
- (fitlocn = yes) [boolean]
- Fit for the location of focus? Each of the parameters may either be held fixed at the value given in the par file or allowed to vary in order to find the best-fitting curve.
- (locn = 0.) [real]
- Initial estimate of location of focus. If the location is to be held fixed, the value is taken from this parameter. If the location is to be allowed to vary, the initial estimate will either be gotten from the data (if init=data) or from this parameter (if init=par). The first guess from the data is simply the X location of the largest Y value.
- (fitampl = yes) [boolean]
- Fit for the amplitude of the Gaussian?
- (ampl = 1.) [real]
- Initial estimate of amplitude. The first guess from the data is the difference between the largest and smallest Y values.
- (fitsigma = yes) [boolean]
- Fit for sigma?
- (sigma = 50.) [real]
- Initial estimate of sigma. The first guess from the data is one quarter of the difference between the largest and smallest X values.
- (fitbase = yes) [boolean]
- Fit for the baseline?
- (baseline = 0.) [real]
- Initial estimate of baseline. The first guess from the data is the smallest Y value.
- (option = "lsq") [string, Allowed values: lsq | minsum]
- The fit may be performed by minimizing the sum of squared deviations (option=lsq) between the data and the curve or by minimizing the sum of the absolute values of the deviations (option=minsum).
- (ftol = 1.e-5) [real]
- Fractional error allowed. The fit is terminated either when the maximum allowed number of iterations (currently 500) is reached or when the fractional error is less than ftol. The fit is performed by minimizing a function, e.g., sum of squared deviations. The function is evaluated at the vertices of a simplex, and the fractional tolerance is ABS (YHIGH - YLOW) / ((ABS (YHIGH) + ABS (YLOW)) / 2.), where YHIGH and YLOW are the maximum and minimum values.
- (logfile = "") [string]
- Name of output file for info about fit.
A file will be created with this name (if it's not null) and information
will be written to it giving some details about the fit.
The values of the variable parameters (but not the fixed parameters)
and the value of the function to be minimized will be written to the file
for each vertex of the simplex.
These are written before each of the two calls to the amoeba routine,
i.e., for the initial estimates of the parameters and also after a minimum
has been found.
In each case the first line gives the parameter values (and function value)
for the vertex containing the current estimates of the parameters,
while the other lines give values for the other vertices,
which are the same except for one parameter at each vertex.
The number of iterations for each call to the amoeba routine is printed.
A line is also printed giving the final values of the variable parameters and
the value of the function to be minimized.
If the data and fitted curve are to be plotted (see the description of the device parameter), the screen will be cleared after writing to the log file, so if logfile="STDOUT" the information will be lost.
- (title) [string]
- A title for the plot may be given with this parameter.
- (xlabel = "refoc position") [string]
- This is used as a label for the X axis.
- (ylabel = "sharpness") [string]
- This is used as a label for the Y axis.
- (xmin = -5.) [real]
- The plot range in X may be specified with xmin and xmax. If either or both is INDEF then the plot limits will be determined by the input data.
- (xmax = 235.) [real]
- See xmin.
- (device = "stdgraph") [string]
- Name of graphics device. This parameter may be set to "stdgraph" or "stdplot" to plot the input data and the fitted curve. If device="" no plot will be generated. If all the flags (i.e., fitlocn, fitampl, fitsigma, fitbase) are set to "no", a plot can still be made which will show the curve calculated with the parameters (locn, ampl, sigma, baseline) specified in the par file.
This task was written by Phil Hodge. A slightly modified version of the Numerical Recipes AMOEBA subroutine is used to do the fit. Numerical Recipes was written by W.H. Press, B.P. Flannery, S.A. Teukolsky, and W.T. Vetterling.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221213691.59/warc/CC-MAIN-20180818154147-20180818174147-00302.warc.gz
|
CC-MAIN-2018-34
| 6,263 | 63 |
https://www.monster.com.my/search/online-learning-jobs
|
code
|
Analyzing Deep Neural Network applications for the development of novel database modeling. Also collaborate with software groups to design and implement model training and inference flow. Willing to work in Kulim, Kedah
An executive position under Learning and Development section in Human Resources department. This position required the candidate from manufacturing industry with minimum 1-2 years working experiences in Learning and Development.
Job Description The Oracle Cloud Product Lifecycle Management (PLM) engineer will support the requirements of the service area, create complex Oracle PLM architecture solutions and apply them to strategic efforts internally or work with technolog
Greetings from AMK Group of Companies!!! Position : Web Developer for Web Application (PayNet - E-Mandate & online payment gateway ) Job Type : 03 month extended project Location : KL Malaysia Payroll : AMK Technologies ,
One of the industry’s leading global software and information technology services companies and a listed company. Specializes in Analytics, Big Data, Machine Learning and Artificial Intelligence,Deep Learning.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618039554437.90/warc/CC-MAIN-20210421222632-20210422012632-00631.warc.gz
|
CC-MAIN-2021-17
| 1,129 | 5 |
https://vintagesleds.com/bs/index.php?topic=260961.0
|
code
|
Yes. Below the subscribe link you should see an arrow with the word "share". Click on that. You'll see three tabs. Share, embed and email. Click on the embed and it will give you a link. Copy and paste that into your post.
Apparently it's not working. Usually does.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400190270.10/warc/CC-MAIN-20200919044311-20200919074311-00130.warc.gz
|
CC-MAIN-2020-40
| 265 | 2 |
http://www.iclarified.com/21199/how-to-convert-h264-mkv-files-to-mp4-without-reencoding-windows
|
code
|
Following this procedure will save you lots of time and prevent video quality degradation if you need video in mp4 format for playback through iTunes, the Apple TV, or your iOS device.
EXTRACT VIDEO AND AUDIO FROM MKV
Demux (ie extract) the video and audio tracks from the MKV container format.
Download and install mkvtoolnix from here to your applications folder.
Launch a new command prompt window by pressing the Windows + R keys. Then type cmd and click OK.
Navigate to the folder that contains your .mkv file and execute mkvinfo video.mkv replacing video.mkv with your filename.
Take note of the video codec, video framerate (fps), and audio codec.
Execute the following command to extract the mkv file.
mkvextract tracks video.mkv 1:video1.h264 2:audio2.ac3
*Replace 'video' with the name your video file. Also be sure to replace .ac3 with the audio format identified in the previous step. ie. .aac, .dts, etc.
CONVERT AUDIO TO AAC
If the audio track you extracted is not in AAC format than you will need to convert it.
You can use your favorite application to convert the audio or try Pazera Free Audio Extractor which can be downloaded from here. Once the download finishes, extract the archive.
Launch AudioExtractor.exe from the folder you just extracted.
Drop the audio file that was extracted from the mkv into Pazera. Note: the audio files will likely be named audio2.ac3 or audio2.dts.
Set the Output format: dropdown to AAC and click the Convert button on the toolbar to begin.
COMBINE VIDEO AND AUDIO INTO MP4 FILE
Mux the .h264 video and the .aac audio file into a mp4 file using MP4Box.
Download MP4Box from here. Extract the downloaded archive.
Drag the MP4Box.exe file into the command prompt window you have open and input the following command.
C:YourPathMP4Box.exe -fps 23.976 -add video1.h264 -add audio2.aac video.mp4
*Make sure to specify the frame rate we noted earlier or your audio will be out of sync. Also be sure to use the .aac audio file and not the original.
MP4Box will now combine the video and audio tracks into a mp4 that can be added to iTunes!
IMPORTANT: If MP4Box fails due to a missing msvcr100.dll file, you can download that file here. Put it in the MP4Box folder.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-40/segments/1474738661953.95/warc/CC-MAIN-20160924173741-00185-ip-10-143-35-109.ec2.internal.warc.gz
|
CC-MAIN-2016-40
| 2,210 | 24 |
https://community.notepad-plus-plus.org/topic/11457/feature-request-folder-as-workspace-using-network-locations-that-aren-t-mapped
|
code
|
Feature Request: Folder as Workspace using network locations that aren't mapped.
The title pretty much explains it. The new Folder as Workspace feature is definitely an improvement but at my job, we have files that live on servers and those locations aren’t mapped to my PC. I may be able to add such a folder by going through the Network portion of the Browse for Folder window when adding to the workspace but at a large enterprise, that could be painfully slow to load. I’d suggest simply using a different folder selection window much like what Atom uses where I can just start typing in a UNC path in the address bar. Let me know if there is any confusion or that I’ve missed something.
@kczx3 Created an account just for agreeing with this. Changing the folder selection would easily fix this.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712297284704.94/warc/CC-MAIN-20240425032156-20240425062156-00159.warc.gz
|
CC-MAIN-2024-18
| 805 | 3 |
https://7dor.blogspot.com/2008/09/okay-so-heres-deal.html
|
code
|
Any of you old enough to remember Ed Sullivan and his show, it seemed that about once a month, he'd have a guy on that would spin plates on the ends of long, thin sticks. The guy would get maybe a couple dozen of these things going, then have to start running around trying to keep them all going -- which was a losing proposition; eventually, all of the damn plates ended up on the floor.
Well, I've been kinda like that guy: every time I thought about posting something that came into my head, one of the other things that I had going on would distract me. Stuff like:
- Installing and testing the Jeebus out of Sun's Open Solaris operating system (free for the downloading). [Informal review: not quite ready for desktop usage yet, but definitely worth considering for server usage.]
- Taking a Tonka "RC" (remote- [not radio-] controlled) frontend loader (similar to this truck, from Radio Shack) and modifying it for use as the base for an Arduino-based robotics platform, with the plan to keep building on it until I either overload the Arduino or the toy :-)
- Getting my webserver (the original TwoOfEverything.org system) repaired/replaced, the operating system installed, and back online.
- Performing all manner of bizarre and unnatural experiments on/with my Arduino.
- Building myself an electronics workbench (surplus countertop, outlets, on/off switch, lighting, etc).
- Sorting through all my assorted salvaged electronic/computer parts (motors, connectors, heatsinks, cables, power supplies, gears, sensors, etc) and getting them organized so I can find shit again.
- Writing a couple of programs to learn Java through the 'total immersion' system: read how to do something I want to do, try it, then keep hacking at it until I get it right. Lather, rinse, repeat...
- Doing the occasional bit of computer service for friend-of-a-friend or referrals -- something that makes me realize more and more just how seriously fucked up MS Windows(tm) is, and just how incredibly naive, stupid, thoughtless, or just plain ignorant some people can be.
- Designing, building, and debugging a couple of not-too-large electronics projects for myself. If you're interested, they are a logic analyzer, a computer-based oscilloscope interface, and a small instrumentation and control system (home automation).
- Continuing to write monthly Science & Technology articles for a local weekly newspaper.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817438.43/warc/CC-MAIN-20240419141145-20240419171145-00352.warc.gz
|
CC-MAIN-2024-18
| 2,400 | 12 |
https://www.bleepingcomputer.com/forums/t/244526/no-browsers-except-ie-will-work/
|
code
|
I'm on a personal laptop, a Toshiba Satellite L305 running Windows Vista SP1.
I bought the computer about two months ago and, until about two hours ago, I had been using Firefox with no incidents whatsoever. I was browsing the internet this evening when it froze up. I force-quitted firefox.exe via the Task Manager and, as usual, restarted the application.
When I did so, it went through a round of auto-updating at the beginning (I had been running 3.0.11; it updated to 3.0.12, I believe) then, when the browser came up, none of the pages would load, returning a "Problem loading page"/"Unable to connect" message on all the tabs. I have tried to connect to several pages in FF, and none load.
My internet connection is fine - AIM, MSN, and Internet Explorer all work with no problems.
On a hunch, I downloaded Google Chrome and tried to run it - the same error occurred as in Firefox.
Yes, I have checked both the Windows Firewall and Firefox proxy settings. All are fine.
No changes have been made to my wifi, router, or ISP.
I've tried several levels of troubleshooting, all to no avail:
1) Restarted system.
2) Restarted firefox in Safe Mode.
3) Restarted Windows in Safe Mode with Networking
4) System Restored to a point made yesterday; then System Restored to a point made a week ago.
5) Upgraded firefox to the latest version, 3.5.1
6) Downgraded firefox to the last version, 3.5.12
7) Did a complete uninstall of Firefox (all profiles/preferences) and reinstalled to 3.5.1
8) Ran several antivirus/antimalware programs: SUPERantispyware, Malwarebytes' Anti-Malware, and CCleaner.
Googling the problem brings up several hits, but no clear resolution other than suggestions to check the Firewall and Proxy. Any suggestions would be incredibly helpful - I'm on an extended trip overseas, so I can't go to my normal tech support buddies for them to give it the once-over.
Edited by jasonglchu, 26 July 2009 - 05:16 AM.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583513009.81/warc/CC-MAIN-20181020163619-20181020185119-00084.warc.gz
|
CC-MAIN-2018-43
| 1,926 | 18 |
https://sourceforge.net/p/auber/discussion/206283/thread/df6ad74f/
|
code
|
Rev. 9790, OSX 10.8.4
I've got an issue while iterating over the edges of my graph after ctrl+Z (Python).
The piece of code:
for e in self.sg.getOutEdges(n):
n2 = self.sg.opposite(e, n)
Exception: Edge with id 150935 does not belong to graph "unnamed" (id 16)
which is rather strange since I'm iterating over these same edges...
Note this does not happen when executing the script on the first time, but only after ctrl+Z
This is quite problematic, forcing me to close and reopen my project whenever I'm editing the script.
Désolé trompé de discussion, je vais déplacer ça dans les tickets.
I bet someone could put a break point on the signal handler function in qt to find out what is receiving your ctrl+z, and then walk through what happens when ctrl+z is pressed.
Also, grepping the source for ctrl+z or any variant of it as well as how keybindings are registered might help.
Log in to post a comment.
Sign up for the SourceForge newsletter:
You seem to have CSS turned off.
Please don't fill out this field.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171664.76/warc/CC-MAIN-20170219104611-00514-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 1,017 | 16 |
http://vtk.1045678.n5.nabble.com/Is-there-a-filter-to-inflate-vtkPolyData-an-opposite-to-vtkShrinkPolyData-td5744305.html
|
code
|
Is there a filter to inflate vtkPolyData, an opposite to vtkShrinkPolyData?
I cannot find one. If there isn't one, how should I go about it?
And what should I do if I need to inflate only a part of the polydata?
I have tried to move each point in the selected data set alongside its normal,
but it is very slow and doesn't work as expected.
I am getting some results for planes or nearly flat surfaces, or even spheres,
but nothing works for surfaces with folds (concave parts).
Any advice? I have spent a week on this, and I am just stuck.
Excuse my ignorance if I miss something obvious, it is my first project with VTK.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670558.91/warc/CC-MAIN-20191120111249-20191120135249-00189.warc.gz
|
CC-MAIN-2019-47
| 622 | 9 |
https://www.lesswrong.com/users/hgbanana123
|
code
|
I think that
"Don't say things that you believe to be literally false in a context where people will (with reasonably high probability) persistently believe that you believe them to be true"
is actually in line with the "bayesian honesty" component/formulation of the proposal. If one is known to universally lie, one's words have no information content, and therefore don't increase other people's bayesian probabilities of falsy statements. However, it seems this is not a behaviour that Eliezer finds morally satisfactory. (I agree with Rob Bensinger that this formulation is more practical in daily life)
Scott Alexander has an interesting little short on human manipulation: https://slatestarcodex.com/2018/10/30/sort-by-controversial/
So far everything I'm seeing, both fiction and anecdotes, is consistent with the notion that humans are relatively easy to model and emotionally exploit. I also agree with CBiddulph's analysis, insofar as while the paperclip/stamp failure mode requires the AI to have planning, generation of manipulative text doesn't need to have a goal--if you generate text that is maximally controversial (or maximises some related metric) and disseminate the text, that by itself may already do damage.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945218.30/warc/CC-MAIN-20230323225049-20230324015049-00120.warc.gz
|
CC-MAIN-2023-14
| 1,231 | 5 |
http://sourceforge.net/p/jython/mailman/jython-dev/thread/[email protected]/
|
code
|
Just Launched: You can now import projects and releases from Google Code onto SourceForge
We are excited to release new functionality to enable a 1-click import from Google Code onto the Allura platform on SourceForge. You can import tickets, wikis, source, releases, and more with a few simple steps. Read More
From: Charles Oliver Nutter <charles.nutter@su...> - 2007-03-02 22:06:46
> I plan to publish drafts of them as soon as possible, to get the
> review of you all.
> What I particularly would appreciate at the moment are:
> - statements about the current development status
> - statements about the future
> of Jython.
> So please feel free to send your comments to me, I'll do my best to
> weave them in.
I'd personally like to also see a roundup of what Leo's working on as
part of this talk at JavaOne. While the primary Jython train is chugging
toward complete 2.2 compatibility, Leo may make some good progress on
the more wild and crazy side of things. The two versions presented
together could help show there's a lot of action in the Jython world.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-10/segments/1394010707300/warc/CC-MAIN-20140305091147-00089-ip-10-183-142-35.ec2.internal.warc.gz
|
CC-MAIN-2014-10
| 1,064 | 16 |
http://jeffstevenson.karamazovgroup.com/2009/03/auto-restart-websphere-application.html
|
code
|
This is because a setting in the WebSphere Integrated Solutions Console (fka Network Deployment Console) and not the node agent service startup setting controls the startup state of the application servers.
The restart state behavior of the application servers is determined by what IBM calls the Monitoring Policy settings. These settings tell the node agent what it should do with the java processes after both an internal (to WebSphere) abnormal shutdown and a complete node restart.
The settings we are concerned with are Automatic restart and Node restart state. The first controls how WebSphere will react to an internal application server failure and the default is set to True. The second is how WebSphere will handle a complete node start (reboot) and the default is set to Stopped. This means that if you restart the physical box (or it reboots itself) you will have to manually start the application servers or WebSphere cluster of application servers in the WebSphere Integrated Solutions Console.
My philosophy on automatic starts is that it should be disallowed only in situations where automatically restarting will either undoubtedly fail (ex: failing back an E1 enterprise server on a W2K3 cluster) or could cause corruption. Since WebSphere is mostly at the presentation layer and since Oracle is making extensive progress with Failed Transaction Recovery, I prefer that the application servers start automatically on node restart.
To have the application servers automatically restart, set the Node restart state to RUNNING in the Servers> Application Servers> server_name > Server Infrastructure > Java and Process Management > Monitoring Policy section of the WebSphere Integrated Solutions Console. Click OK, save your changes, and test.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123560.51/warc/CC-MAIN-20170423031203-00012-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,759 | 5 |
https://research.usfq.edu.ec/en/publications/qubils-midas-a-parallel-free-software-for-molecular-descriptors-c
|
code
|
The present report introduces the QuBiLS-MIDAS software belonging to the ToMoCoMD-CARDD suite for the calculation of three-dimensional molecular descriptors (MDs) based on the two-linear (bilinear), three-linear, and four-linear (multilinear or N-linear) algebraic forms. Thus, it is unique software that computes these tensor-based indices. These descriptors, establish relations for two, three, and four atoms by using several (dis-)similarity metrics or multimetrics, matrix transformations, cutoffs, local calculations and aggregation operators. The theoretical background of these N-linear indices is also presented. The QuBiLS-MIDAS software was developed in the Java programming language and employs the Chemical Development Kit library for the manipulation of the chemical structures and the calculation of the atomic properties. This software is composed by a desktop user-friendly interface and an Abstract Programming Interface library. The former was created to simplify the configuration of the different options of the MDs, whereas the library was designed to allow its easy integration to other software for chemoinformatics applications. This program provides functionalities for data cleaning tasks and for batch processing of the molecular indices. In addition, it offers parallel calculation of the MDs through the use of all available processors in current computers. The studies of complexity of the main algorithms demonstrate that these were efficiently implemented with respect to their trivial implementation. Lastly, the performance tests reveal that this software has a suitable behavior when the amount of processors is increased. Therefore, the QuBiLS-MIDAS software constitutes a useful application for the computation of the molecular indices based on N-linear algebraic maps and it can be used freely to perform chemoinformatics studies.
- 3D N-linear indices
- Java language
- N-tuple simple stochastic
- N-tuple spatial-(dis)similarity matrix
- chemical development kit
- double stochastic and mutual probability matrices
- speed up
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817819.93/warc/CC-MAIN-20240421194551-20240421224551-00651.warc.gz
|
CC-MAIN-2024-18
| 2,066 | 8 |
http://www.forumotion.com/tag/official/socialism
|
code
|
Official LEGO Users Group of Singapore
This is the official forum for the eRepublik country of eCanada
Talk about Emoticones! (Emitcones, if you may)
Official UcE Wolfenstein Enemy Territory forum page
This is the official forum board of the White devils social Club.
SAK clan is a stunters and deathmatchers clan, whose members mix those activities into one original and unique gameplay style.
Welcome to the official forums of Zephyr Faction.
Official forum of the Aderan Wars online strategy game series including The Beginning, Red Apocalypse and Evolutions. In Aderan Wars you build your own empire and experience world politics first hand.
OldSchooL Lineage 2 clan official forum
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416931010631.60/warc/CC-MAIN-20141125155650-00097-ip-10-235-23-156.ec2.internal.warc.gz
|
CC-MAIN-2014-49
| 685 | 9 |
https://community.datawatch.com/thread/4578
|
code
|
Does this http://support.microsoft.com/kb/945280[/url] help at all?
It looks like Service Pack 3 is helpful, and that possibly converting the field to "True" or "False" might help Access understand it better.
So after some testing and fiddling around I've come up with that the information will only overwrite information to the table and not append to it, which seems to suggest that the data is in conflict with the way the table is setup.
I suspect that Monarch is converting the data to YES/NO upon reading in the initial table since (from what I've been able to gather) Monarch doesn't understand this type of data. I can create a new field and convert the -1 and the 0 to "Yes" or "No" but to do this I define the field as text.
I'm going to give this a try with an append action on the new table but I suspect I'll run into the same issue where the database can't auto convert the text field into the YEs/No field needed.
Short of that, I'm not sure if there is a solution. SInce I'm not using SQL and relying on the batch for application communication.
I'm wondering if anyone else has found a way to write data into a YES/NO type files using Access 2003 SP3. I'm hoping yes that there is a way to get it to work. I didn't see anything else in the forumsthat would help.
Out of curiosity, I'd be interested to know if this same issue would apply to Access 2007 and/or 2010?
Okay so the above testing failed completly and I could not generate the new table at all.
I did some further testing and was able to successfully overwrite the table manually through Monarch. The problem is though the returning data being sent is read as data type Number by Access. If I flip the type to YES/NO in the design screen the outlook is all correct. Of course I don't want to have to manually open the table and reflip the output data to data typpe Yes/No every time I run the batch.
So I've validated the data and the data is correct. The problem is identifying the type of data it is correctly. I'm still hopeful someone will have an idea on how to overcome this challenge.
As this is somewhat of a unique situation, I don't believe that this will be resolved by Datawatch any time soon. As such, we're on our own, and left to our own devices.
My solution involves adding some VBA code to the Access database created by Monarch, via a new module.
I developed this code using some web resources and have tested it. It seems to work just fine, as you need per your description, unless I've misunderstood something.
Here's the code to copy/paste into your VBA module:
'A nice enhancement to this code would be to
'not hard code the name of the Use field, but
'rather make the field name a function variable
'so that it could be changed easily as necessary.
Dim db As DAO.Database
Dim tdf As DAO.TableDef
Dim prp As DAO.Property
Dim fld As DAO.Field
Set db = CurrentDb
'add a new field for the Monarch export value
db.Execute "ALTER TABLE YesNoTest ADD COLUMN Monarch YESNO;"
'set the checkbox for the table design
Set tdf = db.TableDefs("YesNoTest")
Set fld = db.TableDefs("YesNoTest").Fields("Monarch")
Set prp = fld.CreateProperty("DisplayControl", dbInteger, acCheckBox)
'update the new Monarch field with the value from the
'Monarch export in the Use field, then
'delete the exported field Use
.Execute "ALTER TABLE YesNoTest DROP COLUMN Use;"
'rename the Monarch field to Use, the original name
fld.Name = "Use"
Set fld = Nothing
Set prp = Nothing
Set tdf = Nothing
Set db = Nothing
/CODENext, add an Access macro. Use a single command, RunCode, specifying the function name UpdateMonarchExport(). Now it is critical that you save this macro with the name AutoExec.
When you open the database (I used the mdb format for my test), the AutoExec macro will kick in, and will invoke the VBA code.
In my testing I used a field named "Use" as the test field with -1 and 0 values, so you'll need to revise that particular in the code to match with your field(s).
I used Access 2010 to develop this solution.
I don't see a non-programmatic solution to this challenge. Not to say that one may not exist; I just don't know what it may be.
EDIT: I used the table name YesNoTest for my Monarch export test, so you'll need to change that in the code too for your purposes.
I've been busy the last couple of weeks with other work tasks and haven't had the chance to check the boards out. I'm definitly going to give this solution a try.
I did want to thanks you for the time and effort into this. It goes far beyond what I was expecting and is very much appreciated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039748315.98/warc/CC-MAIN-20181121112832-20181121134832-00491.warc.gz
|
CC-MAIN-2018-47
| 4,549 | 48 |
http://or2020.sun.ac.za/2020/05/29/the-reproducibility-and-reusability-platform/
|
code
|
This poster is part of the OR2020 Virtual Poster Session taking place in the week of June 1-5. We encourage you to ask questions and engage in discussion on this poster by using the comments feature. Authors will respond to comments in this week.
R. Barbera, R. Bruno, M. Fargetta, R. Rotondo, A. Anagnostou, S. J. E. Taylor
For Open Science to become a common practice its enabling technologies must demonstrate to be useful and easy to use. Building and executing software on distributed computing infrastructures (DCIs), with input data related to Open Access publications and coming from FAIR repositories, should hence be as easy as surfing the web.
The Reproducibility and Reusability Platform (RRP) precisely addresses this issue. It consists of standard-based components: (i) the FutureGateway Framework for Science Gateways, (ii) the INFN Open Access Repository (OAR), and (iii) the Science Software on Demand (SSOD) service.
(Page through the slides below and click on the full screen window)
About the presenter:
Riccardo Bruno, born in Catania, got his Computer Science master degree in 1999. He is working at the Italian Institute of Nuclear Physics (INFN) in the context of computing distributed infrastructures (Grid, Cloud and HPC). He also developed the FutureGateway, a software framework to ease the creation of Science Gateways.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474659.73/warc/CC-MAIN-20240226094435-20240226124435-00294.warc.gz
|
CC-MAIN-2024-10
| 1,348 | 7 |
http://www.codingforums.com/flash-and-actionscript/177890-swf-controller-skin-not-showing-up-html.html
|
code
|
I am very much a novice at web coding and am kind of winging it here. I'm a pro photographer and am putting together some html pages for my website.
I am tearing my hair out because the 'skin' is not showing up in the html page.
I've tried a 'SkinOverPlayFullscreen', 'SkinUnderPlayFullscreen' skin and both 'autohideskin=true' and 'autohideskin=false' parameters. I even made more room in the table data for the skin to show up at the bottom (I know I should be using div tag but this was an old html which I will revise, lol)
It shows up when I open the .swf file with Flash Player but not in the html page. Also, when I play the file in Flash player and hit the 'pause' button, the movie pauses but the audio continues, rats! If you play the file you will notice some audio 'hiccups'. How can I avoid these?
I obviously want to give viewers the option to pause the movie on a certain frame and/or view the movie full screen without the 'skin' inside the viewing composition (this is why I would prefer the 'autohide skin' feature).
Here is an overview of what I have in my root directory:
inside the 'olga' root directory I have:
jpegs directory with several graphics, logo etc.
media directory with olga_10.swf, olga_web.flv, SkinOverPlayFullscreen.swf
scripts directory with expressinstall.swf, swfobject_modified.js
Any input to help me ding this would be great.
Thanks in advance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049282275.31/warc/CC-MAIN-20160524002122-00055-ip-10-185-217-139.ec2.internal.warc.gz
|
CC-MAIN-2016-22
| 1,387 | 12 |
https://www.pixyz-software.com/documentations/html/2021.1/plugin4unity/Preferences.html
|
code
|
To access to Pixyz preferences settings, go through Unity Tool bar EDIT / Preferences :
Click on Pixyz tab to see and modify the differents settings :
- Alias Executable: Path to the Alias.exe executable. Required to import .wire files
- VRED Executable: Path to the VREDPro.exe executable. Required to import .vred files
- Recap SDK Path: Path to the RecapSDK Bin folder. Required to import .rcp & .rcs files
- Custom Tesselation:Max sag: Refer to the custom preset from the import window
- Custom Tesselation: Sag Ratio: Refer to the custom preset from the import window
- Prefab save folder: Set path of the generated Prefab
- Override Prefabs: Override prefabs if a prefab with the same name already exists
- Prefab Dependencies Destination: It is possible to choose where to save dependencies when creating a prefab of a model imported with Pixyz. This is useful for very large models or to have more control over dependencies.
- In Prefab (by default): Meshes, Materials, Textures and GameObjects will be saved in a single prefab. If the prefab size is over 4gb, Unity will throw an exception. In this case, consider switching to the other option.
- In Folder: GameObjects will be saved in a prefab, but Meshes, Materials and Textures will be saved in individual assets in a folder next to the prefab. Be careful, it may create a lot of assets depending on the data that it being imported.
- File Drag and Drop in Scene: Use this setting to allow the drag & drop of your file within your scene
- Import Files in Asset folder: Pixyz can import files in the Asset folder. Supported formats are all formats supported by Pixyz that are not supported by Unity. This is only relevant for file formats that are not supported by Unity natively (see Formats)
- UX Improvement Stats: That helps us to improve the product for better UX
- Log Import Times: Enable Pixyz import duration log the in the Unity console
- Show Toolbox on Right Click in Scene: Enable right click access to the Pixyz ToolBox in the 3D Scene
- Log ToolBox Processing Time: Enable Pixyz ToolsBox operations duration log the in the Unity console
- Log RuleEngine Processing Time: Enable Pixyz import duration log the in the Unity log console
- Automatically check for Pixyz update: Check for plugin updates online
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103915196.47/warc/CC-MAIN-20220630213820-20220701003820-00508.warc.gz
|
CC-MAIN-2022-27
| 2,281 | 20 |
https://forums.adj.com/topic/3d-visualizer-6
|
code
|
I have a little Problem.
New Notebook (Acer Predator G9-591-71DQ / NVIDIA Geforce GTX 970M ).
myDMX Dec 2012 installed but the 3d visualizer, on the monitor is not a picture to see. where is the problem. everything else works. ask for help.
Best regards from good old Germany
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648695.4/warc/CC-MAIN-20230602140602-20230602170602-00258.warc.gz
|
CC-MAIN-2023-23
| 275 | 4 |
https://philosophy.stackexchange.com/questions/7194/how-is-g%C3%B6dels-incompleteness-theorem-interpreted-in-intuitionistic-logic/7195
|
code
|
Classically, one sets up an axiomatic system with a formal deduction system & an interpretation in a model. Generally it is sound, that is: a formally deduced theorem is also true when interpreted in the model. The reverse is called completeness, if a sentence in the model is true then it is also formally deducible. This is the statement of Godels completeness Theorem.
Confusingly Gödel Incompleteness Theorem refers to the notion of decidability (this is distinct to the notion of decidability in computation theory aka Turing machines and the like) - a statement being decidable when we are able to determine (decide) that it has either a proof or a disproof. If all statements in the language are decidable we call it complete. The theorem says that axiomatic systems containing PA is incomplete - that is there are always statements which we cannot find a proof or a disproof.
Now, what happens if the formal deduction system is not classical but intuitionistic? Intuitionistic logic is many-valued but rather than modelling truth one models constructability/provability, which instead of using set theory semantics uses Kripke semantics. Now:
Is it still sound? That is: a formally deduced theorem is also constructible?
Is it incomplete? There is a constructible sentence that is not formally deducible?
Does it have undecidable statements?
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817181.55/warc/CC-MAIN-20240417204934-20240417234934-00543.warc.gz
|
CC-MAIN-2024-18
| 1,350 | 6 |
https://forum.openwrt.org/t/wireguard-site-to-site-to-remote-gateway-routing/91300
|
code
|
Hello everyone in the forum,
Im looking for some help configuring my VPN connection with wireguard.
Im not an advanced user and use only luci for my configs.
So far I have link two site with openwrt devices (Site A and Site B).
Wireguard interface on Site A in LAN firewall zone and same for Site B.
All devices on each sites can communicate with each other.
What I would like to acheive is to have devices on Site A to use the gateway of Site B WAN to access the internet.
Is this even possible? If so, can someone help me in my configs?
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662520817.27/warc/CC-MAIN-20220517194243-20220517224243-00041.warc.gz
|
CC-MAIN-2022-21
| 538 | 8 |
https://www.okcupid.com/profile/english_python?cf=profile_similar
|
code
|
Planning trips - anything from long weekends to epic round the world adventures.
Food - Italian, Mexican, Thai, Ethiopian
Movies - I rarely watch movies and also have no TV :-) I am more of a 'doer' than a watcher.
- You would like to do some fun weekend activity in Switzerland or elsewhere.
- You like my profile and want to know more.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886103579.21/warc/CC-MAIN-20170817151157-20170817171157-00563.warc.gz
|
CC-MAIN-2017-34
| 337 | 5 |
https://forum.cirruspilots.org/t/suggestions-for-wash-dc/40826
|
code
|
Deb & I will be flying into DC on relatively short notice to do the touristy stuff. I used to live there, so I am pretty familiar with the area, but the new restrictions have befuddled things a bit.
We will be staying downtown at Metro Center - near the ‘action’ - but am looking for recommendations for an airport. I am currently leaning towards GAI (Gaithersburg, Montgomery County, MD) do to its proximity to a Metro stop and that I used to keep a plane there! (It’s also close to Steve & Robin Lin, and the Fallows which is another big plus!)
I have flown into the DC area since the enhanced restrictions, and it is my understanding that as long as the airport is OK, and I stay IFR, (& don’t lose my transponder as my governor did [;)]), I should be fine.
Assuming that I fly into GAI, I am also guessing that I will be vectored over Hagarstown (HGR). Is this still the case?
Any help or suggestions on any of these topics would be greatly appreciated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400241093.64/warc/CC-MAIN-20200926102645-20200926132645-00324.warc.gz
|
CC-MAIN-2020-40
| 965 | 5 |
https://www.excelforum.com/excel-formulas-and-functions/954403-count-blank-cells-which-today-falls-within-a-date-range-based-on-adjacent-cell.html
|
code
|
I've been trying to figure out this formula out for weeks but I can't find a solution in the forums that cover what I need!
I need to count the number of blank cells in B1:B170 if the date in A1:A170 is +/- 3 weeks from today(). I need to count the number of cells that are empty only if there is a date listed in Column A as new rows will be added by a few different users on a daily bases. In a dream world, the cells which meet this criteria would be highlighted (I assume this would be easy to accomplish using conditional formatting once the right cells are identified?)
(I'm tracking pregnant women who enroll in a program and need to have a quick way of seeing how many patients are full term (+/- 3 weeks from due date) and have yet to deliver. As patients enroll, I will add their expected due date in Column A, and will update Column B when they deliver.)
Hope that is clear enough. Please let me know if you need any clarification or would like a sample set of data. I'd say my excel wrangling skills are moderately intermediate but I am totally stuck here.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499700.67/warc/CC-MAIN-20230129044527-20230129074527-00854.warc.gz
|
CC-MAIN-2023-06
| 1,068 | 4 |
https://bbs.chinadaily.com.cn/thread-662794-3-1.html
|
code
|
Originally posted by NYChinatown at 2010-3-16 04:53
and thankew for brining back memories
Those schoolgirl days, of telling tales and biting nails are gone,
But in my mind,
I know they will still live on and on ...
Use magic tools
Originally posted by NYChinatown at 2010-3-16 04:48
no matter how you slice me...just not enough to do anythin with my paycheck
Originally posted by jojoxia at 2010-3-18 08:12
I really agree with you. I think the most important is that our government needs to know how to make our good teachers better in rewarding!
Jump to the last page after reply
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875143695.67/warc/CC-MAIN-20200218120100-20200218150100-00002.warc.gz
|
CC-MAIN-2020-10
| 580 | 11 |
http://jst.tsinghuajournals.com/CN/10.16511/j.cnki.qhdxxb.2017.26.019
|
code
|
Abstract:Provenance dependency path patterns are the foundations of many provenance based cloud data security measures. This article analyzes the importance of provenance dependency path pattern mining in provenance based security system with a linearization algorithm for provenance graphs that enables grammar induction and parsing of provenance data using automata models. A similarity measurement method is given for dependency paths based on grammar parsing with a dependency path pattern mining algorithm to reduce reliance on the domain knowledge and support automatic provenance rule learning. The feasibility and effectiveness of the approach are demonstrated by experiments.
Park J, Nguyen D, Sandhu R. A provenance-based access control model[C]//Privacy, Security and Trust (PST), 2012 Tenth Annual International Conference on. Paris, France:IEEE, 2012:137-144.
Sun L, Park J, Sandhu R. Engineering access control policies for provenance-aware systems[C]//Proceedings of the 3rd ACM conference on data and application security and privacy. San Antonio, CA USA:ACM, 2013:285-292.
Nguyen D, Park J, Sandhu R. Dependency path patterns as the foundation of access control in provenance-aware systems[C]//4th USENIX Workshop on the Theory and Practice of Provenance. Boston, MA USA:USENIX Association, 2012:4.
Nguyen D, Park J, Sandhu R. A provenance-based access control model for dynamic separation of duties[C]//Privacy, Security and Trust (PST), 2013 Eleventh Annual International Conference on. Tarragona, Spain:IEEE, 2013:247-256.
李斌, 王艺霏, 裴继升, 等. 基于溯源数据的业务流程合规性检测[J]. 清华大学学报(自然科学版), 2013, 53(12):1768-1776. LI Bin, WANG Yifei, PEI Jisheng, et al. Business process compliance checking based on provenance data[J]. J Tsinghua Univ (Sci & Tech), 2013, 53(12):1768-1776. (in Chinese)
Muniswamy-Reddy K K, Macko P, Seltzer M I. Provenance for the cloud[C]//8th USENIX Conference on File and Storage Technologies. San Jose, CA USA:USENIX Association, 2010:14-15.
Groth P, Moreau L. PROV-Overview:An Overview of The PROV Family of Documents[R]. Southampton, UK:W3C, 2013.
叶先一, 张福基. 偏序集上的一种拓扑排序[J]. 数学研究, 2005, 28(4):440-443. YE Xianyi, ZHANG Fuji. A topological sorting in partial order set[J]. Journal of Mathematical Study, 2005, 28(4):440-443. (in Chinese)
Carrasco R C, Oncina J. Learning stochastic regular grammars by means of a state merging method[M]//Grammatical Inference and Applications. Berlin Heidelberg:Springer, 1994:139-152.
Bergmann R, Müller G, Wittkowsky D. Workflow clustering using semantic similarity measures[M]//KI 2013:Advances in Artificial Intelligence. Berlin Heidelberg:Springer, 2013:13-24.
Margo D W, Smogor R. Using provenance to extract semantic file attributes[C]//4th USENIX Workshop on the Theory and Practice of Provenance. San Jose, CA, USA:USENIX Association, 2010:7-7.
Chen P, Plale B, Aktas M S. Temporal representation for mining scientific data provenance[J]. Future Generation Computer Systems, 2014, 36:363-378.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107879362.3/warc/CC-MAIN-20201022082653-20201022112653-00555.warc.gz
|
CC-MAIN-2020-45
| 3,080 | 13 |
https://community.postman.com/t/vertical-scroll-bar-not-found/14911
|
code
|
I can’t scroll vertical or horizontal
Hey @ahmeed.salaah17, welcome to the community !
Would you mind sharing a screenshot or going into more detail about where you expect to see a scroll bar?
sorry i can’t upload image ,site limitation
issue: scroll bar in the edge of screen not exist now but before while using version 7.06 works fine
and check in another device ,scroll bar exist
also it exist only on launchpad screen
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400214347.17/warc/CC-MAIN-20200924065412-20200924095412-00570.warc.gz
|
CC-MAIN-2020-40
| 426 | 7 |
https://support.microsoft.com/en-us/kb/830555/en-us
|
code
|
Article ID: 830555
A memory leak occurs when you refresh an HTML page that uses Microsoft JScript code that contains circular references to objects in the Microsoft Internet Explorer Document Object Model (DOM).
This memory leak occurs because DOM objects are non-JScript objects. DOM objects are not in the mark-and-sweep garbage collection scheme of JScript. Therefore, the circular reference between the DOM objects and the JScript handlers will not be broken until the browser completely tears down the page. This memory leak will end when the browser opens a new Web page or when the browser window is closed.
To resolve this problem, avoid circular references to Internet Explorer DOM objects in your Jscript code. To work around this problem in the sample code that is included in the "More information" section of this article, make the following change:
With this change, the mouse function is not a closure object that leads to a circular reference.
Microsoft has confirmed that this is a bug in the Microsoft products that are listed in the "Applies to" section.
Steps to reproduce the behavior
For more information about Internet Explorer leak patterns, visit the following Microsoft Developer Network (MSDN) Web site:
Article ID: 830555 - Last Review: June 20, 2014 - Revision: 4.0
Retired KB Content Disclaimer
This article was written about products for which Microsoft no longer offers support. Therefore, this article is offered "as is" and will no longer be updated.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-32/segments/1438042988458.74/warc/CC-MAIN-20150728002308-00083-ip-10-236-191-2.ec2.internal.warc.gz
|
CC-MAIN-2015-32
| 1,484 | 11 |
https://forums.afterdawn.com/threads/need-help-hope-this-is-right-spot.289182/
|
code
|
I posted this in another area but I think it was the wrong spot. Hi my name is Bill and after reading the posts in this forum I went and checked out DVD Red Pro and have been corresponding with them but I'm still confused and I'm hoping someone here can help me further. I'm trying to find out if DVD Red Pro will connect to my current DVD recorder and my dual-deck VCR both manufactured by Go-Video so I can duplicate copyrighted and non copyrighted VHS tapes to DVD and vice versa. I've established that the DVD recorder is ok but I'm not sure about the vcr. I read the steps for connecting the DVD Red Pro and I am lost with it's use of just two cables. I've established through my messages with DIMAX support that I cannot use the component, yellow-white-red cables so I'm stuck. Here is my current setup and connections available on both my DVD recorder and dual-deck vcr. I have my DVD recorder connected to my VCR and digital cable so i assumed i just needed to hook up the DVD RED Pro between the DVD recorder and my vcr using the single connections, correct? My trouble is understanding where exactly these single connections connect to on my respective devices. I looked at my various connection capabilities on both my vcr and DVD. On my VCR I have two line in's...line 1 has a yellow video connection along with one white audio (L) and one red audio (R) connection; line 2 has a yellow video connection along with one white audio (L) and one red audio (R) connection; and finally the last set of connections is Line Out with one yellow video, one white audio (L) and one red audio (R) connections. On my DVD player I have more connections. On one labeled LINE IN 2 I have Video In - one yellow connector, Audio In - (L) white and (R) red then there is a separate connection labeled s-video in. On another set of connections I have P-scan with one connection labeled R/Pr in red, another connection labeled G/Y in green and another conenction labeled B/Pb in blue. I then have connections labeled as Audio Out with a connection labeled (L) in white and another labeled (R) in red. Besides these I have another set labeled Video Out 1 in yellow and then another connection labeled s-video out. The last lone connection I have is labeled Coaxial and is in orange. How would DVD Red Pro connect with the above connections - anyone - please????
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647519.62/warc/CC-MAIN-20180320170119-20180320190119-00302.warc.gz
|
CC-MAIN-2018-13
| 2,351 | 1 |
http://www.surfaces2016.com/mac-rutan/
|
code
|
Mac Rutan :: Refraction/Reflection
About the Project ::
Refraction/Reflection invites participants to play and dance with light-altering artifacts. The artifacts enable participants to effect the immediate environment and each other. An array of projections, sculpture and artifacts beckons new participants to interact within the space, prompting them to alter their surroundings. The projections stream words and images while sculptures provide the means for reflection. Through the interaction of energy between surfaces, materials and humans, Refraction/Reflection presents a dynamic multisensoral relationship intended to inspire interpersonal outcomes.
About the Artist ::
Mac Rutan is an artist intrigued with human interaction and ubiquitous computing spanning analog and digital technologies. Endlessly fascinated by humankind and nature, his art explores the development, process, and effects of interrelationships.
Professionally Mac has been an exhibition installer, designer, and documentarian for various institutions, including the Harn Museum of Art, The Florida Museum of Natural History, and Orlando Museum of Art. He has also served as Technical Director/Media Designer for the video artist Miroslaw Rogala and was the Jury Coordinator for the Chicago International Film Festival’s Intercom competition.
Mac has an A.A. in Music, B.S. in Computer Science at Columbia College, Chicago, and M.F.A. in Media Design from Full Sail University. He is the Course Director for Digital Media Production in the department of Digital Arts and Design at Full Sail University.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824537.24/warc/CC-MAIN-20171021005202-20171021025202-00366.warc.gz
|
CC-MAIN-2017-43
| 1,584 | 7 |
https://communications.cfaes.ohio-state.edu/search/site/toolboxes?amp%3Bf%5B1%5D=hash%3A1pcg3d&%3Bamp%3Bf%5B1%5D=hash%3A232jhm&f%5B0%5D=hash%3A3y1lci&f%5B1%5D=hash%3A79zk9u&f%5B2%5D=hash%3A5hmbp3
|
code
|
- Did you mean
information, go to http://ocdc.osu.edu. Ohio Tourism Toolbox The Ohio Tourism Toolbox brings you easy access ... contributions of numerous industry collaborators, this toolbox continually grows to provide timely resources for ...
Leadership Program LOOK Summer Leadership Experience Community Planning Local Government Toolbox ...
larger scales. The End Result A new technique in the toolbox of water treatment plants that face harmful ...
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473871.23/warc/CC-MAIN-20240222225655-20240223015655-00152.warc.gz
|
CC-MAIN-2024-10
| 454 | 4 |
https://ell.stackexchange.com/questions/36710/my-relationship-to-the-patient-is-that-of
|
code
|
Say, a mother is filling out a form for her daughter (patient) at the hospital. Which one should she put down in the given space - Mother or Daughter? I am assuming either one of these must be the answer since there is a colon after the of. Also, does it have to be A mother to feel like the sentence is complete. Anyway, my mother actually wrote "I am her mother" and told me to calm down... and I did, but I could always ask here on StackExchange.
This is why my first grade teacher taught me to answer questions with complete sentences. Your mother's answer was a complete sentence, and resolved the ambiguity.
"I am her mother" is correct.
Based on the phrasing of the question in the title, "mother" would be the correct one-word answer. The question is phrased in terms of "(I am the person filling out the form.) My relationship to the patient is that (I am the patient's): ____".
The word "my" determines the implied subjects of the implied sentences and clauses.
If the patient were filling out the form, the correct one-word answer would be "self" or "me" or "myself".
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100056.38/warc/CC-MAIN-20231129041834-20231129071834-00764.warc.gz
|
CC-MAIN-2023-50
| 1,078 | 6 |
http://robotfindskitten.org/pipermail/rfk-dev/2001-April/000082.html
|
code
|
[rfk-dev] BART RESCUE PROCEDURES
Sun, 15 Apr 2001 01:24:32 -0700
begin Sam Phillips quotation:
> My favorite part on the BART are the emergency procedure posters
> that tell you what to do if the train wrecks and you're in the
> Transbay tube. There actually is a platform between the east and
> west bound tracks and they expect you to calmly stand there until
> emergency rescue can get you.
They expect you to STAND ON THE OPPOSITE TRACKS until the
train can come get you! Presumably the rescue train has a big scoop
on the front that just picks up all of the dazed, stunned, and
possibly bleeding people from its path.
You are not entitled to your opinions.
01234567 <- The amazing* indent-o-meter!
^ (*: Indent-o-meter may not actually amaze.)
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084891546.92/warc/CC-MAIN-20180122232843-20180123012843-00189.warc.gz
|
CC-MAIN-2018-05
| 748 | 15 |
https://community.developers.refinitiv.com/questions/46412/how-to-refresh-token-using-eta.html?sort=oldest
|
code
|
Before authentication token expires, we get new one with refresh_token. But how to use it in existing connection? Do we send another RSSL_DMT_LOGIN request?
Couldn't find clear description of this process in case of secure socket connection in ETA.
Yes, the application must re-issue a Login request with an new access token in the AuthenticationToken attribute. You can find more detail in Value Add Developers Guide section 7.3.2 Login Reissue
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585507.26/warc/CC-MAIN-20211022114748-20211022144748-00688.warc.gz
|
CC-MAIN-2021-43
| 445 | 3 |
https://aedcweb.com/project/jobs-intelligence_report-21-q2/
|
code
|
Real-Time Jobs Intelligence Report 2021, Q2
The data from the Real-Time Jobs Intelligence Report comes from Jobs EQ, a service that provides access to labor market data down to the zip code. Update to this report is a snapshot of the Anchorage job market in the second quarter of 2021.
The appendix provides additional information to supplement this at-a-glance report. For more information, please reach out to Development Director Kate Matheson at [email protected] or (907) 334-1207.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710473.38/warc/CC-MAIN-20221128034307-20221128064307-00591.warc.gz
|
CC-MAIN-2022-49
| 499 | 3 |
https://jp.mathworks.com/matlabcentral/answers/864335-how-to-obtain-indices-of-cell-arrays
|
code
|
How to obtain indices of cell arrays?
2 ビュー (過去 30 日間)
I have dozens of cell arrays like this that are the output of a long 'for' loop. I need to find the first and the last non-zero indices in each row. For example in the case of the sreenshot attached, I would like to get an output of: [1,3] for the first non-zero cell and [1,8] for the last non-zero cell in this specfic row. Obviously, the postion of non-zero cells and empty cells are very different in each iteration of my loop, so of course I wouldn't know beforehand the postions in the array of the results that I'm looking for, as opposite to the case of the screenshot attached.
I have tried using the function 'find', 'any', etc, but I always get the same error: 'The function is not defined for inputs of type 'cell''
Any ideas please?
millercommamatt 2021 年 6 月 24 日
There might be an easier way to do this, but it works.
% get the indices of all non-empty cells
[row,col] = find(cellfun(@(x) ~isempty(x),YourCell));
% grab the cell array size
[numrows, numcols] = size(YourCell);
firstcol_index = NaN(numrows,1);
lastcol_index = NaN(numrows,1);
% get the first and last index for each row, leave NaN if all cols empty
for ii = 1:numrows
single_row_col_inds = col(row == ii);
firstcol_index(ii) = min(single_row_col_inds);
lastcol_index(ii) = max(single_row_col_inds);
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337516.13/warc/CC-MAIN-20221004152839-20221004182839-00187.warc.gz
|
CC-MAIN-2022-40
| 1,354 | 18 |
https://lists.pentaho.org/pipermail/mondrian/2007-November/000901.html
|
code
|
Tr : [Mondrian] Question on non-aggregable measures
mbienstein at yahoo.fr
Fri Nov 23 01:40:13 EST 2007
Once again, sorry for not mailing it to the developers list. I just hit reply.
I've read your response. I don't think it will work for my requirements because the data has to come from aggregate tables and not the fact table at all. Actually there's a case of when the fact table IS the lowest level of aggregation already, but I don't think Mondrian deals with that (Count will count the rows in fact tables but sum the count measure in aggregate tables for example).
However I think it is a good idea, if orthogonal. The only disagreement I have is the semi-additive measure system you've got. MDX should be used to define these sorts of things. It's great if there is a mechanism to place these cells into the cell cache (calculated cells aren't right now I think) but don't use "last" like you have. Once again all this is I think orthogonal to my needs.
----- Message transféré ----
De : Julian Hyde <jhyde at pentaho.org>
À : michael bienstein <mbienstein at yahoo.fr>
Cc : mondrian at pentaho.org
Envoyé le : Vendredi, 23 Novembre 2007, 1h00mn 43s
Objet : RE: [Mondrian] Question on non-aggregable measures
This thread should have stayed on the developers' list. (I
don't usually broaden personal messages to public lists, because I don't want to
inadvertently publish confidential information. But I took the liberty of Cc:ing
the developer's list this time.)
michael bienstein wrote:
requirement is that at any organisation/time crossing the budget user can
enter a number. Even if all child organisations have numbers the parent
is NOT aggregated and could be contradictory. Bizarre requirement that,
but that's the way it's currently done and they want the same thing only for
it to run faster so I'm proposing to change technology.
Since we're talking about developing a feature, let's see
how we can broaden the requirement to cover other common cases, without making
the specification or implementation much more complicated.
In the case of non-aggregatable measures, we could model
these as an aggregation function NONE.
I suppose if you are going to define such a measure, you
need to ensure that your fact table contains at must one row per cell. Mondrian
could enforce that by generating MAX and MIN and comparing
Also, I can imagine a measure which can be rolled up along
some dimensions but not others; maybe not in your application, but in
I experienced this with distinct-count measures. For
example, the number of distinct customers can be aggregated over the gender
dimension, but not over the time dimension. (If you have 10 distinct female
customers in Q1 and 5 distinct male customers in Q1, you definitely have 15
distinct customers in Q1. Why can you say that? Because gender is functionally
dependent on customer id.)
Also, consider semi-additive measures, the textbook example
of which is inventory-on-hand. This measure is aggregated using the LAST
operator on the time dimension, SUM operator on other dimensions (e.g.
Putting this all together, I see a measure being defined
with a default aggregation function, which may be SUM, AVG, FIRST, LAST, NONE;
and being able to override the aggregation function for certain
<Measure name="Inventory on hand"
<Measure name="Customer count"
this more general scheme still consistent with your requirements? It would
certainly be nice to deal with semi-additive measures properly at the same
Thanks Julian, I'll have a look at
Message d'origine ----
De : Julian Hyde <jhyde at pentaho.org>
Mondrian developer mailing list <mondrian at pentaho.org>
Envoyé le :
Jeudi, 22 Novembre 2007, 1h53mn 12s
Objet : RE: [Mondrian] Question on
We already have the mother of all non-aggregable
measures, namely distinct-count. It's slightly different in that it's
computable by going back to the fact table, whereas for what you want, if it's
not in the agg table, it ain't there at all. (Or maybe you would allow
aggregation on some dimensions but not others - I don't know your precise
So, it isn't there, but it could be fairly easily
implemented by generalizing the distinct-count
From: mondrian-bounces at pentaho.org
[mailto:mondrian-bounces at pentaho.org] On Behalf Of michael
Sent: Wednesday, November 21, 2007 11:16
To: Mondrian developer mailing list
[Mondrian] Question on non-aggregable measures
I may very well use Mondrian in a short project
soon. One point that I think is probably missing that is part of the
requirements is a non-aggregable measure that is read only from aggregation
tables. E.g. a budget or objective that is filled in at certain
members of an org hierarchy but not all and certainly not aggregated from
facts attached to the leaves.
I don't know if this can be
handled by the existing code (it's been more than 6 months since I last
looked at the code). Can anyone tell me
Ne gardez plus qu'une seule adresse mail ! Copiez
vos mails vers Yahoo! Mail
Ne gardez plus qu'une seule adresse mail ! Copiez vos mails vers Yahoo!
Ne gardez plus qu'une seule adresse mail ! Copiez vos mails vers Yahoo! Mail
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the Mondrian
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362918.89/warc/CC-MAIN-20211203182358-20211203212358-00624.warc.gz
|
CC-MAIN-2021-49
| 5,216 | 83 |
https://www.sqlservercentral.com/forums/topic/database-stuck-in-recovery/page/4
|
code
|
The EMERGENCY mode is a perused just status used to peruse information from data sets in the RECOVERY PENDING/SUSPECT mode. Basically, when a data set status is changed to SUSPECT, it becomes distant. Setting a data set in EMERGENCY mode helps access the data set and run a maintenance on it utilizing DBCC CHECKDB with REPAIR_ALLOW_DATA_LOSS command.
ALTER DATABASE database_name SET ONLINE
Prior to continuing, check assuming the data set is still in EMERGENCY mode by running the accompanying command:
SELECT name, state_desc FROM sys.databases WHERE name = Test_Database
Before to beginning the maintenance method, it means quite a bit to change the data set to SINGLE_USER mode to keep different clients from utilizing the data set.Once the database is in SINGLE_USER mode. You can repair it by excuting a DBCC CHECKDB with REPAIR_ALLOW_DATA_LOSS.
ALTER DATABASE Test_Database SET SINGLE_USER WITH ROLLBACK IMMEDIATE DBCC CHECKDB (Test_Database, REPAIR_ALLOW_DATA_LOSS)
The CHECKDB command runs successfully without any consistency errors.
Now, Switch the data in multi user mode Using this command
ALTER DATABASE Test_Database SET MULTI_USER
Refresh your database and check it one more time. I believe it will work for you. If It is not working, Please comment here.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099892.46/warc/CC-MAIN-20231128151412-20231128181412-00681.warc.gz
|
CC-MAIN-2023-50
| 1,272 | 10 |
https://github.com/pranik
|
code
|
- Verona, Italy
- Joined on
Oct 7, 2011
- active_admin 1 The administration framework for Ruby on Rails applications.
- world_flags 1 Gem with country flags in one sprite with CSS prepared for the Rails 3.1 asset pipeline
- ckeditor 1 Ckeditor integration gem for rails
- kaminari 1 A Scope & Engine based, clean, powerful, customizable and sophisticated paginator for Rails 3
- rails_apps_composer 1 A version of the RailsWizard gem with custom recipes for Rails starter apps.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257823963.50/warc/CC-MAIN-20160723071023-00320-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 477 | 8 |
https://docs.budibase.com/building-apps/design/handling-data/filtering-data
|
code
|
Formcomponent. Select the schema you want, most often it will be the same thing you select in the data provider. Inside the form, put a
Data Providercomponent as well as a field of your choice, an easy one to get started with is the
Number Field. On the field component you select the column you want to filter on. In the example below we'll use the unit price.
Unit Pricethat you selected for the number field component, "More than" and "Binding". Select the lightning bolt icon to the right and select the number field from the list of bindings that comes up. After saving your users should now be able to filter the data themselves.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588053.38/warc/CC-MAIN-20211027022823-20211027052823-00135.warc.gz
|
CC-MAIN-2021-43
| 635 | 4 |
https://invisioncommunity.com/forums/topic/460094-how-to-use-ipsuimenu-with-events/
|
code
|
Tom S.January 4, 2021 in Developer Connection
I couldn't figure out from reading this article:
I created a simple dropdown menu using this format:
<!-- The trigger -->
<a href='#elMyMenu_menu' id='elMyMenu' data-ipsMenu>Open Menu</a>
<!-- The menu -->
<ul id='elMyMenu_menu' class='ipsMenu'>
But I want to be able the listen to open and close events. How can I create an event listener using ips.ui.menu?
As a side note, a lot of these articles lack an actual example which would save people from having to post to the forum.
$( '#elMyMenu' ).on( 'menuOpened', function( elemID, originalEvent, menu )
$( '#elMyMenu' ).on( 'menuClosed', function( elemID, menu )
Started 1 hour ago
Started January 11, 2020
Started September 12, 2019
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224651325.38/warc/CC-MAIN-20230605053432-20230605083432-00085.warc.gz
|
CC-MAIN-2023-23
| 731 | 14 |
https://www.davidson.edu/academics/mathematics-and-computer-science/faculty-and-staff/doug-locke
|
code
|
Ph.D. Carnegie-Mellon University
B.A. Kalamazoo College
After more than 40 years designing, building, managing, and consulting on a wide variety of systems and software, including the Apollo moon-landing program, the Space Shuttle, a variety of unmanned spacecraft, various military and commercial aircraft, various land vehicles, ships, and even submarines, I now have the pleasure to work with the Davidson Computer Science faculty and students. I think creating computer systems and software is great fun and I'm excited to be able to pass this on to another generation.
My research and technical interests cover real-time and embedded systems and software, programming languages, operating systems, database performance, execution scheduling, and related topics in Computer Science.
I have been involved in real-time systems and software research since 1982 in conjunction with a number of university programs and consortia. I have served as a leader for a number of international research and standards organizations such as the IEEE's Technical Committee on Real-Time Systems, IEEE's Standards organization that created the Unix standard (ISO/IEC 9945), Oracle's Java Community Process, and the Object Management Group's Architecture Board.
Currently I am leading the development of a new standard for developing safety-critical applications using the Java language.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912204857.82/warc/CC-MAIN-20190326054828-20190326080828-00243.warc.gz
|
CC-MAIN-2019-13
| 1,372 | 6 |
https://www.inforisktoday.com/whitepapers/security-re-imagined-part-i-adaptive-approach-to-cyber-threats-for-w-1648
|
code
|
It's time to re-imagine security.
Conventional security detects threats too late (if at all), and resolves them too slowly. It gives security teams a fragmented, incomplete view into what's going on in their network. It's passive and blind to broader threat trends. And it reacts too slowly to new threats and changing conditions.
Organizations need a flexible, deeply integrated framework that offers a far-reaching view of threats and evolves as quickly as conditions do. Their security architecture must be agile. It must be deeply integrated for an end-to-end view of attacks. It must present a full picture of threats by incorporating internal and external intelligence. And it must take an active, "lean-forward" posture that doesn't just wait for attacks but anticipates them.
FireEye calls this approach Adaptive Defense.
In this paper, learn:
- Why it's time to reimagine your security architecture
- Key metrics to assess your security posture
- Why preventing every attack is unrealistic - and why resolving them early is more important
- How a fragmented, incomplete view of attacks obscures detection and slows response
- Why conventional architectures are creating more work with less to show for it
- How to improve the ROI on your existing security investments
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510358.68/warc/CC-MAIN-20230928031105-20230928061105-00117.warc.gz
|
CC-MAIN-2023-40
| 1,276 | 11 |
http://www.pearltrees.com/u/874936-quandary-home-page
|
code
|
Quandary Home Page
Quandary is an application for creating Web-based Action Mazes. An Action Maze is a kind of interactive case-study; the user is presented with a situation, and a number of choices as to a course of action to deal with it. On choosing one of the options, the resulting situation is then presented, again with a set of options. Working through this branching tree is like negotiating a maze, hence the name "Action Maze". Action mazes can be used for many purposes, including problem-solving, diagnosis, procedural training, and surveys/questionnaires. All of these types of use are easier to understand by example than they are to explain, so here are some example exercises. Quandary is only available for Windows (although it also works perfectly on Wine under Linux). The Quandary site has now been moved to the University of Victoria.
Related: Enlaces del curso MOODLE-11
• Authoring Tools
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710926.23/warc/CC-MAIN-20221203075717-20221203105717-00028.warc.gz
|
CC-MAIN-2022-49
| 913 | 4 |
https://forum.cs-cart.com/t/shipping-method-per-country/40829
|
code
|
How can you associate a shipping method for each country? For example, when shipping to Tanzania, the customer is presented with UPS Canada shipping options. I want them to see UPS Worldwide options.
If you use Manual rate (by defined location),
In Shipping → Locations, Create a name and select the countries you like to ship-to. Then In Shipping → Shipping methods, Add a shipping method - UPS Worldwide, then click Shipping charges tab, select each country location name, and define your shipping charge table for each country location.
In Realtime rate calculation, you can define shipping methods like UPS Canada, UPS Mexico, UPS Worldwide,etc… As I tried, CS-cart will base you defined UPS Shipping service country list and buyer country to show the related shipping methods. In Case, your test are not like what I said. I suggest submit your idea wish to CS-cart Ideas forum!
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710931.81/warc/CC-MAIN-20221203111902-20221203141902-00246.warc.gz
|
CC-MAIN-2022-49
| 888 | 4 |
https://radio-weblogs.com/0001014/2003/07/07.html
|
code
|
Time to come clean on an investment I made a year and a half ago. At the time, UserLand software had released a Mac OSX version of Radio and I was totally digging the built in news aggregator. I came up with a cunning plan: I asked Userland if I could purchase a pre-installed feed on their aggregator, which supports RSS xml feeds. I paid $10,000 for a one year license. To date I've been delighted with my purchase and although I haven't checked recently, I'm pretty sure Userland still has me in the defaults.
Besides investing in the technology with user licenses for Frontier and Radio UserLand, I ponied up to the bar and made a commitment to a format. And now I feel fucked.
The $10k didn't 'just' give me an automatic base within the userland community, it got pasted on web pages all over the world and I've built up an audience that consists of 50% aggergator users.
But this investment is clearly being halted short by the (N)echo project.
So I'm invoking an age olde american tradition of letting my wallet do the talking. I will again invest $10k in aggregator default placements this year, but I will spread it around, to all developers who adhere to RSS2.0. Include (N)echo and you're out of luck.
A powerful opportunity for weblog tool developers and vendors: "We'll make last-minute changes to accomodate you. In other words, the pride-swallowing is two-way. Tell us what you want and we'll do it. This is what never happened with Netscape."
Besides supporting tools that I use that already support the metaweblogAPI, how else can us users help to ensure history doesn't repeat itself?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780055632.65/warc/CC-MAIN-20210917090202-20210917120202-00288.warc.gz
|
CC-MAIN-2021-39
| 1,602 | 7 |
https://www.roadtovr.com/oculus-improves-iteration-time-quest-developers-using-ue4/
|
code
|
Oculus has updated its UE4 Quest development tools so that developers can spend less time waiting and more time testing and iterating on their VR applications. The changes are similar in scope to recent improvements to Unity Quest development.
Because Quest is its own standalone headset, testing how an application will run on the headset itself requires packaging the application and then deploying it to the headset before being able to test it. Because this process can take a few minutes from the time you start packaging until you get to see your app in the headset, it’s very time consuming to test small changes. Iteration time—how quickly one can make changes and then see them—is a key factor in the efficient creation of any media. For developers building Quest applications, the faster the time between making changes and testing them, the more time they can spend honing their applications to be polished and perfromant.
Oculus has introduced two changes with the goal of significantly speeding up the iteration process for developers building Quest applications with Unreal Engine 4. Some of the improvements also apply to developers building applications in their own game engine using the native Oculus Mobile SDK.
Skip APK Build When Iterating on Code
The first change allows developers to skip recompiling and repackaging their game after making code changes.
Instead of requiring the APK be rebuilt to include newer compiled binaries, a change was made to the Oculus OS to allow libraries to load automatically from the application’s dataDir instead of from the installed package if a file by the name exists, when a special flag is set in the package settings and the application is debuggable.
Oculus says the option can be found in Editor Preferences > General > Experimental, and also notes that “this option bypasses the normal Android APK build logic. If any changes are made that require a new APK to be generated, such as Java changes or Android manifest changes, you will need to disable this option temporarily to allow it to be built and installed.”
The blog post also explains how the function can be used in native development environments.
Using the VR Template that comes with UE4 as a test case, Oculus says that the Skip APK Build change improved the time-to-launch by 2.95 times, from 3 and a half minutes to 66 seconds.
FASTBuild Support for UE4 Code Compilation
Oculus says it has implemented FASTBuild support, “a high performance, open-source build system […] [that] supports highly scalable compilation, caching, and network distribution.” This allows developers to speed up code compilation by distributing the work across computers on the developer’s local (or VPN) network.
The company shared instructions for using FASTBuild in its blog post, and says that the tool can speed up builds of both the UE4 editor and “any Oculus VR game projects,” which we understand to mean that it can benefit both Quest and Rift projects.
For the ShowdownVR sample, using FASTBuild distributed compilation with access to 36 threads took 13 minutes and 39 seconds compared to 28 minutes and 28 seconds with local compiling on 12 threads. A fully cached build took just 3 minutes and 30 seconds. “These timings include all preprocessing, precompiled header generation, code compiling, and linking,” Oculus noted.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948223038.94/warc/CC-MAIN-20240305060427-20240305090427-00485.warc.gz
|
CC-MAIN-2024-10
| 3,367 | 13 |
https://proximityone.wordpress.com/tag/urban-rural/
|
code
|
.. an overview of the Federal statistical system and how to access data .. the U.S. Federal Statistical System offers a vast array of diverse data resources that are useful in wide-ranging planning and analytical applications. Many of these data resources, such as census block level demographics from the decennial census, are unique in scope and content; in many cases there are no alternative data resources.
But there are issues/challenges for the data user to navigate the Federal Statistical System. Examples … the Bureau of Labor Statistics releases total employment data by county quarterly and monthly through multiple programs. The data values differ, for methodological reasons, but the net result can be confusion. The Census Bureau releases total employment data from many statistical programs by county both annually and more frequently. Where are these alternative total employment data and how can they be accessed? How do these various measures differ and which data are right for my situation? This section provides basic statistical program information. Subsequent updates will provide more detail.
This section provides an overview of the U.S. Federal Statistical System (FSS) and information that can help stakeholders navigate access to selected types of data produced by the FSS. While the FSS is focused on agencies that collect, develop and make available statistical data, there is a broader set of data and resources that relate to accessing and using these data. As technology and related data analytics resources have evolved, access to and use of these data is closely associated with the development of geographic data by Federal statistical and other agencies and Geographic Information Systems (GIS).
The FSS is a decentralized set of agencies that collect, develop and make available statistical and geographic data. The OMB Office of Statistical Programs and Standards (SPS) provides a FSS coordinative role. The SPS establishes statistical policies and standards, identifies priorities for improving programs, evaluates statistical agency budgets, reviews and approves Federal agency information collections involving statistical methods, and coordinates U.S. participation in international statistical activities.
While the FSS spans more than 100 agencies, the 13 “principal statistical agencies” have statistical work as their principal mission. Excluding funding for the decennial census ($919.3 million requested for the Decennial Census for FY 2016), approximately 38 percent ($2,486.9 million of the $6,486.6 million total proposed for FY 2016 President’s budget request) of overall funding for Federal statistical activities (of the Executive Branch) provides resources for these 13 agencies. The principal statistical agencies include:
• Census Bureau (Commerce)
• Bureau of Economic Analysis (Commerce)
• Bureau of Justice Statistics (Justice)
• Bureau of Labor Statistics (Labor)
• Bureau of Transportation Statistics (Transportation)
• Economic Research Service (Agriculture)
• Energy Information Administration (Energy)
• National Agricultural Statistics Service (Agriculture)
• National Center for Education Statistics (Education)
• National Center for Health Statistics (CDC/HHS)
• National Center for Science and Engineering Statistics NSF/Independent
• Office of Research, Evaluation, and Statistics — SSA/Independent
• Statistics of Income (IRS)
The remaining 62 percent of the FY 2016 budget involves more than 100 programs that conduct statistical activities in conjunction with another program mission. These statistical programs are components within a Federal department or other agency. They include a broad set of centers, institutes, and organizations in addition to the 13 principal statistical agencies.
There are also Federal agencies whose statistical activities are not part of the Executive Branch. These agencies include the Congressional Budget Office, which develops and applies projection models for the budgetary impact of current and proposed Federal programs; the Federal Reserve Board, which compiles the widely used Flow of Funds report and other statistical series and periodically conducts the Survey of Consumer Finances; and the U.S. Government Accountability Office, which uses statistical data in evaluations of government programs.
Guide to Navigating the Federal Statistical System
The following graphic is a snapshot of the Guide to Navigating the Federal Statistical System. See http://proximityone.com/fss.htm to access the entire guide.
– click graphic for larger view.
Join me in a Data Analytics Lab session to discuss more details about accessing and using wide-ranging demographic-economic data and data analytics. Learn more about using these data for areas and applications of interest.
About the Author
— Warren Glimpse is former senior Census Bureau statistician responsible for innovative data access and use operations. He is also the former associate director of the U.S. Office of Federal Statistical Policy and Standards for data access and use. He has more than 20 years of experience in the private sector developing data resources and tools for integration and analysis of geographic, demographic, economic and business data. Contact Warren. Join Warren on LinkedIn
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764494852.95/warc/CC-MAIN-20230127001911-20230127031911-00255.warc.gz
|
CC-MAIN-2023-06
| 5,310 | 26 |
https://nnovgorod-times.ru/user/view/18708
|
code
|
Xxxadul cam2 cam - Invalid register operand when updating
wherein the address of the wide operand in the memory is aligned to result in a plurality of low order bits of the address to not be required for retrieval of the wide operand, and those low order bits provide the indicia of the size of the wide operand.13. The size of the result for additional instructions may not be so constrained, and so utilize dedicated storage to which the result operand is placed on execution of the instruction.
In a processor including a functional unit coupled to a first data path having a first bit width, a second data path having a second bit width greater than the first bit width, a plurality of third data paths having a combined bit width less than the second bit width, a wide operand storage storing a wide operand, a register file including registers having the first bit width, the register file being connected to the third data paths, a method comprising: further comprising a step of rounding the result elements by one of a plurality of rounding operations including round-to-nearest, round-to-zero, round-to-negative infinity, and round-to-positive infinity. The dedicated storage may be implemented in a local memory tightly coupled to the logic circuits that comprise the functional unit.
Namely, in each cycle, dependency checks are made by comparing the logical-register numbers shown as operands in the instructions, and the logical-register nwnbers are respectively renamed to appropriate physical-register numbers so that the dependencies would be dissolved. In regard to superscalar processors, it is desired to enhance performance by streamlining register renaming and decoding / issuing a larger number of instructions per cycle.
In the present invention, source and result operands are provided which are substantially larger than the data path width of the processor.
There is also a need for a processor system capable of efficient handling of operands and results of greater overall size than the entire general register file. In addition, several classes of instructions will be provided which cannot be performed efficiently if the source operands or the at least one result operand are limited to the width and accessible number of general purpose registers.
In addition, several instructions and apparatus for implementing these instructions are described which obtain performance advantages if the operands are not limited to the width and accessible number of general purpose registers.a functional unit capable of performing operations in response to instructions, coupled by the second data path to the wide operand storage, and coupled by the third data paths to the register file; andwherein the processor executes an instruction containing instruction fields specifying (i) a control register in the register file storing a control operand, and (ii) a results register in the register file, the instruction causing the functional unit to perform an operation using the control operand and the wide operand, and place the results of that operation in the results instruction causes the functional unit to perform an operation between elements contained in the wide operand and elements contained in the operand register, the elements being of a size specified by a control operand to thereby produce a plurality of results elements from which a value is stored in the results register. If the memory operand remains current—that is, the conditions are met—the memory operand fetch can be combined with one or more register operands in the functional unit, producing a result.
wherein the extraction is further controlled by fields in the control register which specify a shift amount from zero to the element size minus one and specify one of a plurality of rounding operations.wherein the address information for the wide operand stored in the memory is stored in the register file, and the address information includes both an address of the wide operand in the memory and an indicia of a size of the wide operand. The size of the result may be constrained to that of a general register so that no dedicated or other special storage is required for the result.
The technique involves maintaining, in a register list memory circuit having entries that respectively correspond to physical registers, a list of register assignments that assign logical registers to the physical registers. An instruction dependency exists between instructions (1) and (2) because instruction (1) reads data from register RI, and instruction (2) subsequently writes new data to register R1.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141515751.74/warc/CC-MAIN-20201130222609-20201201012609-00707.warc.gz
|
CC-MAIN-2020-50
| 4,604 | 9 |
https://get-help.robotigniteacademy.com/t/noetic-pr2-launch-from-shell/11696
|
code
|
I’d like to launch the robot and in the world in Gazebo in the shell, without clicking on the icon and menus to choose the robot and a world with clicking buttons. I performed the following steps and it did not work:
- source ~/simulation_ws/devel/setup.bash
- export ROS_PACKAGE_PATH=/home/user/simulation_ws/src/:/home/simulations/public_sim_ws/src:/opt/ros/kinetic/share
- echo $ROS_PACKAGE_PATH
- roslaunch pr2_description robot_control.launch
RLException: [robot_control.launch] is neither a launch file in package [pr2_description] nor is [pr2_description] a launch file name
The traceback for the exception was written to the log file
Please advise a way to resolve this challenge.
Hello @kavi1 ,
Well, this error basically says that either you don’t have a package named
pr2_description in your rosject, or you don’t have a launch file named
robot_control.launch in the
Make sure that you have the expected simulation packages/files in your rosject.
@albertoezquerro Thank you. Yes, I understand.
Where are the files located in the shared Noetic Gazebo Model? Please note that these are existing files. when we create a rosject in Noetic.
I would like to just type the command in the shell instead of clicking on the buttons to launch gazebo. Please help. Thank you
As Alberto said, in an empty ROSject ( which is what I supose you are launching ) , the pr2_description is not in the accesible part of the system.
Here you have a Pr2 simulation in ROsject form : https://app.theconstructsim.com/#/l/4079b47c/
Here you can launch the PR2 through the command line and have a rich environment for Perception training:
roslaunch pr2_tc_gazebo main.launch
Hope it helps
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337339.70/warc/CC-MAIN-20221002181356-20221002211356-00420.warc.gz
|
CC-MAIN-2022-40
| 1,678 | 21 |
https://sdkcon78221.crestron.com/sdk/Crestron_Certified_Drivers_SDK/Content/Topics/Overview.htm
|
code
|
The Crestron® Drivers software development kit (SDK) allows developers to create drivers for use within the Crestron ecosystem, including Crestron Home® OS, .AV Framework™ software, and SIMPL or SIMPL#Pro programming. This ecosystem consists of Crestron control systems for commercial and residential applications. Drivers provide connectivity between the control system and a device. The SDK provides a complete development environment for integrating custom third-party devices into Crestron solutions.
This document, along with the provided libraries, is intended to guide you in developing Crestron Drivers. At a high level, the document has two primary objectives:
- Walk developers through building and testing a driver
- Provide reference material for developing custom driver solutions
It is recommended that developers new to Crestron Drivers start with the walk through topics prior to attempting to create a custom driver solution. Developers that have already created custom drivers can browse the reference topics as needed or use the Search function within this document to locate specific reference material.
The following functionality is not supported by the SDK at this time:
- Developing a new device type
- Sample drivers that require or include restricted information
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296946535.82/warc/CC-MAIN-20230326204136-20230326234136-00636.warc.gz
|
CC-MAIN-2023-14
| 1,292 | 8 |
http://www.wfl.fha.dot.gov/resources/cadd/geopak-2004/pm-setup.htm
|
code
|
"Setup Project Manager for Proposed Cross Sections
In order to create proposed cross sections using any of the "Typical Sections", you must first setup Project Manager:
Each will be explained in order below:
Open the cross section file that contains your existing ground elements. Invoke Project Manager by either using the pulldowns Applications > GEOPAK Road > Project Manager or by using the Tools icon shown below:
Create a Project:
When Project Manager is invoked the dialog below appears:
I recommend that when you Create a Project you do so under your current working directory. This is easily done by using the pulldowns on the Project Manager dialog, Directory > Current Working Directory as shown below:
Once the Directory is set, create the New Project by using the Project Manager pulldowns, Projects > New as shown below:
Key in the Project Name, select the Job Number, adjust the Preferences, (very important to adjust the Preferences here). 2 other options are to select the Working Directory and type in a short Project Description. When Finished, click on OK as shown below:
When OK is clicked, the dialog will appear as shown below, highlight the .prj file and click on OK:
Create a User:
When OK is pressed, the Project Users dialog will appear as shown below. Select Users > New from the pulldowns.
Complete the New User dialog similar to theh illustration below and click on OK:
The Project Users dialog will appear similar to the illustration shown below. Highlight the User and click on OK.
When OK is pressed the Project Manager (Road Project) dialog will appear as shown below. Notice the Project name, the User name and Job # match what was previously set up.
Create a Working Alignment:
Click on the Select button to create a new Working Alignment as shown below:
The Select Working Alignment dialog appears. Use the pulldowns and select Run > New as shown below. Click on OK.
The New Run Name dialog appears. Type in the name of the "Run" to create. The Description field is optional. Click on OK.
The Select Working Alignment dialog appears. Highlight the desired run (you may eventually have several) and click on OK.
Notice how the Project Manager (Road Project) dialog is now set to use the Working Alignment "one", as shown below:
Click on the Define button. We are now ready to being "defining" everything about the alignment that we want to use.
The Working Alignment Definitions dialog appears, show below using the working alignment "one".
Complete each of the required "Sections" of this dialog by clicking on each and completing the fields. Required sections are:
- Plan View
- Cross Section View
- Existing Ground
Each required section is explained below:
Click on the File button and browse to the plan view DGN file. Click on the Select button and select the chain.
Toggle the first option to By Design File. Set both scale values to 10. Browse to the Patterns DGN file, using the File button. To fill in the values for the pattern lines, open the patterns DGN file, click on the Reset button, check the appropriate attributes to set and use the Match button to "data point" the pattern lines to use.
Toggle the option to All in DGN and browse to the shape DGN file using the File button.
Cross Section View:
Browse to the cross section DGN file using the File button.
Open the cross section DGN file, click on the Reset button, check the appropriate attributes to set and use the Match button to "data point" the ground line.
To complete the Working Alignment Definition, click on OK as shown below:
You are now ready to begin using any of the Typical Sections and Create Proposed Cross Sections.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705502703/warc/CC-MAIN-20130516115822-00078-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 3,639 | 36 |
https://www.programmableweb.com/news/twilio-how-to-call-screening/how-to/2009/09/23
|
code
|
Often a voice application will have a list of numbers to call in order. If the first number doesn't pick up, then a second number is called etc. For calls that go to voice mail, our solution is to prompt the called number to accept the call. Learn how.
This is older, archived content that may not contain a detailed description of the how-to. Please refer to the URL below for the complete how-to.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573052.26/warc/CC-MAIN-20190917040727-20190917062727-00460.warc.gz
|
CC-MAIN-2019-39
| 398 | 2 |
https://cliopatria.swi-prolog.org/swish/pldoc/man?predicate=odbc_set_connection/2
|
code
|
:- use_module(library(odbc)).(can be autoloaded)
read, tell the driver we only access the database in read mode. If
update(default), tell the driver we may execute update commands.
true(default), each update statement is committed immediately. If
false, an update statement starts a transaction that can be committed or rolled-back. See section 2.4 for details on transaction management.
- I haven't found a good description of what this does, but setting it to
dynamicmakes it possible to have multiple active statements on the same connection with Microsoft SQL server. Other values are
- Define the encoding used to communicate to the driver. Defined values
are given below. The default on MS-Windows is
unicodewhile on other platforms it is
utf8. Below, the *A() functions refer to the‘ansi' ODBC functions that exchange bytes and the *W() functions refer to the‘unicode' ODBC functions that exchange UCS-2 characters.
- Communicate using the *A() functions and pass bytes untranslated.
- Communicate using the *A() functions and translated between Prolog Unicode characters and their (possibly) multibyte representation in the current locale.
- Communicate using the *A() functions and translated between Prolog Unicode characters and their UTF-8 encoding.
- Communicate using the *W() functions.
false), statements returning
SQL_SUCCESS_WITH_INFOsucceed without printing the info. See also section 2.8.1.
- Defines how the SQL constant NULL is represented. Without specification,
the default is the atom
$null$. NullSpecifier is an arbitrary Prolog term, though the implementation is optimised for using an unbound variable, atom and functor with one unbound variable. The representation
null(_)is a commonly used alternative.
The specified default holds for all statements executed on this connection. Changing the connection default does not affect already prepared or running statements. The null-value can also be specified at the statement level. See the option list of odbc_query/4.
- If the width of a column exceeds Length, use the API SQLGetData() to get the value incrementally rather than using a (large) buffer allocated with the statement. The default is to use this alternate interface for columns larger than 1024 bytes. There are two cases for using this option. In time critical applications with wide columns it may provide better performance at the cost of a higher memory usage and to work around bugs in SQLGetData(). The latter applies to Microsoft SQL Server fetching the definition of a view.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510358.68/warc/CC-MAIN-20230928031105-20230928061105-00694.warc.gz
|
CC-MAIN-2023-40
| 2,526 | 23 |
https://community.alfresco.com/thread/231996-category-and-sub-category-label-lenght-in-search
|
code
|
I've encountered a trouble recently. We have a big category and subcategory tree ( at least 10 levels) with more or less 30 characters by label.
When searching for a subcategory in the deepest levels in the advance search, the result return no files despite the fact that those files are linked to this category.
Is there a sum limit for characters in the subcategories ? If it's the case, do you know how to increase this limit ?
Thank you sincerely for the informations !
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578527865.32/warc/CC-MAIN-20190419161226-20190419183226-00127.warc.gz
|
CC-MAIN-2019-18
| 473 | 4 |
http://bio.net/hypermail/INFO-GCG/1997-March/002213.html
|
code
|
In article <browns02-2703971117430001 at mcrcr1.med.nyu.edu>,
Stuart M. Brown <browns02 at mcrcr.med.nyu.edu> wrote:
>I would like to offer my users access to SeqLab from Macs and PC in
>their labs and offices, but cost of X software for many hundreds of
>machines is a real obstacle. I have eXodus on several Macs in our
>labs and it works quite well - but at $118 per copy, very few of my
>users are going to buy it.
>>I have a copy of MI/X but it crashes when I try to run SeqLab (works
>ok for other less demanding X applications).
>>Has anyone successfully run SeqLab with MI/X?
Yes, I have, on a Mac. However, I have found MI/X to be very slow,
and tends to leave bits of menus and so on hanging about on the
screen, which is rather messy. It is also hopeless if you use a
remote window manager. The only way I have found it to be even
remotely stable is if you use the local twm-alike window managre that
it comes with. I have made it available for my users but only really
so that they can evaluate the concept. I suggest that they buy eXodus
or eXceed if they think they will want to use X a lot.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511364.23/warc/CC-MAIN-20231004084230-20231004114230-00174.warc.gz
|
CC-MAIN-2023-40
| 1,105 | 18 |
https://sisik.eu/blog/web/file-tool-intro
|
code
|
My next tiny online tool for analyzing file types
Sometimes when I'm cross-compiling native C libraries for Android, I like to check the ABI of the final .so library file. Some project's don't compile straight away and I need to hack the build system before I get my compiled library. When I'm not sure if the right type of ABI was compiled, I like to use the handy
file utility that comes bundled with Linux and quickly check my library.
I wanted to create a customized online version of this tool that would be hosted on my blog and this is the result.
The online tool has the following features
- it shows a short description of the file type
- it displays the mime type
- it can display some image properties of image files
- you can use it to quickly check the ABI and platform of native .so libraries
- it shows common extensions of some file types
- you can process multiple files in bulk and export a spreadsheet report with file type information
- you can get the pdf file version
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474663.47/warc/CC-MAIN-20240226194006-20240226224006-00588.warc.gz
|
CC-MAIN-2024-10
| 989 | 12 |
https://forums.bulbagarden.net/index.php?members/linny_456.30417/page-3
|
code
|
If you are finding yourself unable to log in, you should be able to fix the issue by following the following process.
1. Close all browser tabs with any part of Bulbagarden open.
2. Delete all Bulbagarden.net cookies (and if possible, any cached site data for Bulbagarden) from your browser.
3. Close and reopen your browser, open a new tab, and log into the forums on the new tab.
If you've followed this process and are still having issues, please contact us via the "Contact us" link at the bottom of the forum.
sorry, you posted that you'd be ready on your own wall and i missed it. I can probably be there in a half hour, provided i dont fall asleep. i'll vm you when i get out of the battle subway. trying to get that focus sash.
Don't delete an old post so you can try and bump a thread without getting caught. We can see deleted posts. And your post was there earlier, and now it's not - it's deleted and you've posted a new one.
In future either wait for a reply or edit your previous post.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178358956.39/warc/CC-MAIN-20210227114444-20210227144444-00507.warc.gz
|
CC-MAIN-2021-10
| 999 | 8 |
http://kennardlilly.com/portfolio/hikkai.html
|
code
|
Be In Touch
Product design and branding for a next-level to-do list app.
Mobile, UX, UI
Hikkai is a next-level to-do list app organized by groups, people and folders in a way that is intuitive and natural to how your brain works. I designed the branding and product design.
More Curated Works
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587877.85/warc/CC-MAIN-20211026103840-20211026133840-00593.warc.gz
|
CC-MAIN-2021-43
| 292 | 5 |
http://community.teradata.com/t5/Database/RECURSIVE-VIEW/td-p/41437
|
code
|
I have issues regarding recursive queries...
1) can we create a view over a recursive view in teradata.
2) and I have to implement a view which has two recursive queries which are dependent on derived tables.,
please suggest solution asap
thanks in advance.
This should help.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794863689.50/warc/CC-MAIN-20180520205455-20180520225455-00620.warc.gz
|
CC-MAIN-2018-22
| 275 | 6 |
https://www.tek-tips.com/viewthread.cfm?qid=1739883
|
code
|
OpenDNS has raised a TCP/IP question
OpenDNS has raised a TCP/IP question
Scenario: to use openDNS web filtering requires input of DNS into the WAN settings of the modem- but the issued Telstra (Australia) modem/routers have their WAN settings disabled in firmware. Solution: - use another router.
Complication: for end user (not me) simplicity I don't want to replace the OEM modem/router - this way if there are internet supply problems then users can *easily* default back to their original set-up.
**** I know it will work by replacing with a new modem/router but this IS NOT an answer to my questions ****
So I'm using a second router (a Dlink DIR-826L that was sitting around for something else...it was dirt cheap!) but I can't bridge the first (firmware wont let me) nor can I simply use the second router as a repeater because I need to enter different DNS settings.
As I need two routers I had the light-bulb idea of using the OEM router for my computers & devices (no openDNS) and then using the second router (with openDNS) for the rug-rats. Brilliant, but it's not quite working - 80%. So far my best solution is the pretty standard set-up of:
Subnet: 255.255.255.0 (can only change last octet)
DHCP Server 192.168.0.2-62 (again can only change the last octets)
Set DHCP reservation lease for DIR-826L MAC = 192.168.0.4 = OK
Router IP: 192.168.1.1
Subnet Mask: 255.255.255.0
Internet Connection setup works with either Static IP (192.168.0.4) or Dynamic IP.
Everything works, except:
1. I can't get access to DIR-826L connected devices from CGD24N connected devices. Can ping 192.168.0.4 from CGD24N but nothing else(extending DHCP range makes no difference)
2. Can ping everything from the DIR-826L router, and whilst DIR-826L connected devices (eg iPhone) can browse or have network access to CGD24N connected devices (eg Seagate NAS) unfortunately most apps (eg. phone backup) wont let two devices connect unless they are connected to the same router. Or perhaps need the routers connected differently.
I've turned off all firewalls and even tried putting the 192.168.0.4 IP into the DMZ of the CGD24N router.
**** I know everything will work if all devices connect directly to the DIR-826L - but that IS NOT MY QUESTION!! ****
I have been trying to get my head around subnets & subnet masks, and from what I have read there should be a way to communicate in both directions. My noob logic suggests to me the problem is because the two routers are in different subnets (192.168.0.1 & 192.168.1.1) but whenever I set up the DIR-826L with the same subnet (eg. router IP: 192.168.0.64) I get stuck. Even when trying subnet masks the problem is I can't get any internet access through to the DIR-826L using Dynamic IP Internet Connection settings - but I can't use static IP as the router then tells me I have a subnet conflict between the LAN & Internet Connection settings (which I do). Different subnet masks make no difference either. I have wondered if this is possibly a PORT issue but again I don't want to change the default set-up of the CGD24N router.
I realise this two-direction communication may not be possible, but I've got to the point where even if I *did* get it working I wouldn't actually know why, so.....
Q1. From a TCP/IP perspective, why is the communication one-way but not the other?
Q2. Is it a hardware limitation of the DIR-826L or CGD24N routers? Not really a TCP/IP question I know....
Q3. Is it possible to have two-way communication between the routers with this hardware set-up, and if so what is the TCP/IP set-up? A NO is fine BTW
Q4. If not, what extra hardware would I need and what would be the TCP/IP set-up?
Q5. I understand how to get remote access to the CGD24N router (Provider IP address), but how do I get remote access to the DIR-826L router if it's IP is 192.x.x.x? Not possible? Fortunately I can access the Dlink via a cloud login....
Really appreciate any thoughts - and are more than happy to be pointed in the right direction for relevant web-site references. Even if I can't get it working the way I want it will be good to know the TCP/IP reasons.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267860570.57/warc/CC-MAIN-20180618144750-20180618164750-00204.warc.gz
|
CC-MAIN-2018-26
| 4,114 | 26 |
https://forum.aptoslabs.com/t/ait2-zakola/1852
|
code
|
Hi friends, support me in my endeavors!
My name is Dmitry
A short description, background, experience and main achievements
I am currently living in Russia. I work in IT for more than 15 years.
My first experience was last year. By happy coincidence became a GoldFinch Ambassador, got involved in the process and I liked it. Started to put nodes, participate in testnodes, and help develop projects. Aptos is my first “real” blockchain project that I’ve been involved in since phase one, and I see it as quite interesting from a learning perspective as well. Throughout the year, I’ve been learning about different projects.
Testnets: StarkNet, Subspace, Althea, Celestia, Minima, Forta, IronFish, Massa, Masa.
Also wrote an article: Aptos Node - Zakola - Medium
I am fluent in Russian and English.
You can contact me via Telegram: @Zakola66
If you know me, support me!)
Machine: 4CPU/DDR 8gb/SSD 200Gb/OS ubuntu 20.04
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711360.27/warc/CC-MAIN-20221208183130-20221208213130-00129.warc.gz
|
CC-MAIN-2022-49
| 926 | 11 |
http://www.jguru.com/faq/view.jsp?EID=98171
|
code
|
The PropertyResourceBundle class constructor takes an InputStream (not a Reader). Does this mean that the property files that back the PropertyResourceBundle always have to be encoded in ASCII (Cp1252 really on windows)? How are people (localizers) dealing with that in Japan/Korea/China etc.?
According to Sun's Bug Parade, there is a work around, of sorts. The property files (at least as of 1.2) will support unicode characters if they are placed in the property file using the uXXXX notation. Not very nice.
The RFE number is 4221013
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189667.42/warc/CC-MAIN-20170322212949-00473-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 537 | 3 |
https://support.mozilla.org/en-US/questions/1116504
|
code
|
For the 9th time I have upgraded to Windows 10 and the flash plugin crashes on every page. I have updated..cleared cache..downloaded CCleaner to clean my computer..uninstalled and reinstalled..unchecked accelerator..unchecked protective mode and everything I could think of, as per many suggestions on the forum. I might add that it works fine in Internet Explorer.
Additional System Details
- Google Update
- NPRuntime Script Plug-in Library for Java(TM) Deploy
- Next Generation Java Plug-in 11.77.2 for Mozilla browsers
- Shockwave Flash 21.0 r0
- User Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Firefox/45.0
If you have submitted crash reports then please post the IDs of one or more recent crash reports that start with "bp-".
You can find the report ID of recent crash reports on the "Help > Troubleshooting Information" page (about:support).
- click the "All Crash Reports" button on this page to open the about:crashes page and see all crash reports.
Alternatively you can open about:crashes via the location/address bar.
If a line on the about:crashes page doesn't start with "bp-" then click the line to submit the report and the link will be updated and gets a "bp-" prefix if the report is submitted successfully. Please do not add the "bp-" prefix yourself.
I see you posted a crash ID in a new thread.
Locking this thread.
Please continue here: [/questions/1116521]
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579251802249.87/warc/CC-MAIN-20200129194333-20200129223333-00141.warc.gz
|
CC-MAIN-2020-05
| 1,403 | 15 |
https://pdxscholar.library.pdx.edu/mth_fac/297/
|
code
|
We propose an a posteriori error estimator for high-order p- or hp-finite element discretizations of selfadjoint linear elliptic eigenvalue problems that is appropriate for estimating the error in the approximation of an eigenvalue cluster and the corresponding invariant subspace. The estimator is based on the computation of approximate error functions in a space that complements the one in which the approximate eigenvectors were computed. These error functions are used to construct estimates of collective measures of error, such as the Hausdorff distance between the true and approximate clusters of eigenvalues, and the subspace gap between the corresponding true and approximate invariant subspaces. Numerical experiments demonstrate the practical effectivity of the approach.
This is the preprint version, under review for publication in Numerische Mathematik, and is also available at https://arxiv.org/abs/2009.06677.
Giani, S., Grubisic, L., Hakula, H., & Ovall, J. (2020). A Posteriori Error Estimates for Elliptic Eigenvalue Problems Using Auxiliary Subspace Techniques. Preprint version.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499744.74/warc/CC-MAIN-20230129144110-20230129174110-00646.warc.gz
|
CC-MAIN-2023-06
| 1,103 | 3 |
https://makerfairegalicia.com/en/charlas/nunca-choveu-que-non-escampara
|
code
|
"Nunca choveu que non escampara" aims to minimize the side effects that floods bring with them, affecting the population with considerable material and sometimes personal damage, for which a prevention system is sought.
In this way, the project consists of the design of a station prototype that controls the flow and the level of the water in specific points of the hydrographic basin of the area to be studied. Developed with Arduino, it allows to control the critical situations caused by these natural disasters and, thus, notify when the situation of torrents and streams approaches risk levels and can cause flooding.
I started going to the Isidro Parga Pondal Scientific-Technological Classrooms when I was 11 years old. In them, with the help of people like David Ballesteros, I saw society in a different way.
When I was in sixth grade, I participated as a student in the Isidro Parga Pondal Scientific - Technology Classrooms. Over the past seven years, I have learned to see problems that need a solution and to apply my knowledge of the scientific method to find it.
Thanks to the different investigations in which I became involved during this stage, I was able to delimit the margins of what inspired me to continue working and investigating. Right now, the basis of my research is the implementation of technology to improve aspects of the world that affect us daily.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648911.0/warc/CC-MAIN-20230603000901-20230603030901-00596.warc.gz
|
CC-MAIN-2023-23
| 1,382 | 5 |
http://wpg-callcenters.livejournal.com/982.html
|
code
|
I need the work experience for my resume though... *sigh*
I hope some of my resumes dropped off to other places result in callbacks :(
The really really sad part is, I'm *GOOD* at my job. I just despise the repetitive nature of it.
It feels like my brain is turning to mush!
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171232.43/warc/CC-MAIN-20170219104611-00613-ip-10-171-10-108.ec2.internal.warc.gz
|
CC-MAIN-2017-09
| 274 | 4 |
https://www.elitmus.com/jobs/32026-bidgely-data-analyst-intern-16-bangalore
|
code
|
About the company:
Bidgely (which means 'Electricity” in Hindi) is an innovative technology startup which aims for disaggregation of power consumption at a household level.
In countries like USA & UK and Japan there is peak load pricing applicable on electricity bills unlike India(where fixed per unit charge is applicable).To help out the consumers understand when and where they can save the electricity most by understanding usage patterns , hourly analysis, giving notifications if usage is more and bill predictions. It uses data analytics and pattern finding techniques on power consumption graphs to calculate the power consumed by each individual device in a household without plug-in monitors.
Founded in 2011 by Abhay Gupta and Vivek Garud out of a Mountain View garage, Bidgely has come a long way. It got recognized as an Energy Innovation Pioneer at 2015 IHS EnergyCERAWeek for using ground-breaking Saas analytics for transforming energy usage and was also voted as one of the top 100 clean technology companies worldwide by CleanTech.
With a young and exuberant team of data scientists, engineers, salespeople and marketers, Bidgely provides a fun and competitive environment with a zeal to achieve its goal of changing the perspective of 5.6 billion people with access to electricity, on energy efficiency.
- 2016 batch BE/BTech/MCA/MS
- Good pH score
- Good academic record
Bidgely is looking for extraordinary and dynamic Data Analysts to be part of its core team in Bangalore. You must be a highly analytical individual who enjoys working with data and can find interesting patterns & issues. Be part of a highly energetic and innovative team that believes nothing is impossible with some creativity and hard work.
- Analyse electricity consumption data and identify the various appliances & their consumption in a home.
- This is accomplished by analysing the unique fingerprint of the appliances and triangulating with usage, behaviour and weather patterns affecting the appliance usage.
- Understand data characteristics, prepare test data sets, design test scenarios, define metrics and evaluate the performance of different algorithms by validating with the ground truth.
- Monitor the quality of the results in production system by going through various reports and visually validating the results.
- Define rules to identify the erroneous results faster from large results set.
- Understand product requirements, data science research problems, implementation details and algorithms.
- Strive for excellence in data quality by looking beyond obvious scenarios and stated requirements.
- Deliver a high quality robust product in a fast paced start-up environment.
- Collaborate with data science team, engineering team and product management to elicit & understand their requirements and develop potential solutions.
- Present results graphically and succinctly and clearly to the key stake holders.
Desired Skills :
- Strong analytical and problem solving skills. Should have the ability to sift through large data, identify patterns and find issues.
- Able to communicate succinctly and effectively.
- Strong communication and collaboration skills.
- Experience with data analysis tools such as Microsoft Excel, R etc. would be a plus.
- Fluency in scripting and programming in perl /python/ C/C++/ Java would be a plus.
- If selected you will be on an Internship for the first 6 months, post successful completion of the Internship period, your position will be converted to permanent employment with a higher compensation.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710710.91/warc/CC-MAIN-20221129164449-20221129194449-00240.warc.gz
|
CC-MAIN-2022-49
| 3,554 | 26 |
http://ufpaperubxs.lasvegasdentists.us/the-womb-of-the-grail.html
|
code
|
The rose and the grail share many spiritual resonances the walled garden is womb-like, and mary was sometimes regarded as the garden itself. No this was a total fabrication made by the authors of a book called 'holy blood, holy grail' which was used by dan brown in his own book called the. Awakening the grail light there is a huge wave of feminine christ consciousness flooding the planet at this time – which is beyond religion and beyond any boundaries of belief, culture or. Discovering the womb and taking those first steps to clear, cleanse and open its infinite vastness is an essential piece of the healing journey for every woman, and. The hidden occult history of moldavite this theory about the grail being the womb and bloodline has been popularized by dan brown’s novels and movies such as. Many books on esoteric matters discuss the grail, rose, and cross later rendering of grail symbolism the ark of the new covenant—the womb and. Holy grail, the description is based on the idea that the real grail is not a cup but the womb and later the earthly remains of mary magdalene. Womb awakening is the foundational throne of the feminine christ – the womb is the holy grail, the sacred chalice that holds the secrets of life.
Legend of the holy grail according to the legend, the grail represented many things – a cup, a stone, but most significantly, the womb of mary magdalene. Arthurian and grail lore make up the matter of the authors of the holy blood and the holy grail suggest that it should actually be understood as the womb. The real origins of the holy grail were not [holy grail] was the cup that symbolized the womb and the bloodline of the most ‘pure’ of the reptilian. The sword and the grail restoring the forgotten archetype in arthurian myth john adcox i dron, a chalice, or the womb of mary magdalene), and strikes. The holy grail is a vessel that serves as an important motif in arthurian literature different traditions describe it as a cup, dish or stone with miraculous powers. Monty python-the black knight hopelessromantic27 loading monty python the holy grail - the killer bunny - duration: 5:19 boxy brown 1,929,818 views.
Sacred feminine medicine wheel journey through the grail womb cross in 2012, as the gateway to the feminine dimension opened to birth the new wave of feminine. The holy blood and the holy grail (retitled holy blood, holy grail in the united states) is a book by michael baigent, richard leigh and henry lincoln.
Guardians of the holy grail 60 this is the energy of christ consciousness and why christ was associated with the holy grail the womb of the goddess is. Its representation was that of the sacred vessel, the vas uterus, the womb and so, when fleeing into france, mary the grail code is based on the principles of liberty, fraternity and. Womb & hara awakening apprenticeship journeying through the 8 grail gates of the womb medicine wheel to sexually awaken and unite the divine woman/man.
They concluded that the legendary holy grail is simultaneously the womb of mary magdalene and the sacred royal bloodline in the holy blood and the holy grail. The sacred power of menstrual blood and resurrection’ previously associated with the holy womb and menstrual blood of the divine mother the holy grail.
The guardian - back to home make the possibility of prolonging a baby’s effective gestation period outside of the womb has long been viewed as the holy grail.
The real history of the holy grail sandra miesel brown maintains that the grail is the womb of mary magdalene who bore the merely human christ's child. So what is womb awakening about many women today, when contemplating their womb space the womb is the ‘holy grail’ of all ancient religion and myth. May you find great value in these grail quotes and inspirational quotes about grail from my large inspirational the grail is the womb of the beloved - robert. The magdalene mysteries and the path of the blue rose veronica goodchild, phd herself is the grail, or her womb is the grail as the carrier of the bloodline. The grail is often depicted as a cup or chalice the cup is a feminine shape, receptive, containing, possibly the woman’s body or womb our culture and society has actively persecuted and.
The womb of sacred geometry by randall carlson previous articles in this series the meaning of sacred geometry the meaning of sacred geometry part 2 what’s the point as described in. Alchemical terms for the symbolic grail, signifying the womb of matter, a universal vessel of all transformations the original symbol was the vase of life and death representing the womb. Holy grail part 3 - bloodline mary magdalene with her alabaster jar the holy grail was a symbol for the womb containing the blood of christ. The holy grail cup is the womb itself vøń loading unsubscribe from vøń cancel unsubscribe working subscribe subscribed unsubscribe 51 loading loading working add to want.Download The womb of the grail
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512332.36/warc/CC-MAIN-20181019062113-20181019083613-00425.warc.gz
|
CC-MAIN-2018-43
| 4,979 | 8 |
https://mail.python.org/pipermail/numpy-discussion/2016-October/076145.html
|
code
|
[Numpy-discussion] Intel random number package
ralf.gommers at gmail.com
Thu Oct 27 04:25:33 EDT 2016
On Thu, Oct 27, 2016 at 10:25 AM, Pavlyk, Oleksandr <
oleksandr.pavlyk at intel.com> wrote:
> Please see responses inline.
> *From:* NumPy-Discussion [mailto:numpy-discussion-bounces at scipy.org] *On
> Behalf Of *Todd
> *Sent:* Wednesday, October 26, 2016 4:04 PM
> *To:* Discussion of Numerical Python <numpy-discussion at scipy.org>
> *Subject:* Re: [Numpy-discussion] Intel random number package
> On Wed, Oct 26, 2016 at 4:30 PM, Pavlyk, Oleksandr <
> oleksandr.pavlyk at intel.com> wrote:
> Another point already raised by Nathaniel is that for numpy's randomness
> ideally should provide a way to override default algorithm for sampling
> from a particular distribution. For example RandomState object that
> implements PCG may rely on default acceptance-rejection algorithm for
> sampling from Gamma, while the RandomState object that provides interface
> to MKL might want to call into MKL directly.
> The approach that pyfftw uses at least for scipy, which may also work
> here, is that you can monkey-patch the scipy.fftpack module at runtime,
> replacing it with pyfftw's drop-in replacement. scipy then proceeds to use
> pyfftw instead of its built-in fftpack implementation. Might such an
> approach work here? Users can either use this alternative randomstate
> replacement directly, or they can replace numpy's with it at runtime and
> numpy will then proceed to use the alternative.
The only reason that pyfftw uses monkeypatching is that the better approach
is not possible due to license constraints with FFTW (it's GPL).
> I think the monkey-patching approach will work.
It will work, for a while at least, but it's bad design.
We're all on the same page I think that a separate submodule for
random_intel is a no go, but as an explicitly switchable backend for
functions with the same signature it would be fine imho. Of course we don't
have that backend infrastructure today, but it's something we want and have
been discussing anyway.
-------------- next part --------------
An HTML attachment was scrubbed...
More information about the NumPy-Discussion
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780058589.72/warc/CC-MAIN-20210928002254-20210928032254-00252.warc.gz
|
CC-MAIN-2021-39
| 2,178 | 38 |
https://en.wiktionary.org/wiki/caquesseit%C3%A3o
|
code
|
Jump to navigation Jump to search
caquesseitão m (plural caquesseitões)
- A creature mentioned in Fernão Mendes Pinto’s memoir Peregrinação, described as having the size of a large duck, being black, having bat-like wings, a lizard-like tail, a snake-like neck, spikes the length of a quill on its back and a rooster-like spur on the back of its head.
- caquesseitão on the Portuguese Wikipedia.Wikipedia pt
- Peregrinaçam on the Portuguese Wikisource.Wikisource pt
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232256546.11/warc/CC-MAIN-20190521182616-20190521204616-00042.warc.gz
|
CC-MAIN-2019-22
| 474 | 5 |
https://permies.com/t/55313/Classes
|
code
|
Do you teach classes in innoculating logs, Peter? I would love to learn more and am in WA State.
posted 1 year ago
Thanks for asking. Yes I regularly teach Mushroom Cultivation & Application Courses. I am in the midst of planning some for later in the year, you can sign up to hear about that by entering you email at the linked page.
See the 700-page Radical Mycology book—a compendium of all things related to fungi, their cultivation, and application—here: http://bit.ly/rmchthaeus
The human mind is a dangerous plaything. This tiny ad is pretty safe:
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607726.24/warc/CC-MAIN-20170524001106-20170524021106-00287.warc.gz
|
CC-MAIN-2017-22
| 558 | 5 |
https://analytixon.com/2018/04/27/distilled-news-755/
|
code
|
Ople uses advanced machine learning to automate and optimize Data Science processes, accelerating the delivery of new, more accurate models from months to minutes. With Ople, business executives will gain first movers’ advantage on new opportunities, team leaders will deliver faster, more accurate results, and, Data Scientists will now be able to focus on actual business objectives, not just workflow.
We illustrate pattern recognition techniques applied to an interesting mathematical problem: The representation of a number in non-conventional systems, generalizing the familiar base-2 or base-10 systems. The emphasis is on data science rather than mathematical theory, and the style is that of a tutorial, requiring minimum knowledge in mathematics or statistics. However, some off-the-beaten-path, state-of-the-art number theory research is discussed here, in a way that is accessible to college students after a first course in statistics. This article is also peppered with mathematical and statistical oddities, for instance the fact that there are units of information smaller than the bit. You will also learn how the discovery process works, as I have included research that I thought would lead me to interesting results, but did not. In all scientific research, only final, successful results are presented, while actually most of the research leads to dead-ends, and is not made available to the reader. Here is your chance to discover these hidden steps, and my thought process!
While the field of machine learning advances swiftly with the development of increasingly more sophisticated techniques, little attention has been given to high-dimensional multi-task problems that require the simultaneous prediction of multiple responses. This tutorial will show you the power of the Graph-Guided Fused LASSO (GFLASSO) in predicting multiple responses under a single regularized linear regression framework.
Time series data, simply put, is a set of data points collected at regular time intervals. We encounter time series data every day in our lives – stock prices, real estate market prices, energy usage at our homes and so on. So why should we care about this data? Because understanding time series data, especially of stock prices, could help you to be on a path to make $$$. Visualizing time series data play a key role in identifying certain patterns in graphs and predicting future observations in the data for making informed decisions. Some properties associated with time series data are trends (upward, downward, stationary), seasonality (repeating trends influenced by seasonal factors), and cyclical (trends with no fixed repetition). Instead of focusing on forecasting analyses, we’ll guide you through the first step in time series analysis: Visualisation.
Scientists across nearly every discipline are researching ever larger and more complex data sets, using tremendous amounts of compute power to learn, make discoveries and build new tools that few could have imagined only a few years ago. Traditionally, this kind of research has been limited by the availability of resources, with only the largest universities or industry partners able to successfully pursue these endeavors. However, the power of cloud computing has been removing obstacles that many researchers used to face, enabling projects that use machine learning tools to understand and address student questions and that study robotic interactions with humans, among many more. In order to ensure that more researchers have access to powerful cloud tools, we’re launching Google Cloud Platform (GCP) research credits, a new program aimed to support faculty in qualified regions who want to take advantage of GCP’s compute, analytics, and machine-learning capabilities for research. Higher education researchers can use GCP research credits in a multitude of ways — below are just three examples to illustrate how GCP can help propel your research forward.
Using already existing models in ML/DL libraries might be helpful in some cases. But to have better control and understanding, you should try to implement them yourself. This article shows how a CNN is implemented just using NumPy. Convolutional neural network (CNN) is the state-of-art technique for analyzing multidimensional signals such as images. There are different libraries that already implements CNN such as TensorFlow and Keras. Such libraries isolates the developer from some details and just give an abstract API to make life easier and avoid complexity in the implementation. But in practice, such details might make a difference. Sometimes, the data scientist have to go through such details to enhance the performance. The solution in such situation is to build every piece of such model your own. This gives the highest possible level of control over the network. Also, it is recommended to implement such models to have better understanding over them. In this article, CNN is created using only NumPy library. Just three layers are created which are convolution (conv for short), ReLU, and max pooling.
Deep Learning is one of the ‘hot’ topics in the AI area – a lot of hype, a lot of inflated expectation, but also quite some impressive success stories. As some AI experts already predict that Deep Learning will become ‘Software 2.0’, it might be a good time to have a closer look at the topic. In this session I will try to give a comprehensive overview of Deep Learning. We will start with a bit of history and some theoretical foundations that we will use to create a little Deep Learning taxonomy. Then we will have a look at current and upcoming application areas: Where can we apply Deep Learning successfully and what does it differentiate from other approaches? Afterwards we will examine the ecosystem: Which tools and libraries are available? What are their strengths and weaknesses? And to complete the session, we will look into some practical code examples and the typical pitfalls of Deep Learning. After this session? you will have a much better idea of the why, what and how of Deep Learning, including if and how you might want to apply it to your own work.
In the world of postmodernism, Relativism has been, in its various guises, both one of the most popular and most reviled philosophical doctrines. According to Relativism, there is no universal and objective truth; rather each point of view has its own truth. You must be wondering why I am discussing it and how it is even related to Data Science. Well, in this post, I will be discussing the usefulness of each error metric depending on the objective and the problem we are trying to solve. When someone tells you that “USA is the best country”, the first question that you should ask is on what basis is this statement being made. Are we judging each country on the basis of their economic status, or their health facilities etc.? Similarly each machine learning model is trying to solve a problem with a different objective using a different dataset and hence, it is important to understand the context before choosing a metric.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039746386.1/warc/CC-MAIN-20181120110505-20181120132505-00537.warc.gz
|
CC-MAIN-2018-47
| 7,109 | 8 |
https://developers.arcgis.com/qt/latest/qml/guide/display-kml-content.htm
|
code
|
Keyhole Markup Language (KML) is a geographic data format popularized by Google Earth. KML files can be distributed with supporting content, including images and 3D models, in a KMZ archive. ArcGIS Runtime supports version 2.2 of the KML specification as defined by the Open GIS Consortium (OGC).
Display a KML/KMZ file
KML content is loaded using a KmlDataset. The KmlDataset constructor takes a URL, which can point to a local file or a network location. Loading the layer will cause the associated dataset to load. KML layers can also be loaded from portal items, which can specify a link to a file or the KML/KMZ file itself.
Note:See Licensing your ArcGIS Runtime App to learn more about the licensing requirements for KML files loaded over the network and from disk.
Note:Creating, editing, and saving KML data in ArcGIS Runtime is described in more detail in the topic Edit KML content.
Many KML files are wrappers that point to resources over the network. For example, a weather map might consist of a single network link that points to the latest forecast, to be retrieved every 5 minutes. As a result, loading the layer does not necessarily guarantee that the content has loaded – linked content can fail to load without affecting the load status of the layer.
Note:Many KML files, even those delivered over secure HTTPS connections, point to resources via insecure HTTP links. These resources may fail to load as a consequence of App Transport Security on iOS. Add appropriate ATS exceptions as needed for KML content. See Apple’s developer documentation for more information about ATS exceptions.
Explore the KML content tree
KML layers contain content in a hierarchy. You may need to programmatically explore this hierarchy to interact with KML content. For example, to turn off a screen overlay, you would need to first find it in the tree, then change its visibility. This code will follow a recursive pattern, using a function that calls itself for each node in the tree. The KML tree should be explored starting with KmlDataset. .
The non-recursive part of turning off a screen overlay is toggling its visibility once it's found. Because you're working with a generic KmlNode, you first need to determine whether each iterated node is a screen overlay, KmlScreenOverlay. After the screen overlay is found, toggle its visibility.
You should then look for screen overlay nodes that may exist deeper in the hierarchy, however. Recursively call exploreKml on any nodes that have children.
You can call the recursive function initially withKmlDataset's rootNodes, either after loading the map or in reaction to user action (like a button press).
The tree-exploration pattern is useful for other tasks involving KML. For example, ArcGIS Earth uses a recursive pattern to build a table of contents:
Identify and popups in KML
In the ArcGIS information model, a popup is defined with a set of fields that describe an object, including how that information is formatted. Unlike ArcGIS feature services, KML files don't define a standard schema for object attributes. Instead, KML files may provide a rich HTML annotation for each object, which can be presented in place of a popup. You can access the the HTML annotation via KmlNode.BalloonContent, then display that using a webview.
Viewpoints in KML
KML has two primary ways for defining viewpoints:
LookAt - defines a camera relative to the position of a KML feature
- Camera - defines the position of the camera explicitly
KmlViewpoint can represent both types of viewpoints. Custom code is required to convert from a KML viewpoint to an ArcGIS Runtime viewpoint, which can be used for navigating a scene. See Google's reference documentation for details, including diagrams. Earth browsing apps should respect LookAt viewpoints specified in KML content.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-04/segments/1610703519923.26/warc/CC-MAIN-20210120054203-20210120084203-00648.warc.gz
|
CC-MAIN-2021-04
| 3,820 | 20 |
https://www.cats.rwth-aachen.de/cms/cats/Der-Lehrstuhl/~bjxok/KarriereAmCATS/lidx/1/
|
code
|
Career at CATSCopyright: © Vitalij Albert
A career at CATS takes many forms!
Our focus lies clearly on scientific activities – our research in modeling, simulation and optimization of technical systems covers the whole range from theoretical method development to industrial applications. A degree in computational engineering science, mechanical engineering, mathematics, or physics is the best foundation to start working on these topics.
The personal development of our employees is just as important to us as their professional skills. Therefore, project management, teaching, and conference presentations as well as the participation in soft-skills workshops is strongly encouraged and supported. Given the international nature of our work, contacts to foreign research partners and participation in scientific conferences all over the world are explicitly fostered. At the same time, a collaborative and appreciative working environment is natural for us.
Furthermore, apprenticeships are very important to us: we have been training future office administrators, IT specialists and mathematical-technical software developers (MATSE) successfully for years now. Our research in computational engineering science demands individual and high-quality IT solutions on a regular basis, which result in very interesting and challenging tasks for our apprentices.
After gaining experience in industry, I pursued my doctorate at CATS from 2005 to 2011. Immediately afterwards, I applied for a professorship at the University of Applied Sciences Aachen, where, to this day, I hold a tenured position in the study area of Biomedical Engineering. Amongst other tasks, I give lectures in fluid mechanics and CFD courses. The time at CATS was a very busy one, but likewise an amazing experience, during which I learned a lot: Not only how to work scientifically, but also how to lead a team of students and to communicate with engineers and medical doctors. Additionally, I was very involved in teaching, which made me realize how much I enjoy passing on knowledge. Overall, the time at CATS was a perfect preparation for my current job and teaching position.
Prof. Mehdi Behbahani
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100779.51/warc/CC-MAIN-20231208212357-20231209002357-00462.warc.gz
|
CC-MAIN-2023-50
| 2,176 | 7 |
https://zorikh.blogspot.com/2012/03/story-of-whats-been-delaying-retun-to.html
|
code
|
So here's the story: My first delay was in getting the video tapes converted to digital media. I had to wait until the money came in to do that. The money came from a new job I acquired. This proved to be a double-edged sword. The job got me money, but took my time.
I also came to discover that my computer has a hard time using Adobe Premiere when there are too many files being drawn from and when the project is too long. I got the idea that a laptop would resolve some of these issues, being as it would have a new OS, more memory, and be portable, allowing me to edit when away from home.
Santa Clause bequeathed me with a spanking new MacBook Pro, which then put me in the dilemma of wither learning a Mac-compatible editing program like Final Cut, or using Windows on a Mac so I could continue editing with Premiere. I chose the latter.
At first I was told to use Parallels to install Windows, so I bought the program and installed Windows, then Premier, then noticed that Premiere was running a little wonky. Someone then said the boot Camp was the way to go to install Windows on a Mac.
The trouble is that the latest version of Boot Camp only works with Windows 7, and I only had windows XP. So a friend provided me with a copy of Windows 7.
But when using Boot Camp, one should back up one’s files. The external hard drive I was using did not have enough space to hold all the files on my new MacBook, so I was burning disks to open up the space. Then one day the external hard drive failed.
The troubleshooting guides led me to research file recovery companies. After recovering form the cardiac event that the prices they were charging gave me, I head from a friend that it’s possible tat you don’t need “file recovery,” it could just be a simple hardware problem.
It turned out that the USB jack had broken off of the circuit board, the disk itself was fine, so the company that sold me the HD provided me with a dock. But the HD would not fit into the dock. They said they would provide me with a new casement, but forgot to get it to me until I called them a week or so later. Again, the HD did not fit, but I figured out that I needed to detach the little circuit board on which the USB input jack had been attached, and then everything fit just fine.
Then it seemed that I could no longer simply move the files from my MacBook to my HD, so I had to burn disks. It took me a while to figure out how to burn disks on a MacBook. In fact, I wound up using an XP program and doing the work in windows through Parallels. Then it looked like the disks were blank after burning.
Both of these things turned out to be false alarms. I figured out how to move the files, and that the disks were not really blank. In any event, I finally got all my files backed up and was ready to run Boot Camp and install Windows 7.
What followed was a continuation of the Kafka-esque nightmare that has been plaguing me. I shall spare you the minute details, but merely say that it involved having to burn and re-burn disks, load drivers onto one thing and then another, a search for some internet access that would not stall out during a download process, and two late nights at the Apple store.
Now it looks like I may have to plunk down about $300 one way or another; either to buy a new copy of Windows 7 so I can load it onto my MacBook so I can continue editing in Adobe Premiere, or to buy a copy of Final Cut, render what I have done in Premiere already, and learn how to use Final Cut as I go.
And I hope to have something to screen by the end of the month.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-26/segments/1560627998923.96/warc/CC-MAIN-20190619063711-20190619085711-00017.warc.gz
|
CC-MAIN-2019-26
| 3,570 | 13 |
https://coderanch.com/t/653716/certification/Passed-OCAJP-preparing
|
code
|
R K Sharma wrote:Recently, I have successfully completed my first Java Certification with 86%.
Don't forget to add your name to the OcajpWallOfFame
R K Sharma wrote:Now, I'm planning for 1Z0-804. Anyone,help me to understand the difficulty level of this exam compare to first exam (1z0-803).
It will be much harder than the OCA exam for 2 reasons:
1/ you'll have to know much more advanced topics, like generics, collections, file nio, threading, concurrency, jdbc
2/ you'll need a more detailed knowledge of the contents to be able to answer the questions correctly.
R K Sharma wrote:Currently, I'm reading K&B's OCAOCP Java SE7 Programmer Study Guide. Is it enough ?
Excellent choice! I passed 3 SCJP
exams using K&B, these forums and lots of coding practice as only resources. So it's definitely enough to pass the exam.
Hope it helps!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648695.4/warc/CC-MAIN-20230602140602-20230602170602-00601.warc.gz
|
CC-MAIN-2023-23
| 838 | 10 |
https://github.com/tivac/modular-css/releases/tag/v19.0.0
|
code
|
The release of
[email protected] required some reworking in the rollup plugin, and since it's a breaking
peerDependency change due to API changes here we are at
There's some other small under-the-cover improvements like
processor.invalidate() but the rollup stuff is the big one.
- requires [email protected]
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178347321.0/warc/CC-MAIN-20210224194337-20210224224337-00078.warc.gz
|
CC-MAIN-2021-10
| 321 | 6 |
https://metricstudios.com/discuss/issues?page=2
|
code
|
RESOLVED. I discovered a small bug in RB when using weights. If you have a range defined with an empty upper or lower boundary (`‘null’` in the syntax below) weighted value will always show up as 0.
However setting the max value to an actual number instead (in this ... [view]
RESOLVED. If I use a filter to indicate that I want everything but a certain value, I’m finding that if I click on the filter again, the syntax will change so that my selection of the dataset becomes inverted from what I originally intended.
So if I enter `rockstar!=1` in my filter syntax to... [view]
I am having some problems when I try to import a template to my report builder project.
I get this error: Error importing template: Object reference not set to an instance of an object".
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057615.3/warc/CC-MAIN-20210925082018-20210925112018-00491.warc.gz
|
CC-MAIN-2021-39
| 772 | 6 |
https://www.spanishdict.com/answers/5259/quillado-quillar-primo-ta-quillado-con-migo-te-la-va-a-quillar-conmigo
|
code
|
Primo here is slang here too: dude
Yes, I thought of that, but I decided it didn't apply because if my (and apparently your) guess that "ta" is short for "está? is correct, it seems strange to use the formal form in such informal speech. The same logic applies to the last part of the sentence, in which "va" is used rather than vas. However, given the sloppy nature of the writing, maybe the writer just didn't put on the final S (maybe that's common in DR Spanish), in which case your version makes more sense.
BTW, you wrote "I would adventure...," but you have to say "I would venture..." Also, "Your going to have a problem" is bad English, but maybe you wrote it that way on purpose to match the original.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304471.99/warc/CC-MAIN-20220124023407-20220124053407-00495.warc.gz
|
CC-MAIN-2022-05
| 712 | 3 |
http://ru.webclient.neko.im/
|
code
|
About Neko IM!
Contact nulani[at]neko.im via e-mail or XMPP.
Please see the forums. If something is broken, please make a post about it there or contact me on email: xmpp (at) neko.im.
Privacy: No more information is collected and stored than what is absolutely necessary. Rosters, vcards, offline messages, and so forth.
Uptime: As much as possible. No guarantees.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1398223207046.13/warc/CC-MAIN-20140423032007-00297-ip-10-147-4-33.ec2.internal.warc.gz
|
CC-MAIN-2014-15
| 365 | 5 |
https://osdev.org/Monolithic_kernel
|
code
|
A monolithic kernel includes all (or at least, most) of its services in the kernel proper.
This reduces the amount of context switches and messaging involved, making the concept faster than a Microkernel. On the downside, the amount of code running in kernel space makes the kernel more prone to fatal bugs.
The word "monolithic" by itself means a single piece (mono) that is of or like stone (lithic), however when applied to kernels the exact meaning is more general. Most people[who?] consider that a kernel where device drivers and services run as part of the kernel is a monolithic kernel, regardless of whether parts are dynamically loaded "kernel modules" or if everything is a true single unchangeable binary. For this reason, a distinction can be drawn between "monolithic" and "pure monolithic".
Modern versions of Linux are a well-known example of a monolithic kernel - while drivers are shipped as dynamically loaded "kernel modules" they are still loaded into and running in kernel space. Monolithic kernels are common for the 80x86/PC architecture.
Examples of "pure monolithic" kernels are rare for the 80x86/PC architecture (but more common in embedded systems). This is because of the wide variety of devices, hardware and CPU features that may be present within a modern PC - a pure monolithic kernel would need to be far too large or compiled specifically for the computer before use.
In general most OS's aren't "pure monolithic" or "pure micro-kernel", but fall somewhere between these extremes in order to make use of the advantages of both methods.
- MSDOS, including Windows 9x (95, 98, Me)
- Mac OS <= 8.6
- Most BSDs
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474594.56/warc/CC-MAIN-20240225071740-20240225101740-00346.warc.gz
|
CC-MAIN-2024-10
| 1,642 | 9 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.