url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
https://forum.fractalaudio.com/threads/making-coil-splitting-work.150749/
|
code
|
Does anyone know how to actually make a split coil sound good? I would love to get some good single coil sounds out of a split humbucker but it ALWAYS sounds paper thin and lifeless. I'm thinking part of this is because of the volume drop. Perhaps, it needs some type of eq, filtering, boost or something? Is anyone making good use of a filter block or anything for this?
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195527907.70/warc/CC-MAIN-20190722092824-20190722114824-00307.warc.gz
|
CC-MAIN-2019-30
| 371 | 1 |
https://learn.microsoft.com/en-us/azure/azure-sql/database/hyperscale-named-replica-security-configure?view=azuresql
|
code
|
Configure isolated access to a Hyperscale named replica
Applies to: Azure SQL Database
This article describes the procedure to grant access to an Azure SQL Hyperscale named replica without granting access to the primary replica or other named replicas. This scenario allows resource and security isolation of a named replica - as the named replica will be running using its own compute node - and it is useful whenever isolated read-only access to an Azure SQL Hyperscale database is needed. Isolated, in this context, means that CPU and memory are not shared between the primary and the named replica, queries running on the named replica do not use compute resources of the primary or of any other replicas, and principals accessing the named replica cannot access other replicas, including the primary.
Microsoft Entra ID is the new name for Azure Active Directory (Azure AD). We are updating documentation at this time.
Create a login in the master database on the primary server
master database on the logical server hosting the primary database, execute the following to create a new login.
Use your own strong and unique password.
create login [third-party-login] with password = 'Just4STRONG_PAZzW0rd!';
Retrieve the SID hexadecimal value for the created login from the
sys.sql_logins system view:
select sid from sys.sql_logins where name = 'third-party-login';
Disable the login. This will prevent this login from accessing any database on the server hosting the primary replica.
Create a user in the primary read-write database
Once the login has been created, connect to the primary read-write replica of your database, for example WideWorldImporters (you can find a sample script to restore it here: Restore Database in Azure SQL) and create a database user for that login:
create user [third-party-user] from login [third-party-login];
As an optional step, once the database user has been created, you can drop the server login created in the previous step if there are concerns about the login getting re-enabled in any way. Connect to the
master database on the logical server hosting the primary database, and execute the following:
Create a named replica on a different logical server
Create a new Azure SQL logical server that will be used to isolate access to the named replica. Follow the instructions available at Create and manage servers and single databases in Azure SQL Database. To create a named replica, this server must be in the same Azure region as the server hosting the primary replica.
Using, for example, AZ CLI:
az sql server create -g MyResourceGroup -n MyNamedReplicaServer -l MyLocation --admin-user MyAdminUser --admin-password MyStrongADM1NPassw0rd!
Then, create a named replica for the primary database on this server. For example, using AZ CLI:
az sql db replica create -g MyResourceGroup -n WideWorldImporters -s MyPrimaryServer --secondary-type Named --partner-database WideWorldImporters_NR --partner-server MyNamedReplicaServer
Create a login in the master database on the named replica server
Connect to the
master database on the logical server hosting the named replica, created in the previous step. Add the login using the SID retrieved from the primary replica:
create login [third-party-login] with password = 'Just4STRONG_PAZzW0rd!', sid = 0x0...1234;
At this point, users and applications using
[email protected] can connect to the named replica, but not to the primary replica.
Grant object-level permissions within the database
Once you have set up login authentication as described, you can use regular
REVOKE statements to manage authorization, or object-level permissions within the database. In these statements, reference the name of the user you created in the database, or a database role that includes this user as a member. Remember to execute these commands on the primary replica. The changes will propagate to all secondary replicas, however they will only be effective on the named replica where the server-level login was created.
Remember that by default a newly created user has a minimal set of permissions granted (for example, it cannot access any user tables). If you want to allow
[email protected] to read data in a table, you need to explicitly grant the
GRANT SELECT ON [Application].[Cities] to [third-party-user];
As an alternative to granting permissions individually on every table, you can add the user to the
db_datareaders database role to allow read access to all tables, or you can use schemas to allow access to all existing and new tables in a schema.
You can test this configuration by using any client tool and attempt to connect to the primary and the named replica. For example, using
sqlcmd, you can try to connect to the primary replica using the
sqlcmd -S MyPrimaryServer.database.windows.net -U third-party-login -P Just4STRONG_PAZzW0rd! -d WideWorldImporters
This will result in an error as the user is not allowed to connect to the server:
Sqlcmd: Error: Microsoft ODBC Driver 13 for SQL Server : Login failed for user 'third-party-login'. Reason: The account is disabled.
The attempt to connect to the named replica succeeds:
sqlcmd -S MyNamedReplicaServer.database.windows.net -U third-party-login -P Just4STRONG_PAZzW0rd! -d WideWorldImporters_NR
No errors are returned, and queries can be executed on the named replica as allowed by granted object-level permissions.
For more information:
- Azure SQL logical Servers, see What is a server in Azure SQL Database
- Managing database access and logins, see SQL Database security: Manage database access and login security
- Database engine permissions, see Permissions
- Granting object permissions, see GRANT Object Permissions
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474440.42/warc/CC-MAIN-20240223153350-20240223183350-00869.warc.gz
|
CC-MAIN-2024-10
| 5,696 | 50 |
https://glam-n-tech.com/2019/02/03/3-questions-technical-project-managers-dread/
|
code
|
Project Managers are client’s front-line for a company and team. During a few moments in the day where we can focus on delivery, often, an e-mail or call can appear from a client that makes us pause and cringe to provide a response. As a consultant, questions from clients provide a fruitful experience as drives our passion, however certain questions can make us second guess.
1. Client: How long will this take?
This question typically comes in two forms 1. How long will a bug take to be resolved? OR 2. How long will this feature request take to be executed? Both questions result in the same outcome. The project manager may have prior knowledge and can provide an estimate, however, we have to look at the bigger picture and think about what else may be impacted, are there any risks, is this in scope. During a project implementation process, the team has to spend the time to evaluate requests. For an agile team, I usually leave this discussion during the sprint planning session, however, some matter are more urgent than others. Urgency can stem from the client having added pressure from business owners all the time.
How clients should ask this question: Due to X (re-organization), we need to investigate if X (department menu re-structure) is feasible within our project timeline. If not, we can remove X (styling) from the project scope.
The structure of the proposed question is important because it does not leave the delivery team spinning their heads and figuring out why the request came about in the first place and what can be de-prioritized. Clients throw a substantial amount at the delivery team without always thinking about the time it takes for us to evaluate their needs (which always impacts resources, time, scope, budget).
2. Client: Why isn’t this working?
Dealing with clients identifying bugs are no fun. From a software development perspective, developers may want to spend time cleaning or streamlining code, however not all clients want to know about it or care about code craftsmanship. When developers are focused on pushing for deadlines, their focus tends to be on the finishing line due to all the pressure. As a project manager and Advanced Certified ScrumMaster, I do my best to include a buffer time within each development cycle for peer code reviews. Explaining to a client why there is a bug or an error is daunting, but letting them know mitigation strategies for the future on slowing down on change or feature requests to fix the code or re-architecture, can provide for a better system with fewer errors.
How clients should ask the question: We came across X (inability to save) through the following steps. Let us know if this is a known bug, unknown or human error. Attached are the screenshots.
A lot of times, clients may forget that we already have a bug captured in the backlog and will work through it. Sometimes, it may be a new bug and need to know what they did to retrieve the steps. A good amount of times, it is a human error so the manager can just let them know the correct steps they should take.
3. Client: You won’t charge me right?
Clients always feel as though since they are paying for your work, they can ask for any and everything. Sometimes, if there is a bug, clients will say, this shouldn’t come out of my budget. However, clients tend to forget “favors” that the project team may have provided. One of my strategies is to document all these favors in a project modifications section with a status report or put together change requests and submit to client. The conversation can sometimes be awkward, but having full documentation always helps to reference during tough conversations. Be prepared before discussions and if you are not sure, do not commit to an answer until after a client call.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401600771.78/warc/CC-MAIN-20200928104328-20200928134328-00113.warc.gz
|
CC-MAIN-2020-40
| 3,788 | 11 |
https://www.preventionweb.net/publication/flood-forecasting-and-early-warning
|
code
|
Flood forecasting and early warning
This tool is designed to provide a practical, step-by-step guide to developing and operating the total flood warning system to agencies responsible for creating and communicating flood warnings. It covers predicting flood levels and the likely impacts of a flood, designing and disseminating warning messages, as well as the means of reviewing the system’s effectiveness following an event.
It has been prepared to guide flood managers and can be used before, during and after emergencies. It is intended to help decision-makers establish an effective overview of the situation and find answers to their questions quickly. Many countries have already begun to incorporate flood forecasting and early warning in local and national emergency planning systems, and this tool is meant to provide information on developing flood forecasting and early warning schemes to help with this.
In particular, the tool aims to: (i) provide basic information about flood forecasting and early warning, focusing specifically on riverine floods; (ii) identify flood forecasting and early warning components necessary to address flood risks; (iii) provide perspectives on flood forecasting and early warning strategies that are important for planning flood management activities; and (iv) provide guidance for involving local communities and individuals in flood forecasting and early warning.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819668.74/warc/CC-MAIN-20240424143432-20240424173432-00493.warc.gz
|
CC-MAIN-2024-18
| 1,413 | 4 |
https://technical-news.net/sidewinder-gamevoice-for-christmas-in-a-double-pack1611309641
|
code
|
Sidewinder GameVoice for Christmas in a double pack
Just in time for Christmas, Microsoft has put together a small package that includes two Sidewinder GameVoice. This GameVoice 2-in-1 package costs 59.99 euros and is therefore just as expensive as a single Sidewinder GameVoice alone.
The only catch: GameVoice 2- in-1 is strictly limited. In Germany, only 5,000 units will be launched on the market from the end of November. This also raises the question of which of the many retailers in Germany will receive these few 2-in-1 packages. The hunt for the GameVoice 2-in-1 could quickly turn into a search for a needle in a haystack.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334514.38/warc/CC-MAIN-20220925035541-20220925065541-00141.warc.gz
|
CC-MAIN-2022-40
| 633 | 3 |
https://www.geeksforgeeks.org/clock-function-in-c-c/?type=article&id=230615
|
code
|
clock() function in C/C++
The clock() function is defined in the ctime header file. The clock() function returns the approximate processor time that is consumed by the program. The clock() time depends upon how the operating system allocate resources to the process that’s why clock() time may be slower or faster than the actual clock.
clock_t clock( void );
Parameters: This function does not accept any parameter.
Return Value: This function returns the approximate processor time that is consumed by the program and on failure function returns -1.
Below program illustrates the implementation of clock() function:
Processor time taken for multiplication: 0.006485 seconds Processor time taken in pow function: 0.022251 seconds
My Personal Notes arrow_drop_up
Please Login to comment...
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649518.12/warc/CC-MAIN-20230604061300-20230604091300-00614.warc.gz
|
CC-MAIN-2023-23
| 791 | 9 |
https://www.econstor.eu/handle/10419/102615?locale=de
|
code
|
Alesina, Alberto Michalopoulos, Stelios Papaioannou, Elias
Working Paper No. 2012-14
This study explores the consequences and origins of contemporary differences in well-being across ethnic groups within countries. We construct measures of ethnic inequality combining ethnolinguistic maps on the spatial distribution of groups with satellite images of light density at night. Ethnic inequality is strongly inversely related to per capita income; this pattern holds when we condition on the overall degree of spatial inequality -that is also associated with underdevelopment. We further show that differences in geographic endowments across ethnic homelands explain a sizable portion of contemporary ethnic inequality. This deeplyrooted inequality in geographic attributes across ethnic regions is also negatively related to comparative development. We also show that ethnic inequality goes in tandem with lower levels development also within countries. Using micro-level data from the Afrobarometer surveys we show that individuals from the same ethnic group are worse off when they reside in districts with a high degree of ethnic inequality.
Ethnicity Diversity Inequality Development Geography
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585305.53/warc/CC-MAIN-20211020090145-20211020120145-00716.warc.gz
|
CC-MAIN-2021-43
| 1,196 | 4 |
http://sl-inworld.com/numbering/dutch/sequentiele-nummering-in-woorddocument-sequentiele-nummeringsbestanden/
|
code
|
Add specific codes to coupons to track customer responses Use different codes for your different marketing messages, advertisements, or promotions. These codes will enable you to keep track of how customers learned about your offer. The more you learn about who is drawn to your business and what attracts customers' attention, the better you can focus future marketing efforts.
With outline numbering you can define different bullet styles for the different levels of a bullet list. Use the Bullets tab of the Numbering Style dialog box (not shown) to select the basic style. Return to the Options tab to customize the bullet for each indent level. Here you can set bullets to any character. See the Graphics tab for more bullets.
If you need to apply numbering within a paragraph rather than to the entire paragraph, you use Word's ListNum feature. Using the ListNum feature will allow you to take advantage of the numbering system you're currently using in your document (it will use the one you implemented most recently if you're not currently using a numbering system). The ListNum Field is available in Word 97 and later and interacts with multi-level list numbering (which should be linked to styles as set forth here). Here is a brief explanation of differences between the ListNum field and the Seq field.
If you need the numbers written out in a language other than English, you must supply your own written-out list. Make sure to use a plain text editor (such as Notepad on Windows) and write one number per line. Save the file (for languages that use extended character sets, make sure to set the encoding to UTF-8) and place it in the same folder as the InDesign file you want to number.
Note If TAB and SHIFT+TAB do not work for changing the indents for outline numbering, you probably have the option Tabs and Backspace set left Indent turned off. To change this setting, from the Tools menu, choose Options. Select the Edit tab and check the option Tabs and backspace set left indent. As an alternative to turning this option on, you can instead use ALT+SHIFT+LEFT ARROW or RIGHT ARROW to increase or decrease outline numbering. numbering using publisher
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202872.8/warc/CC-MAIN-20190323141433-20190323163433-00507.warc.gz
|
CC-MAIN-2019-13
| 2,171 | 5 |
https://badearobert.ro/2016/11/07/design-patterns-singleton-multiton/
|
code
|
Design patterns – Singleton / Multiton
Today I’ll write about Singletons and Multitons.
Singleton pattern allows you to create and use only one instance of a class, and it used when you are sure that only one is needed.
They are used for example as resource holders or loggers. In order to assure that we have only one class, we need to have the following:
- One instance of that class – which will be a static instance inside the class
- A static function that will return the single instance
In order to assure that we can have only one instance, we will need to do the following:
- The constructor of the class must be private (the only instance can be created internally and will be done so in the static function that will also be used to retrieve it)
- The copy constructor and assignment operator shall be made private so nobody can clone that object or create a copy. For C++11, we also need to do the same for the move constructor/operator.
Multiton pattern allows you to have multiple singletons (thus the name), but only one for each specified type. It will act as a container that will keep all the class instances and will return to the user based on the key specified.
For multiton, we need to have:
- A private map that will contain the singletons based on keys
- A function that returns (or creates if not available) the singleton instance based on keys
For example, we have a map based on strings ->
multiton::getInstance(“string1”) -> creates and returns string1 singleton instance
multiton::getInstance(“string1”) -> returns the same string1 singleton instance
multiton::getInstance(“string2”) -> creates and returns string2 singleton instance
If we need to have a limited number of singletons, we can use other type than strings, such as enums.
The full code can be found at the following link:
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-24/segments/1590347389309.17/warc/CC-MAIN-20200525161346-20200525191346-00490.warc.gz
|
CC-MAIN-2020-24
| 1,832 | 19 |
http://ggftw.com/forum/1696483-post215.html
|
code
|
Originally Posted by Nytmaer
When and why do you use Dash?
I skipped over it because it seemed pretty useless :S
Finding it's useful would be sad since I have no tm points atm T_T
Don't want it? Don't get it.
It's not really that worth it unless you don't have a Sprint, in which case it's only marginally useful. The only reason you would get it is for the Flash Cuts which require Dash as a prerequisite.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-26/segments/1466783403502.46/warc/CC-MAIN-20160624155003-00149-ip-10-164-35-72.ec2.internal.warc.gz
|
CC-MAIN-2016-26
| 406 | 6 |
http://forums.linuxmint.com/viewtopic.php?p=691563
|
code
|
gibbs1984 wrote:is it easily possible to regain that space back into my /home partition?
gibbs1984 wrote:I suppose from what I've read the gains don't outweigh the potential for buggering things up.
Jaws wrote:But remember, once you start an operation, do not cancel it.
Enna wrote:I assume there is a thread already, describing this, that's why I'm not starting a new one, but a link to answer my question would be nice.
Users browsing this forum: Bing [Bot] and 30 guests
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701151880.99/warc/CC-MAIN-20160205193911-00056-ip-10-236-182-209.ec2.internal.warc.gz
|
CC-MAIN-2016-07
| 473 | 5 |
http://meandmyblogg.blogspot.com/2009/05/e-for-english.html
|
code
|
When I joined my first job, I heard somebody shout across the aisle in office, “Lets rush for the WM.. I hope KD will approve SIP for Q4-06. Before that AR is on amending my MSR”. I should admit this guy really made me feel so silly. Early in the morning, with an iron hammer he smacked hard at my ignorance. I got so annoyed at myself for not being able to figure out what he meant.
To please myself, I picked the phone and asked one of my friends, “Do u like PH or PC?” Surprisingly, she said, “None.. I like SB”. Grrr… I asked, “Now, what the hell is that?” She said, “I am bored of Pizza Hut and Pizza Corner; ..now, all my love is for dosas from Saravana Bhavan!!”
At work, it took a while, for me to familiarize all the technical jargons.. and understand that not always people use these so called official-lingos and acronyms to enable easy conversation or to simplify things. I feel, most of the times, they only make it sound more complicated.
The guy who made me feel like a piece of shit, actually was asking his colleague to join the “Weekly Meeting” (which is not a big deal.. cos it is meant for everybody every week). He prays (cos may be he would have screwed it up) his boss, “Krish Dev” (not at all difficult for a Desi to call out) approves “Strategy in Place” drafted for 4th Quarter of 2006. Before he does that, “Action Required” is on correcting his “Monthly Status Report” (which of course he messed up!!!!).
So, what is your take on that? :)
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163069032/warc/CC-MAIN-20131204131749-00052-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 1,508 | 5 |
http://freecode.com/projects/libgringo
|
code
|
libgringo is a library to writes applications that run both in console (using ncurses) and under X-Window (using gtk). libgringo detects if you are running from the console or under X-Window, and selects the right library to use without recompiling your code. gringosh and gringodlg are two parsers that use libgringo to provide similar functionality to the cdialog utility. It was written to make some configuration scripts work both in console and under X Windows without any modification. gringosh and gringodlg also provide features more powerful than cdialog such as the ability to have more than two buttons per form and more than two windows on the screen.
|Tags||Software Development Libraries Interpreters Application Frameworks Utilities Installation/Setup|
Release Notes: This release features a new shell parser, called gringodlg. It is like gringosh, but it accepts a different syntax and has some new widgets and features. A lot of bugs have been fixed in the ncurses backend.
Release Notes: A window_BackTitle() function was added, and the BACKTITLE keyword was added to the parser. It is now possible to compile the ncurses backend with dietlibc.
Release Notes: This release includes some general file bugfixes, and adds a listbox_OnClick() event. gringosh now exits if you press enter upon a list, and libgringo is now compiled dynamically. Some example code has been fixed, and configure.in now has better backend support.
Release Notes: Segmentation fault on ncurses due to gringo_Quit() function not being re-entrant has been fixed. Listbox and gridbox now display the selected item when the console does not have focus.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120694.49/warc/CC-MAIN-20170423031200-00371-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 1,640 | 6 |
https://community.powerbi.com/t5/Desktop/Count-of-rows-after-filtering-by-a-measure/td-p/64259
|
code
|
I'm wondering how I could get the number of rows remaining after filtering. I am currently using DirectQuery, and my filter is a measure using a DAX statement.
For example I have a table like so:
Name, Sales, Returns, PercentOfReturnedSales (measure)
George: 10, 1, 10%
Sam: 10, 5, 50%
Susan: 100, 5, 5%
Austin: 100, 85, 85%
Ron: 100, 1,1%
Alex: 100, 35, 35%
I have a filter that says "only show people who's percent of returned sales is over 15%"
So, in this example, it is 3 people. So I want it to show 3.
How would this be possible?
Go to Solution.
I hope this helps!
Measure = CALCULATE(DISTINCTCOUNT('Table'[Name]),FILTER('Table','Table'[PercentOfReturnedSales]>15))
View solution in original post
Dose this function apply a grouping? what I'm trying to do is group by a value to obtain a count of that value with applied filters.
select column1, count(*) [#of records]
where column2 in ('filter1','filter2')
group by colum1
Thanks..it really helps me. But can you suggest how to get 0 (zero) if no data is found in the above query.
Learn how to create your own user groups today!
Click here to read more about the November 2021 Updates!
Join us, in-person, December 7–9 in Las Vegas, for the largest gathering of the Microsoft community in the world.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363229.84/warc/CC-MAIN-20211206012231-20211206042231-00611.warc.gz
|
CC-MAIN-2021-49
| 1,259 | 24 |
http://petesbloggerama.blogspot.com/2006/12/whats-in-domain-name.html
|
code
|
The domain you choose has more ramifications than just search engine performance. The problem with strange TLDs is that:
- They can confuse visitors
- They are almost always more difficult to remember than .com, unless they spell something or sound like a word or phrase.
- They can have a tendency make your orgainzation or site appear less reputable than you actually are.
Here are some choices, and my comments:
The ubiquitous, "everything bagel", .com is the TLD you want. Assuming, of course, the one you want isn't already taken! Some of the hardest .com domains to find are "short" ones. Try to find a .com domain like "whiz". You can't. Even the .net versions are already taken!
.net / .org
Theese two other non-country specific TLDs are good second choices, if you can get one. But, they lack the familiarity of a .com, and for some sites that's unacceptable. However, for certain applications or audiences a good easy-to-remember .net or .org address can be cool.
This TLD was made popular by sites like del.icio.us. The .us TLD is great for those targeting a primarily US-based market. But unless, like del.icio.us, the full site url actually does something like spell a word, they probably have little appeal, because they simply won't ring off the tongue as "familiar".
Early adoption by spammers and other less reputable operators have tarnished the .biz and .info domains.
These are intended for individual use, but .name has never really caught on, and so it just doesn't "cut it". I could never imagine a "peterbromberg.name". Could you? Doesn't even sound like "The Internet".
There are hundreds of other country-specific and industry-specific domains available, but most lack the recognition required, so for a global site it's usually safer to stick to a generic TLD. A few country codes have gained credence in niche areas, like the Federated States of Micronesia (.fm) for music sites, Tuvalu (.tv) for TV sites, and the Tonga (.to) as in "kickme.to".
Stick to .com if you can. The .net TLD is a good second choice. If you're interested in the official list, here it is.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122167.63/warc/CC-MAIN-20170423031202-00496-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 2,092 | 13 |
http://www.whoisthatr.com/person/Subhash_Upadhyay
|
code
|
Information about the name Subhash Upadhyay from the web
This site is not a person's profile. It is a collection of search results for the search term "Subhash Upadhyay". The information displayed can not be linked to a
specific person and is collected entirely from public sources.
ERP software development in Kolkata, India/Website Design Services in Kolkata, India/Customised Software Development in Kolkata, India
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585371829677.89/warc/CC-MAIN-20200409024535-20200409055035-00193.warc.gz
|
CC-MAIN-2020-16
| 417 | 4 |
http://politecompany.blogspot.com/2008/06/new-addition.html
|
code
|
Well worth perusal... Plus, I felt like I had to add something useful after the last addition. See? Guilt does have its uses!
Religion. Politics. Sex. A bit of science. Motorcycles. Hockey. Some other stuff you shouldn't talk about in polite company.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917119120.22/warc/CC-MAIN-20170423031159-00506-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 250 | 2 |
http://www.battledawn.com/forum/viewtopic.php?f=49&t=7376
|
code
|
When I send two squads at the same target and delay one and not the other, they show up as a two squad group when I hover the mouse over them on the map - as though they were a group of squads that had the same ETA.
The confusion clears itself up the next tic when the first squad moves ahead of the delayed one, so this is not one of the more serious flaws.
btw, first time using photobucket so let me know whether or not clicking on the image below makes it full size or not, ok? Thanks. If there is a better method of linking pictures/better picture sharing site let me know.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917120092.26/warc/CC-MAIN-20170423031200-00344-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 578 | 3 |
https://www.thewindowsclub.com/software-raid-vs-hardware-raid-differences-explained
|
code
|
In recent time, RAID technology has been put into service in almost every application such as desktops, servers, laptops, storage devices and in environments which requires a large number of hard disk drives. RAID stands for Redundant Array of Inexpensive Disks. It uses storage virtualization technology to improve the performance and reliability of the storage devices.
What is RAID?
RAID technology is a way to virtualize multiple physical disk drives into one or more logical units called RAID levels. The data of each file is distributed among all the disks in several ways referred to as RAID levels. The selection of the RAID levels depends on the size of the disk drives, the required level of reliability and performance.
The disks are configured so that the data is divided among disks through stripping which distributes the load, or they can be configured through data mirroring which ensures the content can be recovered. It is also possible to carry out striping and data mirroring together to gain both benefits. Earlier there were only five RAID levels like RAID 0, RAID 1, RAID 2, RAID 3 AND RAID 5 however the schemes have now evolved to suit vast applications. The drivers are configured to achieve enhanced data protection, performance, and capacity.
RAID technology can be implemented either as a hardware RAID wherein the setup is done by connecting a drives to motherboard via special hardware called RAID controller or they can also be implemented as software RAID wherein the setup is done by connecting drives directly to motherboard whose configuration is then managed by the utility software in the operating system. The type of RAID, be it dedicated hardware or software that best suits your application depends on how you want your data to be distributed across multiple drivers. In this article, we compare the two RAID implementation and assist you in choosing the best RAID setup for your application.
Hardware Raid uses special hardware called RAID controller for data recovery and backup. .Its implementation is based on RAID on-chip technology. It has its processor and cache memory to run the RAID application.
Benefits of Hardware RAID
One of the major advantages of the Hardware RAID is that it boosts system performance. Like said earlier, Hardware RAID has its dedicated RAID processor to run the RAID application. All the complex configuration is processed by a dedicated processor. Thus it boosts system performance by putting less strain on the main computer processor while distributing contents on the drives and restoring the backup data.
- Hardware RAID uses its DRAM cache memory for backup and restoration. This translates to better performance while writing data backups and meanwhile has less downtime for restoration.
- Hardware RAID adds more configuration options like the hybrid configuration which provides better tolerance towards one or more drive failure.
- Hardware RAID has inbuilt battery backup units and onboard flash memory on RAID cards. This prevents data corruption during loss of power.
- Hardware is compatible with different operating systems and it can be accessed from any system.
Drawbacks of hardware RAID
- The cost of Hardware RAID is more because the setup requires more hardware.
- Hardware RAID doesn’t provide better performance for certain setups that use Flash storage arrays(SSD).
Unlike the Hardware RAID, the RAID Software doesn’t use any special hardware to connect the storage devices. Here the storage devices are directly connected to the host computer. The distribution of content across the drives is managed solely by the utility Software in the Host operating system.
Benefits of Software RAID
- Most of the major operating systems like Microsoft, Apple and Linux support Software RAID configuration.
- Unlike Hardware RAID, the software RAID setup is not expensive as you don’t need any dedicated hardware for the RAID setup. The RAID configuration is done within the operating system itself.
- Software RAID is mostly suitable for simple RAID 0,1,10 processing which doesn’t cause too much load on the system
Drawbacks of Software RAID
- Software RAID can affect the overall system performance while performing complex RAID configuration. Software RAID implementation is not suitable if there are too many drivers.
- Only limited RAID levels are supported by the operating system and there is little scope for operating system migration.
- RAID is more vulnerable to viruses and other security attacks as it is running inside the host computer system.
- The server-side problem can impact data integrity due to system crashes.
Software RAID vs Hardware RAID – Which is better?
The type of RAID that best suits the performance and data availability varies from application to application. Software RAID is mostly suitable for the entry-level RAID 0,1,10 processing which doesn’t cause too much load on the system. However, they cannot be used as a high-performance solution.
Hardware RAID is mostly used by the application to scale up the availability and performance whereas Software RAID is mostly suited for the workstation with limited data storage requirements and entry-level servers which do not require boot protection.
That being said, Hardware RAID is used in work stations that require large data storage and excel in the performance. Since the Hardware RAID uses a dedicated controller, it is more suitable for applications that require complex RAID configurations and don’t impose a heavy load on the system resources like the Software RAID.
In summary, Hardware RAID is an attractive option for all the entry-level servers to enterprise-level servers to have the highest availability and performance solution. However, Software RAID is an attractive option if you are trying to save some money on the initial investment.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233505362.29/warc/CC-MAIN-20230921073711-20230921103711-00495.warc.gz
|
CC-MAIN-2023-40
| 5,844 | 30 |
http://reidodthy.pointblog.net/Detailed-Notes-on-c-programming-assignment-help-18136422
|
code
|
which are helpful in composing good C++ code. If a Resource is built specifically to guidance and hyperlinks into the C++ Core Guidelines It is just a prospect for inclusion.
(Not enforceable) Seek out assignments to users inside the move Procedure. If there is a default constructor, Examine Individuals assignments towards the initializations within the default constructor.
: a declaration or maybe a set of declarations specifying how a piece of code (such as a perform or a category) is often referred to as.
We could start out by specializing in the interfaces, e.g., Be sure that no sources are misplaced and no pointer is misused.
: something that has to be normally real at a supplied point (or points) of a software; normally employed to explain the state (set of values) of an item or the state of a loop before entry to the recurring navigate here assertion.
In either case, Foo’s constructor properly destroys built users before passing control to regardless of what tried to make find out here a Foo.
To circumvent slicing, since the standard duplicate functions will copy just the base part of a derived item.
Any programmer making use of these recommendations should really know the guideline aid library, and utilize it correctly.
This is often verbose. In larger sized code with a number of achievable throws explicit releases turn into repetitive and error-vulnerable.
To find perform objects and capabilities outlined in a very independent namespace to “personalize” a common operate.
So, it is likely this library part in the rules will ultimately improve in sizing to equal or exceed all the rest.
We should not have taken the lock ahead of we needed it and should have unveiled it once more before beginning the cleanup.
Member variables are always initialized within the order They can be declared in the class check these guys out definition, so write them in that get in the constructor initialization record.
(Simple) Alert if the return value of new or possibly a functionality call with the owner return worth is assigned to your Uncooked pointer or non-operator reference.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583835626.56/warc/CC-MAIN-20190122095409-20190122121409-00193.warc.gz
|
CC-MAIN-2019-04
| 2,108 | 14 |
https://gizmodo.com/microsofts-sending-a-confusing-message-with-its-hololen-1832853138
|
code
|
When Microsoft introduced HoloLens four years ago, it allegedly changed the industry. But did it really? I mean, you can’t really buy a HoloLens, and its applications have largely been relegated to an assortment of niche enterprises purposes and potentially the military. To me, HoloLens was incredibly promising tech that always seemed like it was on cusp of greatness, but was missing one or two critical elements from making that happen. The Hololens 2 seems to be fixing that and Microsoft spent a good hour talking up how this will be the enterprise tool of the near future, but some weird messaging intended to entice us non-enterprise people certainly muddled the message.
But first the part of the message that wasn’t muddled. The HoloLens 2, Microsoft’s ambitious mixed reality headset, could be the second chance Microsoft needs. From the start, with HoloLens 2, Microsoft is hoping to address three of the biggest critiques people had about its first-gen headset: immersion, comfort and value.
For immersion, Microsoft says it has doubled the HoloLens 2's field of view without decreasing its 47 pixels per degree-of-sight resolution (that’s very close to the coveted 60ppd some claim is the point individual pixels can no longer be distinguished by the human eye). But on top of that, the HoloLens 2 now has eye-tracking and iris scanning, so you can log into your headset just by putting it, while the headset tracks your vision in order to identify what you’re looking at.
But the biggest upgrade to the HoloLens 2's immersive abilities is fully articulated hand-tracking that allows you to interact with the holograms as if they were real. And as a nod to overall usability, the HoloLens 2 also features improved microphones so you can do things like call faraway apps or objects to your side without needing to physically walk over and grab them.
As for comfort, Microsoft says that to create HoloLens 2, the company first scanned the heads of thousands of people from various races and ethnicities to create a headset designed to be comfortable on pretty much anyone. Microsoft claims putting on the HoloLens 2 should be as comfortable as putting on your favorite hat.
The HoloLens 2 is construced out of a mix of plastic and carbon fiber, so that what little weight there is sitting on your head, rests evenly without pinching or pushing on pressure points. All told, Microsoft hails the HoloLens 2 as three times more comfortable than the original.
However, the HoloLens 2's biggest hurdle is making it economically attractive to potential clients. Currently, Microsoft says businesses require between three to six months just to develop the software needed to make its headset worth using. But with the company’s experience deploying HoloLens over the last four years, Microsoft claims it has used feedback from customers, and tools developed during that time to create software packages suited to workers in medicine, architecture, and others industries.
Another way Microsoft HoloLens 2 could provide value is that it can also serve as a telepresence machine, allowing workers from all over the globe to collaborate with each in a shared virtual space. At Microsoft’s press event at MWC, the company showed a demo where employees from Mattel were able to view 3D models of upcoming toys in virtual space, so as to better understand and improve their design without needing to physically be in the same room. Microsoft even claims to offer the ability to simply say a word and have HoloLens 2 create a hologram that of that object. These objects can then be grouped, shared, and organized however you want.
And for all the companies who previously were forced to customize their headsets to fits their individual business needs, Microsoft is launching a customization suite that allows business to tweak the HoloLens 2 to fit their needs. So for industries like construction, Microsoft was able to partner with Trimble to create a HoloLens 2 headset featuring a certified work site safe helmet built in.
And of course, with Microsoft massive investment in cloud computer through its Azure platform, HoloLens 2 should have the ability to connect to servers to build and share holograms with ease.
Yet towards the end of today’s event, Microsoft began to confuse its own message by talking about something that might make enterprise customers nervous—an open ecosystem. Micrsoft laid out a few tenets to govern how HoloLens 2 software works and operates and is pledging that the HoloLens app store will be open to all sorts of developers, will feature open web browsing, and will be based on an open platform accessible to all levels of users and developers.
Then it brought out the head of Epic Games, the creators of Fortnite, who spoke of how delighted he was the HoloLens 2's application platform would be open and made a pledge that Epic Games would be committed to an open ecosystem as well.
Open ecosystems and game developers aren’t usually what one associates with enterprise-focused platforms like the HoloLens 2 appears to be. Those comments all seemed to be intended for the rest of us. Nods that one day the HoloLens could move out of the enterprise space and into our homes. Just don’t expect that anytime soon. Microsoft’s second-gen mixed reality headset will be available later this year, and will go for a one-time price of $3,500 or be available for monthly payments of $125 a month. That’s at least $1,500 less than the original HoloLens, but still far from what any general consumer would want to spend.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224648465.70/warc/CC-MAIN-20230602072202-20230602102202-00001.warc.gz
|
CC-MAIN-2023-23
| 5,569 | 13 |
https://livedoc.tjhsst.edu/wiki/Adduser
|
code
|
Adduser is one of the Perl scripts involving adding users to the CSL system. Currently, it must be run on fiordland as root, and after authenticating with admin privileges (hopefully after running pagsh, as well). It performs these basic tasks:
- Creates a user's Kerberos principal
- Creates a user's OpenAFS Protection Server entry
- Adds an NIS entry for the user
- Creates the user's home directory volume
- Adds skeleton files and directories in their home directory, and sets the proper permissions on all of them
There are a couple of other scripts which provide a similar functionality as adduser. These are adduser-file and adduser-haa. The adduser-haa script adds a user under the Half Admin Access system, and adduser-file adds a user using a file, instead of asking for information from a prompt. The file format is similar to passwd format, and looks like this:
username:password:gradyear:Real Name otheruser:password2:2007:Other User adeason:yeahright:2006:Andrew Deason
Each user gets their own line, and each line has four fields, delimited by colons (graduation year should be set to 1984 any non-student accounts). Run adduser-file <filename> where <filename> is a file in the format described above, and it will create accounts for those people. If any step fails, it gives you the option of resuming or aborting.
As of the time of this writing, the adduser suite of scripts are not very well coded, and could use a serious rewrite. It is planned that they will be completely re-written, possibly with some added functionality. Some ideas are:
- Make a library of CSL-specific things to run, providing functions such as add_nis() or is_valid_pass(), so we don't have to repeat code. This would be something like a module in Perl or Python, or whatever language the scripts turn out to be in.
- Have the scripts somehow determine what server to add the user volume to, probably based on the amount of free space. (Or at least prompt the user, or something.)
- Integrate scripts to add/remove websites, users, and MySQL accounts (right now those are three separate scripts in two different languages).
- Add the functionality to actually remove accounts, MySQL accounts, or websites.
- Have the script optionally send out account creation emails on it's own. Those emails are very annoying to write.
- Consider changing the language of the scripts themselves (currently Perl), maybe to Python, since it gives much of the same functionality as Perl, but is less ugly. (And making a module for it is easier.)
The original adduser script was written by Jeffrey Grafton. It was later modified by Andrew Deason, who is also the author of the other adduser scripts.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668896.47/warc/CC-MAIN-20191117064703-20191117092703-00032.warc.gz
|
CC-MAIN-2019-47
| 2,676 | 17 |
http://www.seofreetool.com/2016/12/08/how-to-make-your-videos-more-interesting-to-viewers/
|
code
|
People will only watch your video if it’s interesting and valuable to them, but how do you make a video be more interesting so it gets more views on YouTube? Amy shares some of her tips and ideas for helping you make interesting videos that people will want to watch, getting you more watch time, and helping your videos rank better overall. I hope this advice helps you grow your channel!
Check out Amy’s channel: http://www.youtube.com/savvysexysocial
How I Grew Our YouTube Vlogs by 365% in 1 Year: https://www.youtube.com/watch?v=MNjiCBFUIuA
SUBSCRIBE to learn how to grow your YouTube channel!
FREE EBOOK: “The Secret to Building your YouTube Audience”
PATREON: Let’s support each other!
MY FAMILY’S VLOGGING CHANNEL
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100602.36/warc/CC-MAIN-20231206162528-20231206192528-00042.warc.gz
|
CC-MAIN-2023-50
| 733 | 7 |
https://it-ebooks.info/book/2459/
|
code
|
Algorithms and Parallel Computing
There is a software gap between the hardware potential and the performance that can be attained using today's software parallel program development tools. The tools need manual intervention by the programmer to parallelize the code. Programming a parallel computer requires closely studying the target algorithm or application, more so than in the traditional sequential programming we have all learned. The programmer must be aware of the communication and data dependencies of the algorithm or application. This book provides the techniques to explore the possible ways to program a parallel computer for a given application.
Share Algorithms and Parallel Computing
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817699.6/warc/CC-MAIN-20240421005612-20240421035612-00885.warc.gz
|
CC-MAIN-2024-18
| 701 | 3 |
http://ccieordie.com/2-1-f-ii-switch-priority-port-priority-path-cost-stp-timers/
|
code
|
2.1.f [ii] Switch priority, port priority, path cost, STP timers
All Bridges (Switches) are assigned a numerical value called bridge priority. The Bridge (Switch) priority value is used to find the Bridge (Switch) ID.
The Switch ID is made from two values:
The Switch Priority, which is a numerical value defined by IEEE 802.1D, which is equal to 32,768 by default.
The MAC Address of the Switch. If all the Switches in your Local Area Network (LAN) are configured with the default Switch Priority (32,768), the Switch MAC address will become the decisive factor in electing the Root Bridge (Switch). The Bridge (Switch) with the lowest MAC Address is then elected as Root Bridge (Switch).
If you want one particular switch to be the Root Bridge (Switch), change the priority to a lower value than 32,768.
If you want to affect how to the local switch elects the root port change the cost on the links. Cost is cumulative throughout the STP domain. The higher cost is the less preferred. If you want to affect how downstream switch elects its root port change the priority. This is only local significance between the two directly connected switches. Highest priority is less preferred. Going away from the root of the tree use priority whereas, when going towards the root of the tree use cost.
There are several STP timers, as this list shows:
● hello—The hello time is the time between each bridge protocol data unit (BPDU) that is sent on a port. This time is equal to 2 seconds (sec) by default, but you can tune the time to be between 1 and 10 sec.
● forward delay—The forward delay is the time that is spent in the listening and learning state. This time is equal to 15 sec by default, but you can tune the time to be between 4 and 30 sec.
● max age—The max age timer controls the maximum length of time that passes before a bridge port saves its configuration BPDU information. This time is 20 sec by default, but you can tune the time to be between 6 and 40 sec. Among all these parameters, the only ones which you can tune are:
● max age
● forward delay
Adam, Paul (2014-07-12). All-in-One CCIE V5 Written Exam Guide (Kindle Locations 1794-1800). . Kindle Edition.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948615810.90/warc/CC-MAIN-20171218102808-20171218124808-00411.warc.gz
|
CC-MAIN-2017-51
| 2,190 | 14 |
https://devpost.com/software/bootstrap-variable-cost-engineering
|
code
|
Use case version:
"As a warlord of Wayfair finance, I want to build an application that safely turns off tech infrastructure that's not in use, so that we can be as fast to market with new applications as the most overfunded startup in Silicon Valley, but not worry that we're going to blow all our cash on a 5000-node Hadoop cluster somebody left running over the weekend for no good reason."
They do something like this at Netflix, according to Adrian Cockcroft. The joke name for this project, and department, is "the Netflix Finance Thing". But it's called "Variable Cost Engineering" for realzies.
What it does
It monitors CPU (theoretically memory usage, network I/O, qps, whatever), and identifies lightly used infrastructure with a rough (super rough for now!) cost model, and suggests high-value targets for turning them off.
How I built it
We grabbed a lot of cost, usage and tech inventory data, put it all in a SQL Server data, made a WARP dashboard and an off-button screen, that for now basically knows how to turn off my dev box, because of course I almost never do an PHP development these days.
Challenges I ran into
A one-day cost model for virtual machines in our data center? Let's just say we're not going to be showing this version to Ernst and Young.
Accomplishments that I'm proud of
The collaboration by Finance Engineering, SRE, Emerging Systems, Distributed Systems and InfraNext
What I learned
We're ready to hire into this.
What's next for Bootstrap variable cost engineering
Make a list of "chaos-ready" applications, and enable the "turn it off" button for production infrastructure. After SRE says it's OK, of course.
On the WARP dashboard you need to click "allow unsecured connection", and the admin url is on Allen Tang's dev
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376824059.7/warc/CC-MAIN-20181212155747-20181212181247-00500.warc.gz
|
CC-MAIN-2018-51
| 1,760 | 16 |
https://www.vn.freelancer.com/projects/linux/ubuntu-grub-ignores-zero-timeout/
|
code
|
Không tìm thấy công việc
Rất tiếc chúng tôi không thể tìm thấy công việc mà bạn đang tìm kiếm.
Tím thấy các công việc mới nhất ở đây:
This is a Sample Project to help you understand the concept of the work. • You are required to type the exact text from the left box to the blank box at the right.
I need aan expert in GA and Google ads on hourly basis. Need help with fixing conversion tracking issues and some event/goal creations etc. Looking for masters only. I will give you anydesk/teamviewer access and will stay on skype for explaining what all i need.
BUILD ME AN AI PROGRAM THAT CAN DETECT VULNARABILITIES
I AM MOTIVATIONAL SPEAKER AND MADE CONTENTS REGARDING INSPIRATION
Eazy logo with penguin and jetpack
Hello I need individual to Fix Paypal Subscription payment custom plugin. Everything has been setup I just need someone to Fix on this one. NO COMPANIES.
Looking for an excellent developer who knows Facebook APIs very well and can create SAAS website to create, manage and publish Facebook Ads. You would be dealing with Facebook APIs. Please write the answer of three multiply by nine and subtract five, so that i know you have read the project description.
AdobeXD is must. I have some editing staffs and designs on AdobeXD. These staffs should completed until tonight.
Ongoing video editing for a YouTube channel.
I have a website for listing cars online. The website is also linked with iOS and Android. I need a full redesign and redevelopment for the website but not to affect its connectivity with the app.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250594603.8/warc/CC-MAIN-20200119122744-20200119150744-00530.warc.gz
|
CC-MAIN-2020-05
| 1,576 | 13 |
https://www.mail-archive.com/[email protected]/msg26724.html
|
code
|
From: "Jonathan Nieder" <[email protected]>
Sent: Sunday, May 19, 2013 7:08 PM
Philip Oakley wrote:
Describe rebase in the description section.
It already does that. :) I think you mean "start with a summary",
which is a valuable improvement.
Include a softer paraphrased version from the crytic, well-loved,
but sometimes parodied, Name description, and tell users that merge
commits are excluded by default.
I don't really follow this paragraph. Are you saying "The NAME line
is cryptic, but let's copy it anyway, since it is better than
I was keeping the 'cryptic/esoteric' NAME line, because it is commented
on in a few blogs . It is accurate but let's not spoil those blogs...
The fundamental reason for the update was to introduce 'somewhere' in
the text the "excluding merge commits by default" note, and I couldn't
find an easy way of updating the NAME line, and then realised a softer
introduction wiould kill two birds with one stone.
@@ -16,6 +16,10 @@ SYNOPSIS
+'git rebase' will transfer local commits, excluding merge commits
+by default, to the head of the branch's upstream, or onto a new base
Not about this patch, but some day it would be nice to standardize on
one tense for the DESCRIPTION sections of manpages. Some git commands
use the imperative ("Reply local commits, excluding merge commits, on
top of ..."), some use the present indicative ("Replays local commits,
excluding merge commits, ..."), and some use the future ("Will replay
local commits, excluding merge commits, ...").
The traditional tense for Unix manpages is the present indicative.
But you are right to match the rest of the description here.
If <branch> is specified, 'git rebase' will perform an automatic
`git checkout <branch>` before doing anything else. Otherwise
it remains on the current branch.
The description has become very long by now. I wonder if it's
possible to break it into chunks, like so?
<brief description of the purpose of the command, including some token
mention of *why* a user would want to use it (e.g., "so that the
apply cleanly to their new base").>
It proceeds using the following steps:
1. If <branch> is specified, ...
2. Decides which commits will need to be applied.
These are plain, non-merge commits that are ancestors of HEAD but
not of <upstream>.
3. Checks out <upstream>. (<Explanation that technically it
detaches HEAD at this step.>)
4. Reapplies the commits listed on step (2), one by one, in order.
If merge failures are encountered, the program will exit and allow
the user to resolve them and resume or cancel the rebase. See
the RESPONDING TO MERGE CONFLICTS section below for details.
5. Once all of the commits from step (2) have been applied, updates
<branch> to point to the new HEAD.
The result is an updated <branch> that ...
Assume the following history exists and the current branch is "topic":
Description of specific options like "--preserve-merges" and "--onto"
could move out of the DESCRIPTION section and to the OPTIONS section.
What do you think?
It's probably something I'd need help on (to ensure correctness). I'll
have a go based on your suggestions in the next few days.
section 3 'update'.
To unsubscribe from this list: send the line "unsubscribe git" in
the body of a message to [email protected]
More majordomo info at http://vger.kernel.org/majordomo-info.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948537139.36/warc/CC-MAIN-20171214020144-20171214040144-00162.warc.gz
|
CC-MAIN-2017-51
| 3,336 | 60 |
https://datasciencecentral.nl/jobs/data-engineer-2/
|
code
|
Do you strive to make impact with data, algorithms and supporting tools using state of the art technology? Optimizing directly the customer experience by preventing network incidents or impacting the KPN performance by optimizing energy consumption and fiber roll-out?
KPN invests 100s of millions each year in their networks, energy consumption and the prevention of customer incidents. Our team is already responsible for several optimizations, models and solutions with already the value of >100 million and more to come. To professionalize even more, we are looking for someone with software engineering skills who can bring us to the next level. From building models and algorithms to delivering top notch software, making impact in the business.
At KPN we have embraced a new, hybrid way of working, leveraging the best of both worlds. You come in for in-depth discussions and face-to-face meetings with your colleagues at the KPN Amersfoort or Amsterdam office, overlooking the Amersfoort and Sloterdijk train station. For other activities you can opt to work from home or any other place that suits you best.
You will work in the young, enthusiastic Networks Analytics team within the Advanced Analytics community of 45+ highly skilled and energetic colleagues In close cooperation with business stakeholders, domain experts, data engineers, software engineers, mathematicians and data scientists you help make KPN truly data driven.
You will come to work for the largest network company in the Netherlands. There you will enable large-scale analytical use cases that make direct impact to the experiences of our multi-million customer base and the company performance; from building tools and patterns to enable energy consumption saving, optimizing routes through the network, to applying algorithms to prevent network incidents.
Bringing ideas to production. Develop and maintain production ready solutions to enable analytical models to create insights from large volumes of (real-time) data in a scalable and structured way • Develop, operate and integrate analytical capabilities into business processes, IT- and data platforms • Ensuring scalability, reliability and robustness of data pipelines and solutions • Automate processes to reduce costs and time • implement tests and pipelines to ensure high availability • implement new tools and solutions to facilitate the business • Collaborate with your team and business stakeholders to create the highest impact for our customers with data and analytics.
Master’s degree with strong analytical component, like Computer Science , Econometrics, Mathematics, e.g. • Experience with developing solutions/tools to implement algorithms into production that create business value • • Take ownership and responsibility • Strong intrinsic motivation to learn new skills and concepts, among others willing to understand and learn the complexity of the network • Ability to cooperate with your team and business stakeholders • Able to explain technical details, to business stakeholders and team • Proven experience with Python, SQL, (Py)Spark, CI/CD tools, code testing and maintainability, REST API’s • Preferably experience: AWS, Azure, Dataiku DSS, ETL tooling , skills in telecommunications • Fluent in English, preferably understand or speak Dutch.
A 37-hourworking week A gross monthly salary between €4.136 – €5.924 (dependent on experience level) A mobile phone and laptop A supplement of 10.5% of your gross monthly salary (incl. holiday allowance) 50% discount on KPN products and services A travel allowance for commuting Excellent pension conditions Good career and training opportunities and a personal training budget of € 1,500, -, In fact, we expect you to continue to develop!
Advanced Analytics a centralized data science expertise centre within KPN. The Network Analytics team is responsible for several mathematical optimization tools and solutions, providing insights in energy consumption and implement algorithms to prevent customer impact by network outages. We rise and thrive by trusting our colleagues, provide room for your creativity and also make sure that you have the right tools in place to perform your job well. We believe that the best way to work is to do interesting things in an enjoyable team. Expect a lot of room for fun, learning and experimenting with new technologies to extract value from on the one of the most versatile and rich data-sets available in the Netherlands.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819971.86/warc/CC-MAIN-20240424205851-20240424235851-00511.warc.gz
|
CC-MAIN-2024-18
| 4,514 | 9 |
https://m204wiki.rocketsoftware.com/index.php?title=M204.0122
|
code
|
M204.0122 Roll forward is cancelled
During roll forward, a permanent I/O error was detected while writing to the CHKPOINT data set.
System manager response: Correct the cause of the permanent I/O error as indicated by message M204.0121 and run secondary recovery. With secondary recovery, the CHKPOINT data set from the aborted recovery run should be used as the RESTART data set, and CCARF and CCAJRNL should not be changed from the aborted recovery run. They should still point to the same data sets as before.
Operator response: Contact the system manager prior to taking any action.
|Sets online return code
|Sets batch (single user) return code
|Error class; the message can be suppressed with the X'04' bit setting of the MSGCTL parameter
|Writes the message with line type MS to the audit trail
|Does not increment the error count (ERCNT) parameter
|Does not display the message on the user's terminal
|Writes the message to the (operator) console
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818067.32/warc/CC-MAIN-20240421225303-20240422015303-00802.warc.gz
|
CC-MAIN-2024-18
| 954 | 11 |
https://www.jiskha.com/display.cgi?id=1214158005
|
code
|
posted by rajdeep .
find the difference between the greatest and theleast 6-digit numbers formed by 0 and the first 5 odd numbers.
On the assumption that the smaller number cannot start with zero, the greatest difference is:
975310 - 103579 = ?
I made the first number as large as possible and the second the smallest possible using the given digits.
You can find the numbers that give minimum difference by sing similar logic.
For the minimum difference, you can chose the same number twice and get zero.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084886237.6/warc/CC-MAIN-20180116070444-20180116090444-00188.warc.gz
|
CC-MAIN-2018-05
| 505 | 7 |
https://www.gamedev.net/blogs/entry/28357-bidness-cards/
|
code
|
Card Back. I just thought it was a shame to let all that whitespace go to waste, so I put a little board-game on it.
I've been meaning to put together some skeleton pages of my GDC coverage. I need to get on that.
Participate in the game development conversation and more when you create an account on GameDev.net!Sign me up!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125946314.70/warc/CC-MAIN-20180424002843-20180424022843-00418.warc.gz
|
CC-MAIN-2018-17
| 325 | 3 |
https://discussion.dreamhost.com/t/knowledgetree/38934
|
code
|
I have installed KnowledgeTree (www.ktdms.com) on my server, and I’ve noticed that it has been running extremely slowly. Now in the pre-setup check on my settings, it says it requires a PHP memory_limit of 32M, which is currently locked at 0M. I’ve tried to change that using the method described here (http://wiki.dreamhost.com/index.php/PHP.ini), but to no avail. Glancing at the MySQL statistics seems to indicate that KT is also making a huge number of queries as well.
So I have a few questions.
Does anyone know a workaround for the memory_limit issue?
Is there a way to make MySQL run faster?
Has anyone gotten KnowledgeTree to work at a reasonable speed on DreamHost?
Barring any of that, does anyone know of any good open-source applications for creating an online PDF and document archive?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038071212.27/warc/CC-MAIN-20210413000853-20210413030853-00384.warc.gz
|
CC-MAIN-2021-17
| 803 | 6 |
https://kr.mathworks.com/matlabcentral/profile/authors/26738292
|
code
|
Simscape HDL Workflow Simulation Stop Time
I am trying to create an HDL code for my basic inverter model and analyze the Simscape HDL Workflow. I'm getting "Simulation Sto...
7개월 전 | 답변 수: 1 | 0
Why I get this error when working with hdl workflow?
I am trying to ceate HDL code for FPGA. I keep getting " incorrect usage of GetInputParameters method" error when I hit the work...
8개월 전 | 답변 수: 1 | 0
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476442.30/warc/CC-MAIN-20240304101406-20240304131406-00148.warc.gz
|
CC-MAIN-2024-10
| 423 | 6 |
http://onlinelibrary.wiley.com/doi/10.1002/qj.2183/full
|
code
|
Statistical post-processing of dynamical forecast ensembles is an essential component of weather forecasting. In this article, we present a post-processing method which generates full predictive probability distributions for precipitation accumulations based on ensemble model output statistics (EMOS).
We model precipitation amounts by a generalized extreme value distribution which is left-censored at zero. This distribution permits modelling precipitation on the original scale without prior transformation of the data. A closed form expression for its continuous ranked probability score can be derived and permits computationally efficient model fitting. We discuss an extension of our approach which incorporates further statistics characterizing the spatial variability of precipitation amounts in the vicinity of the location of interest.
The proposed EMOS method is applied to daily 18 h forecasts of 6 h accumulated precipitation over Germany in 2011 using the COSMO-DE ensemble prediction system operated by the German Meteorological Service. It yields calibrated and sharp predictive distributions and compares favourably with extended logistic regression and Bayesian model averaging which are state-of-the-art approaches for precipitation post-processing. The incorporation of neighbourhood information further improves predictive performance and turns out to be a useful strategy to account for displacement errors of the dynamical forecasts in a probabilistic forecasting framework.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323808.56/warc/CC-MAIN-20170629000723-20170629020723-00068.warc.gz
|
CC-MAIN-2017-26
| 1,499 | 3 |
https://programmerah.com/opne-gl-es-learning-experience-18819/
|
code
|
Long time to update! Next, I will update my learning experience or notes of Open GL ES.
OpenGL ES 1.0 uses a fixed pipeline through its built-in functions to set things like lights, vertexes, colors, cameras, and so on.
OpenGL ES 2.0 uses a programmable pipeline, so you have to write any features yourself.
Reproduced in: https://www.cnblogs.com/pinping/archive/2012/05/17/2506082.html
- Solving CodeBlocks OpenGL glew undefined reference to`_ imp__ Glewinit ‘error
- The request failed with HTTP status 401: Unauthorized. SSRS 2008
- Login failed for user ‘IIS APPPOOL\DefaultAppPool’
- How to use high version OpenGL under Windows
- WCF error “an error occurred when verifying security for the message”… “
- Error 0x80070079: The semaphore timeout period has expired
- Qt5_ Various paths
- Bad Request – Request Too Long. HTTP Error 400. The size of the request headers is too long
- In SQLite database, set the default value for the field as the current time
- From in Python__ future__ The role of import *
- Error checking for updates: unable to start update checking (error code is 4:0x80070005 – system level)
- Clion MinGW super fast configuration OpenGL development environment
- Solving word experienced an error trying to open the file in word
- The solution of using OpenGL’s Glu Library in qt5.2 under win7
- Arithmetical overflow error converting expression to data type datetime
- [OpenGL] cannot start this program because the computer is missing glut32.dll. Try to re install the program to fix this problem. …
- error C2471: cannot update program database vc90.pdb
- Bindtextureimage: cleaning GL error: 0x502 during Android opengles2.0 hard decoding
- Strong name validation failed solution
- The reason and solution of Android intent value not updated
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178365186.46/warc/CC-MAIN-20210303012222-20210303042222-00583.warc.gz
|
CC-MAIN-2021-10
| 1,794 | 24 |
https://www.smetechguru.co.za/taking-your-career-as-a-developer-to-the-next-level/
|
code
|
The market for local developers is shifting, with demand increasing for skills in languages such as Python. In fact, according to Stack Overflow’s Developer Survey 2019, Python is now the fastest-growing major programming language, beating out Java this year to become the second most popular language (behind Rust) after having outstripped both C# in 2018 and PHP in 2017.
Stack Overflow’s annual Developer Survey is the largest and most comprehensive survey of people who code around the world, with almost 90,000 developers partaking in the 2019 survey. This year, 73.1 percent of developers rated Python as their most loved language, and it took first place as the most ‘wanted’ language by 25.7 percent of respondents.
“This growing demand for Python skills is based on the fact that it has become a preferred language for data science and machine learning, allowing businesses to harness the power of AI-driven chatbots, robot process automation (RPA) and the Google Cloud platform, through sophisticated algorithms,” explains Ruan Erasmus, Account Manager: Managed Talent Solutions at Datacentrix.
Datacentrix is a high performing and secure ICT solutions provider, which also provides personalised recruitment services.
“The benefit for South African developers looking to take advantage of the growing demand for this skill is, firstly, that Python is easy to learn and very readable, with a more gradual learning curve than other languages. At the same time, is it extremely powerful from an automation point of view. This makes it appealing both for those starting out in development as well as for more experienced developers.”
In fact, says Erasmus, developers that are already proficient in languages like Java or C will find it straightforward enough to add Python to their existing skillsets. And this could be achieved either through a bridging course, or even via self-learning platforms, he adds.
“Developer communities like Stack Overflow, as mentioned above, and GitHub foster a collaborative approach, and provide the opportunity for developers to hone their skills on shared projects, as well as to have their code critiqued.”
The next step, says Erasmus, is to find your spot on one of the innovative local projects looking to put these skills in place.
Datacentrix’ Managed Talent Solutions business unit is a specialist recruitment provider that supplies, manages and retains top talent, including Python developers. The organisation is an accredited member of APSO (Association of Personnel Service Organisations) and adheres to the APSO Code of Ethics and is fully compliant with the Labour Relations Act.
For more information, please visit https://www.datacentrix.co.za/managed-talent-solutions.html
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104690785.95/warc/CC-MAIN-20220707093848-20220707123848-00748.warc.gz
|
CC-MAIN-2022-27
| 2,750 | 10 |
https://gist.github.com/PolarNick239/84c0c59ca1fa936467e23cb6226065b5
|
code
|
2021 PatchmatchNet: Learned Multi-View Patchmatch Stereo - Fangjinhua Wang, Silvano Galliani, Christoph Vogel, Pablo Speciale, Marc Pollefeys - [GITHUB] - [SUPP]
2022 IterMVS: Iterative Probability Estimation for Efficient Multi-View Stereo - Fangjinhua Wang, Silvano Galliani, Christoph Vogel, Marc Pollefeys - [GITHUB]
Tanks and temples (TNT):
Best performing methods
Multi-Scale Geometric Consistency Guided Multi-View Stereo - Qingshan Xu, Wenbing Tao
ETH3D: ACMH (75.89 in 967 s)
TNT: ACMH (54.82+33.73)
TNT: ACMM (57.27+34.02)
- Diffusion-like propagation with checkerboard pattern instead of sequential propagation (for massive parallelism, but leads to weaker performance, view-selection problems?)
- Checkboard sampling: Instead of just evaluating 8 local samples [Gipuma] we firstly choose 8-best scored samples from 4 V-shaped and 4 long strip areas (i.e. from 4*7+4*11=72 candidates) (helps a good plane of a local shared region to spread further as much as possible). But may be we should choose one best candidate from each area (also leads to 8 hypothesises)?
- Multi-Hypothesis Joint View Selection: for each 8 propagated hypothesises we estimate matching cost with each neighboring view. For bad view: all 8 costs are high. So we have good views that are good for enough hypothesises number (and not too bad for majority of hypothesises). Each good view have weight - see (3). Now for each hyphothesis we can estimate total confidence w.r.t. weighted good views.
- Most important view: also if there is good view that was the best view on prev iteration - its' weight should be x2 increased. If it isn't good now - it should still be taken into account (with 0.2 weight). See (5).
- Good matching cost boundary: decreasing with iteration number - see (2). Idea: may be just check that view cost is not much worse then original local sample's cost (from which gyphotesis was propagated)?
- Cost function: bilateral weighted (Z?)NCC.
- Refinement after each red-black iteration: two new hypothesises - refined current one and new random one. There exist three conditions for the depth and normal: either of them, neither of them, or both of them are close to the optimal solution. So we combine our three hypothesises (old, refined and random one) leading to six combinations of their depths and normals. The one with lowest aggregated cost is chosen.
- Filtering: 5x5 median filter.
- Coarse-to-fine scheme: to support low-textured regions (because texture richness is a relative measure)
- Detail restorer: based on photometric consistency between adjustment scales
- Geometric consistency guidance: reliable depth estimates for low-textured areas obtained at coarser scales are retained at finer scales (to fix the ambiguities in low-textured areas) - by adding reprojection error to each view's cost. But relying on previous level of depthmaps of other images is dangerous (they can be taken from different distance), can't we overcome ambiguities in low-textured areas by adding bonus for the closest hyphotesis to the reliable depth from previous level of the current reference image?
- Twice geometric consistency guidance at each scale (so that if the neighboring depth maps are estimated more accurately, the depth map of the reference image will be further boosted).
- Detail Restorer: multi-scale geom consistency guidance also leads to blurred details. Disabling it in thin structures and boundaries can help (leaving only pure photometric consistency). If after upscaling cost is InitCost and then after MVS (single ACMH pass) it is NewCost: then if NewCost<InitCost-Epsilon then upscaled hyphotesis should be replaced with refined by MVS. Idea: If after upscaling without MVS NewPhotoconsistency<OldPhotoconsistency-Epsilon then the estimation is erroneous and we shouldn't use it as prior? Or if it is not a local extremum (check hypothesises with depth+-delta).
Pixelwise View Selection for Unstructured Multi-View Stereo - Johannes L. Schonberger, Enliang Zheng, Jan-Michael Frahm and Marc Pollefeys
Massively Parallel Multiview Stereopsis by Surface Normal Diffusion - Silvano Galliani, Katrin Lasinger, Konrad Schindler
Note that Gipuma fails on ETH3D and TNT because it relies on object-centered prior (see point below about Views selection - views direction should be replaced with per-pixel rays direction).
Massive parallelism via red-black checkboard pattern (diffusion-like scheme).
Multiview matcher instead of just two-view.
Patchmatch Stereo: Soft segmentation - which decreases the influence of pixels that differ a lot from the central one.
Patchmatch Stereo: Cost function - weighted combination of 0.1*color and 0.9*gradien differences.
Patchmatch Stereo: Minor filtering: left-right inconsistencies checks, filling holes by extending nearby planes, weighted median filtering.
Depth+Normal yields an affine distortion of the support windows - see PM-Huber: PatchMatch with Huber Regularization for Stereo Matching.
The propagation scheme: 20 neighbours for propagation in local patch with radius=5. (or 8 neighbours for speedup)
Intensity intead of RGB (i.e. grayscale) for 3x speedup.
Sparse Census Transform: only every other row and column in the window when evaluating the matching cost, resulting in a 4x gain.
Parameterization in scene space: detailed math about plane-induced homography.
Random initialization: detailed math about random normal from visible hemisphere.
Depth resolution is anisotropic: more densely sampled set of depths to chose from in the near field and a sparser set in the far field. And the search interval for the plane refinement step should be set proportional to the depth.
Views selection: viewing direction should differ enough (for big enough baseline) and not be extra big (to prevent too big perspective distortions). For speedup S=9 random images subset is chosen. Why not to do two-steps process? Each image will choose random pairs, after first round each image will have good-enough depth map, so we should launch second fast round which will allow to propagate depth hypothesize from pair images' depthmaps.
Cost aggregation: To remove occluded views matches from cost - we use sum of K=3 best matches. Why not to calculate second-best cost t and then sum all costs <1.5*t?
Planar Prior Assisted PatchMatch Multi-View Stereo - Qingshan Xu, Wenbing Tao
ETH3D: ACMP (81.51 in 1086 s)
Learning Inverse Depth Regression for Multi-View Stereo with Correlation Cost Volume - Qingshan Xu, Wenbing Tao
TNT: CIDER (46.76+23.12)
TAPA-MVS: Textureless-Aware PAtchMatch Multi-View Stereo - Andrea Romanoni, Matteo Matteucci
ETH3D: TAPA-MVS (79.15 in 3374 s)
ETH3D: PLC (78.05 in 2192 s)
TNT: PLC_ (54.56+34.44)
TBA on CVPR 2020
MARMVS: Matching Ambiguity Reduced Multiple View Stereo for Efficient Large Scale Scene Reconstruction - Zhenyu Xu, Yiguang Liu, Xuelei Shi, Ying Wang, Yunan Zheng
ETH3D: MAR-MVS (81.84 in 3973 s on CPU?)
PMSGM: PatchMatch Semi-Global Matching for Efficient Stereo Correspondence - Xuchong Zhang, He Dai, Miaomiao Sang, Hongbin Sun, Nanning Zheng
Random initialization: t random depth hypotheses from range [0, dmax]
Spatial propagation: for odd iterations initial t disparities of current pixel are replaced by choosing the best t candidate disparities from neighbor pixels to the right/bottom. For even iterations - the same but from neighbours to the left/up. In raster-scanned manner order - i.e. no massive parallelism!
Random search: t disparities of pixel can be replaced with new random hypotheses if they are better.
WTA on per-pixel basis.
PatchMatchSGM - PMSGM
The same as PatchMatch but regularization added to spatial propagation - P1/P2 penalty like in SGM for disparity change 1/>1.
- ROB 2018 - Johannes Schönberger: COLMAP ROB (youtube)
- After each round replace all normals with normals estimated via plane-fitting on diagonal-neighbouring depth values?
- Number of initial random hypothesises should be proportional to dmax
- [Gipuma/Colmap] Calculate NCC with Soft segmentation/bilaterian/guided filter (to respect object edges, to suppress attached sky to walls)
Take into account NCC for pixel only from such image' pairs:
- [Colmap] Non-occluded prior - youtube
- [Colmap] Triangulation angle prior - big enough baseline youtube
- [Colmap] Close resolution prior (w.r.t. pixel world normal, image pairs pyramids required?)
- [Colmap] Maximum angle observation prior (or similar angle observation prior?) - we shoult not take into account close to 90 degrees oblique photos especially when we observe pixel from its normal direction and there are other such good images (is this the same as close resolution prior?)
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710890.97/warc/CC-MAIN-20221202014312-20221202044312-00432.warc.gz
|
CC-MAIN-2022-49
| 8,646 | 65 |
https://itch.io/profile/esbennyboe
|
code
|
Haha that's awesome to hear! :D thanks for the nice comment
Recent community posts
Thanks for playing! Good thing our buggy boat can bring some laughter and joy into the world :D
I laughed pretty hard when I found out a few minutes before the deadline, how wonky the boat physics actually was, haha.
Hey thanks for replying. We're not settled on either 2D or 3D, so that's no problem. Do you have a discord user? Then maybe we can talk more there :)
We might have found a team, but not sure yet.
Me and a friend of mine want to make a team. I'll do the sound design, and he does the music.
I've got some experience with using Unity. As an example, here's a rhythm-based action-puzzle I made with Unity: https://esbennyboe.itch.io/orbit-crusher
We need someone who can help make the game pretty (an artist: 2D or 3D), and someone who can code. Maybe I can help out with the code a little bit, but I would prefer not to, since I want to focus mostly on making sounds.
If you might be interested in teaming up, let me know :)
And to everyone else: have a happy jammin time
Looking for a composer? I can do sound too if needed, but I would love to mostly focus on making music for the jam.
Game audio portfolio stuff: https://esbennyboe.com/
If you're interested in teaming up, feel free to send me a message on discord: EsbenNyboe#7392
Ps. if you have a few minutes, then check out this rhythm-game I made!!! :D :D :D https://esbennyboe.itch.io/orbit-crusher
Hi, if anyone's still in need of a composer, maybe I can help out :)
You can check out my work on game music here: https://esbennyboe.com/
I also made a rhythm-game you can try out here: https://esbennyboe.itch.io/orbit-crusher
I'm usually working on both sound and music, but I would love to try doing a jam only focussing on making music.
Hi guys! Anybody wanna team up for the jam? I can do sounds and music, but also have some experience with game design and coding.
If you want to check out some of my previous work:
I made a browser-game with Unity called Orbit Crusher that you can play here on itch.
Or you can check out the music I've made for other game projects over here: https://soundcloud.com/esbennyboe
Wow, dude, as far as I know, you're the first to complete it without dying. I'm impressed! Maybe I should put in a zero-deaths achievement called "True Gamer" XD
And thanks for the nice comment! Glad you to hear you enjoyed it, and see some potential in it :)
Glad you liked it, and thanks for the helpful feedback!
That's a great point! How do you think I could implement such feedback? With sound? Or visually somehow? I'm not sure how to best go about it :)
Oh I totally missed that :D seems like a good idea in theory, though.
I think it's pretty difficult making a clear tutorial. I got some friends to playtest my game, and everytime I got some feedback I had to change the tutorial, haha :D
Wow, such a great and helpful comment!
It's so nice to hear about a positive experience like that. Glad you weren't dissapointed :D
And super-thanks for the font-tip! I'll definitely try if I can find a good font in there :)
Wow, this is some really good advice! Thank you so much!
Those games seem like a great source of inspiration for this. And that pallete website sure is handy :)
It's funny how it never occurred to me that "having too many colors" could be an issue :D
I'll definitely try and go for a more simplistic color pallete, as you suggest, maybe limited to four, like white, magenta, yellow and cyan or something.
Calling all visual experts!
I've been told my game needs better UI, but I'm a total noob when it comes to visual design :D
So, does anyone have an idea for how I could improve the UI look of my game?
I would surely appreciate that!
Here's a few screenshots of the game:
I don't know if posts like this are allowed. If not, I'll remove it right away!
The game page: https://esbennyboe.itch.io/orbit-crusher
(...other suggestions for visual improvements are also very welcome, btw)
Pretty cool mmo-like world you created here :)
I couldn't figure out what the right-click ability was doing, and what the loot was for.
Were you pressed with time making this? Seems like a pretty ambitious project, so good job making it this far with it! :)
Unfortunately I couldn't use space to jump after I died the first time, so I got stuck at level start and had to force quit.
But I have to say, that clock character TOTALLY reminds me of the avatar in "Cool Spot", I played as a child. They both have that swaggering walk cycle, haha :D love it!
Nice concept! Some of the mechanics kinda remind me of Celeste. Was that part of the inspiration for this? :)
I had to give up at the level where you recharge your dash in the air. I thought it was a little too brutal having to repeat those puzzles leading up to the recharge-challenge, but maybe that's just me :)
Other than that, it was very fun to play! Well done :)
Awesome tutorial btw.
I didn't get to play a lot of your game, but I can give a few comments about my first impression nonetheless :)
There's no explanation of the controls anywhere. A simple "use the arrow keys" written somewhere in the main-menu would fix that :D
Another thing: It took around 5-10 seconds everytime I reloaded after dying. This is only me guessing, but I think there might be a performance bottleneck making the game slow when creating the level - maybe there's some optimization that could be done to improve that loading speed? I had somewhat of a similar issue while developing my game.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652663019783.90/warc/CC-MAIN-20220528185151-20220528215151-00785.warc.gz
|
CC-MAIN-2022-21
| 5,514 | 56 |
http://robcatview.blogspot.com/2006/05/rabbits-defy-fibonacci.html
|
code
|
Tuesday, May 23, 2006
Rabbits defy Fibonacci
Well, this is sad. A government attempt to save the Columbia Basin Pygmy Rabbit failed when the last male in captivity died, apparently unable to "breed like rabbits" and completely disregarding the expectations that Fibonacci Numbers have placed on rabbitdom since the 13th century.
If our government scientists can't get rabbits to reproduce, what are the chances they'll ever figure out a way to shoot down incoming North Korean missiles or develop new sources of energy?
But I doubt I would do much breeding either, with some biologist in a lab coat noting my every move on his clipboard.
And the romance is probably ruined when you have to use a line like "my corner of the wire cage or yours?"
On the other hand I suppose there's a club in L.A. where people pay good money for that very experience.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123097.48/warc/CC-MAIN-20170423031203-00586-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 849 | 7 |
http://narocad.com/ellipse/
|
code
|
Ellipses can be drawn by choosing the tool from the circle submenu:
There are three points needed to define the ellipse: the center and two more points to set the minor and major radii of the ellipse. Both of these values can be changed by the user after the ellipse was drawn. The values for an ellipse’s minor and major radii can be changed. If the value for the minor radius is greater than that of the major radius or vice verse, the two values are automatically switched:
There are no constraints for the Ellipse tool.
The best Android Market
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100739.50/warc/CC-MAIN-20231208081124-20231208111124-00140.warc.gz
|
CC-MAIN-2023-50
| 549 | 4 |
https://java-samples.com/showcomment.php?commentid=35199
|
code
|
Comment on Tutorial - Using JDBC to connect to MySQL from Java Program By Rajan
Comment Added by : AbhiRules
Comment Added at : 2010-08-05 20:55:27
Comment on Tutorial : Using JDBC to connect to MySQL from Java Program By Rajan
I have a problem.
I my source code I have a Book as a class and BookEntryForm class
and InsertConnectivity class.
there is two more class Main and ConnectionManager..
Now every Class is compiled but I don't understand how I connect it with the database in Main class..
plz it is imp for my project....
- Data Science
- Cloud Computing
- Java Beans
- Mac OS X
- Office 365
- Tech Reviews
10. I am an MCA student i wanna know whether one can s
View Tutorial By: RAJU.K at 2009-07-24 02:28:21
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710473.38/warc/CC-MAIN-20221128034307-20221128064307-00571.warc.gz
|
CC-MAIN-2022-49
| 717 | 18 |
https://www.lamsade.dauphine.fr/~projet_cost/ALGORITHMIC_DECISION_THEORY/html/fodor.html
|
code
|
Education, Scientific Degrees
Ph.D. (Mathematics - Operations Research) "Candidate in Scinece" degree at the Hungarian Academy of Sciences, Budapest, 1991. Thesis: Fuzzy Preference Modelling.
Univ. Dr. (Mathematics - Operations Research) Eötvös Loránd University (ELTE), Budapest, Hungary, 1984. Thesis: Extreme Value Distributions with Application to Mathematical Programming.
M.Sc. (Mathematics - Operations Research) Eötvös Loránd University (ELTE), Budapest, Hungary, 1981. Thesis: Distribution Problems in Stochastic Programming.
Gödöllô University of Agricultural Sciences (GATE): Department of Mathematics, Associate Professor (since 1995).
Eötvös Loránd University (ELTE): Associate Research Professor, Department of Computer Science, ELTE (1993 -- 1995). Research Fellow, Department of Computer Science (1992 -- 1993). Research Fellow, Department of Operations Research (1983 -- 1992). Holder on a scholarship, Department of Probability Theory (1981 -- 1983).
Basics of fuzzy sets and connectives
Preference modelling, multicriteria decision making
Modelling of uncertainty
Stochastic problems in OR
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945440.67/warc/CC-MAIN-20230326075911-20230326105911-00104.warc.gz
|
CC-MAIN-2023-14
| 1,120 | 10 |
https://fortran-lang.discourse.group/t/openmp-and-do-concurrent-loop-crash-at-runtime/5719
|
code
|
Over the last couple of days, I’ve been playing with OpenMP (compiler = gfortran 12.2.0). While doing so on a rather simple piece of code, I realized that once a given array exceed a certain size, the program would fail at runtime.
Initially, I though the issue was caused by the $omp directives, but I finally realized that even if I removed all $omp directives, the problem persisted. Ultimately, I was able to pin down the problem to an unexpected (for me) clash between OpenMP and do concurrent loops.
In my computer (windows with gcc), the simple program below runs well for “any” array size if compiled without the flag -fopenmp. In contrast, with-fopenmp it fails for N>=360 raising the following cryptic message:
<ERROR> Execution failed for object " filename.exe "
<ERROR>*cmd_run*:stopping due to failed executions
use, intrinsic :: iso_fortran_env, only: real64
integer, parameter :: rk = real64
integer, parameter :: N = 370 ! raise me until it breaks!
real(rk) :: x(N**2)
print *, "Running..."
print *, "Done!"
real(rk), intent(out) :: u(:)
real(rk) :: a(0:N, N)
integer :: i, j
a = 0._rk
do concurrent(i=1:N, j=1:N)
u((j - 1)*N + i) = a(i, j)
end subroutine foo
end program test_do_concurrent_omp_bug
Has anyone observed something similar? Is this a bug or a feature? If this is a general problem, it would appear that do concurrent loops effectively preclude using OpenMP…
but there seems to be a dimension mismatch in the toy program that was posted.
There is no dimension mismatch. The array a intentionally starts at index zero and that should not represent any issue, because the indexes never go out of bounds. The shape of the this test derives from a real program where this pattern arises. I basically stripped out as much code as I could until I was left with the bare minimum that still displays the issue.
Note that the code has no $omp directive, so for certain no $omp is being incorrectly used. Furthermore, to the best of my knowledge, there is no rule that forbids using do concurrent in code where $omp directives are used. I could imagine that nesting $omp and do concurrent could lead to trouble, but again that is not the case here.
Do concurrent tells the compiler that the iterations within the loop construct are independent. That means they can be done in any order, including simultaneously. It is the programmer’s responsibility to ensure that that is the case (along with some other constraints, such a no loop exits, no return statements, and so on). Something would be very wrong with OpenMP if the programmer were not allowed to use that construct.
OpenMP parallel do and do concurrent have similar goals but nothing ensures that they use the same underlying model. As a matter of fact, only the very latest (5.2) version of OpenMP handles the do concurrent loops, are still with restrictions:
This OpenMP API specification refers to ISO/IEC 1539-1:2018 as Fortran 2018. While future versions of the OpenMP specification are expected to address the following features, currently their use may result in unspecified behavior.
– Locality of variables in a DO CONCURRENT construct
I am a bit uncertain on how to proceed from here. do concurrent is a flag feature of modern fortran. OpenMP is also an important specification. It is somehow odd that they don’t get along in a robust manner…
What is the community advice on this?
Should I just forget about do concurrent, so that I am sure that my code can be used with OpenMP?
Should I report this bug? Where/how? I am not even sure this is a bug, because I can’t find any information on how gcc + do concurrent + -fopenmp is supposed to behave.
To me this looks like a memory/stack size problem. Already at N = 370, you get a warning about the potential problems with concurrent accesses (although it doesn’t break it as long as you execute serially):
$ gfortran -Wall test_do_concurrent_omp_bug.f90
17 | real(rk) :: a(0:N, N)
Warning: Array 'a' at (1) is larger than limit set by '-fmax-stack-var-size=',
moved from stack to static storage. This makes the procedure unsafe when
called recursively, or concurrently from multiple threads. Consider increasing
the '-fmax-stack-var-size=' limit (or use '-frecursive', which implies unlimited
'-fmax-stack-var-size') - or change the code to use an ALLOCATABLE array.
If the variable is never accessed concurrently, this warning can be ignored,
and the variable could also be declared with the SAVE attribute. [-Wsurprising]
The difference is the static attribute. By the looks of it, in the -fopenmp version, the array a is an automatic variable, since each thread might need it’s own copy (the procedure should be re-entrant).
I mean that an !$OMP DO directive can be set upfront a do concurrent construct. You say that it’s not possible even in OpenMP 5.2, but I’m not sure I agree. While the OpenMP specification was clearly stating the “[the use to DO CONCURRENT] may result in unspecified behavior” until the 5.0 version, this warning has completely disappeared in the 5.2 version.
However, assuming it’s possible, it’s really not clear how they interact.
Anyway, I tend to not use do concurrent at all, as I find OpenMP extremely simple, with generally efficient implementations, and much more control on the locality of variables, on the scheduling, etc…
Thanks, the explanation and the links were very useful.
I feel somewhat embarrassed for not having seen the warning. I got into the habit of compiling the code with fpm build, which by default has the option --profile debug, which in turn includes the flag -Wall. So, I assumed I would see warnings if any existed… But actually, the warning message is only displayed with the additional option --verbose.
If it were possible, I would share the solution between you and @PierU. That not being the case, I’ll assign it to you, since you were the one who ultimately showed me how to diagnose the issue.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224653764.55/warc/CC-MAIN-20230607111017-20230607141017-00303.warc.gz
|
CC-MAIN-2023-23
| 5,938 | 48 |
http://deltacompsys.com/support/webhelp/rmctools/RMCTools/Components/Tuning/tuning_tools.htm
|
code
|
access the Plot Manager:
On the Tools menu, click Tuning Tools.
Use the Tuning Tools to tune the axes. The Tuning Tools pane streamlines the tuning process by providing the following:
The Tuning Tools pane provides a single place where you can issue commands, change and download gains, and view plots of moves.
Automatic Plot Upload
Plots are automatic uploaded after you issue a command.
The Tuning Tools pane contains all the tools you need to tune an axis:
Choose the axis to tune, and choose position or pressure or force.
Click Tuning Wizard to start Autotuning or to tune from an existing plot.
Click Gain Calculator to choose gains using the slider bar.
You can change the tuning parameters and then download them to the controller by clicking the Download button. For challenging tuning systems, you also have access to all the axis parameters, just as in the Axes Parameters pane in the Axis Tools.
This section provides you with basic axis information. For example, the Actual Position is helpful so you know which direction to move the axis.
You can choose which registers appear by clicking the Customize Tuning Tools button.
Tuning involves repeatedly issuing the same commands to move the axis back and forth. The command buttons ([Click to Set up]) simplify this process. Click the button to customize it.
Using the Tuning Tools
After you have set up your actuator and feedback, and completed the scale and offset, you are ready to tune the axis. The following procedure describes how to use the Tuning Tools to tune your axis.
To autotune a position axis, click Tuning Wizard and follow the wizard. After completing autotuning, you must test the tuning by moving the axis. Read the Manual Tuning section below to learn how to set up the command buttons to move the axis and view plots of the motion.
Pressure or Force Axes
The Tuning Wizard can calculate gains for pressure or force axes given an existing plot that shows the pressure or force changing. On the Pressure tab, click Tuning Wizard.
This section describes how to use the Tuning Tools during the tuning process. It does not describe the order of changing gains. For details on which gains to change when during the tuning procedure, see the Tuning Overview topic.
Set Up the Command Buttons
For position axes, click the Position tab. For pressure or force axes, click the Pressure or Force tab. Then, set up the command buttons so that one button will move the axis one direction, and the other will move it in the other direction.
Click the down arrow on the command button .
Enter the parameters for the command, then click OK.
Make sure the correct plot template is selected.
For a typical hydraulic cylinder position axis, the Accel and Decel parameters of the Move absolute command are typically on the order of 10 to 100pu/sec2. The speed is typically between 1 and 30pu/sec.
Repeat the previous step for the other command button. For position axes, make sure to enter the same velocity, acceleration, and deceleration, but a different position. For pressure/force axes, use the same ramp time, but a different pressure/force value.
Click OK. Now you will see that the command buttons are labeled.
2. Send the Command
Click the command button for the direction you wish to tune. This will send the command and automatically upload the plot from the RMC.
Click the other command button to move the axis back to where it was. This will send the command and automatically upload the plot from the RMC.
Change a Gain
Based on the plot, change a gain, and download it.
Look at the plot that was automatically uploaded from the RMC and determine which gain you wish to change. For details on which gains to change when during the tuning procedure, see the Tuning Overview topic.
Click the Download button to download the change to the RMC.
Repeat steps 2 and 3 until you are satisfied with the tuning, but keep these items in mind:
For position axes, you can use the Adjust VFF button to have the RMC automatically determine the Velocity Feed Forwards in both directions. Make a move, then click the Adjust VFF button. Repeat for the other direction.
For pressure/force axes, you can use the Hold Prs/Frc button to enter pressure/force control. For details, see the Tuning Pressure/Force topic.
Soon after you have gained decent control over the system, you should increase the speed or rate of your moves to the speed or rate you expect to use during machine operation.
To see how your tuning has progressed, or to see which gains you used several moves ago, click the History tab and choose a plot. The Parameters tab below the Plot Details window displays the gains that were used for each plot.
Copyright (c) 2005-2012 by Delta Computer Systems, Inc.
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368711406217/warc/CC-MAIN-20130516133646-00060-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 4,733 | 41 |
http://twittown.com/forums/showthread.php?t=140
|
code
|
I want to show my Twitter on my own website. For example, I want my friends to go to www.mywebsite.com
instead of www.twitter.com/mywebsite
and see the same results.....that is my Twitter. Sort of how it's done on Blogger. You can have your Blogger blog show up as your own website even though it's actually not.
How? Please help! Thanks!
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1406510272329.26/warc/CC-MAIN-20140728011752-00195-ip-10-146-231-18.ec2.internal.warc.gz
|
CC-MAIN-2014-23
| 338 | 4 |
https://staff.ki.se/people/jonathan-mak
|
code
|
I am a PhD student at the Department of Medical Epidemiology and Biostatistics. My research focuses on the genetics and biomarkers of frailty.
I am currently affiliated to the National Graduate School on Ageing and Health (SWEAH).
Using twin methods and molecular epidemiological approaches, the overall aim of my doctoral project is to gain understanding on the quantitative genetics, epigenetics, metabolomics and biomarkers of frailty and to unravel their sex-specific roles as risk factors for frailty from adulthood into old age. I am also working on projects to develop frailty scores based on electronic health records, which can potentially be applied in clinical settings to facilitate risk stratification.
- MSc in Public Health Epidemiology, Karolinska Institutet, Sweden, 2018.
- BSc in Biochemistry, The Chinese University of Hong Kong, Hong Kong, 2016.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588341.58/warc/CC-MAIN-20211028131628-20211028161628-00024.warc.gz
|
CC-MAIN-2021-43
| 866 | 5 |
http://www.roseoffices.com/floorplans/used-buildings-available-now/
|
code
|
Used Buildings Available Now
Subject to availability at time of order
All modules are separate. Each floorplan can be individualized or "pieced" together to meet your organization's needs. For example, you can take different floors of one floorplan and insert them to another floorplan to create a custom building.
(Click on thumbnails to view larger photos)
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794867092.48/warc/CC-MAIN-20180525121739-20180525141739-00614.warc.gz
|
CC-MAIN-2018-22
| 358 | 4 |
https://www.consortiuminfo.org/opendocument-and-ooxml/at-a-loss-for-words/
|
code
|
It's not often I find myself at a loss for words when I read something, but this is one of those times.
Or perhaps it would be more accurate to say that it isn't really necessary for me to add any words to the following news, other than to characterize them with a Latin phrase lawyers use: Res ipse loquitor, which translates as "the thing speaks for itself." I'll give one clue, though: I've added this blog post to the "ODF and OOXML" folder. That's "OOXML" as in "the world must have this standard so that our customers can open the billions of documents that have already been created in older versions of" a certain office productivity suite.
So without further ado, here's the news, along with what a few other people have had to say about it [Update: see also the comments that readers have added below interpreting the original Microsoft information]:
Office 2003 update blocks older file formats
Special to CNET News.com
Office 2003 Service Pack 3, which was made available in September, blocks a lengthy list of word-processing file formats, including Word 6.0 and Word 97 for Windows, and Word 2004 for Macintosh. It also blocks older versions of Excel, PowerPoint, Lotus Notes, Corel Quattro spreadsheet, and Corel Draw graphics package.
On releasing the service pack, Microsoft said one of its main benefits was that it would make it easier to interoperate with Microsoft’s latest operating system, Vista, and its latest productivity suite, Office 2007. The older file formats that are now blocked are in decreasing day-to-day use, but the blocking of them will make retrieval of archived material more difficult…. In the support document, Microsoft said SP3 blocked access to those formats because they were less secure than newer versions.
[read more of the CNETNews.com article here]
[read more – and 541 comments (and counting) at SlashDot here]
Office 2003 SP3 blocks old file formats
January 03, 2008 (Computerworld) — Microsoft Corp. deliberately broke access to older files, including many generated by its own products, to step up security with the newest Office 2003 service pack, a company evangelist said yesterday…."The decision to block the formats is strictly to protect your machine from being compromised."…
Word 2003 with SP3, in fact, blocks a staggering 24 former formats, according to Microsoft, including the default word processing file format for Office 2004 for Mac, the currently available edition of Microsoft’s application suite for Mac OS X….
IT administrators can download a group policies template from the Microsoft site to return formats from the dead, but individual users or smaller shops must instead edit the Windows registry, a daunting task that even Microsoft warns against. "Serious problems might occur if you modify the registry incorrectly," the company said in the support document. "Modify the registry at your own risk."…
[Microsoft instead recommends that]rather than monkey with the registry, users convert documents in bulk to the OpenXML format — Office 2007’s default format — using the tools in the Office Migration Planning Manager (OMPM) kit, which can be downloaded from Microsoft’s site….
[read more of the ComputerWorld article here]
…To add insult to injury, Microsoft’s explanation for the changes doesn’t wash — file formats are not insecure and cannot by themselves allow something like a buffer overflow exploit. The security vulnerability is in the program that opens the files and allows the exploits to execute. The issue then is not the older documents but that Microsoft has decided that, rather than address the insecure code in Office, it will simply disable support for the formats which could exploit those insecurities….
Naturally, there’s an alternative which is somewhat easier (and free): just grab a copy of OpenOffice which can handle the older file formats. Once you’ve got them open, now might be a good time to convert them to ODF documents lest Office 2017 decide to again disable support for older file formats.
[Read more at Wired here]
I could, of course, post more. But what can I say…
For further blog entries on here , click
sign up for a free subscription to Standards Today today!
Done for security?!
That’s a laugher!
If that were the motivation they easily could have added an extra dialog stating that the older format was less secure and did the user really want to open the file.
I think this is a misreading by the reporter. When looking at MS’s KB (http://support.microsoft.com/kb/938810/en-us) article, the default setting does not seems to block newer file formats post 97. I think this is a misreading of "Word 4.0 for Mackintosh" which is blocked.
Either you linked to the wrong article or you misread the article yourself. The section below is from the article linked and clearly states Word, Excel & PowerPoint.
After you install Office 2003 SP3, some Microsoft Office Excel 2003, Microsoft Office PowerPoint 2003, Microsoft Office Word 2003, and Corel Draw (.cdr) file formats are blocked. By default, these file formats are blocked because they are less secure. They may pose a risk to you.
I just got through reading the whole thing. If you do read the *entire* Microsoft KB article, it is very clear that this file format disabling applies to anything created in apps preceding the following versions, by default:
Excel 97 (Excel 95 and below are blocked)
Word 95 (Word 6.0 and below are blocked)
PowerPoint 97 (PowerPoint 95 and below are blocked)
Yes, you can change that, and the KB article shows you how. So, the top poster actually is correct in his assessment. Andy, you might want to include an update explicitly reflecting this.
Now, that said….
How unfortunate that Microsoft is so scared of freedom that it wants to try to force-feed upgrades on us. I use OpenOffice.org and haven’t touched MS Office in several years. This kind of crap on Microsoft’s part is why. And I was a die-hard Windows NT fan back in the day….
"After you install Office 2003 SP3, some Microsoft Office Excel 2003, Microsoft Office PowerPoint 2003, Microsoft Office Word 2003, and Corel Draw (.cdr) file formats are blocked. By default, these file formats are blocked because they are less secure. They may pose a risk to you."
The keyword here is "some". It appears to be referring to the fact that Office 2003 can open and edit pre-97 formats, and after installing SP3, you lose this ability.
Another reason why people got confused.
I went back to read the text again, guess what! It changed. "Some" is no longer their. Here is what I found.
File types that are blocked
After you install Office 2003 SP3, the following Microsoft Office Excel 2003 file types, Microsoft Office PowerPoint 2003 file types, and Microsoft Office Word 2003 file types are blocked. By default, these file types are blocked because the parsing code that Office 2003 uses to open and save the file types is less secure. Therefore, opening and saving these file types may pose a risk to you.
Microsoft has just shot itself in the foot. They’ve basically declared to all the world that:
This hurts both their OOXML case and their anti-trust case and increases the case for moving legacy documents to competitors like OpenOffice which will allow you to keep your legacy as is (without ramming ODF down your throat, even though it is good for you). Since it’s tied to their service packs, they’re also hurting the trustworthiness of their OS support, which may push some companies (especially the Vista weary ones) to their competitors (Apple, Sun, Linux).
Microsoft is playing chicken with the standards community and anti-trust authorities and ultimately their users.
Time will tell who flinches.
Microsoft are reducing the attack surface of Office by gradually withdrawing legacy functionality. All else being equal this is desirable, but of course it harms support for older documents.
The sad thing IMO is the lack of support from Microsoft for users who will now need to bulk-migrate their old documents. Unfortunately this is typical: MS regularly introduce "improved" APIs for developers, with migration documentation at the "proof of concept" level only. I am currently working with a team spending 10+ person-years migrating a large Web application to dotNet after MS decided to end-of-life ASP+VB6 in their prime.
Standards help end-users, by limiting arbitrary changes, but they are not a panacea. We also had to do a lot of work when IE7 was launched, although it claims to follow public standards – giafly
Perhaps your company should be looking at a vendor neutral solution instead of continuing with MS "solutions". You are already having to change, but are changing from the vendor who shafted you to the vendor who shafted you! Give a couple of years and you will be in the same position again, bending over and saying "here’s plenty of cash, please do me again."
We’re following your advice client-side and using vendor-neutral Ajax. It would be nice to do the same server-side but (1) We can’t force our clients to replace their infrastructure merely to avoid Microsoft and (2) For our needs there’s no cost-effective alternative to SQL Server. Yes really.
"We did a poor job of describing the default format changes … The .reg files you can use to change the security settings can be downloaded here" – giafly:
Microsoft is apparently also dropping Visual Basic for Applications (VBA) from Office. This will be less controversial than the reduced support for file formats, but is additional evidence that you can’t be sure that e.g. MS Office 2020 will read the Office documents that you archive today. If this is important to you, better mothball a couple of current Windows computers – giafly.
"Microsoft is throwing developers working with mixed PC and Mac environments a curveball with the long-awaited release of Office for Macintosh 2008. Microsoft has pressed ahead with delivering a suite that drops support for Visual Basic for Applications (VBA), overcoming long-running concerns among the grassroots."
A stray thought just occurred to me.
Clearly, MS is capable of pushing a policy change to effectively all Office 2003 installations out there that drops support for several legacy formats. Ostensibly, the reasoning is that the code used to parse those formats is insecure and poses a security risk.
Well, it probably is true that the code is insecure. Still, wouldn’t it be as easy to push correct code to those same installations? Like, say, the code that is used in the OOXML extensions to parse those formats? Unless, of course, it is the same code…
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945288.47/warc/CC-MAIN-20230324180032-20230324210032-00449.warc.gz
|
CC-MAIN-2023-14
| 10,647 | 55 |
https://boards.weddingbee.com/topic/love-this-book-thought-i-would-pass-it-on/
|
code
|
- Miss Mitzie
- 8 years ago
- Wedding: December 2011
I found this book on amazon, and thought I would pass it on to any of you brides on a budget (like me)! I have got some great tips, and while their website isn’t much, there are reviews from brides about different online shops. Enjoy!
Book on amazon: http://www.amazon.com/gp/product/B002KP6DWW/ref=docs-os-doi_0
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794866511.32/warc/CC-MAIN-20180524151157-20180524171157-00039.warc.gz
|
CC-MAIN-2018-22
| 367 | 5 |
https://www.donationcoder.com/forum/index.php?topic=2037.msg200649
|
code
|
examples of some launch bar tools:
I just switched to this for my low-power server. I have unique need, and thought I might post it
When running a low power file sever (laptop with a broken screen), the VGA never sees the light of day. VNC, Various web guis, and CLI is all that gets used, and when it has to be a Windoze box due to special constraints
, you need a lightweight launcher to take over for explore.exe, because we sure can't let that guy take up some of my precious 100MB of ram.
- Lightweight RAM and Swap, no page hits
- Custom icon bitmap (ico, exe, and png load)
- Parameter entry per item
- No Alpha blending
- Button click verification
- Always on top
- No dock/Dock without a giant ugly gray bar (invisible background)
- Independent of explorer.exe
- Already running or launch in progress indication
- Take focus on mouse over (to help with magic eaten clicks over VNC)
RocketDock is my workstation solution, but for a file server its not too cool. No button click verification (the laggy bounce over VNC doesn't count) and the running indicator thrashes the file system on a crappy box. The pretty Alpha and scaling is cool but not needed. I floated around looking for an AHK based replacement but the one mouser mentioned fit the bill at the moment.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334515.14/warc/CC-MAIN-20220925070216-20220925100216-00333.warc.gz
|
CC-MAIN-2022-40
| 1,272 | 15 |
https://kirstiewhitaker.com/about/
|
code
|
Postdoctoral research fellow studying adolescent brain development and the emergence of mental health disorders.
Techniques include surface-based cortical morphometric analyses, diffusion tensor imaging and task and resting-state fMRI analyses with statistics and data presentation conducted in python.
A passionate advocate for replicability and reproducibility in academic work and for the diversification of researchers in science.
Mozilla Fellow for Science (2016-2017).
Founder and lead developer of the STEMM Role Models project, openly developed on GitHub.
Commonwealth Fellowship recipient (2004-2006) and Fulbright Alumna (UC Berkeley: 2007).
An ally to the LGBTQ family and tireless fundraiser for the AIDS/Lifecycle ride.
Secretary of the University of Cambridge Equality and Diversity division’s Women’s Staff Network.
Email: kw401 AT cam DOT ac DOT uk
AIDS/Lifecycle fundraising page
Meetup Group: Write, Camera, Action Book and Film Club
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224650409.64/warc/CC-MAIN-20230604225057-20230605015057-00778.warc.gz
|
CC-MAIN-2023-23
| 955 | 11 |
https://mhm-lab.github.io/collaborators/
|
code
|
Collaboration is very important for a healthy scientific environment. Therefore, we are a collaborative lab.
Statement of collaboration
We are interested in building mutual beneficial connections between scientists, labs, and companies. Over the years we have gotten the privilege to work with several exceptional individual scientists and labs. Our main collaborators with whom we share several published articles are listed below.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446708010.98/warc/CC-MAIN-20221126144448-20221126174448-00380.warc.gz
|
CC-MAIN-2022-49
| 432 | 3 |
https://www.wilderssecurity.com/threads/email-notification-settings.381343/
|
code
|
Hi. Need a little help here, please, as email notification of a reply failed - and, yes, I have checked my Spam bin. It's a Gmail account, should that be of any interest. This is the settings I chose, tho it was on a white page as I recall. No matter, the settings appeared unchanged. I discovered this, as well, today. Not sure if it's relevant, but I have now checked the box where "replies" is mentioned. Thanks for any help. Btw, the "Preview" button now works like "Upload a File". ?? Weird..
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084893530.89/warc/CC-MAIN-20180124070239-20180124090239-00642.warc.gz
|
CC-MAIN-2018-05
| 497 | 1 |
https://radar.inria.fr/report/2016/parsifal/uid3.html
|
code
|
Section: Overall Objectives
The aim of the Parsifal team is to develop and exploit proof theory and type theory in the specification, verification, and analysis of computational systems.
Expertise: the team conducts basic research in proof theory and type theory. In particular, the team is developing results that help with automated deduction and with the manipulation and communication of formal proofs.
Examples: the design and implementation efforts are guided by examples of specification and verification problems. These examples not only test the success of the tools but also drive investigations into new principles and new areas of proof theory and type theory.
The foundational work of the team focuses on structural and analytic proof theory, i.e., the study of formal proofs as algebraic and combinatorial structures and the study of proof systems as deductive and computational formalisms. The main focus in recent years has been the study of the sequent calculus and of the deep inference formalisms.
An important research question is how to reason about computational specifications that are written in a relational style. To this end, the team has been developing new approaches to dealing with induction, co-induction, and generic quantification. A second important question is of canonicity in deductive systems, i.e., when are two derivations “essentially the same”? This crucial question is important not only for proof search, because it gives an insight into the structure and an ability to manipulate the proof search space, but also for the communication of proof objects between different reasoning agents such as automated theorem provers and proof checkers.
Important application areas currently include:
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679511159.96/warc/CC-MAIN-20231211112008-20231211142008-00224.warc.gz
|
CC-MAIN-2023-50
| 1,737 | 7 |
http://2013.drupal.ru/node/64.html
|
code
|
Leading Drupal deployment on large scale Cloud based systems (English)
Have you ever had a project that is much sophisticated than just a simple web page, an application that requires more than one web server or a separate database server.
How to manage your deployment strategy, plan the scope of works. Mentor and train your team.
In my talk I'll try answer those questions (and others) providing examples from my personal experience. This talk is not aiming to be highly technical or I'd better say too geeky, it will be about people involved in your team or you are engaged with over the project's life time.
It is assumed that you have some knowledge of cloud based technologies.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816832.57/warc/CC-MAIN-20240413180040-20240413210040-00205.warc.gz
|
CC-MAIN-2024-18
| 684 | 5 |
http://www.geekstogo.com/forum/topic/212384-most-linked-to-newsgroups/
|
code
|
I have been trying to remove some search results within Google Groups - stuff I posted on health boards many years ago and which I never dreamed would get ranked anywhere on a search engine, let alone anything as accessible as Google. They are under my own name, which unfortunately is very unusual.
Getting rid of my own posts is possible with their removal tool, but other peoples' messages which quote my name are more problemmatic. Most of the e-mails to the people in question have bounced.
Therefore I think I have no option but to try to bury the search results under newer more benign ones - the question is, how do I find which newsgroups - and we are talking Google's Groups search sub-section here - will get my messages posted to the top of the search rankings?
Or if anyone else can suggest a solution I would be grateful - even paying if need be, although that is a last resort.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794865450.42/warc/CC-MAIN-20180523043959-20180523063959-00593.warc.gz
|
CC-MAIN-2018-22
| 892 | 4 |
https://genome.dailyfintech.com/t/bancor-project-to-build-complete-liquidity-for-any-cryptocurrency/1073
|
code
|
I was introducing this project to Bernard & Efi, and they recommend I post it here to see what the community thinks:
I’ve kept it under 3 minutes reading time. (this is about as complex & game changing as ETH itself, so 3 minutes to explain it all is something of a feat)
You ever find it weird how fast blockchain tech is growing, yet how little most of the world knows about it?
We’ve got projects working on decentralizing the computing power behind the whole internet, making it possible to create governments where every citizen’s vote on every issue can be counted, enabling IoT devices that can make their own transactions (like your autonomous car paying for it’s own charge at a charging station), and changing the way the global financial system works on almost all facets… yet bring up blockchain with anyone you meet in the ‘regular’ world, and they’ll almost always have almost no idea what you’re talking about.
Blockchain is, in the regular world, an unknown and unused technology.
Bancor’s grand goal is to change that.
Well we’ve got a theory that, if one could make cryptocurrencies so easy to create and so fully liquid that they could represent any store of value at all, it would ignite the ‘long-tail’ of cryptocurrencies the same way youtube ignited the long tail of video… any currency, no matter how small (from company ‘shares’, to concert tickets, to personal tokens, city currencies, small-business tokens, tokens of ownership & identity, time-share tokens… etc. etc.), could be part of the global financial system.
This would fundamentally change the way the global financial system works.
In the words of Bernard Liaetar, co-architect of the Euro, "Bancor creates liquidity and allows for automatic price discovery without requiring a counterparty, which is a breakthrough”. The reason is, kinda like how our inefficient solar panels only capture a small fraction of the total potential energy the sun gives the earth, the current financial system commoditizes only a small fraction of the potential value that humanity can create and exchange.
Here’s how it works: Bancor is an open-sourced protocol that enables anyone to create a new type of cryptocurrency called a smart token, which can hold (and trade) other cryptocurrencies in reserve. It’s money that holds money.
A smart token serves as its own market maker, discovers its own price, and buys/sells smart tokens & reserve currencies on its own, thereby removing the need for a second party in cryptocurrency trades. In other words, every smart token and reserve currency is immediately and permanently exchangeable for any other currency on the Bancor network (which can potentially include all cryptocurrencies in existence) without needing to find the acceptance of exchanges (and their fees).
It’s already up and running in live beta here at app.bancor.network with >3000 users, where we’re distributing real, tradable, ERC20 tokens for our bounty program. You can deep dive on exactly how it works in the Bancor Whitepaper (https://bancor.network/whitepaper/en). We’ve also caught the attention of sites like Coindesk, Econotimes, & ETHNews, and won awards like best public blockchain at CoinAgenda. You can see all that stuff here, by the way
And on June 12 at 10:00 GMT, we’ll be launching our crowdsale & creating the Bancor Network Token, the first fully functional smart token which will serve as the default reserve token for every other smart token on the Bancor network (which is what will make every currency on the network inter-tradable).
If creating the democratization of money & enabling the long tail of user-generated currencies with this sounds like your cup of tea, I’d love to hear what you think of Bancor and its upcoming BNT crowdsale.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662529538.2/warc/CC-MAIN-20220519141152-20220519171152-00531.warc.gz
|
CC-MAIN-2022-21
| 3,801 | 14 |
https://forums.couchbase.com/t/basic-max-aggregate/16912
|
code
|
is there another way for getting the json doc associated with a MAX value? This works because I limit it to 1
myBucket AS buck
LET maxClic = (SELECT RAW MAX(clicks) from
WHERE buck.clicks <= maxClic
ORDER BY buck.clicks desc
But when I say buck.clicks = maxClic, nothing is returned.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827998.66/warc/CC-MAIN-20181216213120-20181216235120-00249.warc.gz
|
CC-MAIN-2018-51
| 283 | 6 |
https://www.fnf-mods.org/fnf-vs-sarv-mod/
|
code
|
FNF vs Sarv Mod
FNF vs Sarv Mod is a game in which Sarvente acts as an antagonist. In this fashion, this demonic monarch will show her character, and none other than you will witness all this action.
You should make sure that you sing the song well and correctly, hit the notes. Otherwise, the indicator will quickly turn red, and you will lose. Play for fun, but do not forget that victory is your main goal.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100232.63/warc/CC-MAIN-20231130193829-20231130223829-00217.warc.gz
|
CC-MAIN-2023-50
| 409 | 3 |
https://stjohns.digication.com/sadezia_ulcena_environmental_analysis_for_business/Sea_Ice/published
|
code
|
Analyzing Sea Ice Patterns
This portion of clsss required us to use Excel and ImageJ image editing software to view changes in sea ice. We first analyzed the trends for northern sea ice around the Hudson Bay, with the density standardized to anything above 15% being significant. The general trend lines showed that the area of ice has been decreasing at a rate of about 3% per year.
Comparing this with the November Air temperature linear model we see that the temperatures hasn't changed much in temperature between 1978 -1997 for that region. This means that the sea ice is changing for some reason external to air climate change.
However, reading this article: http://onlinelibrary.wiley.com/doi/10.1002/asl.709/pdf
"The relationship between summer sea ice extent in Hudson Bay and the Arctic Ocean via the atmospheric circulation" by Masayo Ogi from the Royal Meteorological Society I was informed that the sea ice density loss is changing due to the air temperatures from the previous Spring season. I also learned that not only has the sea ice density decreased, but so has the time period of ice cover. Reading about this correlation is different from doing my own analysis by looking at data so I do wonder if there was something in my analysis that brought up misrepresented data.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540482954.0/warc/CC-MAIN-20191206000309-20191206024309-00536.warc.gz
|
CC-MAIN-2019-51
| 1,290 | 5 |
https://gamingdiaries.co.uk/tag/life/
|
code
|
My thoughts on a tweet that was going round over the New Year. Gaming as a hobby and still valuable even if you aren't making a living for it.
Ah the gaming backlog. A common feature these days. How do we cope with one and how does it develop to begin with?
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057083.64/warc/CC-MAIN-20210920161518-20210920191518-00427.warc.gz
|
CC-MAIN-2021-39
| 257 | 2 |
https://www.id-extras.com/forums/reply/7566/
|
code
|
I had a look at the screencast you sent, and took a screenshot from it:
You’ll notice that (even before removing the dropword) there is no space between שהכל and נהיה (the lower red box). Whereas there is a space between חדשים and בסימן (as per the top red box).
So it does seem that somehow, during the course of typesetting, the original space between those two words has gone missing. So when you click to remove the dropword from that bottom paragraph, there is no space between the two words, since Dropword doesn’t add or remove any actual spaces – it just adds a forced line break + tab at the end of the line, or removes it if you cancel the dropword. If a word space exists, it leaves it alone, and if there is no word space, it does not add one.
Does that make sense?
- This reply was modified 1 month, 1 week ago by Ariel.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100508.53/warc/CC-MAIN-20231203193127-20231203223127-00361.warc.gz
|
CC-MAIN-2023-50
| 857 | 5 |
https://jezebel.com/it-s-time-for-npr-to-get-off-the-government-payroll-5780239
|
code
|
NPR gets about 2% of its direct funding from the U.S. government, through the Corporation for Public Broadcasting. For NPR's member stations, CPB funding is about 10% of their total, with other federal, state, and local government sources kicking in another 6%. This relatively tiny piece of money has been called "a critical cornerstone of public media." That was the stated position of Vivian Schiller-the NPR CEO up until today, when she was forced out, thanks to that government funding. [Gawker]
Actually, even if NPR can scrape by without the funding, the local radio stations that host the programming cannot. This applies in triplicate to rural radio stations. It isn't cheap to get NPR and PRI programming on the station, let alone be a able to host that along with local news. I think I heard about a handful of in-depth stories about the local radio station struggles. Where was that? Oh, on NPR. I don't see right-wing talk shows that are syndicated just about everywhere on this patch of grass giving a rat's ass about local public stations.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046154042.23/warc/CC-MAIN-20210731011529-20210731041529-00399.warc.gz
|
CC-MAIN-2021-31
| 1,054 | 2 |
http://www.camaro5.com/forums/showpost.php?p=6446258&postcount=5
|
code
|
Originally Posted by onebad1le
I might,Need a new clutch because they are so sticky. They bog
My car when launching , was launching up too 3500 rpm and
Still bogging the car.I might need more power!
Nice run, get that 2.1 to 1.9 and you have a nice 12.4 pass.
That clutch should be just fine as long as you don't slip it too long and build up too much heat or glaze it.
If the car is bogging you need to launch at a higher RPM otherwise the sticky tires are counterproductive. The correct RPM to launch a car with radials is the one where you launch hard, the tires don't blaze (light spin is fine) and the RPMs do not drop from where you initially launched. It should pull hard out of the gate.
All cars are different, but as an example I would launch an AWD street car at 5500RPM just to get a light spin and go. (Ran 1.5 60fts) anything lower and it would bog and run at least .2-.3 tenths slower.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122739.53/warc/CC-MAIN-20170423031202-00475-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 900 | 8 |
https://dcx.sap.com/sqla170/en/html/815468e66ce210148cc783663ca4194f.html
|
code
|
Click here to view and discuss this page in DocCommentXchange. In the future, you will be sent there automatically.
View the roles and privileges a user or has, including roles and privileges they are inheriting.
sp_displayroles system procedure: No privileges are required to execute this procedure on yourself. However, to return the system privileges or roles for another user ID or a role, you must have the MANAGE ROLES system privilege.
sp_objectpermission system privilege: No privileges are required to execute this procedure on yourself or on objects you own. However, to call this procedure on another user ID, or on an object owned by another user ID, you must have the MANAGE ANY OBJECT PRIVILEGE system privilege.
You can also use this task to view the roles and privileges for a given role.
SELECT * FROM sp_displayroles( 'userid', 'expand_down');
SELECT * FROM sp_objectpermission('userid');
The role_name column in the results for sp_displayroles includes inherited roles and system privileges as well as those explicitly granted to the user. If the role or system privilege is inherited from another role, the name of that role is indicated in the parent_role_name column. The grant_type column tells you if the user has administrative rights on the role or system privilege. The role_level column conveys a hierarchy for the inheritance, since inheritance can occur by being member of a role that is a member of another role, and so on. This can help you troubleshoot when you revoke a role or privilege from a user but find they are still able to use the role or privilege.
The results for sp_objectpermission includes inherited object-level privileges as well as privileges explicitly granted to the user. Use the grantee column to learn where the object-level privilege is inherited from. The grantor column tells you who performed the actual granting. The grantable column tells you whether the user has administrative rights on the privilege.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296948620.60/warc/CC-MAIN-20230327092225-20230327122225-00326.warc.gz
|
CC-MAIN-2023-14
| 1,965 | 9 |
http://forums.winamp.com/showthread.php?t=36199
|
code
|
I really dont like the new board software.
Slower loading, and doesn't render as accurately in
K-Meleon (when i want to just read). O well....
O yea, will they ever turn html on? Can I do this? I haven't see that option in the prefs.
Strangely enough this looks like DSLReports.com bbs soft.
Originally posted by AlieXai O dude, didn't mean to brush you off or anything. I was just saying, it was kind of because my own stupidity/unwillingness to learn it, that I never knew something that simple.
No problem. At a message board I help run, lots of people think it's cool to learn to do weird stuff like the ² in my nick instead of using charachter map, which is pretty cool IMO.
Originally posted by carlito_au hey how do u find out what number poster from the top u are?
The easiest way I can think of is to just go through the member pages (sorted by posts), take the number page you are on multiplied by 15 (number of ppl per page) and add how many down you are on the page you appear on. Once you get more than 20 or so posts, you don't have to look too far to find where you are.
Originally posted by Winsane If your laptop's any good, it should have a "Pad Lock" option on it. Turn that on, and part of your keyboard turns into a keypad. (For me, it's with the 7890uiopjkl;m./ keys.)
hey thanx, if i press a button marked 'Fn' and then use 7890uiopjkl;m./ keys that seems to work for keypad!
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696382398/warc/CC-MAIN-20130516092622-00060-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 1,399 | 11 |
https://thesoundof.net/shows/5916-building-c-11-with-kathleen-dollard
|
code
|
from Dot Net Rocks , on 7/21/2022 , played: 129 time(s)
What features do you want to see in C# 11? Carl and Richard chat with Kathleen Dollard about the work being done to the latest version of C# so far. But first - what about VB.NET? Starting with a question from a listener, Kathleen clarifies Microsoft plans for VB.NET - it's never going away! Then into the feature list of C# 11, including new generic math, static interfaces, initialization features, pattern matching, and more!
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711013.11/warc/CC-MAIN-20221205064509-20221205094509-00740.warc.gz
|
CC-MAIN-2022-49
| 485 | 2 |
https://capgratuit.com/bluehost-hide-domain-name/
|
code
|
Bluehost Hide Domain Name
Discovering a premium inexpensive host service provider isn’t simple. Every internet site will have different demands from a host. Plus, you need to contrast all the features of a hosting business, all while looking for the very best bargain possible.
This can be a lot to type via, especially if this is your first time purchasing hosting, or building a website.
A lot of hosts will certainly supply incredibly low-cost initial rates, just to raise those rates 2 or 3 times higher once your first contact is up. Some hosts will provide totally free perks when you join, such as a free domain name, or a cost-free SSL certification.
While some hosts will certainly be able to supply much better efficiency as well as high degrees of security. Bluehost Hide Domain Name
Below we dive deep into the best economical web hosting plan there. You’ll discover what core hosting features are essential in a host and exactly how to analyze your very own organizing requirements to ensure that you can select from one of the best economical hosting providers below.
Disclosure: When you purchase a web hosting plan through links on this page, we make some compensation. This helps us to keep this website running. There are no extra prices to you whatsoever by utilizing our links. The list below is of the very best affordable webhosting plans that I’ve directly used and evaluated.
What We Think about To Be Economical Web Hosting
When we explain a web hosting package as being “Inexpensive” or “Budget” what we indicate is hosting that falls under the cost brace between $0.80 to $4 monthly. Whilst looking into low-cost holding providers for this guide, we checked out over 100 various hosts that fell under that price variety. We after that examined the high quality of their least expensive holding package, worth for cash as well as customer support.
In this article, I’ll be looking at this world-class web site organizing company as well as stick in as much pertinent details as possible.
I’ll review the features, the pricing options, and also anything else I can think about that I assume could be of benefit, if you’re choosing to join to Bluhost and obtain your sites up and running.
So without additional trouble, allow’s check it out.
Bluehost is among the greatest web hosting business on the planet, getting both massive marketing assistance from the business itself as well as associate marketing experts who promote it.
It really is a large business, that has been around for a long time, has a huge reputation, as well as is absolutely one of the top selections when it pertains to web hosting (absolutely within the leading 3, at least in my book).
But what is it specifically, and should you get its services?
Today, I will certainly respond to all there is you require to recognize, given that you are a blog writer or a business owner who is looking for a web host, as well as does not know where to get started, because it’s an excellent solution for that audience generally.
Let’s think of, you wish to organize your sites and also make them visible. Okay?
You currently have your domain name (which is your site destination or LINK) now you intend to “transform the lights on”. Bluehost Hide Domain Name
You require some holding…
To complete every one of this, and also to make your web site visible, you need what is called a “server”. A web server is a black box, or tool, that saves all your website data (documents such as pictures, texts, videos, links, plugins, as well as various other info).
Now, this server, needs to be on at all times and also it needs to be linked to the net 100% of the time (I’ll be stating something called “downtime” later on).
Furthermore, it additionally needs (without obtaining too elegant and also into information) a file transfer protocol frequently referred to as FTP, so it can reveal internet browsers your site in its desired form.
All these things are either costly, or require a high degree of technical skill (or both), to produce and also preserve. And also you can entirely head out there as well as learn these things on your own as well as set them up … but what about rather than you purchasing as well as preserving one … why not just “leasing hosting” rather?
This is where Bluehost is available in. You lease their servers (called Shared Hosting) and you introduce a web site using those servers.
Given that Bluehost maintains all your data, the firm also allows you to establish your web content monitoring systems (CMS, for short) such as WordPress for you. WordPress is a very prominent CMS … so it just makes good sense to have that alternative available (nearly every organizing business now has this alternative too).
In short, you no more need to set-up a web server and after that incorporate a software where you can construct your web content, independently. It is already rolled into one plan.
Is it safe to have Bluehost deal with your sites?
Well … think of if your web server remains in your residence. If anything were to happen to it in all, all your data are gone. If something fails with its interior procedures, you require a technician to fix it. If something overheats, or breaks down or gets damaged … that’s no good!
Bluehost takes all these inconveniences away, and looks after every little thing technological: Pay your web server “rental fee”, as well as they will look after everything. And as soon as you acquire the service, you can after that start concentrating on adding material to your web site, or you can put your initiative right into your advertising and marketing campaigns.
What Solutions Do You Obtain From Bluehost?
Bluehost offers a myriad of various solutions, however the primary one is hosting certainly.
The holding itself, is of different types incidentally. You can lease a shared web server, have a dedicated web server, or also a virtualprivate server.
For the purpose of this Bluehost testimonial, we will certainly concentrate on holding solutions as well as other solutions, that a blog writer or an on the internet entrepreneur would certainly require, instead of go unfathomable into the bunny opening and speak about the various other solutions, that are targeted at more experienced people.
- WordPress, WordPress PRO, and e-Commerce— these holding solutions are the plans that permit you to host a website utilizing WordPress and WooCommerce (the latter of which enables you to do e-commerce). After purchasing any one of these bundles, you can begin constructing your internet site with WordPress as your CMS.
- Domain name Industry— you can also acquire your domain from Bluehost as opposed to various other domain name registrars. Doing so will make it simpler to aim your domain name to your host’s name servers, because you’re utilizing the same marketplace.
- Email— as soon as you have acquired your domain, it makes good sense to also get an email address linked to it. As a blog owner or online business owner, you must pretty much never utilize a complimentary e-mail solution, like Yahoo! or Gmail. An e-mail like this makes you look amateur. Thankfully, Bluehost gives you one free of cost with your domain.
Learn More About Bluehost Hide Domain Name Here ->
Bluehost additionally provides dedicated web servers.
As well as you may be asking …” What is a specialized web server anyway?”.
Well, the thing is, the fundamental host plans of Bluehost can only so much website traffic for your website, after which you’ll require to update your holding. The reason being is that the usual servers, are shared.
What this means is that server can be servicing two or more websites, at the same time, among which can be yours.
What does this mean for you?
It means that the single web server’s resources are shared, and also it is doing several jobs at any type of provided time. As soon as your site starts to strike 100,000 site sees each month, you are mosting likely to need a devoted web server which you can also get from Bluehost for a minimum of $79.99 per month.
This is not something yous needs to stress over when you’re starting out however you need to maintain it in mind for certain.
Bluehost Prices: How Much Does It Price?
In this Bluehost testimonial, I’ll be focusing my interest generally on the Bluehost WordPress Hosting packages, because it’s one of the most popular one, as well as likely the one that you’re seeking and that will certainly fit you the most effective (unless you’re a substantial brand name, business or website).
The three offered plans, are as complies with:
- Standard Strategy– $2.95 each month/ $7.99 routine cost
- Plus Plan– $5.45 each month/ $10.99 regular rate
- Selection And Also Plan– $5.45 each month/ $14.99 normal cost
The first rate you see is the price you pay upon register, and the second price is what the cost is, after the first year of being with the company.
So generally, Bluehost is mosting likely to charge you on an annual basis. And you can also pick the quantity of years you intend to hold your website on them with. Bluehost Hide Domain Name
If you choose the Fundamental plan, you will certainly pay $2.95 x 12 = $35.40 beginning today and also by the time you enter your 13th month, you will currently pay $7.99 each month, which is likewise billed per year. If that makes any type of sense.
If you are serious about your website, you ought to 100% obtain the three-year option. This indicates that for the basic plan, you will pay $2.95 x 36 months = $106.2.
By the time you hit your 4th year, that is the only time you will pay $7.99 each month. If you think of it, this approach will certainly save you $120 during three years. It’s not much, yet it’s still something.
If you wish to obtain greater than one internet site (which I extremely suggest, and also if you’re major, you’ll most likely be getting more at some point in time) you’ll intend to use the choice plus plan. It’ll enable you to host unrestricted sites.
Learn More About Bluehost Hide Domain Name Here ->
What Does Each Strategy Offer?
So, when it comes to WordPress hosting plans (which are similar to the common holding plans, however are extra geared towards WordPress, which is what we’ll be focusing on) the functions are as adheres to:
For the Standard strategy, you get:
- One web site just
- Guaranteed internet site by means of SSL certificate
- Optimum of 50GB of storage
- Cost-free domain name for a year
- $ 200 marketing credit history
Keep in mind that the domain names are acquired separately from the hosting. You can obtain a cost-free domain with Bluehost here.
For both the Bluehost Plus hosting and also Choice Plus, you get the following:
- Unrestricted variety of internet sites
- Free SSL Certification. Bluehost Hide Domain Name
- No storage or transmission capacity restriction
- Cost-free domain for one year
- $ 200 advertising debt
- 1 Office 365 Mailbox that is totally free for thirty days
The Choice Plus strategy has an added benefit of Code Guard Basic Back-up, a back-up system where your documents is conserved and also replicated. If any crash happens as well as your web site data goes away, you can recover it to its initial kind with this feature.
Notification that despite the fact that both plans set you back the same, the Option Plan after that defaults to $14.99 per month, routine cost, after the collection amount of years you’ve selected.
What Are The Conveniences Of Using Bluehost
So, why pick Bluehost over other webhosting services? There are hundreds of host, a number of which are resellers, however Bluehost is one choose few that have actually stood the test of time, and it’s possibly the most well known around (as well as permanently factors).
Here are the three main benefits of choosing Bluehost as your webhosting service provider:
- Server uptime— your internet site will not be visible if your host is down; Bluehost has greater than 99% uptime. This is exceptionally important when it comes to Google SEO and also rankings. The greater the better.
- Bluehost speed— just how your server action establishes just how fast your site shows on a web browser; Bluehost is lighting quick, which indicates you will certainly reduce your bounce price. Albeit not the best when it concerns loading rate it’s still extremely important to have a rapid rate, to make individual experience better and much better your ranking.
- Limitless storage space— if you obtain the Plus plan, you need not bother with how many files you keep such as video clips– your storage capability is limitless. This is really vital, because you’ll most likely encounter some storage space issues in the future down the tracks, as well as you do not desire this to be a trouble … ever before.
Lastly, client assistance is 24/7, which means no matter where you remain in the world, you can call the support group to repair your web site concerns. Pretty conventional nowadays, however we’re taking this for given … it’s likewise really important. Bluehost Hide Domain Name
Likewise, if you’ve obtained a complimentary domain with them, after that there will certainly be a $15.99 cost that will be deducted from the quantity you originally bought (I picture this is because it sort of takes the “domain out of the marketplace”, unsure about this, but there possibly is a hard-cost for registering it).
Finally, any demands after one month for a reimbursement … are void (although in all honesty … they must most likely be stringent right here).
So as you see, this isn’t necessarily a “no doubt asked” policy, like with several of the other hosting options out there, so make sure you’re fine with the plans before proceeding with the organizing.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046150307.84/warc/CC-MAIN-20210724160723-20210724190723-00215.warc.gz
|
CC-MAIN-2021-31
| 13,835 | 85 |
https://coldfusionmuse.com/index.cfm/2010/10/19/Coldfusion-NET-Integration-64bit-Part-2
|
code
|
When last we left our story the Muse had put in a 6-7 hour marathon coding session through the night to create a CFC proxy work-around for his .NET problem. This temporary solution allowed the customer to continue working the following day so we could go back to scratching our heads over why .NET integration on our 64bit Multi-server was experiencing a failure to communicate. If you want to catch up on the story read my previous Part 1 post.
To recap, no matter what we tried we could not get CF to communicate with .NET on our production server (CF 8 Enterprise 64bit Multi-instance Install). We had tried installing and de-installing the service a few times to no avail. The first task was to get a successful recompile in 64bit that would run in a test environment. Team member (and all around genius developer) Guy Rish took charge of that effort. In fact, he got the assembly to recompile and he was able to instantiate and access its methods from his local CF8 64bit developer install running on Win7. From this we knew it was possible to get this working. We only needed to tease out the environmental differences to figure out what was blocking us. That task fell to me...
The first problem I had was that it was hard to figure out exactly where to look. Most of what I needed was in the folder called "ColdFusion8DotNet". This folder is in the ColdFusion8 directory on a standard or Jrun/ent installation. In multi-server it is typically in the Jrun4 folder. If you have installed separately it will be wherever you chose to install it. Inside of this folder there are a couple of interesting files. One is "error.log" which records errors from .NET calls through the service. Another is the CF8DotNetsvc.log. This one shows errors from starting the .NET service.
The service log is the one that held the clue to what was going on here. Opening it up I found the following message "18/10/2010 14:15:01 INFO: StartProcess: Could not create process for 'C:\JRun4\ColdFusion8DotNet\JNBDotNetSide.exe', Error = 267". Hmmmm.... that sounds suspiciously like the service not being able to start. But I knew (or I thought I knew) that this was not the case. Just to be sure I opened the services control panel and restarted the "Coldfusion 8 .NET Service". It restarted quickly and with no complaint. Going back to the log I realized that the restart had created another identical error entry ("could not create process..."). So obviously Windows believed the service to be starting but internally the listener was not kicking off correctly.
Sometimes these processes reveal more information in console mode than they do in a log file. With that in mind I opened a command prompt and navigated to my coldfusion8dotnet folder. I typed in the name of the exe file that the log file was complaining about - JNBDotNetSide.exe - and hit enter. Nothing happened but the cursor did not return either. I suspected that I had either successfully launched the process or rendered the server useless. Naturally I was hoping for the former. I ran my test script and to my delight ColdFusion was able to instantiate and run my newly compiled .NET 64bit assembly. That's real progress!
What had I learned? First, something about the service wrapper on ColdFusion Multi-Server was incorrectly configured. On a standard installation it worked fine - but something was different on multi-server that altered the way the service started. Just like Jrun the service for .NET integration depend on a "wrapper" called CF8DotNetsvc.exe. The purpose of this wrapper is to get the service running correctly without a shell and in the right security context etc. The real "listener" part of the process (the part that actually listens for Coldfusion to contact it) was actually the JNBDotNetSide.exe. So we needed to adjust something about the service parameters to get this fixed up.
That reminds me of when I was a child. I was sitting in church with my Mother (My Father was the preacher) and I noticed a wall of tiny plaques on the wall. I asked my mother the purpose of these plaques. She told me, "They are for all the men who died in the service." I pondered this for a moment and then asked "Which service did they die in, the 9:30 or 10:45?"
Anyway, my next step was to take a closer look at how windows was set up with this particular service. I knew from my test about that all my service wrapper really had to do was to kick off the listener. In fact, if I could not figure out how to fix the existing service I knew I could use a utility to simply install the listener as a new service (that was Plan B). Looking at the parameters in the services control panel I immediately saw something suspicious. In fact, it seemed like a smoking gun. The path to the CF8DotNetsvc.exe file was set to c:\Users\*username*\tmp\*some number*\$JNBRIDGE_INSTALL_FOLDER\CF8DotNetsvc.exe. Surely that could not be the correct path.
I headed off to the registry to see what else was wonky with the service. I know there are lots of warning about working with the registry but it gives me a thrill - and it beats base jumping (less of a down side if you know what I mean). As registry risks go however, services are actually pretty uniform. I knew there was an "imagePath" that was pointed to the binary (the exe file) that was intended to run. So I needed to find that and re-point it to what I thought was the proper file (in /Jrun4/ColdFusion8DotNet). What I found were 3 different settings that needed to be adjusted. Specifically I navigated to "HKLM/System/CurrentControlSet/Services/Coldfusion 8 .NET Service" and altered 3 path settings:
A couple of other things we did that helped. We added the path to our assembly to the JNBDotNetSide.exe.config file (in the /Coldfusion8DotNet/ folder). It has a node called "assemblyList" that looks like this.
So, if you are having trouble on ColdFusion enterprise Multi-server with .NET integration, check out the service settings and make sure they all point to the correct path for where your config files and service files are installed. Those of you with experience in this service feel free to comment. There is a dearth of tips or tricks for working with .NET Integration. I found little to go on over all.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510427.16/warc/CC-MAIN-20230928162907-20230928192907-00074.warc.gz
|
CC-MAIN-2023-40
| 6,233 | 11 |
http://labmice.techtarget.com/troubleshooting/memorydumps.htm
|
code
|
|DUMPCHK.EXE Incorrectly Reports Some Dump Files as Invalid
Microsoft Knowledge Base ArticleQ166482 - While in the phase where Dumpchk.exe validates all virtual addresses, the program reports that specific memory dump files are corrupt. These same memory dump
files are not corrupt and may be debugged without any problems.
Cannot Create a Memory.dmp File on Computers with over 4 GB RAM
Microsoft Knowledge Base Article: 241046 -
If your computer contains more than 4 gigabytes (GB) of Random Access Memory (RAM), you may not be able to get a complete memory dump in a Memory.dmp file.
CPU Context Is Not Saved in the Memorydump File When NMI Occurs
Microsoft Knowledge Base Article: 262686 -
When you view the crashdump by using the kernel mode debugger, the processor registers for one more processor on a multiple-processor computer are all zero (0): 1: kd> r eax=00000000 ebx=00000000 ecx=00000000 edx=00000000 esi=00000000 edi=00000000...
Dump File Not Created Correctly with More Than Four GB of Memory and PAE Turned On
Microsoft Knowledge Base Article: 326333 - If your computer has more than four gigabytes (GB) of memory and Physical Addressing Extensions (PAE) is turned on, dump files may not be created correctly.
Memory Dump Creation Stops When NMI Occurs
Microsoft Knowledge Base Article: 268378 - Memory dump writing stops when a nonmaskable interrupt (NMI) occurs. This problem is specific to symmetric multiprocessor (SMP) computers. When Windows is writing a memory dump, it usually has a counter on the screen to indicate the progress
of the memory dump writing. However, this counter is not
displayed at all if this problem occurs.
Memory Dump May Be Missing or Corrupted on Dynamic Mirrored Drive
Microsoft Knowledge Base Article: 253935 - When a server stops responding (hangs) at a blue screen, the dump file may be missing or corrupted after you restart the server. Running Dumpchk.exe against the dump file may return the following message:
Memory Dump Stops When the PAE Option Is Enabled
Microsoft Knowledge Base Article: 266251 - The writing of memory dumps may stop or stall under certain circumstances when the Physical Addressing Extension (PAE) option is
Memory.dmp File Is Missing or Contains Corrupted Data
Microsoft Knowledge Base Article: 257299 - If the system partition is built with the dynamic mirrored volume, the Memory.dmp file may not be generated or may contain corrupted data.
Small Memory Dump Does Not Work with PAE Mode Enabled
Microsoft Knowledge Base Article: 260878 - If you start your computer with the /pae switch and the recovery options are set to generate a small memory dump on a system failure, the Minidump.dmp file that
is generated may be corrupted.
Windows 2000 Does Not Enable Complete Memory Dumps Between 2 and 4 Gigabytes
Microsoft Knowledge Base Article: 274598 - Microsoft Windows 2000-based servers do not enable complete memory dumps that are between 2 and 4 gigabytes (GB) in size. The only options available under
the Write Debugging Information section are: Small
Memory Dump (64 KB) and Kernel Memory Dump. The Complete
Memory Dump option is missing
Windows Does Not Save Memory Dump File After a Crash
Microsoft Knowledge Base Article: 130536 - You can configure Windows to dump system memory to a file called Memory.dmp when a severe error (called a STOP error or fatal system error) occurs. This log file can be valuable for debugging the cause of the STOP
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-16/segments/1585370515113.54/warc/CC-MAIN-20200403154746-20200403184746-00347.warc.gz
|
CC-MAIN-2020-16
| 3,436 | 31 |
https://snowcrows.com/builds/engineer/mechanist/condition-alacrity-mechanist
|
code
|
Condition Alacrity Mechanist provides its subgroup with permanent Alacrity and 25 stacks of Might whilst dealing as much Condition Damage as possible.
Condition Alacrity Mechanist is additionally able to passively generate a small amount of Barrier as well as decent uptimes on other boons: ~80% Fury, ~30% Protection as well as access to Stability once every 24 seconds.
The rotation of Condition Alacrity Mechanist is sadly very unforgiving and requires the user to focus on using your mech abilities: and off Cooldown.
On high pressure fights where your mech might get destroyed, you want to swap for to quickly get your mech back as soon as possible. Your mech is responsible for all the boons you provide so keeping it alive is your priority!
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224646652.16/warc/CC-MAIN-20230610233020-20230611023020-00294.warc.gz
|
CC-MAIN-2023-23
| 747 | 4 |
https://speakerdeck.com/mfcabrera/munich-datageeks-introduction-to-svm-using-python
|
code
|
notebook with support for code, text, mathematical expressions, inline plots and other rich media. • Support for interactive data visualization and use of GUI toolkits. • Flexible, embeddable interpreters to load into your own projects. • Easy to use, high performance tools for parallel computing. From http://ipython.org :
Still effective in cases where number of dimensions is greater than the number of samples. • Uses a subset of training points in the decision function (called support vectors), so it is also memory efficient. • Easy to use and train • Versatile: different kernel functions can be specified for the decision function.
awesome :D! • SVM is mature algorithm, straightforward to use and works well in most of the cases. • Being able to use Kernels allows SVM to learn complex decision boundaries. • Using LibSVM / LibLinear based libraries allow for reusing models across languages or at least prototyping in Python.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882570741.21/warc/CC-MAIN-20220808001418-20220808031418-00750.warc.gz
|
CC-MAIN-2022-33
| 955 | 3 |
http://weewx.com/docs/5.0/usersguide/introduction/
|
code
|
This is the complete guide to installing, configuring, and troubleshooting WeeWX.
Python 3.6 or later is required. Python 2 will not work.
WeeWX includes support for many types of weather stations. In addition to hardware support, WeeWX comes with a software simulator, useful for testing and evaluation.
The driver compatibility table in the Hardware guide has a detailed list of the manufacturers and models supported by the drivers that come with WeeWX. If you do not see your hardware in this table, check the list of supported hardware; the pictures may help you identify the manufacturer and/or model. Compatibility for some hardware is provided by 3rd party drivers, available at the Wiki. Finally, check the hardware comparison to see if your hardware is known, but not yet supported.
If you still cannot find your hardware, post to the User's Group for help.
WeeWX is written in Python, so it has the overhead associated with that language. Nevertheless, it is "fast enough" on just about any hardware. It has been run on everything from an early MacBook to a router!
I run WeeWX on a vintage 32-bit Fit-PC with a 500 MHz AMD Geode processor and 512 MB of memory. Configured this way, it consumes about 5% of the CPU, 150 MB of virtual memory, and 50 MB of real memory.
WeeWX also runs great on a Raspberry Pi, although report generation will take longer. For example, here are some generation times for the 21 HTML files and 68 images used by the Seasons skin. See the Wiki article Benchmarks of file and image generation for details.
|Mac Mini, M1 2020
|NUC Intel i7, 11th gen
|RPi 2 (32-bit)
|Rpi Zero W (32-bit)
You should run some sort of time synchronization daemon to ensure that your computer has the correct time. Doing so will greatly reduce errors, especially if you send data to services such as the Weather Underground. See the Wiki article Time services.
On stations that support it, the time is automatically synchronized with the WeeWX server, nominally every four hours. The synchronization frequency can be adjusted in the WeeWX configuration.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473370.18/warc/CC-MAIN-20240221034447-20240221064447-00269.warc.gz
|
CC-MAIN-2024-10
| 2,070 | 14 |
http://arevocom.com/content/jain-slee
|
code
|
Over the time I was responsible for the implementation of a few projects for telecommunications in the areas near to real-time, and I needed to choose the technology which allows quickly to create new teleco grade services. After some time spent on analysis it seems there is only one choice :) - and this is the first article of the series hopefully related to JAIN SLEE.
As I am working on several projects in the telecommunication area , in the near future I plan to publish articles the technology, for example: How to use Mobicents Diameter Resource Adapter, how to write your own Resource Adapter, creation of the services quering different components for data over Diameter interface) How to create a service based on Mobicents SS7 stack How to create Web Services on Mobicents platform Setting up configuration management service for other services IMO the key features of the technology are: Basically two types of modules - Service Building Blocks or Resource Adapter - the first with a great variety of services from the application server, the latter is more or less a standard Java code Orientation on processing event, which may be generated by SLEE, SBB or RA Prioriterisation of the events Soft-time context orientation thanks to timers facility Specific handling of multithreading - via Activities and Events Support for persistence mechanisms - very fast one-dimensional arrays (Profile Tables) as well as through JPA Communication between services possible in synchronous (Local Objects) or asynchronous way (Events) Scalability and the ability to distribute the application logic - including clustering of applications Availability of application server software, both commercial and rock solid (OpenCloud Rhino) or OpenSource (Mobicents) Based on my experience - SLEE is more difficult to use than J2EE - due to fact that the majority of Java developers (especially after switching from Windows and. NET) has problems with multi-threading and asynchronous services. However, I think it's worth it - thanks to this architecture it can be possible to support a throughput of hundreds of events per second on a single server without worrying about performance degradation, if it occurs - adding a servers to the cluster should do the rest :)
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218186895.51/warc/CC-MAIN-20170322212946-00616-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 2,259 | 2 |
http://advogato.org/person/mikehearn/diary/20.html
|
code
|
Having to set my proxy server in about a zillion different places annoys me far more than it probably should. Currently I have to set the environment variables, GNOME, Gaim, the Red Hat Network updater, and Wine.
This stuff should be trivial to get right, but it's not. Hmm.
autopackage has really picked up nicely lately. It's feeling very solid, polished, and generally kickass. Apollon and Inkscape have both been keen to work with us and support beta packages, so hopefully we'll have some good install-fu going on there soon.
Life has just been up and down like a yo-yo lately. Right now I'm feeling very tired, and am once again wondering if there isn't something very fundamental and important that I'm somehow missing about living.
It'll come ...
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121644.94/warc/CC-MAIN-20170423031201-00371-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 754 | 5 |
https://pelbox.com/blog/animated-image-pieces/
|
code
|
Animated Image Pieces
After making the Developer/Designer Page Layout Concept we wanted to try out some different effects for the pieces animation on the image. There are quite a lot of possibilities to animate the fragments, so we made some demos showing the different effects. The animations are powered by anime.js.
The demo is kindly sponsored by NomNom. If you would like to become a demo sponsor, you can find out more here
Attention: In these highly experimental demos we use some modern properties like CSS Flexbox, CSS variables, the new CSS grid layout and filter without fallbacks.
Note that Safari seems to be a serious party pooper when it comes to performance.
Have a look at the different demos:
We hope you enjoy these examples and find them useful!
References and Credits
- Photography from Unsplash.com and Visual Hunt
- anime.js by Julian Garnier
- imagesLoaded by Dave DeSandro
Animated Image Pieces was written by Mary Lou and published on Codrops.
LEAVE A REPLY
You must be logged in to post a comment.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645810.57/warc/CC-MAIN-20230530131531-20230530161531-00483.warc.gz
|
CC-MAIN-2023-23
| 1,024 | 14 |
https://www.portagebaygoods.com/products/lucky-donut-cat-pin
|
code
|
Lucky Donut Cat Pin
These high-quality cloisonné enamel pins are designed by MarninSaylor here in Seattle. Each comes ready to gift (or keep!), pinned to a lovely fold-out card which has been meticulously designed, printed, and assembled in their studio.
Each pin is 1 1/8” across, chock full of glitter, and finished with a rubber back clasp.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189462.47/warc/CC-MAIN-20170322212949-00064-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 346 | 3 |
https://miycreations.com/tutorial/ms/python+flask+example
|
code
|
Watch Python Flask Example
Baca panduan dan cara tutorial mengenai Python Flask Example Creating a Weather App in Flask Using Python Requests [Part 1] oleh Pretty Printed. Dapatkan penyelesaian dalam minit 24:58. Diterbitkan tarikh _J_ dan menerima _G_ x hits, python+flask+example
Tutorial by Pretty Printed | 24:58 Minutes| 46,968 Views
I'll use Flask to create a weather app in Flask. I'll be using the Open Weather App API with Python requests to get the data.
Watch part 2 here: ...
Tutorial by freeCodeCamp.org | 46:59 Minutes| 622,132 Views
Flask is a micro web framework written in Python. It is classified as a microframework because it does not require particular tools or libraries....
Tutorial by edureka! | 35:50 Minutes| 131,869 Views
🔥 Full-Stack Web Development Internship Program: bit.ly/fs-internship
This Edureka Python Flask tutorial will cover all the fundamentals of...
Tutorial by Python Engineer | 42:57 Minutes| 11,597 Views
Learn how to write your first TODO App with Flask in this Crash Course. Flask is one of the most popular web frameworks written in Python. Flask is...
Tutorial by Joran Beasley | 11:56 Minutes| 71,095 Views
How to setup a react/flask project.
I have decided to put all my tutorials in my channel
"Code With Joran" ...
Tutorial by THE SHOW | 40:10 Minutes| 14,237 Views
Hello Friends 😊
🔔 Subscribe & click that notification bell so you don't miss anything!
In this video, You will learn everything you need to know...
Tutorial by Corey Schafer | 29:58 Minutes| 388,720 Views
In this Python Flask Tutorial, we will be learning how to create a database using Flask-SQLAlchemy. SQLAlchemy is a great tool for working with...
Tutorial by DevNami | 03:01 Minutes| 10,740 Views
Learn how to create simple web app using Python Flask.
Tutorial by Tech With Tim | 10:36 Minutes| 405,437 Views
Welcome to the first flask tutorial! This series will show you how to create websites with python using the micro framework flask. Flask is...
Tutorial by Tech With Tim | 14:01 Minutes| 173,320 Views
This python REST API tutorial will teach you how to build a python flask REST API. We will start by building a basic REST API then integrating that...
Tutorial by Parwiz Forogh | 08:51 Minutes| 40,910 Views
⭐ Kite is a free AI-powered coding assistant for Python that will help you code smarter and faster. you can use it with Jupyter, PyCharm, VS Code,...
Tutorial by ProgrammingKnowledge | 40:00 Minutes| 7,414 Views
Hello! Welcome to the Python Flask Tutorial series. In this series, we'll learn about Flask, a micro framework built using Python, with the help of...
Tutorial by Corey Schafer | 17:09 Minutes| 1,094,163 Views
In this Python Flask Tutorial, we will be learning how to get started using the Flask framework. We will install the necessary packages and get a...
Tutorial by Tech With Tim | 13:43 Minutes| 151,131 Views
In this flask tutorial I will show you how to render and create HTML templates. I will also discuss how to dynamically create HTML with the use of...
Tutorial by freeCodeCamp.org | 37:36 Minutes| 90,733 Views
Learn how to build a basic social platform with the Python Flask web framework. In this video we review how to create a database, pull data in and...
Tutorial by Corey Schafer | 48:13 Minutes| 138,931 Views
In this Python Flask Tutorial, we will be learning how to add the ability for users to create, update, and delete posts. We will also learn how we...
Tutorial by Tech With Tim | 16:40 Minutes| 87,809 Views
In this video, I'm going to be showing you how to make a website with Python, covering Flask, authentication, databases, and more. The goal of this...
Tutorial by freeCodeCamp.org | 16:06 Minutes| 109,619 Views
Using Python microservices allows you to break up your apps into smaller parts that communicate with each other. This can make it simpler to scale...
Tutorial by Corey Schafer | 20:38 Minutes| 197,723 Views
In this Python Flask Tutorial, we will be learning how to restructure our application into a package rather than running from a single module. This...
Tutorial by Tech With Tim | 13:09 Minutes| 46,334 Views
This flask tutorial will cover how to use Blueprints in a flask application. A blueprint allows you to separate your app into different files and...
Tutorial by Clever Programmer | 44:23 Minutes| 187,369 Views
Watch the FREE webinar training that shows you the Top 3 Secrets to Becoming a Python Freelancer... ...
Tutorial by Corey Schafer | 31:42 Minutes| 521,513 Views
In this Python Flask Tutorial, we will be learning how to use templates. Templates allow us to reuse sections of code over multiple routes and are...
Tutorial by teclado | 11:51 Minutes| 13,564 Views
Learn how to render HTML tables dynamically using Python and Flask! In this video, you'll learn how to take data from your Flask app and create...
Tutorial by thenewboston | 08:32 Minutes| 322,079 Views
Website - thenewboston.com/
GitHub - github.com/thenewboston-developers
Reddit - reddit.com/r/thenewboston/
Twitter - ...
Tutorial by Kalle Hallden | 16:22 Minutes| 75,333 Views
Building My Portfolio Website Using Python Flask
Get a .TECH domain 90% off:
Q&A Discussion about Python Flask Example
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243988882.7/warc/CC-MAIN-20210508121446-20210508151446-00464.warc.gz
|
CC-MAIN-2021-21
| 5,196 | 63 |
https://blogs.msdn.microsoft.com/appserviceteam/2016/08/26/onboarding-to-azure-web-marketplace/
|
code
|
Azure Marketplace is a hub of solutions for users to create different types of resources. Each category of resource such as Data services, Virtual machines, Web have different on-boarding processes for ISVs to publish their solutions in Azure marketplace. In this article we will discuss the process to on-board Web Apps to Web Marketplace in Azure.
To showcase your application in Web Azure marketplace , you need to get your application certified. The certification process is a 5 Step process.
|ONBOARDING||Build your Azure package and provide the marketing content for your application . See details below.|
|CERTIFICATION||We’ll run tests to verify compatibility with our platform or service|
|MARKETING||Promote and market your application taking advantage of Microsoft go-to-marketing resources|
On-boarding New applications to the Web Azure Marketplace
For new applications:
The on-boarding process is a gated approach and the application will be reviewed by our team. Click here to request for certification. Leverage the benefits of this program from being showcased in the Azure Marketplace but also advantages of being part of Microsoft partner network.
Follow the guidelines mentioned below to build your template and test your application on App service. If accepted we will enable it in the Azure portal.
We will continue to maintain existing applications in the Azure Web Marketplace. Please reach out [email protected] if you haven’t already to get details on updated process for managing updates to your application.
Azure Web Marketplace Principles
Users can browse and view applications for different types of Web sites, ranging from photo galleries to blogs to e-commerce sites. To be part of the Azure Web Marketplace, developers should follow these principles, which establish a consistent, quality user experience:
- Be Current: The application you provide a link to must be the latest, stable final release version available, hosted on a publicly available Web URL.
- Application License: The application Azure Web Marketplace may provide an entry point free of charge or use Bring your own license model (BOYL) where users can purchase a license from the application publisher’s website.
- Be Compatible: The generated and configured application deployed from Azure Web Marketplace must also run on any Windows OS.The application should support running on cloud infrastructure by providing an option to make the application stateless.
- Be Hostable: The application to which you provide a link must run well in a shared hosted environment as well as when the user has administrative rights for the computer.
- Be Deployable: The application must be deployable using Github or MSDeploy. Github deployment for package deployment is currently available for applications with no database or MySQL database.
- Be Supported: You must provide a publicly available Web site where end users can download your application, find documentation and/or get free on a best effort basis support through a forum.
- Be Platform Independent: The application to which you provide a link must be able to run on all Windows platforms x86, and x64.
- Be Inclusive: If your application is included in the Gallery, you should include a statement of availability in the Azure App Gallery on the application community’s Web site.
- Be Safe: The application to which you provide a link must not harm customers or be malicious, dishonest, destructive, invasive, or act in any manner restricted by the Web Gallery Application Submission agreement.
- Be a Web App: The application to which you provide a link must be a Web application that can be used to generate a working, usable Web site after deployment without requiring code or customization.
- Support Database Dependencies: Currently our create experience supports Web App with Database ( MySQL and/or SQL DB). If your application has other dependencies , Web Marketplace may not be an option.You may want to look into Azure solution templates.
Package your application code
There are two ways to package your application code :
- Using Web deploy:
Microsoft Web Deploy provides the framework for deploying the Web applications onto Azure. With Web Deploy, a developer adds a couple of manifest files to the root directory of an existing ZIP package that tell Azure Gallery installer how to deploy the application.
The manifest.XML file tells what is in the package and allows the developer to set the name of the directory and Web site where the package is deployed. The parameters.xml file gives developers the ability to ask the user for information during the install process, such as Web site path. Learn more about how to define the Web Deploy manifest files in the Application Packaging Guide. Also check out Tips and Tricks for a successful submission to Azure Website Gallery
- Using Git Deploy:This is alternate method to Web Deploy. If your application code does not require run any database SQL scripts, you can use this option. This Github repository must be a public repository. We currently don’t support private repository.
Building an Azure Package for Marketplace
Azure Package has a special folder structure to be consumed by Azure Marketplace service. Each folder at the root level approximately represents a publisher. A folder contains one or more
.json files, called package manifests, each of which contains the metadata for an Azure Gallery package. Every folder also includes a set of deployment templates, strings , icons and screenshots which can be referenced by the package manifests.
- Icons : The relative path specified by
iconPathin a package manifest must point to a folder that includes the following four images with these dimenions mentioned below:
- Small.png (40×40 px)
- Medium.png (90×90 px)
- Large.png (115×115 px)
- Wide.png (255×115 px)
You can group icons under sub-folders if you have different ones per product. Just be sure to include the sub-folder in the
iconPathfor the package manifest that uses them.
- Screenshots : Images must be exactly 533px by 324px and in PNG format. Specifying a screenshot for a gallery package is completely optional, so do not feel compelled to include one unless it makes sense for your offering.
- Azure package samples : You can find sample packages on GitHub
Update your application version
When there is a new version of your existing application, update the following :
- Change the packageURL property in UIdefinition.json file to point to HTTP URL for your application.
- Change the packageURL in Deployments/Website_NewHostingPlan_SQL_NewDB-Default.json file with the HTTP url for your application.
- [Optional] Update icons or screenshots , strings if needed
Test your application
Follow the criteria below
- Use the Azure resource manager templates and deploy using PowerShell.
- Run these tests in at least 2 different Azure regions.
- Save the results of these deployment in an Excel or Word document. The excel document should have the following columns:
- Resource group
- Web app name
- Subscription ID
- Time of deployment
- Tested with Auto-scale feature [ Yes /No]
- Tested with Continuous Integration [ Yes /No]
- Tested with Deployment slots [ Yes /No]
- Tested with Backup and restore [ Yes/No]
There are some limitations with the Azure create in the portal and power shell . If your application requires these configurations mentioned below , we will not be able to on board the application.
- You web app need Virtual application setting to be configured for web app
- Your web app need a dependency that is not supported by App Service create scenario. We currently support ONLY SQL DB , MySQL and Azure Storage dependencies.
Submit your application
Submit a certification request here . Please do provide information about your application during submission . Here is the kind of information we are looking for to learn about your application
- What is current Usage statistics of your application
- Do you have customers using your application on the Cloud ( Azure or other hosting providers). If yes share at least 2 customer stories.
- How active is the community engaged , primarily for Free applications this information is required
You will receive a response in 3-5 business days with a request for more information or with next steps to move forward.
We recommend to maintain documentation and support for your application on your website. This is key to help get new users started with using your application and follow best practices based on your guidance.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-22/segments/1495463607806.46/warc/CC-MAIN-20170524074252-20170524094252-00415.warc.gz
|
CC-MAIN-2017-22
| 8,542 | 70 |
http://manuelbzrha.blogzag.com/4480916/little-known-facts-about-engineering-assignment-help
|
code
|
"Watching your math help video clips is excellent due to the fact, as you work the issues, you clearly show and reveal every single phase."
It experienced the final some hrs to submit my assignment, I used to be anxious, I had been inquiring to my close friends to help to accomplish my assignment. Among my buddies encouraged to search my assignment on Net then I googled and received lovelycoding.
English crafting is actually an art kind, cost-free flowing in its composition, however strict in its framework. My Homework Help is home to professional English writers who will help you achieve mastery with the English language, amaze your instructors and score that best A grade.
Test this website page to peruse ADOT policies, connected backlinks and regularly requested questions about engineering consultants.
I bought my assignment by the due date and it had been spot on. Even though I gave him pretty fewer the perfect time to do my programming assignment he did it flawlessly and and not using a single mistake. Really extraordinary. If you are trying to find anyone to complete ur assignment last second and guaranteed fantastic function then look no more.
Our methods will help you with every little thing from reading through to note-taking, and time management to exams.
I’m glad I produced up my brain to choose you to do my Java assignment. My order was acknowledged right away and accomplished inside the time-frame. My cousin was from the seventh heaven! Thanks!”
Mr. Sarfaraj Alam aka Sam is wonderful with any sort of programming assignments. You identify any language C, C++, JAVA, Matlab, C#, Net Application, Databases, Knowledge Composition, Activity, Animation, and so on. As talked about directory I did all my assignments all over my semester And that i obtained much more than ninety eight or maybe more which can be an A in every assignments I gave to Mr. Sam, He helped me in each of the assignments. I used several on the net solutions for my assignments in advance of Nevertheless they have been impolite and no clarity on how the work might be accomplished, no real customer support or no authentic conversation until I discovered about Sam. I called him the pretty initially time and requested his features and how he is effective finishing an assignment, I used to be under no circumstances content as I am at the moment, I am even now using his solutions for my Initiatives, assignments, and so forth. I felt I'm conversing with my Mate and we bond a partnership into a click for more genuine fantastic friendship.
Are you currently looking for 2017 mechanical engineering internships or entry degree mechanical engineering Positions? Mechanical engineering encompasses several engineering disciplines and was developed on account of making use of principles of physics and resources science.
You can master Java Programming by me or you can question somebody that could help you with all your programming assignment.
Moreover our experienced workforce of gurus presents Qualified modifying and evidence looking through companies to Highly developed degree English students and professional writers.
co.uk, that delivered and continue to provide this kind of providers on a A lot greater scale. And yet a single critical matter have improved – assignment help have become a Instrument with the good and the successful, instead of individuals who lagged guiding the class.
so On this Java I/O dilemma, It's important to create a technique which is able to use to register and help you save the info inside of a binary file, and A different purpose is utilized to login on the technique that can study the info of a binary file to authenticate username and password.
When you fall into one of several above-outlined classes (or require custom made writing for some other motive), we are right here to fulfill your preferences.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583722261.60/warc/CC-MAIN-20190120143527-20190120165527-00213.warc.gz
|
CC-MAIN-2019-04
| 3,866 | 14 |
https://support.mozilla.org/ga-IE/questions/981455
|
code
|
Cuireadh an snáithe seo sa chartlann. Cuir ceist nua má tá cabhair uait.
Severe slowness in loading web pages with Firefox 26
Hi to all!
I installed the latest version of Firefox and my browsing started being very slow and a lot of error connections and loading troubles occured. I have already tried the "Restart with Add-ons Disabled" mode and also the "Troubleshooting information" resetting Firefox to its default setting. I had this issue when I updated FF to its latest version 26.0 . With the previous version I had no troubles, and I could solve the few ones I had. I unistalled it and tried to install a new fresh copy but it didn't help. I tried also the Firefox 27.0b2 version and I had the same problem.
When I sign-in my Gmail account, the page loads very slowly and the message "Some Gmail features have failed to load due to an internet connectivity problem" appears.
I can't surf the net on Google because the search takes a lot of time and for all the time the sign in the tab "Connecting..." still remains until the page doesn't load the search, I have to reload the current page to return to Google and try again.
YouTube is very slow and videos don't start at the play button.
I have this severe slowness only with Google, YouTube and also with the addons.mozilla.org site . All other sites load with no problems like webmail pages and others.
I have FF 26 installed on my laptop and using the same connection at my home, I have no problems. It only occurs on my desktop.
More details: I always use the private browsing mode and the only extensions I use are "Adblock Plus 2.4", "Adblock Plus Pop-up Addon", "Anti-Porn Pro" and "FireShot". I modified some about:config setting my I had never had any problems with all the previous versions.
I hope saying all about my problem and you could tell me how to solve it.
EDIT: More info about my FF setting and my system information of my desktop are in the "Question details" -> "More system details" where I posted the "Troubleshooting information" (It's in italian language, but it's very easy to understand).
I restored a system point before the installation of the latest version of FF coming back to the 25.0.1 previous version and like expected I have no troubles. But the problem still remain because I can't use this version for all the time, I'll have to update FF sooner or later.
Athraithe ag Infected23z ar
All Replies (16)
Thank you for the detailed explanation and also that you have tried most of the steps to check the connectivity being slow. Before we move ahead, can you please confirm if the connectivity issue is not being observed on another browser on your machine (say Internet Explorer).
The reason I am requesting for this information is because there aren't any regression changes in FF 26.0 that could have caused this slowness you are seeing. I am using Firefox 26.0 on a Windows 7 machine and am not seeing this issue, hence want to rule out any connectivity issues with your ISP before proceeding further.
Does this affect both regular HTTP and secure HTTPS sites equally, or do you notice it only on secure HTTPS sites?
Any special connection setting?
orange Firefox button (or Tools menu) > Options > Advanced > Network mini-tab > "Settings" button
Try "No Proxy" (sorry, I don't know the correct translation)
As a diagnostic, could you switch the Flash Player plugin to "click-to-play"?
Open the Add-ons page using either:
- orange Firefox button (or Tools menu) > Add-ons
In the left column, click Plugins. Then change the setting for Shockwave Flash from "Always Activate" to "Ask to Activate".
When sites want to use Flash, a notification icon will appear in the address bar, or in the player rectangle. After seeing whether load time is better, you can go ahead and approve Flash and see how that changes things.
Does Flash seem to be an issue?
Perhaps you have tried this already but, if not...
When you have a problem with one particular site, a good "first thing to try" is clearing your Firefox cache and deleting your saved cookies for the site.
(1) Bypass Firefox's Cache
Use Ctrl+Shift+r to reload the page fresh from the server.
Alternately, you also can clear Firefox's cache completely using:
orange Firefox button (or Tools menu) > Options > Advanced
On the Network mini-tab > Cached Web Content : "Clear Now"
If you have a large hard drive, this might take a few minutes.
(2) Remove the site's cookies (save any pending work first). While viewing a page on www.google.com:
- right-click and choose View Page Info > Security > "View Cookies"
- Alt+t (open the classic Tools menu) > Page Info > Security > "View Cookies"
In the dialog that opens, you can remove your Google cookies individually.
Then try reloading the page. Does that help? (Repeat as needed with other sites.)
I looked up this error message on Google's support forums, and one common reason for this a few years ago were "Labs" features you may have opted into. To start Gmail with the Labs features disabled, you can use this URL:
More info on managing Labs features: Labs - Gmail Help
I don't know whether this is applicable to the Add-ons site, but if you log in using the "Persona" system with your Gmail address, some Google-stuff may be loading in the background.
It is possible that your security software (firewall, anti-virus) blocks or restricts Firefox or the plugin-container process without informing you, possibly after detecting changes (update) to the Firefox program.
Remove all rules for Firefox and the plugin-container from the permissions list in the firewall and let your firewall ask again for permission to get full unrestricted access to internet for Firefox and the plugin-container process and the updater process.
First of all, thank you for your fast reply. I tried different web browsers such IE and Google Chrome and I confirm the issue occurs only with FF. I'm using Window 7 too. More info about my FF setting and my system information of my desktop are in the "Question details" -> "More system details" where I posted the "Troubleshooting information" (It's in italian language, but it's very easy to understand).
Thank you again and I hope you could help me anyway.
First of all thank you for the fast reply too. I'm sorry but I sincerely have no idea about the difference between regular HTTP and secure HTTPS sites, any examples?
What could happen if I had to change the setting to "No proxy"? Could you explain that in poor words?
The Shockwave Flash plug-in has never caused me any problems, my problem was about the slowness of the video loading, I tried to install again the plug-in downloading from the official web site and I'm quite sure it's not the "trigger" of the problem.
Thank you again and I hope you could help me anyway.
Thank you for this other answer but I always use the private browsing mode, no cookies (no third part cookies), internet history and cache, saved information, site preferences are not saved by default or are recovered and eased when I close FF. I use cleaning programs at the end of the day to clean up them, FF is "always" clear. I have never had problems about.
I looked up this error too and I found the same solution for that, it helped, Gmail is a bit faster than before, thank you.
I don't use any Personas, only the default FF theme.
Thank you for your reply. I use Avast! and I changed manually all its features and setting to suit to my tastes and there are no security settings which are in conflict with FF or block it without my permission. I added an exclusion rule to all the FF services/processes.
Thank you anyway for your reply.
On your question about the proxy, by default, Firefox will use the same settings as Internet Explorer to connect to the internet ("Use system proxy settings") but some users may have security software or services such as TOR or private VPN that change their connection setting. Using "No proxy" would bypass any custom settings in Firefox to see whether any of those is a factor.
I'm now quite sure what caused the problem. Before updating to the latest FF version 26.0 , I also updated my Avast! antivirus to latest version 2014.9.0.2011 . When I restored to a system point which was created by Avast before the updating, I came back to the 25.0.1 FF version and also Avast came back to the previous version. I updated FF to the 26.0 version and I had no problems, I had a try restoring again and I updated Avast and then FF and I had the same problem for what I asked for help.
I had a research and a lot of people who use Avast had the same problem and solved it disabling the Avast add-on / plug-in for FF which I don't use, so the problem still remain but it's not caused by FF but by the new Avast updates.
The main issue is the lag/delay when searching through Google and sometimes FF stop responding and I have to kill the process.
I re-checked the Avast exclusion list like you suggested and it didn't help, the problem still remain but I think I'll find a solution in the Avast support forum.
Thank you all for the replies.
Hi Infected23z, that's great detective work. I hope you get a good answer. In the release notes for the 17 December update, I see:
"Fully rewritten WebShield so that it now doesn't work as a "transparent proxy" anymore, which should result in an overall improvement in stability and performance."
Perhaps it isn't living up to its promise...
Hi, if its any help what worked for me was uninstalling an extension called "disconnect.me/search" as soon as I removed it my searches were fast again. I put it back and the problem returned. The difference was dramatic. Could be an add on?
SOLUTION - FIREFOX and Chrome SLOW & UNRESPONSIVE
This Really Works!!
- open Internet Explorer
- go to Tools > Internet Options
- go to "Connections" tab
- click on "LAN settings" button
- uncheck "Automatically detect settings"
Athraithe ag dtaBSe ar
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362297.22/warc/CC-MAIN-20211202205828-20211202235828-00476.warc.gz
|
CC-MAIN-2021-49
| 9,873 | 74 |
http://www.phpdeveloper.org/news/21600
|
code
|
In the latest post to her site Lorna Mitchell has posted a helpful hint on how you can run multiple versions of PHP at once, mostly how to get the latest version without messing up your current install.
When I advise people about upgrading their PHP version, I say things like "just run your test suite with the new version" "just grab the new version and try your site with the built-in webserver". A couple of people recently have asked for more detail on how to actually achieve these things so here's a quick primer on getting new PHP without touching anything to do with your existing PHP installation.
You'll need a bit of knowledge around compiling software to get the job done, so if you're only used to aptget-ing or yum-ing you might be a little lost. She does include all the commands you'll need including the special "prefix" flag on configure telling it to put PHP in a different location than normal. She also includes a brief test to ensure that it's all up and working (using the built-in web server).
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125948464.28/warc/CC-MAIN-20180426183626-20180426203626-00154.warc.gz
|
CC-MAIN-2018-17
| 1,018 | 3 |
http://www.desert-home.com/2010/11/
|
code
|
Finally got an enclosure and finished the power display. Now it's installed in a wall displaying data and NIS based time. I'm sure I'll be opening it up and adding things, but that's what computers are for. I'll be able to concentrate on a smart home thermostat to control my heat pump now. Click on the thermostat tab above for the description and final picture or click here.
My new power company meter is still working fine. My demand level is hovering at 1.5kW: Totally COOL! Interesting how the other meter had "nothing" wrong with it.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644915.48/warc/CC-MAIN-20230530000715-20230530030715-00298.warc.gz
|
CC-MAIN-2023-23
| 540 | 2 |
https://supportforums.cisco.com/discussion/10681061/collision-issue
|
code
|
Hi guys, would like to check out what's really the logging telling and what's the problem it will be.
I have 2 unit of 6500 boxes with CSM. The topology is doing in single subnet mode.
The server NIC is doing in SLB, where 1 primary 1 standby, and the NIC physically doing in Switched tolerance fault way. The 2 switches are interconnect and trunking allow vlan 11, 12 to carry thru.
I facing intermittent performance issue once trying to access the services. So this is what i get from sh logging :
%CSM_SLB-4-TOPOLOGY: Module 1 warning: IP address conflict: ARP frame from 202.160.xx.xx with MAC 00:01:64:f9:1a:01 received on VLAN 11
%CSM_SLB-4-TOPOLOGY: Module 1 warning: IP address conflict: ARP frame from 10.0.xx.xx with MAC 00:01:64:f9:1a:01 received on VLAN 12
Any idea what i should deal with it?
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128320763.95/warc/CC-MAIN-20170626133830-20170626153830-00481.warc.gz
|
CC-MAIN-2017-26
| 805 | 7 |
https://www.freelancer.cl/projects/Software-Architecture/Write-some-Software-11806492/
|
code
|
We are looking at developing a small prototype which can extract data from live video feeds. The software would take video feed as input and give structured data as the output. The data to be extracted should be configurable (using config/xml, etc.). The data can be like, e.g., detection of number of specific objects in the video, etc.
Please provide a detailed technology stack and high level solution architecture (write-up only) while placing your bid.
Please also provide a reference to a similar kind of work done by you.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794864466.23/warc/CC-MAIN-20180521181133-20180521201133-00284.warc.gz
|
CC-MAIN-2018-22
| 528 | 3 |
https://blog.8-p.info/en/2020/10/22/mocking/
|
code
|
Because of “modern” mocking libraries make mocking easier, developers mock stuff, sometimes too much. Mocking is a necessary evil. You would need to mock a few stuff, but only a few.
The biggest problem of mocking is that you run different code in your testing environment, which basically kills the value of your tests. The tests tell that your change is fine, but you would be unsure because your dependencies are all mocked.
Another problem is that mocking could let you specify your implementation in detail. You know that this function should call A, B, and C. But this level of detail would change over time. Hence it would be better to not specify the detail.
Good tests allow you to change your function easily because the tests tell you that your change is fine. Bad tests prevent you to change your function because you have to modify all tests first.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362930.53/warc/CC-MAIN-20211204033320-20211204063320-00597.warc.gz
|
CC-MAIN-2021-49
| 865 | 4 |
https://codspeed.io/prisma/prisma/branches/deps/engines-4.14.0-57.5907d6ccc8494af6acccafd77cd00a2fa80c028d
|
code
|
packages/client/src/__tests__/benchmarks/lots-of-relations/lots-of-relations.bench.ts::typescript::client generation 100 models with relations
Click on a commit to change the comparison range
feat(scripts): run all benchmarks even if one fails (#18558)
Run all bechmarks and only print failures rather than exiting as soon
as one benchmark fails, and only then throw an error if there were
failures. This makes the benchmark runner behave more similarly to a
test runner, and it will prevent CodSpeed from marking other
benchmarks as "dropped" when one of them crashes.
7 months ago by aqrln
chore(deps): update engines to 4.14.0-57.5907d6ccc8494af6acccafd77cd00a2fa80c028d
7 months ago by prisma-bot
Skip broken tests
Functionallity is actually broken and never worked even prior to engine
update - test just passed because there were no engine-side spans issued
during the execution.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100164.87/warc/CC-MAIN-20231130031610-20231130061610-00447.warc.gz
|
CC-MAIN-2023-50
| 885 | 15 |
https://supportforums.cisco.com/discussion/10643806/fwsm-versions-and-mtu
|
code
|
Running fwsm v2.3(1) in one environment and v2.3(3) in a separate environment. Are there any difference in how ip unreachables are treated in the versions. We seem to be runnning into mtu fragmentation issues from the later version box. We can put a rule in there but I need to know if the version differences are the cause. The earlier version works fine.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-26/segments/1498128323721.80/warc/CC-MAIN-20170628171342-20170628191342-00552.warc.gz
|
CC-MAIN-2017-26
| 356 | 1 |
https://cartesianfaith.com/2010/04/06/libtweeno-a-mash-up-library-for-teensy-and-arduino/
|
code
|
Somewhat belated, but I released an initial version on my IDE-independent Teensy/Arduino library. The basic idea is that the Arduino has a lot of great features, including an extensive user community and library of functions. Its weak point (which for many is not an issue) is the IDE and development process that you’re married to. libtweeno hopes to bypass that by providing a standard avr-gcc library that includes all the built-in features of the Arduino without the IDE constraints.
The library is available on nurometic.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644574.15/warc/CC-MAIN-20230529010218-20230529040218-00760.warc.gz
|
CC-MAIN-2023-23
| 528 | 2 |
https://www.ijcai.org/Abstract/09/158
|
code
|
Negotiation Using Logic Programming with Consistency Restoring Rules
We formalize negotiations using logic programming with consistency restoring rules (or CRProlog) [Balduccini and Gelfond, 2003]. Our formulation deals with incomplete information, preferences, and changing goals. We assume that each agent is equipped with a knowledge base for negotiation which consists of a CR-program, a set of possible assumptions, and a set of ordered goals. We use the notion of an answer set as a means to formalize the basic notions of negotiation such as proposal, response, negotiation, negotiation tree (protocol), etc. and discuss their properties.
Tran Cao Son, Chiaki Sakama
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647459.8/warc/CC-MAIN-20230531214247-20230601004247-00037.warc.gz
|
CC-MAIN-2023-23
| 673 | 3 |
http://stackoverflow.com/questions/12210277/remove-the-view-and-layout-name-from-sef-url-in-joomla-2-5
|
code
|
I am using joomla 2.5 I want to display the SEF without the view and layout name.
http://localhost/cars/vehicles/buyer/vehicle_overview/7/18 to http://localhost/cars/vehicles/carname
In that above url I have to display the name of car instead of view,layout and ids. I am using the js_autoz component and want to change the SEF in that component.
Could you provide any examples to remove the view and layout? Thanks in advance
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701149548.13/warc/CC-MAIN-20160205193909-00197-ip-10-236-182-209.ec2.internal.warc.gz
|
CC-MAIN-2016-07
| 426 | 4 |
http://managedcomponents.com/runtime-error/fix-nvidia-runtime-error-update.php
|
code
|
Nvidia Runtime Error Update
Or does it this MSI has updated the BIOS 2x. Sounds like a school or commercial setup -- please provide more details. Hello, dedicated port for the WiFi modem. Or from other laptop repair shop Hello all, iand reverts to "No Signal".I wanted to know how i canvideo or do I have another problem?
I don't think have any way 1.5v 465mhz around 50~55 idle !! I use qwest DSL Runtime http://managedcomponents.com/runtime-error/repairing-nvidia-update-c-runtime-error.php from Can or US ... Update Nvidia Update C++ Runtime Error I don't NEED or second the process repeats itself. I have an Asus M2N-E SLI mobo with Runtime up was no problem.
Can anyone think of what have a driver issue that I think is rather unique. The LCD screen turns black Error using the DSL on the switch.Aside from the graphics card and one HDD a couple of times they finally boot...
Windows can't work with those by default a Logitech X5400 5.1 Surround system. My current graphics card isI'm using Intel Core 2 Duo E6750 @3.2ghz now with Asus P5K. Microsoft Visual C++ Runtime Error Nvidia Update I have a setthey mean a replacement again but sometimes not.Have you considered a clean install of VISTA Ultimate? helloabout the nVidia card and that's it.
Can you boot to Can you boot to If I do nothing http://www.tomshardware.com/answers/id-2822092/geforce-experience-allowing-update.html for the workgroup is not available".After i push the reset buttonmy router config page.If not not of Logitech Z 5300 speakers.
I switch fromlive OS to do so.Getting the Clearwire WiFi Nvidia Runtime Error Windows 10 cooler of 50$ around CAN ?Anyways I got into windows at of formating the drive from Windows? Http://pcsupport.about.com/od/fixtheproblem/ht/hderrcheck.htm If problems are found usuallyand the CD/DVD player there is nothing else installed.
I always gethave recently setup a Webserver on my Server.I got till 483mhz information however to the post.All the computers areonbaord sound card in the mother board.Getting all the computers to see check over here Error I could do to fix this?
How do you know which most recent drivers from Asus.com.If anything is found thengot hung up with the repeating behavior. I downloaded and installed the https://forums.geforce.com/default/topic/524498/getting-a-visual-c-runtime-error-when-checking-for-update-threw-nvidia-driver-/ want either of those options.So is there any other wayInspiron e1705 seems to be shot.
Should I consider replacing this on-board web with any of the computers. And it won't letit, it is not getting detected.It should offer to takeover the HD and format it. windows or safe mode?My graphics card on my my new rig the BIOS hangs and repeats.
This is one of those tooit keeps looping as described.I can't run a detected in my friend's machine. Once again it tried to restart and Nvidia Runtime Error Windows 7 currently somewhere under $100.It will check your Windows CD and do a full install.
My budget is http://managedcomponents.com/runtime-error/fix-nvidia-update-runtime-error.php the SysFan1 (case exhaust fan), start running.Am running vista home for the computer to work.Will a better video card (64 MB vs. Nvidia my issue could be?The fans stop?within fiveWHY is the Internet 'turned off' during the day?
At the max volt happen with anything else? But the same is getting Geforce Experience 3.0 Runtime Error many irons in the fire stories.It rebooted and didinsight on this matter.Hi, i got a pavilion dv6000 on there run check disk.
If the WiFi router is that accessible, then Nvidia to much trouble.The monitor displays 5 lines of info256 MB) allow for better streaming video watching? After that it boots fine. (since postingrunning Windows 2000 Pro.Thanks in advance. it was a boot up.
The PS fan, the CPUFan, and this content ati hd3450, and it requires additional power to run.I need another switch with aand damn the graphics are too low.The problem is "The server list generally the hardware needs replacing. Then I can't get to the Nvidia Driver Update Runtime Error so I cant do the "right click" format.
It seems I have a SoundMAX analog via DVI-VGA cable can able to see. Then If nothing failstrue 5.1 and I can't figure out how.Thanks for help. Use the access my website from my external ip. I would appreciate anyyour budget. So I have a Blackberry Pearl Verizon phone.
Follow the instruction HERE You need to brought another computer up. My Dell Dimension 4600 Desktop is now Nvidia each other in a workgroup is. Runtime Then i connect with my monitor using Nvidia Geforce Update Runtime Error experts, I am facing one paculiar issue with my KINGSTON Datatraveller. Nvidia In addition I Runtime phone or somehow get around this? Ummmm..
Lol... This is the best cooler you can get for its recycling thing again. Or BIOS;; but 483 I canmount it ot CD and boot from that. Via MSI's OnLine Update tool (Windows) I Vcredist X64 2008 Do you mean "Z" 5400.Anything higher won't evenwhere I can buy a new laptop card from.
Anyways suggestions for air CPU boot ok with your old video card installed? When i try to usesuccessfully updated the BIOS from v1.0 to v1.10. Operating System and Service Pack? Iprenium and got 4g ram... Does anyone know what C-Media audio output and Vista Ultimate 64 bit.
Is there another way to activate the with a M1000 router. Thanks, Paul. Does the system still over 5 years old (purchased October 2003). Eg set it up how DSL to Clearwire.Also, I am looking for a good site you can use with your PC?
Here's the deal, I have a nVidia Geforce 7900 gs. Not a lot of of configuring jacks, just configuring the outputs. My thought is since I'm not I need to format a harddrive which has only ext2 (or ext3) partitions on it.And my case isn't me choose any other option.
From what I read it seems like I RAM and CPU for problems. The very first time I powered up get to bios but not to windows.. I just bought a new video card, the of 1.5v for e6750.I need some help on how exactly to go to my asus screen..
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376823614.22/warc/CC-MAIN-20181211083052-20181211104552-00531.warc.gz
|
CC-MAIN-2018-51
| 6,015 | 22 |
https://tayeh.me/uses/
|
code
|
Here are the things I use which keeps me productive.
- I use
HP OMEN 15(2020). It is a fast machine, Intel Core i7-10750H Hexa-Core, 20GB of DDR4 RAM, 512Gb NVMe SSD, NVIDIA GeForce GTX 1660Ti (6GB GDDR6).
- I am currently using
iPhone 7as my phone. It is an old device, but it still feels fast. I am planning to upgrade it (support).
- I use
Linuxfor my day job as a primary OS, I use
Fedoraas a primary distro from 8 years, Fedora 33.
- on servers, I use
I have completely switched to Visual Studio Code and enjoying the robustness of the editor.
I use vscode to edit all my files
Ansible Playbook and etc.
- Firefox: I used Firefox. It is fast, has great developer tools, has tracking protection and I can’t live without the Container tabs.
- Firefox Lockwise: Securely access the passwords you’ve saved in Firefox from anywhere — even outside of the browser.
- DigitalOcean: Get $100 in cloud credits from DigitalOcean using my link, a simple interface to create servers with great pricing.
- Amazon Web Services
- Google Cloud Platform
- Postale: Free email addresses for your domain name, I use to host my own email address.
- GitHub Pages: It super fast & free service to host your static sites, tayeh.me hosted on GitHub Pages
- GitHub: I use GitHub to host my git repositories. It has a nicer interface which like the most. I also use it for internal team collaboration.
i will update this page soon
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662519037.11/warc/CC-MAIN-20220517162558-20220517192558-00379.warc.gz
|
CC-MAIN-2022-21
| 1,414 | 21 |
https://stacker.com/petruce-jean-charles
|
code
|
Petruce Jean-Charles (they/them) earned an M.A. in Journalism and Public at American University, where their interest in investigative reporting and storytelling grew. They have covered stories on healthcare, education, the LGBTQ community, and the coronavirus pandemic. Their work has been published in The Nation, USA Today, Mother Jones, The Food and Environment Reporting Network and The Courier-Tribune. Reach them on X. Outside of work, they love listening to podcasts, watching horror and thriller movies, and visiting art museums.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817289.27/warc/CC-MAIN-20240419043820-20240419073820-00499.warc.gz
|
CC-MAIN-2024-18
| 538 | 1 |
https://www.dvhardware.net/article70937.html
|
code
|
Oh boy, a Microsoft update is causing problems again. Bleeping Computer reports the latest set of critical security updates that were rolled out last week can cause Windows 10 systems to stop booting properly after performing a system restore:
The issue affects all Windows machines where system protection is turned on and a system restore point has been created prior to installing one or more Windows 10 updates.
When users try to restore the system after the Windows 10 updates have finished installing, the system will not be restored and, instead, "the computer experiences a Stop error (0xc000021a)" and, after restarting the computer, the system will not be able to return to the Windows desktop.
Details on how to resolve this issue can be found over here. Microsoft is working on a fix.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141727782.88/warc/CC-MAIN-20201203124807-20201203154807-00172.warc.gz
|
CC-MAIN-2020-50
| 796 | 4 |
https://archive.sap.com/discussions/thread/1053853
|
code
|
Java nodes clustering, one vs many
Hi, we have a Java production server with 6 nodes of 1 GB each. we thinking about changing that to 1 node of 6 Gb. Do you know what would be the benefits? is possible to assign that memory to a server in a 6.40 WAS?
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-09/segments/1550247514804.76/warc/CC-MAIN-20190222074154-20190222100154-00590.warc.gz
|
CC-MAIN-2019-09
| 250 | 2 |
https://www.tes.com/teaching-resources/shop/aglasgow
|
code
|
This resource is the first of 8 lessons for Kodu. Students have to create a volcano, add apples, control movement and add points when correct colour of apples are picked up.
- Powerpoint with differentiated learning objectives (bronze, silver, gold)
- Exemplar Kodu world with code
- Demo world or file to give students to jump straight to the coding
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187824899.43/warc/CC-MAIN-20171021205648-20171021225648-00307.warc.gz
|
CC-MAIN-2017-43
| 350 | 4 |
https://www.antler.co.uk/lola-landscape-zip-around-purse-burgundy
|
code
|
Trusted. Since 1914.
Your Bag is currently Empty
Lola is extremely practical with an impressive 12 card slots, 2 slip pockets and internal zipped pocket for coins.
Thanks to its long line zip around closure you can be ensured all your belongings will stay safe and organised.
Lola has not compromised practicality for style as it is a very elegant purse made of 100% genuine grained leather with funky contrasting lining.
Our products are made to an incredibly high standard and are rigorously tested
Our customers are renowned for their loyalty; an Antler case is often passed down to future generations
Since we began in 1914, we have won
the trust of millions of consumers around
Shipping to :
Design By Limesharp
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514572964.47/warc/CC-MAIN-20190916220318-20190917002318-00061.warc.gz
|
CC-MAIN-2019-39
| 716 | 11 |
https://mathspace.co/textbooks/syllabuses/Syllabus-99/topics/Topic-1497/subtopics/Subtopic-17843/?activeTab=interactive
|
code
|
A bag contains the letters A, B, C, D and E. Two letters are randomly drawn out of the bag without replacement.
Construct a probabilty tree showing all possible outcomes:
Find the probability A is drawn followed by B drawn.
Find the probability that two A's are drawn.
Find the probability C is not drawn.
Find the probability that D is drawn.
Find the probability that E is drawn and B is not.
Find the probability that C or D is drawn?
Find the probability that neither C nor D are drawn.
Buzz is dealing cards from a regular deck. How many possible outcomes are there if he deals one card each to:
A carton contains a dozen eggs, of which $4$4 contain no yolk.
If $3$3 eggs are chosen at random for a cake, what is the probability that they all have no yolk?
A class contains $5$5 girls and $6$6 boys. Two are selected for a class committee. What is the probability that a girl and boy are selected?
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296818067.32/warc/CC-MAIN-20240421225303-20240422015303-00219.warc.gz
|
CC-MAIN-2024-18
| 902 | 13 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.