url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
https://revitoped.blogspot.com/2008/04/cad-surveys-and-your-revit-project.html
code
This method should ALWAYS be followed. It is critical to follow when the survey coordinates of your building site have large values (> 2 miles/3km from site 0,0): ALWAYS locate sites underneath buildings. Revit buildings like to stay near home and be oriented to project north. Sites can wander about and talk to the buildings later. DON'T try to pan your view 40 km northeast of 0,0 and try to build your building model there because your site coordinates have a remote origin. This will work in AutoCAD but in Revit you will be very unhappy. NEVER import or link a site with large coordinate values Origin to Origin! This may seem correct based on AutoCAD experience, but here too you will be very unhappy in Revit. You will get the correct origin later in the process. - Build your revit model at or near the position of the elevation marks in the default template with the building oriented orthagonal to your desired printing frame. i.e. use a Project North not True North for your working environment. For one building on a site: - Link in a site model or site dwg. - Move and Rotate the SITE so that it is located correctly relative to the building. - Acquire the site's coordinates. Now, the site's origin will be the origin of your shared coordinates. The site's Y axis will be True North. The site coordinate values can be arbitrarily large without disturbing Revit's internal calculations. - You can later open the site model and link in the building using shared location and it will land in the exact position. For multiple buildings on a site: - Create a Site project, link in a site dwg, placing the center of the building site near the center of the default view. - Acquire coordinates from the site. - Build any site elements, topos, etc. - Link in building rvts. Move and rotate them so that they are correctly located on the site. - Publish coordinates to the rvts. Now all models will have the same Shared origin and True North orientations. - You can now link the site into any of the buildings (the other buildings can be linked in as well) using shared location and it will be in the exact location.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510481.79/warc/CC-MAIN-20230929022639-20230929052639-00402.warc.gz
CC-MAIN-2023-40
2,122
16
https://developerpublish.com/my-10-favourite-funny-programming-quotes/
code
I was looking to some really funny programming quotes to use in one of the seminars. I was able to collect quite a lot of them and few of the programming quotes were really good and funny quotes. In this blog post, I list out my 10 favourite Programming Quotes which are funny as well. My 10 Favourite & Funny Programming Quotes - If debugging is the process of removing software bugs, then programming must be the process of putting them in. – Edsger Dijkstra - There are only two kinds of programming languages: those people always bitch about and those nobody uses. – Bjarne Stroustrup - It’s not a bug – it’s a feature. – Anonymous - The best thing about a Boolean is even if you are wrong; you are only off by a bit. – Anonymous - In theory, there is no difference between theory and practice. But, in practice, there is. — Jan L. A. van de Snepscheut - Debuggers don’t remove bugs. They only show them in slow motion. — Anonymous - Programming is like sex. One mistake and you have to support it for the rest of your life. – Michael Sinz - Nine people can’t make a baby in a month. — Fred Brooks, the Mythical Man-Month - There are two ways to write error-free programs; only the third one works. – Alan J. Perlis - The first 90% of the code accounts for the first 90% of the development time. The remaining 10% of the code accounts for the other 90% of the development time. — Tom Cargill If you have any favourite programming quote , leave them in the comment section.
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670743.44/warc/CC-MAIN-20191121074016-20191121102016-00185.warc.gz
CC-MAIN-2019-47
1,506
14
https://search.datacite.org/works/10.18126/saim-cv6c
code
XCT dataset and Deep Learning Models for Automated Segmentation of Computed Tomography Images of Fiber-Reinforced CompositesA A. Badran, D B. Marshall, Z. Legault, R. Makovetsky, B. Provencher, N. Piché & M. Marsh The dataset consists of X-ray Computed Tomography (XCT) scans and complementary data (Trained Deep Learning Models) for segmentation of composite microstructure before in-situ tensile loading and crack segmentation after loading. 1 citation reported since publication in 2020. This data repository is not currently reporting usage information. For information on how your repository can submit usage information, please see our documentation.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499541.63/warc/CC-MAIN-20230128090359-20230128120359-00282.warc.gz
CC-MAIN-2023-06
657
4
https://discuss.openedx.org/t/helm-charts-collaboration-for-large-instances/8875
code
I’d like to share with you all this thing we have been working on with some amazing people from this community. In the early days of Open edX, one of the first things that you would encounter when you got involved was the configuration repository. Nowadays life is much simpler, thanks to tutor you can get started with the world famous 15 min install. You can even get all the way to a production-grade installation from there. Sometimes however you get into more complicated use cases that are not covered by tutor or even by openedx. You start to put more and more things into your Kubernetes cluster and it can get very complex. You wish that you could share some of the things that are happening to you with others and maybe get a different set of eyes looking at your specific situation. Well, I’d like to draw your attention to a new project we are trying to get rolling. Somewhere to share the experience we at the community are collectively building about hosting Open edX at a medium to large scale. The project itself is two things at the moment: - a proof of concept repository made by @braden that contains helm charts and tooling to make that interoperable with tutor. We are starting with the focus on the foundations to run many independent installs of tutor in one single cluster. - and a decision record that lays some groundwork for the vision and how different members of the community can collaborate on the charts and tools. We are starting a formal period of review today and will run until Monday 9th of January 2023. This is a little longer than the usual two weeks but you know holidays! Now that everyone here starts to wind down for the end of the year it would be a great time to chime in, give a review, write some comments or leave a thumbs up. If you are already sold on this concept and want to catch up on the discussion, I’ll leave all the links nice and tidy here: - The ADR: https://github.com/openedx/open-edx-proposals/pull/372 - The proof of concept repo: https://github.com/open-craft/tutor-contrib-multi - The issue to make this a community repo: https://github.com/openedx/tcril-engineering/issues/577 - The current roadmap/issues list: https://github.com/open-craft/tutor-contrib-multi/issues - The beginning and the latest post of the thread where we have been talking about this for months. Finally, I’ll tag everyone that I can remember has participated in this so that you are the first people to get both my appreciation and the invitation to review: @braden @regis @keithgg @MoisesGonzalezS @gabor @jhony_avella @lpm0073 @antoviaque @sambapete @kmccormick
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499953.47/warc/CC-MAIN-20230201211725-20230202001725-00777.warc.gz
CC-MAIN-2023-06
2,613
16
http://vixra.org/abs/1203.0010
code
Authors: Marcelo Carvalho We investigate the twin paradox assuming the acceleration acts instantaneously in one of the twins and whose effect is just to revert the relative movement of the twins keeping the same relative speed. The relative motion of the twins is then split in two stages: one where they move away and another when they approach each other. Each stage is described by specific Lorentz transformations that obey certain boundary conditions related to the reversion of motion. We then show how the paradox arises from the particular form of the Lorentz transformation describing the approaching movement of the twins. Comments: 10 Pages. [email protected] [v1] 2012-03-03 19:49:18 Unique-IP document downloads: 69 times Add your own feedback and questions here: If you wish to point out that something is wrong in the paper you must be polite and mention at least one specific error, otherwise your comment will be deleted as unhelpful.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368708766848/warc/CC-MAIN-20130516125246-00094-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
951
7
http://lists.subsurface-divelog.org/pipermail/subsurface/2017-June/028744.html
code
[PATCH] QML UI: turn off spinner if pull-down-to-refresh fails dirk at hohndel.org Thu Jun 22 02:48:05 PDT 2017 Obviously correct patch. Duh. > On Jun 22, 2017, at 2:22 AM, Rick Walsh <rickmwalsh at gmail.com> wrote: > Signed-off-by: Rick Walsh <rickmwalsh at gmail.com> > I will try to work out how to do GitHub pull requests I'm happy to take things like this as patches, Rick. But creating a pull request is really easy. You need a GitHub account. Fork the Subsurface-divelog/subsurface repo Create a local branch git checkout -b forDirk add the commit there git push https://github.com/<yourGitHubID>/subsurface forDirk enter your login and password now on the website navigate to that branch there will be a button to create the pull request. More information about the subsurface
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335059.43/warc/CC-MAIN-20220928020513-20220928050513-00069.warc.gz
CC-MAIN-2022-40
785
19
http://yodiz.com/help/how-to-use-realtime-count-of-issues-graph/
code
How to use Realtime count of issues graph How this graph is helpful! - This chart show you every-time a new issue is created or fixed - This provide a good indicator how many of the new issue is added or fixed in current day - Help you to understand the inbound vs inbound correlation of bug Here are the description what are the fields in graph and what they really mean ||This is the amount of issues in total currently in your project. If a new issue is added or fixed this number will updated accordingly, reflecting the current state of your issue count. |Change & Change(%) ||Change indicate the amount of issues based on previous day count. Assuming you have 100 issues yesterday, and your team created 4 new issue today, so your current value of issue will be 104 and % indicate the percentage increase or decrease of issues |One Month Low ||It show the lowser of the issue count you have in a month |One Month High ||It show the highest of the issue count you have in a month How to add this widget - Choose any dashboard where you want to add the Open Issues – Realtime status - Click “add new widget” from top right - Find the “Open Issues – Relatime Status” from the list of widgets in the bottom of the page. - Add the widget by clicking on the plus sign on it
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118743.41/warc/CC-MAIN-20170423031158-00389-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,285
18
https://community.poly.com/t5/Video-Endpoints/Can-t-Answer-Call-From-Lynn/td-p/8704
code
I am working on deploying our HDX 7000. I have configured it for Lynn integration. I do not have the RTV license. When the HDX dials out to the Lynn user it works fine. When a user tries to open a video session with the HDX it just rings. I have set it to automatically answer but that does not help. I have tried hitting the answer button on the controller and on the web interface controller. Neither options will answer the call. Any help would be appreciated. Do you mean microsoft lyncs integration? Is the user call from your internal network or from from the web (other side of your firewall). Yes I meant Lync. The spell check feature turned it into Lynn. I have figure out this portion of the problem. If my HDX initiates the call the endpoint does not have to have a web camera. If the Lync client initiates the call they must have a web camera installed. There is no way to answer a call without the endpoint having video. We don't have Lync (yet), but still use OCS2007R2 This has separate option to make voice call or video call to another OCS client. Has this disappeared with Lync?
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662520817.27/warc/CC-MAIN-20220517194243-20220517224243-00628.warc.gz
CC-MAIN-2022-21
1,096
7
https://www.princeton.com/people/princeton-consultants-welcomes-dr-michael-stewart-senior-associate
code
March 10, 2021 Mike joins us from Stony Brook University, where he earned a PhD in Physics. His research included modeling and simulation of novel physics phenomena, automated analysis of experimental data, and the design and acquisition of data. Mike published articles on the dynamics of matter-wave quantum emitters in a structured vacuum, and the spontaneous emission of matter waves from a tunable open quantum system. He is experienced in machine learning, natural language processing, Python programming, and statistics. A native of the Detroit area, Mike graduated from the University of Michigan with a B.S. in Mathematics and Physics. He speaks German and Mandarin and enjoys cooking, reading, yoga and gaming.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950383.8/warc/CC-MAIN-20230402043600-20230402073600-00742.warc.gz
CC-MAIN-2023-14
720
2
https://link.springer.com/article/10.1007/s11263-019-01202-3?error=cookies_not_supported&code=fd56ee94-c232-4091-982b-4d941ac4f49a
code
This paper addresses the problem of image matting for transparent objects. Existing approaches often require tedious capturing procedures and long processing time, which limit their practical use. In this paper, we formulate transparent object matting as a refractive flow estimation problem, and propose a deep learning framework, called TOM-Net, for learning the refractive flow. Our framework comprises two parts, namely a multi-scale encoder-decoder network for producing a coarse prediction, and a residual network for refinement. At test time, TOM-Net takes a single image as input, and outputs a matte (consisting of an object mask, an attenuation mask and a refractive flow field) in a fast feed-forward pass. As no off-the-shelf dataset is available for transparent object matting, we create a large-scale synthetic dataset consisting of 178 K images of transparent objects rendered in front of images sampled from the Microsoft COCO dataset. We also capture a real dataset consisting of 876 samples using 14 transparent objects and 60 background images. Besides, we show that our method can be easily extended to handle the cases where a trimap or a background image is available. Promising experimental results have been achieved on both synthetic and real data, which clearly demonstrate the effectiveness of our approach. This is a preview of subscription content, log in to check access. Buy single article Instant access to the full article PDF. Price includes VAT for USA Subscribe to journal Immediate online access to all issues from 2019. Subscription will auto renew annually. This is the net price. Taxes to be calculated in checkout. For an image of size \(512\times 512\), 18 pictures and around 20 min processing time are needed. For an image with n pixel, we have 7 unknowns (3 for B, 2 for P, 1 for m, and 1 for \(\rho \)) for each pixel, resulting in a total of 7n unknowns. Other large-scale datasets like ImageNet (Deng et al. 2009) can also be used. The objects consist of 7 glasses, 1 lens and 6 complex objects. Glasses with water are implicitly included. Complex shape is excluded in experiments here to speed up training. The first value is measured on the whole image and the second measured within the object region. Glass \(\times \)12, glass and water \(\times \)4, lens \(\times \)2, and complex shape \(\times \)2. We simply multiply the refractive flow field by a scaling factor (\(<1\)). Chen, G., Han, K., & Wong, K. Y. K. (2018). TOM-Net: Learning transparent object matting from a single image. In CVPR. Cho, D., Tai, Y. W., & Kweon, I. (2016). Natural image matting using deep convolutional neural networks. In ECCV. Chuang, Y. Y., Zongker, D. E., Hindorff, J., Curless, B., Salesin, D. H., & Szeliski, R. (2000). Environment matting extensions: Towards higher accuracy and real-time capture. In SIGGRAPH. Deng, J., Dong, W., Socher, R., Li, L. J., Li, K., & Fei-Fei, L. (2009). Imagenet: A large-scale hierarchical image database. In CVPR. Duan, Q., Cai, J., & Zheng, J. (2015). Compressive environment matting. The Visual Computer, 31, 1587–1600. Duan, Q., Cai, J., Zheng, J., & Lin, W. (2011). Fast environment matting extraction using compressive sensing. In ICME. Duan, Q., Zheng, J., & Cai, J. (2011). Flexible and accurate transparent-object matting and compositing using refractive vector field. In Computer graphics forum. Eigen, D., Puhrsch, C., & Fergus, R. (2014). Depth map prediction from a single image using a multi-scale deep network. In NIPS. Fischer, P., Dosovitskiy, A., Ilg, E., Häusser, P., Hazırbaş, C., Golkov, V., van der Smagt, P., Cremers, D., & Brox, T. (2015). Flownet: Learning optical flow with convolutional networks. In ICCV. He, K., Zhang, X., Ren, S., & Sun, J. (2016). Deep residual learning for image recognition. In CVPR. Ilg, E., Mayer, N., Saikia, T., Keuper, M., Dosovitskiy, A., & Brox, T. (2017). Flownet 2.0: Evolution of optical flow estimation with deep networks. In CVPR. Kim, J., Kwon Lee, J., & Mu Lee, K. (2016). Accurate image super-resolution using very deep convolutional networks. In CVPR. Kingma, D., & Ba, J. (2015). Adam: A method for stochastic optimization. In ICLR. Lin, T.Y., Maire, M., Belongie, S., Hays, J., Perona, P., Ramanan, D., Dollár, P., & Zitnick, C.L. (2014). Microsoft coco: Common objects in context. In ECCV. Nah, S., Kim, T. H., & Lee, K. M. (2017). Deep multi-scale convolutional neural network for dynamic scene deblurring. In CVPR. Peers, P., & Dutré, P. (2003). Wavelet environment matting. In Eurographics workshop on rendering. Persistence of vision (tm) raytracer. http://www.povray.org/. Qian, Y., Gong, M., & Yang, Y. H. (2015). Frequency-based environment matting by compressive sensing. In ICCV. Ronneberger, O., Fischer, P., & Brox, T. (2015). U-net: Convolutional networks for biomedical image segmentation. In International conference on medical image computing and computer-assisted intervention. Shen, X., Tao, X., Gao, H., Zhou, C., & Jia, J. (2016). Deep automatic portrait matting. In ECCV. Shi, J., Dong, Y., Su, H., & Yu, S. X. (2017). Learning non-Lambertian object intrinsics across shapenet categories. In CVPR. Smith, A. R., & Blinn, J. F. (1996). Blue screen matting. In SIGGRAPH. Wang, Z., Bovik, A. C., Sheikh, H. R., & Simoncelli, E. P. (2004). Image quality assessment: From error visibility to structural similarity. IEEE TIP, 13, 600–612. Wexler, Y., Fitzgibbon, A. W., & Zisserman, A., et al. (2002). Image-based environment matting. In: Rendering techniques. Xu, N., Price, B., Cohen, S., & Huang, T. (2017). Deep image matting. In CVPR. Yeung, S. K., Tang, C. K., Brown, M. S., & Kang, S. B. (2011). Matting and compositing of transparent and refractive objects. ACM TOG, 30, 2. Zhu, J., & Yang, Y. H. (2004). Frequency-based environment matting. In Computer graphics and applications. Zongker, D. E., Werner, D. M., Curless, B., & Salesin, D. H. (1999). Environment matting and compositing. In SIGGRAPH. This project is supported by a Grant from the Research Grant Council of the Hong Kong (SAR), China, under the Project HKU 718113E. We gratefully acknowledge the support of NVIDIA Corporation with the donation of the Titan X Pascal GPU used for this research. Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations. Communicated by Patrick Perez. About this article Cite this article Chen, G., Han, K. & Wong, K.K. Learning Transparent Object Matting. Int J Comput Vis 127, 1527–1544 (2019). https://doi.org/10.1007/s11263-019-01202-3 - Transparent object - Image matting - Convolutional neural network
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600401641638.83/warc/CC-MAIN-20200929091913-20200929121913-00127.warc.gz
CC-MAIN-2020-40
6,638
53
https://logicprogramming.org/2012/04/editorial-march-2012/
code
In the last three months we posted several important announcements: various call for papers and positions, the Book Review of Luís Moniz Pereira on the Book by Bob Kowalski, and the new document for ISO Prolog (by Jonathan Hodgson). The contributions to this issue are mainly concerned with applications of Logic Programming, that are crucial for the growth of the logic programming field and its assertion as a critical problem solving technology to the broadest audience. The contribution by Francesco Calimeri and Francesco Ricca reports on the industrial applications of ASP made with the DLV system. They focus on two main applications but there are many other: - computing optimal allocations of the available personnel in a major European seaport in such a way that the right processing of the shoring cargo boats is guaranteed, and - an e-tourism system that exploits ASP for finding the best matches between the offers from the tour operators and the requests of the tourists. The second contribution is by Boon Thau Loo that presents the Network Datalog (NDlog) language, an extension of Datalog used in declarative networking. ICLP 2012: Now an informal report from ICLP 2012 organization. Great news: Logic Programming is definitely alive and kicking! We received 102 abstracts! Roughly 20 of them will be directly accepted as TPLP papers; but probably many more will be accepted as technical communication and presented in Budapest (September 4-8). You have still chance to submit papers in the various ICLP workshops: ASPOCP, CHR, CICLOPS, WCB, LoCoCo, WLPE, and Co-LP, and to participate to the works of WG17. We will have as usual the Doctoral Consortium, and two special events. - A special event celebrating the 25th birthday of SWI Prolog, one of our favorite Prolog implementations, and - A VERY SPECIAL session where the author(s) of the most influential paper of ICLP 1992 (-20 years) and ICLP 2002 (-10 years) will be presented an award and given the opportunity to present the evolution of their original works. The winners will be kept secret till that day! Don’t miss that session. But don’t forget PPDP and LOPSTR. Deadlines are approaching and the trip from Budapest to Leuven is very nice! ALP Web site: The original design we proposed for the ALP web site included the option of providing feedback and comments for each article posted. Unfortunately we experienced two problems with this design: the first is that we have received very few comments to the articles (14 in two years); the second is that, in spite of using a re-CAPTCHA filter, we continue receiving an overwhelming number of spam messages – in the order of one hundred spam comments per day. We decided to implement a change in policy to address this situation. We will leave comments open only associated to the Editorial and for the period of one month (of course if there is an active discussion, the deadline will be extended). In case of comments after that date (or on other papers), just send us an email and we will open that page for comments. We apologize for this change, but the amount of spam was not sustainable any longer. Turing: And now to another topic. Alan Mathison Turing was born in London on June 23rd, 1912. During his short life, he had the time to lay the foundations of Computer Science. Several conferences are dedicated to celebrate the hundredth anniversary of his birth this year. We would like to add here few lines of Prolog codes (most of you probably have written a variant of this program once in your life) that constitutes (maybe) the shortest and simplest complete Prolog implementation of an interpreter for a Turing machine, and it is a small contribution of Logic Programming to the memory of Alan: %%% turing(+Left_tape_ini,+State_ini,+Symbol_ini,+Right_tape_ini, %%% -Left_tape_fin,-State_fin,-Symbol_fin,-Right_tape_fin ). turing(Left,halt,S,Right, Left,halt,S,Right). turing([L|L_i],Q,S,R_i,L_o,Q_o,S_o,R_o) :- delta(Q,S,Q1,S1,left), turing(L_i,Q1,[S1|R_i],L_o,Q_o,S_o,R_o). turing(,Q,S,R_i,L_o,Q,S_o,R_o) :- delta(Q,S,Q1,S1,left), turing([bk],Q,S,R_i,L_o,Q,S_o,R_o). turing(L_i,Q,S,[R|R_i],L_o,Q_o,S_o,R_o) :- delta(Q,S,Q1,S1,right), turing([S1|L_i],Q1,S1,R_i,L_o,Q_o,S_o,R_o). turing(L_i,Q,S,,L_o,Q,S_o,R_o) :- delta(Q,S,Q1,S1,right), turing(L_i,Q,S,[bk],L_o,Q,S_o,R_o). where delta is defined using facts of the form: delta(q0,bk,qa,bk,right). delta(q0, 0,qb,1,left). ... delta(qn,1,qc,0,right). The interpreter is of course called using goals as: Can you come up with a more declarative or simpler implementation? Is your favorite flavor of logic programming capable of doing better? Or maybe functional programming? The challenge is on… Last but not least, Agostino and Enrico
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100229.44/warc/CC-MAIN-20231130161920-20231130191920-00287.warc.gz
CC-MAIN-2023-50
4,732
21
http://www.cisco.com/c/en/us/td/docs/voice_ip_comm/cust_contact/contact_center/icm_enterprise/icm_enterprise_10_0_1/Installation/Guide/UCCE_BK_U3311A55_00_unified-cce-installation-upgrade/UCCE_BK_U3311A55_00_unified-cce-installation-upgrade_chapter_01.html
code
You install Cisco Unified Contact Center Enterprise (CCE) in a virtualized environment. In a virtualized environment, you can run Cisco Unified CCE on a VMware ESXi platform. Run the virtual machines (VMs) on Cisco Unified Computing System (UCS) B-series or C-series servers, or Third-party servers. For more information about server specifications, see the Virtualization Supported Applications page on the DocWiki. Install the Cisco Unified CCE components after you configure the VMs. The steps to install Cisco components on a VM are the same as the steps to install on physical hardware. Upgrade scenarios are considered at a component level; you can perform one type of upgrade on one component, and another type of upgrade on another component. However, the A and B side of any given component must be running on identical hardware. Follow the task flow and tasks for the upgrade scenario that applies to each individual component involved in the overall upgrade. If your hardware and operating system meet the minimum requirements for Cisco Unified Contact Center Enterprise, Release 10(x), you can perform a Common Ground upgrade on your existing hardware. But, if you determine that you need new hardware to meet the requirements during planning, you require a Technology Refresh Unified CCE release 10(x) requires Windows Server 2008 R2. If you are upgrading from Release 8.5(1) and before, you must perform a Technology Refresh upgrade because Unified CCE releases before Release 8.5(1) do not support Windows Server 2008 R2. Some deployments from Release 8.5(2) through 8.5(4) continued to use Windows Server 2003. Those deployments cannot perform a Common Ground upgrade to Release Additionally, ensure that there is sufficient "head room" to support the new release. If CPU or memory usage on the existing system exceeds 50%, upgrade the hardware and then perform a Technology Refresh upgrade paths for Common Ground upgrades are: from Release 8.5(2) onward that use Windows Server 2008 R2 to Release 10.0 Release 9.x to Additionally, support for SQL Server 2008 R2 was introduced in Release 9.0. Therefore, an upgrade from any 8.x version running SQL Server 2005 involves a specific set of steps to upgrade to SQL Server 2008 R2. For Release 8.5(2) and after, follow the steps for a Common Ground upgrade to Release 10.0. Ensure that your server firmware is up-to-date with compatibility requirements; out-of-date firmware can result in obscure downstream problems after a seemingly successful Technology Refresh upgrades when you upgrade your hardware as well as your Cisco software and supporting third-party software. paths for Technology Refresh upgrades are: Release 8.x to Release 9.x to supports only a virtualized environment. If you are upgrading from a bare metal environment to Release 10, you can only perform a Technology Refresh upgrade. If you have a current virtual environment that does not use Windows Server 2008 R2, perform a Technology Refresh upgrade to Release 10. Build a parallel network using new hardware and prestage it with configuration data to support the existing production network. Do not use backup and restore procedures to perform the prestaged configuration on the parallel network. Use the EDMT tool to transfer data and perform a schema upgrade during the upgrade process. Before you start installation or upgrade activities, fully plan your Unified CCE contact center installation or upgrade. Ensure that the system is ready, and that all requirements for supported hardware and software are met. This section provides a summary of the requirements for Unified CCE. If you have not confirmed all the information in this section, complete the planning phase before proceeding further. Network requirements for virtualized Unified CCE systems vary widely, depending on the size and type of Unified CCE solution deployment. Confirm that you have clearly established all network requirements before you install or upgrade a Unified CCE contact center. You run the Unified Contact Center Enterprise solution on VMware ESXi platform. This solution requires that you run the virtualized machines (VMs) on Cisco Unified Computing System (UCS) B-series or C-series servers, or Third-party servers. You install the Unified CCE components after you configure the VMs. requirements apply to VMWare on virtual machines for Unified CCE: install the Unified CCE components on each VM, install VMware Tools using all the VMware Tool default settings. You require one license for VMware vSphere Standard or Enterprise ESXi for each host server. patch or upgrade the ESXi, also update the VMware Tools. As part of the planning process, ensure that all hardware, Cisco software, third-party software, VMware, and firmware are compatible. Confirm that you meet all the following compatibility requirements: point is important for upgrades that occur across multiple maintenance windows. Components that are upgraded in one maintenance window must interoperate with other components that are still at the previous version, until the full upgrade
s3://commoncrawl/crawl-data/CC-MAIN-2016-07/segments/1454701158609.98/warc/CC-MAIN-20160205193918-00039-ip-10-236-182-209.ec2.internal.warc.gz
CC-MAIN-2016-07
5,080
72
http://funnytweeter.com/when-jason-swung-that-sleeping-bag-with-a-girl-in-it-against-a-tree-in-friday-the-13th-i-bet-for-a-brief-moment-the-girl-was-like-wheeee/
code
@huntigula: when Jason swung that sleeping bag with a girl in it against a tree in Friday the 13th, I bet for a brief moment the girl was like "wheeee!" YOU MIGHT ALSO LIKE @PresidentGrimes: I promise to find a new girlfriend right away when my old girlfriend gets eaten by walkers. America needs a first lady. @SaddestFinger: how to fall down a long set of stairs: step 1) step 1 step 2) step 3 step 3) step 7 step 4) step 10 step 5) step 15 step 6) step 26 @wheatnik: My bucket list is just the words "afford things" written in orange crayon on a paper towel.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889681.68/warc/CC-MAIN-20180120182041-20180120202041-00255.warc.gz
CC-MAIN-2018-05
561
5
http://www.mathisfunforum.com/search.php?action=show_user&user_id=169286
code
Welcome to the forum. Hello Admin & Moderator! Today, I have wrote a comment here, with content welcome and introduction. But I don't see my post when joined again. My post wrote before Bod Bundy's reply! I think my post deleted here, But I can't understand why did my post delete? Please answer this problem?
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917121165.73/warc/CC-MAIN-20170423031201-00336-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
309
5
https://forum.qt.io/topic/38410/how-the-eglfs-plugin-works
code
How the eglfs plugin works? I created an embedded linux image for an imx6 board. I cross-compiled qt5 with the eglfs support. When I run a Qt application is seems the framebuffer is "shared" between the application itself and the tty console. I mean the screen is redrawn every time one of the two processes requires: so when I move the mouse I see my Qt application, but when the caret flashes (in background) or I type on the keyboard the tty console is redrawn. Is there any environment variable to set or something else in order to tell the system to give the complete control of the framebuffer only to the foreground application? The video driver is the freescale vivante / galcore. Hello! I have same ploblem! Did you solve it? same problem here. I'm using a udoo quad board it's a freescale imx6 cpu with vivante gpu. I cross compiled Qt 5.3 on an ubuntu 12.04. I tried disabling all the ttys at boot but the cursor keeps blinking. I found this page listing some enviromental variable for eglfs: I tried some configurations but without success. Any idea is wellcome :) If you're still around and interested, we fix this problem with echo 0 > /sys/class/vtconsole/vtcon1/bind Thanks for the solution, it worked for me. Hello, if somebody is still interested in information on this topic, this is what I've found out: If framebuffer console is turned on in the kernel, a console is shown on the display (showing e.g. the blinking cursor) and after a few minutes, the display is blanked per default (duration till blanking can be set somewhere). Then, you can either "wake up" your display again using $ echo 0 > /sys/class/graphics/fb0/blank in terminal or turn the framebuffer console off in the kernel by unsetting the kernel option CONFIG_FRAMEBUFFER_CONSOLE (e.g. using make menuconfig) and recompiling the kernel. @adebruyn thank you very much for this tips, this is well working :) But how to rebind the framebuffer driver once the QT application has been closed ? Is a command like this could do the trick ? echo 0 > /sys/class/vtconsole/vtcon1/bind ; \ myQtApplication -platform eglfs ; \ echo 1 > /sys/class/vtconsole/vtcon1/bind Because I need to get the console back when the application close. Also, do you know if we get the same problem with the console (flashing in background) if the application is lunch from init.d ?
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583511206.38/warc/CC-MAIN-20181017174543-20181017200043-00467.warc.gz
CC-MAIN-2018-43
2,340
26
https://www.devdiaries.net/blog/Spring-Boot-2-PostgreSQL-JWT-React-Part-1/
code
- Setting Up the backend environment - Creating the project with Spring Initializr - Spring Boot JPA Configuration In this series, we will create a modern web application using Spring Boot 2.1.5 and React. We will start from the backend creating an API in Spring Boot and using the PostgreSQL database. The frontend will be created using the React. The application that we will develop will be a currency portfolio. We will be able to add, edit and delete currencies from the database. In addition, we will secure our application using the JWT token, so that we only have access to our data. - Java knowledge - Basic Spring Boot knowledge - Basic Maven knowledge - Basic knowledge of SQL databases Setting Up the backend environment We are going to create and run Spring Boot project. To do this you must have Java SDK installed (version 8 or higher) any IDE (I will use Intellij). Creating the project with Spring Initializr We will create the Spring Boot project with Spring Initializr. It is a web tool that’s used to create Spring projects. You can use web-based initializr (https://start.spring.io/) or provided by IDE (in the case of Intellij). We will generate a Maven project with the latest Spring Boot version (2.1.5). In the Dependencies section, we will select dependencies that are needed in our project. Please start with following dependencies: - Web: Spring Web Starter - JPA: Spring Data JPA - H2 Database - PostgreSQL Driver - Spring Boot DevTools The DevTools provides facilities for developers (e.g. automatic restart after changes). Development is much faster because the application is automatically restarted after new changes have been detected. After all, your pom.xml should look something like this: If you do not want to generate a project in the initializr - you can use my pom.xml. Initializer has generated a directory structure with the main application class: In addition to the usual class with the main() method, you probably noticed the @SpringBootApplication annotation. It is a combination of multiple annotations. The most important of them are: @EnableAutoConfiguration - tells Spring Boot how you will want to configure Spring, based on the jar dependencies that you have added to the pom.xml. @ComponentScan - tells Spring to look for other components, configurations, and services in the specified package. @Configure - Defines the class that can be used as a source of bean definitions. Spring Boot JPA Configuration Now, we will create a database by using JPA. Firstly, we will use H2 in-memory SQL database (good for fast development, we do not have to run any databases - Spring will do it for us, storing data in memory). JPA and Hibernate JPA (Java Persistent API) provides object-relational mapping for Java applications. In the case of databases, we are talking about entities and therefore the most important annotation in the case of JPA is @Entity class presents the structure of a database table and the fields of an @Entity class present the columns. Hibernate is the most popular JPA implementation and is used in Spring Boot by default. Creating the entity classes in Spring Boot Entity classes use the standard JavaBean naming convention and have getters/setters. All fields have private visibility. JPA creates tables with the names of the classes. If you want to use another name for the table, you should use @Table annotation Let’s create a package for our Entity class and classes related to retrieving records from the database (repositories). We will use domain name: net.devdiaries.wallet.domain. Next, we create entity classes - Our database will contain currency portfolios. My @Id annotation defines the primary key. The @GeneratedValue tells that the ID is automatically generated by the database. We use AUTO strategy. It means that the JPA provider selects the best strategy for a particular database. Instead of creating getters/setters methods, we used Lombok (@Getter, @Setter), which will create it for us during compilation. We already have a class that will create a table with columns in the database. Now it’s time to create Repository class - which provides functionality for Creating/Removing/Updating/Deleting data from the database. We will start from repository for CurrencyRepository extends the CrudRepository<Currency, Long>. It defines that this repository is for the Currency entity class and the type of Id is long. CrudRepository provides multiple CRUD methods. Most important of them: |long count()||returns number of entities| |< S extends T > save(S entity)||saves an entity| |Iterable ||returns all records of provided type| |Optional ||returns one record for given ID| |void delete(T entity)||deletes entity| Let`s check that everything is done correctly: 1 - Add settings to application.properties It enables the H2 console and logs all Hibernate queries. 2 - Run WalletApplication application 3 - Go to localhost:8080/h2-console and use jdbc:h2:mem:testdb as JDBC URL: 4 - Use SELECT * FROM CURRENCY query and click Run button. H2 console should return no rows: CommandLineRunner to inject demo data Now we will add some demo data to the H2 database. For that, we will use the CommandLineRunner class. This class provides the functionality to run specific pieces of code when the application is fully started. Let’s use it in the main application class: We injected CurrencyRepository using @Autowired which enables dependency injection (described in https://www.devdiaries.net/blog/Spring-Design-Patterns-Dependency-Injection/ post). Next, we used the save() method from CrudRepository to save objects in the database. Now repeat the 4. point described above. You will see that new records have appeared in the database: The first part was done! In the next post, we will create a RESTful service. We will add the controller and use Spring MVC. The second part of the tutorial is available at PART 2.
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514570740.10/warc/CC-MAIN-20190915052433-20190915074433-00385.warc.gz
CC-MAIN-2019-39
5,909
70
http://psx-scene.com/forums/f263/best-current-product-dual-boot-downgrade-100194-print/
code
Best current product for dual boot downgrade Ok so apparently, progskeet has a new version that supports dual boot and e3 can dualboot cfw and ofw well. (i dont think there are others except pnm but saw nothin on it) cost aside, what is the best product in terms of speed, reliability, and ease of use?? i am not going to do the downgrade flashing, but i am going to buy the hardware to do so. i was about to buy e3 dual boot but then progskeets dual boot popped up and i read some positive reviews on it so as of jan 13, what would you downgrade and dual boot with? pros/cons to each i knew its very noobish to ask this way, but like i said, im paying a tech to do it
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163990831/warc/CC-MAIN-20131204133310-00029-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
668
7
https://www.oreilly.com/library/view/windows-7-made/9781430236504/adding_shortcuts_to_libraries_in_other_places.html
code
It is pretty easy to get to your libraries through the Start menu or through the navigation pane in Windows Explorer. But maybe those aren't your favorite ways to get to your libraries. When you click the Windows Explorer button on the Taskbar, you get the Library window that displays all of your libraries. When you first start Windows, before you open any programs, there are two places immediately accessible: the Taskbar and the Desktop. Though you already know how to use the Windows Explorer button on the Taskbar to get to libraries, there are ways to make the Taskbar and the Desktop do more for you, as shown in Figure 2–7.
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258620.81/warc/CC-MAIN-20190526004917-20190526030917-00436.warc.gz
CC-MAIN-2019-22
635
2
https://discuss.96boards.org/t/wifi-mac-address-programming/978
code
Sorry I didnt notice your entry before going on vacation. The firmware passes the MAC address to the kernel in the device tree but I believe you can still add the property to the device tree at the time of creating your image. So if you follow the db410 instructions on how to build the boot image, add the following change to your kernel tree (adjusting your MAC address), generate the new image and flash it with fastboot [jramirez@igloo kernel.git (debian-qcom-dragonboard410c-16.09-local *$)]$ git diff diff --git a/arch/arm64/boot/dts/qcom/msm8916.dtsi b/arch/arm64/boot/dts/qcom/msm8916.dtsi index 551c12a..7cf949e 100644 @@ -1129,6 +1129,7 @@ interrupts = <0 145 0>, <0 146 0>; interrupt-names = "tx", "rx"; + local-mac-address = [02 00 27 60 25 28]; qcom,state = <&apps_smsm 10>, <&apps_smsm 9>; qcom,state-names = "tx-enable", "tx-rings-empty"; fastboot flash boot boot-db410c.img Does this help?
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257647576.75/warc/CC-MAIN-20180321043531-20180321063531-00353.warc.gz
CC-MAIN-2018-13
905
14
http://www.cplusplus.com/forum/beginner/120942/
code
|Of course its not like installing an app. You are installing a library. What did you expect? :P| Well, I didn't know what to expect. Google searches yielded poor results for "reinstalling libraries c++" so I started to wonder about the terms I was using. It's funny you linked to lazyfoo, because that's whose tutorial I was using. Though, just for SDL_Image. I got SDL to install correctly and was using it just fine with someone else's tutorials on another site, and when I came to lazyfoo, there was a sudden need to have SDL_Image. And that's when I started having problems. I got a version of SDL_Image to match my outdated SDL, but for some reason code::blocks says it expects SDL2_Image headers and libraries, not the version I chose. So at this point I thought I'd say "screw it" and reinstall SDL 2.0, SDL2_Image, and just do lazyfoo's beta SDL 2.0 tutorials. I'm just irritated because I don't get much time for programming and when I do it's so much setup and so little actual writing programs.
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423320.19/warc/CC-MAIN-20170720181829-20170720201829-00661.warc.gz
CC-MAIN-2017-30
1,006
8
http://www.swtor.com/de/community/showpost.php?p=5833635&postcount=13
code
This is all true. This is also my point. For no spec does Disturbance seem to be anything more than a move used grudgingly, and that's just for TK/Lightning. The other two specs just ignore the power altogether. Now if it was awesome for TK spec, that would be different. There are plenty of powers that are pretty much made for one spec or the other. Mind Crush seems like a primarily Balance spec power for example. But Disturbance really isn't much TK other than to proc effects. It's a filler move that procs other (better) abilities for TK, nothing more, nothing less. You can use it outside of TK spec, but its usually better to use something else. Now that's not isolated to Sages, that applies to a lot of classes. TkT is only situationally useful for non-tank Shadows and Rupture is primarily for Annihilation Maras while Vanguards will rarely use Full Auto.
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049276416.16/warc/CC-MAIN-20160524002116-00188-ip-10-185-217-139.ec2.internal.warc.gz
CC-MAIN-2016-22
867
2
https://www.superprof.co.uk/post-graduate-researcher-with-msc-cognitive-neuroscience-ucl-and-bsc-psychology-university-bristol-available-tutor.html
code
I'm always prioritising listening to the exact work that student's want to go through - especially when it comes to guidance with specific exams, essays, etc. I'll tailor our work to be specific to your exact needs. Alongside this, I'll focus on fostering the independence of thought and critical thinking. These are skills necessary to attain the highest grades regardless of whether you are in school or university. I also look to build the context of how what we're learning in psychology/neuroscience fits into the wider world, such as pursuing a career relating to clinical work or even machine learning and artificial intelligence. I am a post-graduate researcher working between University College London and Bristol. A graduate from the Cognitive Neuroscience MRes (research master's) degree at UCL and the University of Bristol's Psychology BSc, I gained first-class honours from the University of Bristol and am predicted the same from UCL. Starting in the final year of my undergraduate degree and continuing into my post-graduate career, I have led help and teaching workshops (in psychology, neuroscience and statistics modules) for students struggling in their courses' helping many achieve distinctions in their grades. I also believe that my recent graduation from being a student places me in a unique position to understand the needs of both secondary-school students preparing for university admission or students who are currently completing undergraduate degrees. University College London - MRes Cognitive Neuroscience (expected 1st) University of Bristol - BSc Psychology (1st Class Hons) University College School - A-level (A*, 2As, B), GCSEs (8A*s, 2As) Presented academic work at 2 conferences: Body Representation Network, Edinburgh (July 2018) & British Psychological Society Undergraduate Conference, Bristol (March 2017) January 2015 - July 2015: Research internship, University of Bristol's Psychology Department June 2016 - August 2016: Research internship, University of Bristol's Camouflage Research Department July 2017 - August 2017: Research assistant to my undergraduate thesis supervisor, University of Bristol September 2018 - present: Part-time research assistant, University College London Brain Plasticity Lab psychology lessons closeby? Here's a selection of tutor listings that you can check out. |at his home||at your home||By webcam| |1 hour||Not available||£15||£15| |5 hours||Not available||£70||£75|
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989030.87/warc/CC-MAIN-20210510033850-20210510063850-00074.warc.gz
CC-MAIN-2021-21
2,454
15
http://www.sac-home.org/doku.php?do=export_xhtml&id=projects:awlf
code
Lead Developers: Robert Bernecky The Algebraic With-Loop Folding (AWLF) project extends the capability of the With-Loop Folding optimization to operate on AKD arrays. To do this, it has to perform symbolic analysis of WL bounds and array index sets and their intersections. AWLF enables -ecc, as that improves the analysis quality. As a fringe benefit, CF has been extended to remove, whenever feasible, guards that can be proven always satisfied, thereby improving run-time performance when compiling with -check c. Current Status: Works on odd-numbered days. No support for non-unit stride; no support for non-unit width. Solving of the symbiotic expressions used for the above symbolic analysis is problematic in several ways. The primary problem is that there is no way to tell, at present, that an analysis is complete. This can lead to AWLF failure to operate, and/or to nugatory hypercube slicing.
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583517628.91/warc/CC-MAIN-20181024001232-20181024022732-00176.warc.gz
CC-MAIN-2018-43
904
3
https://lists.debian.org/debian-legal/2001/04/msg00103.html
code
Re: No license On Wed, Apr 11, 2001 at 12:43:45PM -0400, [email protected] wrote: > Where would a package with no license at all fit in in the distro? > it is given with source, but no copyrights, or license, when I asked the author if it was licensed he said this: > "There's indeed no copyright or license on it, so you are free to use it." If it has no copyright then the author has to state this explicitly (i.e. say it is in the public domain). If the author doesn't say anything, then the default is that it's copyrighted with all rights You might be able to use the email you got from the author as this statement, but it's pretty thin evidence. A public statement would be much better.
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648431.63/warc/CC-MAIN-20180323180932-20180323200932-00248.warc.gz
CC-MAIN-2018-13
706
11
https://bniaulin.wordpress.com/2012/03/28/getting-a-quick-win-with-sharepoints-meeting-requests/
code
Meeting Request Quick Wins A Good idea to get people into SharePoint and start working with the basics of SharePoint is to use the Outlook integrated Meeting Request. This generates a SharePoint Site for an Outlook Meeting Request for the organizer to store documents. As this feature is already available in Outlook 2007 and 2010 for SharePoint it allows for a quick win in user adoption and allows users to play with SharePoint since the meeting site is theirs to play with. A good communication and procedure is of course required for this to be a quick win success. You can easily add the button anywhere you want for quick access. This will connect to your SharePoint and create a meeting site based on the chosen template. Cool! It actually integrates beautifully, by adding attendees in the site’s permissions, and creating the site using the information used in outlook.
s3://commoncrawl/crawl-data/CC-MAIN-2018-22/segments/1526794863410.22/warc/CC-MAIN-20180520112233-20180520132233-00153.warc.gz
CC-MAIN-2018-22
880
4
https://warpforge.io/ecosystem/warpsys/
code
Warpsys is the name of a catalog full of software that's built in, and ready to use in, Warpforge. The Warpsys catalog and its contents are considered part of the ecosystem of Warpforge, and not an integral part of it, because you can use the software in the Warpsys catalog without using Warpforge, and you can use Warpforge without using any references to the Warpsys catalog. Many of the same people are involved in contributing to and maintaining both projects, though. The Warpsys catalog is visible in a couple different ways: - the rendered HTML catalog website: https://catalog.warpsys.org/ - This is the easiest to navigate -- click through module names to find release info, download links for content, and links to metadata. - In addition to content built with Warpforge, you can find how it was built by looking at the replays. For example, this is a replay showing how the warpsys Bash package is built: catalog.warpsys.org/warpsys.org/bash/_replays/zM5K3Vgei4...Zv5TQ - the same Catalog data, but raw, in JSON files, in Git: - and the source code that produced these build instructions originally: Contributing to Warpsys We're happy to have more people working on contributing packages to the Warpsys collection! Right now the way to do that is simply joining the community chat, and making pull requests to warpsys source repo. Conventions within Warpsys Warpsys module, release, and item naming The Warpsys catalog attempts to be a good example of the recommended Catalog naming conventions. Warpsys uses Zapps The Warpsys catalog packages most software as Zapps. Some software is also packaged as statically linked, where that seemed appropriate. The item label or metadata in the catalog should indicate which packages are which.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100739.50/warc/CC-MAIN-20231208081124-20231208111124-00843.warc.gz
CC-MAIN-2023-50
1,748
18
https://elixirforum.com/t/understanding-cpu-under-utilisation-with-observer/31267
code
I am a newbie to Elixir and have a question about a small application that processes messages from two websocket servers. It holds state in a key-value bucket and sends messages out to the servers periodically. There are five modules: - A key-value bucket Agent - One websockex client with some processing of messages, storing results in (1) - Another websockex client with very little processing, also storing results in (1) - A diagnostic module that prints to the console occasionally, pulling state from (1). It mostly sleeps. - A continuously looping module/function that pulls state from (1), writes to (1) and sends some websocket messages out. As expected (1) and (5) are very busy. The application runs on a four logical core system but consistently uses only 25 percent of total CPU available spread across two cores/schedulers. Also, the CPU usage is strictly out of phase with each other. As the calls to the key-value Agent are synchronous I am not surprised if that it is a bottleneck, but I don’t understand why the application maxes out at precisely 25 percent of total CPU (i.e. one core’s worth) that is distributed across two cores in an exactly out of phase manner. Shouldn’t (5) run much hotter on average than (1)? Or am I not reading the relevant info from observer correctly? Are there other things I should be looking at? Any help most appreciated.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335573.50/warc/CC-MAIN-20221001070422-20221001100422-00279.warc.gz
CC-MAIN-2022-40
1,379
10
http://www.ajudaica.com/item/382_86/Standard+Tefillin+Peshutim+with+free+bag
code
Standard Tefillin Peshutim Sefaradi Yemenite version are mainly aimed at people on a tight budget. Although obviously Kosher, with the Parshiot written by a scribe, these Tefillin are made using several pieces of Tefillin that are glued together in order to form the inner compartments thereby relying on a number of leniences. These Tefillin Peshutim are Kosher at the most basic level and are also the guaranteed lowest price that you'll find on the web for such a set. Included with the Tefillin is a free, velvet Tefillin bag. Important to know: If you are right-handed you wear the Tefillin on the left arm whereas if you are left-handed you wear the Tefillin on the right arm.
s3://commoncrawl/crawl-data/CC-MAIN-2015-40/segments/1443737898933.47/warc/CC-MAIN-20151001221818-00119-ip-10-137-6-227.ec2.internal.warc.gz
CC-MAIN-2015-40
682
5
https://softwareengineering.stackexchange.com/questions/27909/how-do-you-decide-your-side-projects/27940
code
At any given time, I usually have a bunch of ideas for weekend/side projects that I can work on. The ideas can be generally be categorized into these: - Self Learning: Learning a new language/ technology/ framework - Work related: Learning/Doing something that would help you at work - Money: Projects that (you think) can make some money - Fun/Utility projects These are just the rough categories that I can think of and there can be more/other ways of classification. My question is based on your experience what should drive the decision of what kind of project to work on. What parameters apart from the type of project should impact this decision (time, effort, money...)
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947476374.40/warc/CC-MAIN-20240303111005-20240303141005-00616.warc.gz
CC-MAIN-2024-10
676
7
https://www.petoi.com/pages/faq
code
Where can I find instructions, manuals and documentation? Please check our documentation site. Where can I find more info about NyBoard? Please visit the NyBoard documentation page. What are the supporting modules? Bittle supports a few modules such as sound sensor, light sensor, touch sensor, camera module. You can connect common modules using the 2.54mm connectors on NyBoard V1. Although Nybble uses the same board NyBoard V1 as Bittle uses, there’s no easy way to mount the modules. What connection methods do Petoi robots support? - wired serial connection via USB programmer - bluetooth dongle - WiFi dongle Where can I find documentation for the intelligent camera module? Do your robots support voice-based input? If you equip them with a sound module, they can be programmed to do voice recognition and act on voice commands accordingly. What single board computers do your robots support? Our robot supports communication with another micro-controller/computer(such as Raspberry Pi, Nvidia Jetson Nano, micro:bit) through wired or wireless connections. The control structure of both the wired and wireless connections is based on serial UART. Bittle supports connecting to a Raspberry Pi 3A+/Zero directly. It will power the Pi and communicate with the Pi through the serial port. For other Pi models and MicroBit, they can be wired to the robot but have some geometric constraints. Jetson Nano is too big for the robots so only the wireless connection is recommended. What are the differences between your robots? Please check the robot comparison page. Do you provide warranty? Yes, please check the warranty policy .
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964361253.38/warc/CC-MAIN-20211202084644-20211202114644-00545.warc.gz
CC-MAIN-2021-49
1,633
23
http://forum.game-labs.net/profile/27957-schwabbel/
code
I think you were write the crafting needs a refactoring, but on my opinion this is the wrong direction. For people who want to sail a ship after a 3 clicks - therefore their is a shop ! The huge richness of details belonging to ship crafting was the charme of this game and makes it comfortable not only for doom- but also for anno-players. If you remove the intermediate materials there is no longer any challenge in managing the crafting and every 7-year-old midshipman could handle crafting a Victory. When I walk through the shipyard I could smell the teak planks and see the reflection of my petroleum lamp in the gold of the furnishings. I fear in the future I only smell the the plastic of my keypad and my mouse. A pity, just another software whith a bunch of missed chances. What will be next, a 'Kill-Button' which appears after 1 minute of NPC-battles to decrease the mouse-clicks at sea ?
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221216453.52/warc/CC-MAIN-20180820121228-20180820141228-00272.warc.gz
CC-MAIN-2018-34
900
7
https://answers.sap.com/questions/7302322/workload-analysis-java---error-loading-template-0t.html
code
I am currently trying to view out worload analysis data for our portal via WorkCentres and I am getting the following error: Error loading template 0TPL_0SMD_MPEH_WA_Q0002 Notification Number BRAIN 276 I have activated the BI content, but I am sure there is something to do with Bex that needs to be done. Does anyone have any ideas?
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104672585.89/warc/CC-MAIN-20220706121103-20220706151103-00521.warc.gz
CC-MAIN-2022-27
333
5
https://heasarc.gsfc.nasa.gov/docs/xmm/abc/node7.html
code
Throughout this Primer, data from the HEASARC archive are used to illustrate how to run tasks for each instrument on XMM-Newton; new users are encouraged to use these sample data, though in should be noted that any data from the relevant instrument will do. Information about the example datasets are in Table 5.1. |Instrument||Chapter (Command line, SAS GUI)||ObsID||Object| |EPIC (Imaging mode)||6, 7||0123700101||Lockman Hole| |EPIC-PN (Timing mode)||8, 9||0400550201||Cen X-3| |RGS||10, 11||0153950701||Mkn 421| |OM (Image mode)||12.2||0123700101||Lockman Hole| |OM (Fast mode)||12.3||0411081601||Mkn 421| |OM (Grism mode)||12.4||0125320801||BPM 16274| A number of SAS tasks, including those which rerun the pipeline, require an up-to-date list of calibration files (the CIF file) and extended Observation Data File (ODF) summary file. These are obtained by running the tasks cifbuild and odfingest, respectively. Because of these dependencies, it is strongly recommended that users run these tasks, whether they plan to rerun the pipeline or not. Since these tasks are very straightforward to run, we will just call them from the command line and save the SAS GUI for more interesting tasks. First, gunzip the all gzipped files in the ODF directory. If necessary, rename all files in the ODF directory to upper case. This can be done using the script provided by the NASA/GSFC XMM-Newton GOF. Many SAS tasks require calibration information from the Calibration Access Layer (CAL). Relevant files are accessed from the set of Current Calibration File (CCF) data using a CCF Index File (CIF). A CIF is included in the pipeline products (*CALIND*), but if the CCF has been updated it can be recreated by the user by simply typing The task cifdiff can be used to compare the new CIF with the old: If the CAL has changed, it is a good idea to repipeline the data using the new CIF. To help determine whether it is reasonable to repipeline the data, the CCF release notes should be examined (see §2.5). CCF files can be downloaded directly from the SOC website see (see §4.2). To use the updated CIF file in further processing, you will need to reset the environment variable SAS_CCF: The task odfingest extends the Observation Data File (ODF) summary file with data extracted from the instrument housekeeping data files and the calibration database. It is only necessary to run it once on any dataset, and will cause problems if it is run a second time. If for some reason odfingest must be rerun, you must first delete the earlier file it produced. This file largely follows the naming convention described in §3.3.3, but has SUM.SAS appended to it. After running odfingest, you will need to reset the environment variable SAS_ODF to its output file. To run odfingest and reset the environment variable, simply type: The user will likely find it useful to alias these environment variable resets in their login shell (.cshrc, .bashrc, etc.). The rest of this guide consists of step-by-step examples of how to reprocess and analyze data for the EPIC, RGS, and OM; the chapters for each instrument, and which way that SAS is used (on the command line or through a graphical user interface) are listed in Table 5.1. At the start of each chapter, it is assumed that the user has downloaded the data, initialized SAS, and set the environment variables, as listed in 4.3. It is also assumed that the CIF file is up-to-date, the *SUM.SAS file exists, and the appropriate environment variables were reset as needed. Many first time users will probably find the GUI more useful than the command line. To invoke it, simply type A window will appear with two panels. The upper one will contain task names, what group they belong to (such as utility, epic, timing, calibration, etc.) and a short description of each. The lower one will contain information about environment variables, and as tasks are invoked, feedback from the tasks. The interface is shown in Fig. 5.1. Remember that tasks place output files in whatever directory you happened to be in when the SAS GUI was called, so either open and close the GUI in the directory where you want the output or move the files to the directory they should be in.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100909.82/warc/CC-MAIN-20231209103523-20231209133523-00836.warc.gz
CC-MAIN-2023-50
4,205
38
http://www.pixelpoppers.com/2016/05/capsule-review-runner2.html
code
Friday, May 6, 2016 CAPSULE REVIEW: Runner2 Runner2: Future Legend of Rhythm Alien You can get Runner2 at http://www.runner2.com/ Runner2: Future Legend of Rhythm Alien is a rhythm platformer like its predecessor. Your character runs automatically, you avoid obstacles and collect gold by jumping, sliding, kicking or blocking at the right time, and your actions affect the music. It expands on the original in several ways - the game is much prettier and has a bunch of characters and skins to unlock, there are more levels and many of them have branching paths, and most importantly there are now optional mid-level checkpoints. This greatly mitigates the frustration of restarting a longer level because of a single mistake near the end, while still allowing players the option of the original hardcore challenge. There are a few misfires - for example, a new post-level "bonus chance" mechanic that makes pursuing 100% completion much more tedious than it needs to be - but overall it's a bigger and better BIT.TRIP RUNNER, and still a great way to zen out as long as your reflexes are up to it and you can groove on chiptunes.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123560.51/warc/CC-MAIN-20170423031203-00098-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,131
5
https://www.jointhe.space/jointhe-space-discord-is-going-live/
code
JoinThe.Space Discord is going live! We’re excited to kick off another initiative aimed at fostering international networking among space enthusiasts who share a passion for rockets, rovers, balloons, satellites and all things space tech. Introducing the first version of our dedicated Discord server for space industry enthusiasts. Our goal is to facilitate global communication without boundaries, offer a platform for discussing space tech, space-related contests, companies, job offers and opportunities all in one place. LINK (avaible till 19.09.2023) : https://discord.gg/X7xennPb This is just the MVP, so we’ll be continuously improving it. We invite you to share any suggestions for enhancements with us at [email protected] We believe that together, we can create an amazing space for international space integration. #SpaceCommunity #Networking #SpaceTech #JoinTheSpace #SpaceHub
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474676.26/warc/CC-MAIN-20240227121318-20240227151318-00058.warc.gz
CC-MAIN-2024-10
906
5
https://nels.dev/cv/
code
I am a PhD candidate at the VECG Group at University College London, where I do research on (outdoor) asymmetric collaborative mixed reality. I have a BSc and MSc in Computer Science and previously worked at IBM as a data scientist and at Microsoft Research and TNO Research as a research intern. My work has spanned various topics within the field of computer science, including human-computer interaction, computer-supported cooperative work, and generative artificial intelligence. However, my common thread has been to focus on building human-centered systems that are both effective and enjoyable to use. Ph.D. Computer Science M.Sc. Computer Science B.Sc. Computer Science - Conducted research within the EPIC group (Extended Perception, Interaction & Cognition) and HCAIX group (Human-Computer & Artificial Intelligence Experiences), under the mentorship of Bala Kumaravel, Nicolai Marquardt, and Andy Wilson. - Contributed to two co-first author papers; one presently under review and the other in preparation. - Worked on advanced systems driven by custom machine learning models, delivering direct business impact for enterprise clients. - Communicated analytical findings to diverse audiences, steering strategic decision-making for internal and external stakeholders. Cloud Solution Architect Intern (Data & AI) - Designed and engineered advanced data models and analytics solutions for global clients and internal Microsoft teams. - Proposed a data-centric methodology to enhance efficiency in data center construction process management. - Conducted research towards a novel approach to head-mounted display (HMD) removal within RGB-D images at the Intelligent Imaging group under the mentorship of Frank ter Haar. - Designed and evaluated a generative adversarial network (GAN) for the joint inpainting of RGB-D images. - Described the results in my master’s thesis as well as a paper presented during the VHCIE workshop at IEEE VR 2021.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511351.18/warc/CC-MAIN-20231004020329-20231004050329-00446.warc.gz
CC-MAIN-2023-40
1,954
15
https://www.online-medical-dictionary.org/definitions-d/dinoprost.html
code
F2 alpha, Prostaglandin Prosta-5,13-dien-1-oic acid, 9,11,15-trihydroxy-, (5Z,9alpha,11alpha,13E,15S)- Prostaglandin F2 alpha A naturally occurring prostaglandin that has oxytocic, luteolytic, and abortifacient activities. Due to its vasocontractile properties, the compound has a variety of other biological actions.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296950247.65/warc/CC-MAIN-20230401191131-20230401221131-00541.warc.gz
CC-MAIN-2023-14
317
4
https://www.zefrank.com/bulletin_new/showpost.php?s=85fdaaf4cc93fbb1597c062bd153d057&p=215647&postcount=6
code
Originally posted by rapscalious rob I had that happen when I first joined. It was always threads I had posted to. I got rid of them all and have never had that happen again. I think maybe it was once an option under “options” in the user cp - automatically subscribe to threads or something like that. Yeah, I have tried everything and it still happens....even to some threads that I haven't posted on... Be yourself, because the people that mind don't matter, and the people that matter don't mind.
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362992.98/warc/CC-MAIN-20211204124328-20211204154328-00020.warc.gz
CC-MAIN-2021-49
504
4
https://onedev.io/blogs/4
code
OneDev 10.3 is able to specify user id and group id when run docker container via steps. Before running the step, owner of the workspace will be changed to specified user and group. So this feature will not work if OneDev runs with rootless container runtime, or when docker user remap is enabled. Besides non-root support, markdown editor is also improved to be able to add/remove leading spaces of a code block by selecting them and press tab/shift-tab. This is convenient when indent a code block:
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712297292879.97/warc/CC-MAIN-20240425094819-20240425124819-00488.warc.gz
CC-MAIN-2024-18
500
3
http://advrider.com/forums/showpost.php?p=2368486&postcount=86
code
I am Sylvia, from the Netherlands. I check the ride reports here often, and post something now and then. I ride about 10 years, most of the time on a R1100GS. A couple of months after I bought a 1200GS: a car hit me, and I broke about all my bones. I am starting to get my life back now, and bought a Yamaha Tricker to get used to the traffic again (and be able to come to a standstill without falling, with my now very weak legs):
s3://commoncrawl/crawl-data/CC-MAIN-2015-27/segments/1435375091925.14/warc/CC-MAIN-20150627031811-00261-ip-10-179-60-89.ec2.internal.warc.gz
CC-MAIN-2015-27
431
5
http://developer.nokia.com/community/discussion/showthread.php/108978-Carbide-C-v1-2-Debug-does-extra-build
code
I'm working on a rather big project bld.inf with some 30 MMPs. After changing some code and rebuilding my Symbian component using CTRL+ALT+B I click the Debug button expecting the emulator to start instantly. Instead Carbide systematically wants to rebuild the whole project which takes at least 5 minutes on a very fast dual core machine. As a workaround I interrupt the build process kicked off after clicking the Debug button and then I click again the Debug button this time it launches the emulator without trying the rebuild the whole project. Also sometimes after a debug session it just can't build my component any more saying that the EXE is used by another process. To fix it I have to exit and restart Carbide. BTW, overall I'm very very happy with Carbide.C++ v1.2 so far. The code browsing notably is simply amazing it really makes a huge difference in productivity. I particularly appreciate things like Call Hierarchy and Type Hierarchy. Keep up the good work Carbide people! I'll be looking forward for a consolidated v1.3.
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609539230.18/warc/CC-MAIN-20140416005219-00353-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
1,040
5
https://blog.gerv.net/2009/09/checkin_permissions_for_commcentral/
code
Since we moved to Mercurial, those with checkin access have needed an extra permissions bit to check in to mozilla-central and its branch trees. This bit was the technical indication that people had been through the two-vouchers-and-SR process. Committers to comm-central, with the exception of those working on calendar, also had to go through the same process. However, until last night, this was not technically enforced – anyone with Hg access could check in to comm-central. It now is enforced. We think only one person who has committted to comm-central in the past six months does not have that bit, so this change should not affect most of you. But, if you are someone who has been working in comm-central and find yourself unable to check in this morning, let me know and we’ll sort something out. :-)
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475238.84/warc/CC-MAIN-20240301093751-20240301123751-00621.warc.gz
CC-MAIN-2024-10
814
3
https://trandingnews.space/how-to-get-a-data-science-job-decoded-in-8-simple-steps/
code
The promising career in the data science field has led to an increase in competition. With numerous candidates competing hard to get the role, the opportunities often land in the lap of the right skilled and experience holders with effective communication. All the prerequisites and the answer to how to get a data science job are in eight detailed steps below. 8 Steps to Get a Data Science Job Follow these eight steps to get your desired data science job: Step 1: Define Your Goal and Path Clearly identify your career goals in data science Clearly define your data science career goals based on tenure and expertise level. Consider becoming a data analyst with internships or entry-level positions for short-term goals. Medium-term goals involve becoming a subject matter expert and publishing research papers. Long-term goals may include becoming a top data scientist, collaborating with companies, starting a firm, and contributing to universities and journals. Research different data science roles and choose the one that aligns with your interests and skills Research various data science roles and select the one that aligns with your interests and skills. Options include becoming a Data Analyst, mastering Machine Learning, specializing in Natural Language Processing, working on Big Data Projects, or advancing in Deep Learning. Identify the skills and knowledge required for your desired role and create a learning plan Wondering about how to get into data science? Begin with creating a learning plan which includes joining a certification course, going through free lectures on YouTube, gaining information from books or working in coordination with other experts in the field. To further answer how to get data analyst job as a fresher or how to get a data science job, the following table presents the skills and knowledge required for various data science roles: |Data Analyst||Data manipulation and visualization, Excel, SQL, Data visualization libraries||Data cleaning, preprocessing, querying and visualization| |Machine Learning||Algorithms, hyperparameter tuning, model selection, evaluation metrics, TensorFlow, scikit-learn, PyTorch||Supervised and unsupervised learning, clustering, regression, classification, ensemble methods, deep learning architectures| |Natural Language Processing||NLP libraries, frameworks, spaCy, NLTK, transformers, classification, entity recognition, sentiment analysis, fine-tuning language models||Word embeddings, Recurrent and Convolutional Neural Networks (RNNs and CNNs), text preprocessing| |Big Data||Large-scale data processing, storage and processing in distributed environments||MapReduce, data partitioning, sharding| |Deep learning||Deep learning frameworks, deep neural networks, computer vision, NLP applications.||Neural network architectures, transfer learning, backpropagation, optimization algorithms.| Step 2: Master the Fundamentals Develop a strong foundation in statistics, mathematics, and programming languages such as Python or R - Statistics: Candidates figuring how to get a data science job should gain knowledge in descriptive and inferential statistics and probability. These are used for summarization, visualization, making inferences and hypothesis testing. Probability is used in Bayesian statistics and Monte Carlo simulations. - Mathematics: Learn about linear algebra and calculus focusing on linear regression, SVM or Support Vector Machines and PCA or Principal Component Analysis. In calculus, focus on gradients, optimization algorithms and partial derivatives. These are required for dimensionality reduction, matrix operations and gradient-based optimization. - Programming languages (Python or R): Learn about methods of data manipulation, working with data structures, control structures, functions, libraries and packages. These are used for cleaning and processing the data, repetitive tasks, and implementation of complete algorithms. Learn about data manipulation, visualization, and analysis techniques Wondering how to get data analyst job as a fresher or thinking about how to get into data science? Mastering the three techniques can be your solution: - Data manipulation: The candidates must learn SQL or structured Query Language and programming languages for data manipulation. They should be able to query, filter, join and aggregate data while filtering, grouping, merging and transforming it. - Data visualization: Begin with learning popular data visualization libraries, for instance, Plotly, ggplot2, Matplotlib or Seaborn. Work on storytelling skills, creating engaging content while making it simpler for the understandability of technical and non-technical audiences. - Data analysis: Master the statistical concepts for data interpretation and machine learning algorithms for analyzing the practical applications of data. Learn all the related techniques like hypothesis testing, clustering, NLP, regression analysis, and clustering. Understand key machine learning algorithms and concepts Machine Learning is the prime answer to how to get a data science job. To outshine in jobs, focus on supervised and unsupervised learning algorithms, decision trees and ensemble methods, neural networks and deep learning, model evaluation and selection, overfitting and regularization, hyperparameter tuning, feature selection of data and mode deployment and interpretability. Step 3: Gain Practical Experience Specifically, answering the query about how to become data analyst with no experience, here are the important points to consider: Work on real-world data science projects The projects allow for gaining practical applications and skills by dealing with messy datasets. You can build a portfolio demonstrating complex problem-solving and critical thinking skills gained from data science projects. Explore 50+ real world projects with our Blackbelt plus program! Apply for internships or freelance projects to gain hands-on experience. Internships provides certified proof to showcase your abilities and skills. It also sets your foot in the industry and helps you better understand the real world. Meeting with different experts and dealing with competitors and colleagues develops confidence. Step 4: Build a Strong Portfolio Showcase your data science projects, demonstrating your skills and problem-solving abilities This step helps in how to become a data scientist without a degree. The exhibition of projects, skills and problem-solving abilities through a portfolio proves your worth in front of the employer. It helps you outshine other individuals and displays your eagerness and activeness in the field. It speaks for your technical capabilities and to overcome the challenges. Develop a GitHub repository or personal website to display your work These contribute to your portfolio and indicate your independent ability for task completion. Besides exhibiting the skills, it also showcases your continuous learning and updated knowledge. It specifically speaks to your coding ability, algorithm implementation and management skills. Document your methodologies, results, and any insights gained from your projects Documenting in a clear and concise manner speaks for the ability to communicate your results, which is a highly significant aspect of the field of data science. The ability to communicate the same to a non-technical audience, along with the replicable nature of your results, demonstrates your conceptual clarity in the field. Check out our article on Data Scientist Resume Guide! Step 5: Networking and Building Connections Attend data science meetups, conferences, and industry events Besides contributing to networking opportunities, these are important to gain insights about current and future job prospects and new fields. Knowledge sharing in such events is helpful in attracting recruiters to make a lasting impression. The online engagement benefits in getting a data science job by letting you learn from your peers across the globe, seek advice on challenges, showcase your expertise and remain updated in the field. Connect with professionals in the field through LinkedIn and other networking platforms. The networking platforms allow you to exhibit your professional expertise. Your strong profile can be fit for any company, thus aiding you in landing a job. Different job opportunities are also available on these platforms. Learn, connect and thrive: Join our Analytics Vidhya community and find the best data professionals and enthusiasts. Step 6: Enhance Your Skill Set Stay updated with the latest advancements in data science The latest advancements are significant for continuous evolution and gaining a competitive edge in the crowd. It increases the candidate’s capability, accuracy and efficiency while improving problem-solving efficiency. It also boosts the ability of data-driven decision-making. Explore specialized areas such as natural language processing, computer vision, or deep learning The specialized areas allow for gaining expertise in specific niches. Besides gaining increased and efficient knowledge of the niche, it aids in solving complex problems concerning the same. For instance, NLP experts will specialize in chatbot development and sentiment analysis, but computer vision experts will focus on image segmentation. Consider pursuing advanced degrees or certifications if necessary The degrees and certifications lead to career advancement, provide in-depth knowledge, and prove the candidate’s dedication to learning and excelling in the field. The prime contribution of certificates and degrees is in promotions, increased application ability of knowledge and increment in salary. Step 7: Tailor Your Resume and Cover Letter Customize your resume to highlight relevant skills, experiences, and projects. A resume is the first introductory document that decides the opportunity to exhibit your true skills. Customizing it efficiently every time according to the job requirement increases the chances of gaining the opportunity. Write a compelling cover letter that showcases your passion and fit for the role Ensure the cover letter expresses your enthusiasm and accurate reason to apply for the job and efficiently explains why you are the most suitable for the role. Personalize the letter and illustrate your journey and learning for better interaction with every recruiter. Quantifying your achievements by including numbers and metrics. They catch attention and have a more lasting impact compared to qualitative words. Include keywords from the job description and highlight your ability to provide data-driven results. Exhibit your solution-oriented nature. Step 8: Ace the Interview Prepare for technical and behavioral interviews Ensure preparation for statistics, programming and machine learning with an emphasis on algorithms, key concepts and methodologies mentioned in the job description. Ace the behavioral part by clearly explaining your past experiences, teamwork capabilities and problem-solving approaches. Review common data science interview questions and practice solving them Practice for the interview by going through questions on data manipulation, analysis, model evaluation, metrics, techniques, tools and algorithms as well as behavioral questions. Demonstrate your problem-solving skills, ability to communicate complex ideas, and passion for data science Use your portfolio and projects to show your problem-solving skills. Communicate your achievements and your skills clearly and precisely. Exhibit a passion for data science by stating current updates, advancements and active engagement in projects outside the academic requirements. The data science job requires the right mix of education, skills and communication. Besides the requirement of soft skills, the aspirants in the field must focus on gaining hands-on experience and building a portfolio. It helps in the long run. The passion and curiosity of the candidates should be exhibited by remaining updated with advancements in the field. Frequently Asked Questions A. It is not hard to get a data science job in the presence of conceptual clarity, hands-on experience and practice and efficient representation of required skills. A. You need a Bachelor’s degree, technical skills like programming languages, and proficiency in machine learning and data analysis techniques to be a data scientist. Ensure gaining proper soft skills like problem-solving, critical thinking and team working abilities as well. A. Yes, freshers can get internships and entry-level positions in data science. These help in building the foundation for further advancements. A. You can get a data science job in India by gaining the right education and skills. Networking, internships, and online courses also play important roles in the journey.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100057.69/warc/CC-MAIN-20231129073519-20231129103519-00144.warc.gz
CC-MAIN-2023-50
12,816
75
http://www.copytechnet.com/forums/xerox/117884-xes-8830-a.html?s=d8163f54c469e35a417998f66beff793
code
This is an indicator of one of several possible causes. The "DDS Enabled" function is not checked. This is found in the printer setup area on the web interface for the controller. Different versions of controller firmware will have slightly different look and arrangement from one another, but look for the DDS Enabled check box. If it is unchecked, check the box, then select "Update Printer". There are two different models of scanner that were sold with the 8830. The older 7356 scanner will automatically be recognized by the 8830, and enable the Scan-to-net feature. However, if the newer Synergix scanner is installed, the controller will need the Scan-to-net feature installed on the controller. If you look at the web interface in the features section, you will see if this feature is installed and enabled. Try looking at the section which shows the features. It should show a line Scan-to-net feature. You should see the feature present and enabled. If this is not the case, it may be that the feature key will have to be reinstalled. It is unusual for this to happen on an HFT controller. On possibility is the battery on the controller main board is bad. When the battery fails, the controller can loose the feature key information.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917118552.28/warc/CC-MAIN-20170423031158-00017-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,244
5
https://rubysec.com/advisories/CVE-2021-41263/
code
CVSS v3.x: 6.2 (Medium) - >= 4.0.0 This vulnerability impacts any Rails applications using The issue has been patched in v4 of the rails_multisite gem. Note that this upgrade will invalidate all previous signed/encrypted cookies. The impact of this invalidation will vary based on the application architecture.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100484.76/warc/CC-MAIN-20231203030948-20231203060948-00755.warc.gz
CC-MAIN-2023-50
310
5
https://www.york.cuny.edu/it/service-delivery-unit/use-mail-merge-to-create-multiple-labels
code
When you run a mail merge, Word pulls names, addresses, and other information directly from your Excel spreadsheet into the email messages, labels, envelopes, or documents you’re creating. The merge runs more smoothly if all the information you want to include is ready—so, the first step is to make sure: The columns in your spreadsheet match the fields you want to use in your merge. For example, to address readers by their first name, make sure you have separate columns for first and last names. If you want to sort by city, be sure you have a separate City column. All the data you want to merge is in the spreadsheet. If you want to add more names or other information, it’s best to make those changes now—before you start the merge. Number formatting won’t change. If your spreadsheet includes dates, times, currency values, or postal codes that begin or end in 0, see Format mail merge numbers, dates, and other values. Make any changes or additions in your spreadsheet before you connect it to your mail merge document in Word. Tip If you’re setting up your Excel spreadsheet by importing information from a .csv or a .txt file, use the Text Import Wizard. For more information, see Format mail merge numbers, dates, and other values. When the data’s ready, start the mail merge In Word, open a new document. Click Mailings > Start Mail Merge, and then click the kind of merge you want to run. Click Select Recipients > Use Existing List. Browse to your Excel spreadsheet, and then click Open. If Word prompts you, select Sheet1$ and click OK. Now the Excel spreadsheet’s connected to the mail merge document you’re creating in Word. To include only some of the people or items from your spreadsheet, click Mailings > Edit Recipient List. The Mail Merge Recipients box opens. Here, you can select just the rows you want to include. To make them easier to find, you can sort and filter the information. For more information about sorting and filtering items, see Sort and filter the data for a mail merge. Next, you can insert mail merge fields that pull the information from your spreadsheet into your document. For example, to add a greeting line to an email message or a letter, click Mailings > Greeting Line. Or add addresses from your list by clicking Mailings > Address Block. For more information about adding fields from your spreadsheet, see Insert mail merge fields. When your document’s ready, click Preview Results and click the arrows to see each specific copy of the document. To finish the merge, click Finish & Merge, and then click Print Documents (If you are ready to print you labels locally ) or Send E-mail Messages (if you want to email it to the Print Shop). If you are using OWA you will need to safe the file and attach it from you email For more information about setting up email message options, see Email merge in Word. Save your mail merge file for next time When you save the mail merge document, it stays connected to your mailing list. To use the mail merge document again, open it and click Yes when Word prompts you to keep that connection. Then, if you want to change which people or items you include in the merge, click Edit Recipient List to sort, filter, and select them. For more information about sorting and filtering a mailing list, see Sort and filter the data for a mail merge.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030333541.98/warc/CC-MAIN-20220924213650-20220925003650-00660.warc.gz
CC-MAIN-2022-40
3,353
25
https://apkpure.com/pugs-in-space-demo-3d-platform/com.bellabooprod.pugsinspacedemo
code
Early 3d demo -Jungle level prototype -Collect 100 coins while avoiding traps -Jump, Dash, Double jump through the level of 3d platforms. We have a lot planned for this game, would love your feedback. Most of the content at this point is place holder. We have some content generation system in the works that will allow use to explore the galaxy and play levels on fully generated worlds. This is a short demo of what it might play like on the phone. Touch controls and gamepad are supported.
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221217951.76/warc/CC-MAIN-20180821034002-20180821054002-00204.warc.gz
CC-MAIN-2018-34
492
3
https://gcmd.gsfc.nasa.gov/KeywordSearch/Keywords.do?KeywordPath=%5BKeyword%3D%27NINO3%27%5D&Portal=GCMD&MetadataType=0
code
This collection consists of climate change indices including Southern Oscillation Index (SOI), North Atlantic Oscillation (NAO), sea level pressure anomalies (SLP), sea surface temperature (SST) anomalies, ... "Forecast sea surface temperature fields are produced on a monthly basis using the Zebiak and Cane (1987) coupled atmosphere-ocean At present, two forecast products are available: The standard, ...
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145533.1/warc/CC-MAIN-20200221142006-20200221172006-00175.warc.gz
CC-MAIN-2020-10
407
6
https://www.telerik.com/blogs/tag/html5?page=6
code
Support & Learning Application Development and Deployment Data Connectivity and Integration Web Content Management Get A Free Trial close mobile menu Testing & ALM Top 10 Moments from BUILD Day 1 Keynote When a keynote is being streamed live to the interwebs, there's really little point in live blogging. Back when I first started Telerik Watch, live streaming events were very rare, so live blogs made more sense. That said, if you're like me, sometimes you don't have time to suffer through a 90 minute event just to catch the few bits of interesting news. What you really want is a summary that tells you everything you need to know to capture the overall jist and important news in a few short minutes. Thus, this post. Rather than bring you blow-by-blow typed updates as the... September 13, 2011 The Impact of Windows 8 (This article is a re-post from the Telerik Watch blog by Todd Anglin) By now, you've no doubt seen the first preview of Microsoft's follow-up to the hit Windows 7 release (if not, take five minutes and check-out the video on YouTube - don't worry, it's "official" and not a leak). Windows 8 finally has a name and a face, and we finally have a (public) glimpse of where Microsoft is driving the modern OS experience. The preview does not dive deep or provide the full story for Windows 8 (expect more details as Microsoft marches towards the September Windows 8 "BUILD" conference), but it does highlight... June 16, 2011 Silverlight vs HTML5 - WTF? It has been a wild weekend for sure. A slew of important announcements at PDC, sudden withdrawal of all Silverlight sessions, Bob Muglia’s statement about Microsoft’s change in plans, the uptake from journalists, the community uproar... A comedy of errors was unfolding in the technology space while I was happily spending my weekend enjoying my kid’s birthday and not thinking about dev platforms. So, I come in the office today and my inbox is blinking like crazy, mails from a ton of people from inside the company and out and the common question is – what are you/we doing with Silverlight?... November 03, 2010 Free JustCode, JustMock licenses tomorrow [Cross-posted from TelerikWatch.com] Sometimes people use the saying “Everyone’s a winner,” when in fact everyone is not a winner. If you join us tomorrow for the JustCode, JustMock and OpenAccess ORM webinar, though, you will be a winner! Everyone is truly a winner tomorrow because everyone that attends the Q2 2010 What’s New webinar will get free licenses for both JustCode and JustMock, Telerik’s powerful Visual Studio productivity tools. That’s $500 worth of software just for attending the live webinar event! To get your complimentary licenses, register now for the webinar, and then join us tomorrow, July 22nd at 11:00 AM Eastern. You must attend the... July 21, 2010 Working with OpenAccess in Visual Studio 2010 Beta 2 If you’re like me, the end of the year represents a time when most other projects are starting to wind down and you finally have a chance to get back to testing some of those “fun” Microsoft betas. Visual Studio 2010 Beta 2 is probably at the top of the stack. Microsoft’s next major update to the flagship IDE is getting very close to RTM, so now is a great time to start checking-out the tool. What you should be pleased to know is that almost all of Telerik’s developer tools already offer a lot of support for VS 2010- even... December 15, 2009 Testing & ALM Latest updates in your inbox Angular 5 is Here! November 06, 2017 October 30, 2017 Telerik Platform Webinar Recap—Modernizing One Hybrid App at a Time October 27, 2017
s3://commoncrawl/crawl-data/CC-MAIN-2017-47/segments/1510934806124.52/warc/CC-MAIN-20171120183849-20171120203849-00553.warc.gz
CC-MAIN-2017-47
3,630
29
https://discourse.threejs.org/t/postprocessing-adds-a-lot-of-pixelation/55813
code
I am trying to optimize the visual appearance of my scene and faced another interesting effect of post processing, for some reason OutputPass makes my GLTF very pixelated as shown below. I use 3 post-processing passes in the following order: RenderPass → SSAA → OutputPass. Default config is: SSAA.level = 3; renderPass.enabled = false; To optimize performance on slower devices I analyze FPS and either reduce SSAA level up to level 1 or disable SSAA as following: As you can see OutputPass remains enabled and it results into pixelation. For some reason, when I disable OutputPass the lighting changes (worsens) and the level of pixelation visibly lowers. Please see below: Output pass enabled: Output pass disabled: It seems it is visible only on a very small objects, like watch hands that are less than 1 mm thick. We have discussed OutputPass with @Mugen87 in one of our previous conversations and in the fiddle we used this effect is almost invisible: Edit fiddle - JSFiddle - Code Playground. But with the right level of zoom and proper angle you can find the difference as shown below. Pay attention to the area around the mouse cursor. Could you please suggest what can cause this effect and how to fix it? @user123 just count a number of animationLoop executions against some predefined time, for example, 1 second to get frames per second count. Define your thresholds and it FPS drops below the threshold then do ssaa.level -= 1; or ssaa.enabled = false;. I hope it helps. This code is actually obsolete. WebGLMultisampleRenderTarget has been removed, the render target should be of type half float and the color space should be linear-srgb. Ideally users do not pass in custom render targets to the composer since they are often not configured correctly. I’ll have a closer look at the new fiddle in the next days. @new I can reproduce the white pixels but interestingly only in Chrome and Safari. Not in Firefox. Can you please make a test with Firefox as well? Besides, make sure you test on macOS if possible. There could be an issue in ANGLE and afaik Firefox uses this component on Windows. BTW: This issue is not exclusive to OutputPass. Any RTT setup produces these white pixels (even a simple copy pass). @Mugen87 you are right, it works well on Firefox MacOS. However, the issue can be reproduced on Safari and Chrome on MacOS, also Chrome Android and iOS, and Safari iOS. @Umbawa_Sarosong thanks. I played with camera near value and in my case decreasing it further actually worsens the issue. Decreasing it down to 0.0001 makes the issue 10x stronger. Also, when I use SSAA issue disappears, but my intention is not to use any antialiasing on mobile devices while maintaining proper colors with OutputPass. Could you please suggest how good is TRAAEffect’s performance? Would it work on mobile without draining the battery? After playing with this thing for a while I realized that it is not only post-processing that is affected by the issue, it just makes it worse, but the issue itself if present always and highly depend on the camera near value. If we set it low enough, everything becomes super ugly as can be seen here: Edit fiddle - JSFiddle - Code Playground
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473558.16/warc/CC-MAIN-20240221202132-20240221232132-00713.warc.gz
CC-MAIN-2024-10
3,200
20
https://www.uaebirding.com/forum/uae-general-birding/arabian-green-bee-eater
code
Recently I found out that the Green Bee-eaters found in this part of the world are subspecies named Arabian Green Bee-eater. Yet there are 2 types was found when i checked online. Merops cyanophrys and Merops muscatensis. So which one of these types are correct in UAE? or do we have both here?
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474661.10/warc/CC-MAIN-20240226162136-20240226192136-00485.warc.gz
CC-MAIN-2024-10
294
2
https://www.catswhocode.com/blog/introducing-catswhocode-code-snippet-library
code
A code snippet library on CWC? Over the years, CatsWhoCode has become a place of interest for web developers. Most popular articles on the blog are those who showcase useful code snippets which can be used directly on your projects. This is why I decided to go further in that direction, and create a place where people can easily find useful code snippets. I have added some snippets but for now the whole library looks a bit empty. Don’t worry, I add snippets everyday so it will not take very long until we have a consistent collection of code snippets! Submit your own snippets CWC code library allows developers to submit their own code snippets so they can share them with other developers. When submitting a code snippet, you are able to link to your own website so you’ll get (hopefully) a few visits to your website. The link is dofollow, so submitting quality snippets is also good for your SEO. All submission will be manually approved or declined, to ensure the quality of the library. I rather focus on quality than quantity. Want to submit a cool code snippet? Go here!
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376827281.64/warc/CC-MAIN-20181216051636-20181216073636-00403.warc.gz
CC-MAIN-2018-51
1,087
6
http://www.obiba.org/?q=node/75
code
Software solutions for epidemiological data management and analysis OBiBa applications are fully interoperable and offer a comprehensive and integrated software solution for both individual studies and networks of studies that aims to build a federated database infrastructure.Learn more This release fixes bugs, security updates and includes several new featuresDetails This release offers a complete rework of the web user interface.Details This release fixes bugs for longitudinal studies.Details This release includes Python client, Geospatial data types and Public datasources.Details A complete list of releases and events can be found here.
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400372542.20/warc/CC-MAIN-20141119123252-00200-ip-10-235-23-156.ec2.internal.warc.gz
CC-MAIN-2014-49
647
7
https://allureartlife.com/2019/04/06/apr-6th/
code
Soccer Game (Saw NYCFC play in Yankee’s Stadium) Met up with my friends Jon. (Awesome guy, good friend) Met new people. Hung out with famous people. We were so amazed. Had a good talk. I went to an art expo. (so so so creative and wild) Long train ride. All in all, I got my fitbit steps in, and Oh yes, I have over 1 millions steps clocked in from last year January. My feet have been busy.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224647810.28/warc/CC-MAIN-20230601110845-20230601140845-00770.warc.gz
CC-MAIN-2023-23
393
9
https://spjsblog.com/forums/topic/dffs-installer-2-0-error-with-external-js-file/
code
The new DFFS Installer 2.0 is throwing the error shown in the attachment when loading an Edit form that loads an external JS file in the Custom JS section. This occurs on two different lists, each loading the same external JS file (from a _scripts folder), but using different Custom JS. I’ve modified the DFFS_frontend_CEWP.html file per the error message but get same error. Reinstalling Installer 126.96.36.199 eliminates the error when the Edit form loads (thankfully). While inspecting the lists I’ve successfully moved to DFFS Installer 188.8.131.52 (they don’t call an external JS) I noticed that the top web part for the form loads DFFS_loader_overlay.html and the bottom web part loads DFFS_loader_v2.html. Is that to be expected?
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510603.89/warc/CC-MAIN-20230930050118-20230930080118-00889.warc.gz
CC-MAIN-2023-40
745
2
https://www.thestudentroom.co.uk/showthread.php?t=4031337
code
I've applied to 3 degrees at the University of Dundee, however I'm having a hard time between picking between the 3. If anyone is familiar with these degrees, can you give me your input? The degrees are: - Business Management (Accounting and Finance) - International Business and Finance And actually passed?
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948597295.74/warc/CC-MAIN-20171217171653-20171217193653-00319.warc.gz
CC-MAIN-2017-51
308
5
http://ioarvanit.gr/en/archives/3395
code
There are many introductory educational robotics activities for Lego platforms that deal with the basic capabilities of a robot, namely to move using motors and perceive something from its environment using sensors. They usually involve building a simple model using ready-made instructions and creating a simple program that is tested for effectiveness. In this case, the inspiration for the story of the activity comes from Graeme Faulkner. Aliens have descended on our city and we are asked to build a robot that will visit them and greet them so that we can understand their moods. Our main goal is to program a robot to move certain distances and then change the program to use the distance sensor (ultrasonic) to stop in front of obstacles. I have implemented this specific activity several times with variations and different platforms (Lego NXT, Lego Wedo and Wedo2, Lego EV3, Lego Spike Prime). The following description is based on Lego Spike Prime. We give each group the following worksheet without any introduction and ask the children to read the first paragraph. We can be a bit conspiratorial for a while and argue that aliens really have come and the Mayor not knowing where to turn has come to us who know about robotics. The main activity consists of four steps. In the first two students build the robots and alien models which can be done in parallel within each group. - In the first step, students build alien models from paper, cups, etc. - In the second step, students build the robotic model. We want something fairly simple that can move and have the ability to add the distance sensor. One such case is the Basic driving base 2 from the Lego Spike Prime platform. - In the third step, we ask the student teams to program the robot so that it can approach the alien (we don’t use any sensors yet) and smile (with the screen) showing a welcome message. We do not give many instructions and ask the children to experiment with the movement commands that the platform has. Some activate the motors for a specific time, while some also calculate the centimeters. Each team has rulers at its disposal to measure the distance between the robot’s initial position and the alien’s position. - In the fourth step, we remove the fixed position of the alien on the track and inform the teams that the aliens will change position every time they run the program (we will place them wherever we want). So they will need to follow the vague instructions on the worksheet to find a solution.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817650.14/warc/CC-MAIN-20240420122043-20240420152043-00312.warc.gz
CC-MAIN-2024-18
2,509
9
http://www.coderanch.com/t/602216/java/java/IO
code
1. Both your print statements just print a new line. Neither of them print anything else - I assume either the number or a message is supposed to be written? 2. You ought to close your PrintStreams. That's probably not the cause, but in some cases the stuff you print might be "buffered", and never get written if you never close the stream. It could lead to other problems as well. If you're using Java 7 the easiest way is to use a try-with-resources statement, which can automatically close resources for you. If you aren't, you should create the streams in a try block, and close them in a finally block. (If you haven't come across these, http://docs.oracle.com/javase/tutorial/essential/exceptions/tryResourceClose.html is probably a good starting point).
s3://commoncrawl/crawl-data/CC-MAIN-2015-48/segments/1448398445142.9/warc/CC-MAIN-20151124205405-00253-ip-10-71-132-137.ec2.internal.warc.gz
CC-MAIN-2015-48
761
2
http://www.simplyhired.com/a/jobs/list/q-weblogic+developer/fdb-30
code
Senior Java/J2EE Developer - US Citizenship Required Excalibur Solutions LLC - Washington, DC Senior Java Developer with strong technical leadership skills will develop J2EE application in the following technology environment:.... Pega Integration & Support Developer Vega Consulting Solutions, Inc - Reston, VA Pega Integration & Support Developer. Extensive experience with J2EE application servers (WebSphere, WebLogic, Jboss, etc.).... Software Engineer Intern Harris Corporation - Melbourne, FL Experience with Oracle WebLogic, HTML5, CSS 3, GIT, Visual Studio, Eclipse, SQL Developer. Troubleshoot applications developed in-house and by external... FPT Software - El Segundo, CA Application servers (JBOSS, WebLogic, Tomcat). Providing developer support for production applications. A Software Developer will be responsible for developing... Verizon - Irvine, CA RESTful API coding and concepts Experience with cloud-based software architectures Experience with JSON, REST, HTML5, Gradle, Git, Eclipse, Weblogic Desired... Collabera - Richmond, VA Must have experience with Tomcat / Weblogic. Must have experience with Core Java / J2EE application and development skill.... Java/Oracle - Application Development PF1 Professional Services - Clearwater, FL The JAVA Developer will serve as a a technical lead resource for the application development team. JAVA Application Developer will provide technical leadership... Senior Applications Developer AT&T - Atlanta, GA Overall Purpose: Able to build highly scalable, mobile first and best-in class Consumer and Business portal platforms using Java and emerging open source Netrist - Chantilly, VA You’re the type of developer that:. Experience in Weblogic and/or Websphere Application Server. Since the project is just getting started we need strong... Kemtah - Las Vegas, NV Patching WebLogic experience. PeopleSoft 9.2 Developer that has experience supporting a Peoplesoft Human Capital Management (HCM) installation in an enterprise...
s3://commoncrawl/crawl-data/CC-MAIN-2016-44/segments/1476988719286.6/warc/CC-MAIN-20161020183839-00395-ip-10-171-6-4.ec2.internal.warc.gz
CC-MAIN-2016-44
1,994
25
https://chaslinux.com/category/computer-recycling/
code
A mix of extra software designed to make transitioning to Linux easier The Computer Recycling Project at The Working Centre has been installing Linux on computers as far back as late 2001…. Category: Computer Recycling Posts that are mostly about the Computer Recycling project at The Working Centre: https://www.theworkingcentre.org/cr/ Sometimes a newer computer isn’t better Most of the time a newer computer *is* better Conventional wisdom dictates the newer a computer is, the better the computer is. This bit of advice generally holds true comparing an earlier… Hardware detection script for *buntu Linux refurbishers About the script I wrote the hardware.sh BASH script to make it a bit simpler for volunteers at The Working Centre’s Computer Recycling Project to figure out what hardware was in a…
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945279.63/warc/CC-MAIN-20230324082226-20230324112226-00399.warc.gz
CC-MAIN-2023-14
815
7
https://blog.packagecloud.io/resources/package-management-for-centos-packages-with-jcenter
code
CentOS Linux is a free and open source operating system that is functionally compatible with its upstream source, Red Hat Enterprise Linux (RHEL). CentOS conforms fully with the upstream vendor's redistribution policy and aims to be 100% binary compatible. It aims to provide enterprise-class capabilities on community-supported infrastructure. Jcenter is the new one-stop resource for third party open source components, libraries, and frameworks. It is an Open Source software index established by Baidu's J-Team to help software developers find what they need. It is an open-source search engine that has many advantages over other popular search engines. Jcenter was created by Java fans for Java fans, with pure Java code and can be used for any purpose without proprietary restrictions. Using the pure search algorithm the index can be distributed. Finally, our powerful technology allows you to find what you are looking for faster than ever! Mar 14, 2017 This post guides you through how to inspect and extract JAR files from the co... Sep 18, 2021 This article explains about RPM and how you can use it. Also, you can find th... Dec 14, 2015 Check this article to learn how RubyGem index and metadata work internally. Packagecloud manages millions of packages for companies like...
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103646990.40/warc/CC-MAIN-20220630001553-20220630031553-00270.warc.gz
CC-MAIN-2022-27
1,290
9
http://ladymoiraine.com/forum/index.php?topic=651.0
code
I thought I had done this for Mass Effect but I guess not, I know I have one for Dragon Age and Fallout. Okidoki. First of all, you need to get the .ini file set up to use the console, this is from the wiki:http://masseffect.wikia.com/wiki/PC_Cheats Backup Your ProfileUsing the cheat codes mentioned on this article may alter your profile permanently, and tag it as invalid. Therefore, it is recommended to backup your entire profile for the option to revert back later on. On Windows XP/2000: X:\Documents and Settings\[username]\My Documents\BioWare\Mass Effect On Windows Vista/7: X:\Users\[username]\Documents\BioWare\Mass Effect Note: replace X with the drive letter where your Windows system is installed on, and replace [username] to the user that you are logging into the system with.) Enabling The ConsoleTo enable the console, browse to and open the file Mass Effect\Config\BioInput.ini (the full location is mentioned above) in any text editor (Notepad, for example), but not with rich text editor (Microsoft Word, OpenOffice Write, WritePad, and the likes). In the file you opened, search for [Engine.Console], and add the line ConsoleKey=Tilde just under it. By default the [Engine.Console] section will contain: HistoryBot=-1ConsoleKey=Tilde The code addition is marked as colored text Note that some keyboard layouts, specifically on non-US English layouts, the Tilde key will map differently, and the game engine will not recognize the Tilde keyword. In this case, you will need to select a different key, such as Tab, CapsLock, or any other to function as the console key. Ok, these are the codes I use when I start a new career: givexp 400000 = level 56 but this can vary. I always save first, then experiment with the amount of 0's, don't use over 5!! It's really overkill, even for me. I used to use giveallxmods but I don't use that anymore, it's ALL the upgrades and you'll go way over your inventory and it's more fun finding the upgrades, so I don't use that one anymore. Also, I have discovered givebonustalent and this is my new most favorite command! I love playing as an adept BUT I also like the soldier. By using givebonustalent, you can start out as a soldier and add the tech and biotic skills! I have to check in game how many you can safely add because you'll run out of room on the hud and then not be able to use the talent, so there is a limit. I'll post a screenshot of my newest one with the talents I added. She's working out nicely! To use that code, there are numbers that correspond to the talents, so to give the Throw talent you would type givebonustalent 49 Here are the talent codes:Adding Additional Talents In the console, type "GiveBonusTalent X", replacing X with one of the numbers below. 7 Assault Rifles 21 Sniper Rifles 98 First Aid I happen to have a lot of adepts so now I can add the shotguns, sniper rifles and some of the electronics, it all works out really great! So, I hope that can get you all started on your cheating ways!
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645257063.58/warc/CC-MAIN-20150827031417-00085-ip-10-171-96-226.ec2.internal.warc.gz
CC-MAIN-2015-35
2,990
22
https://www.techgig.com/question/26246/i-ve-bca-2010-i-ve-60-i-ve-specialization-java-j2ee-oracle-development-using-sql-pl-sql-how-i-get-opening
code
Hi.... I've done BCA in 2010, as well as I've although 60% marks. Apart from that I've done specialization on JAVA, J2EE and oracle development using SQL and PL/SQL. Can you suggest me how can I get an opening as fresher??? Need ur suggestions..... why ru learning data bases and programming languages i am not able to understand You Better try some local companies. get at least 6 month experience. This will create ur platform. if u will have to compromise with salary then dont mind. becoz the start im importabt
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948517350.12/warc/CC-MAIN-20171212153808-20171212173808-00481.warc.gz
CC-MAIN-2017-51
515
4
https://howtowriteaprogram.blogspot.com/2010/08/unit-tests.html
code
A program that has not been tested does not work. The ideal of designing and/or verifying a program so that it works the first time is unattainable for all but the most trivial programs. We should strive toward that ideal, but we should not be fooled into thinking that testing is easy. […] Test strategies should be generated as part of the design and implementation efforts or at least should be developed in parallel with them. As soon as there is a running system, testing should begin. Postponing serious testing until “after the implementation is complete” is a prescription for slipped schedules and/or flawed releases. The C++ Programming Language, Bjarne Stroustrup Like many people I've found unit testing to be a useful technique for raising the quality of the code I work on. What I learned when I started using unit tests was that they are not just a means to expose bugs - they have a wider positive influence on the code. More anon. Say I need to extract the CPU clock speed from the processor name embedded in the chip. So I want something like this to return the value 1700 (meaning 1700MHz). So I code this function and then I think about how to test it. To test this function I might want something like this This line would most likely be in a function called from main() in a standalone unit test program. When the program finishes it says something like “tests executed 1, tests failed 0". If the function doesn’t produce the expected value the unit test app tells me there has been a failure and gives the module name, line number, the expected value and the actual value. Some people use unit test frameworks, of which there are many available. I tend to use just a couple of simple macros such as the TEST_EQUAL shown here. Obviously one doesn’t stop there. I add as many real-world examples of valid embedded processor strings as I can get my hands on, and I try to test all the edge cases I can think of You get to decide whether 12..34MHz is a real speed or not (e.g. you could argue it represents junk followed by 34 MHz). Or you may have a specification that decides this for you. But unless this is safety critical code I wouldn't spend too much time worrying about it. Often we just need a reasonably correct result and robust code that won't bomb out when given an unexpected input (cf. Robustness principle). It's very unlikely any processor manufacturer is going to embed garbage like 12..34MHz in their chip, but if they do you know your code will do something reasonable. But the point is, thinking up crazy unit test cases gives you a moment to consider what you are doing. I try to think about the code in two different ways: I’m a ‘customer’ of the code – testing the interface – how would I like it to behave? But I also know the code, so I can try to exercise as many code paths as I can. Kevlin Henney suggests you name unit tests using propositions; not test_all_men_are_created_equal. (I don't always remember to do this.) Some people say you are not the best person to test your own code because you will hold back in some way, deliberately not trying hard to break it. I don't recognise that mindset; I'd much prefer to break my own code in a unit test and quietly understand, fix and learn from the failure than have the code break more publicly, with who knows what consequences. Of course, it may not be a deliberate holding back, it may just be some blind spot that stops you creating a body of tests that compose an adequate coverage of the code. This may be where writing at least some of the tests before the implementation may help. It’s not appropriate for this extract_mhz() function, but sometimes I’ve been able to exhaustively test a function (or class) by iterating over the entire range of possible inputs and expected outputs. For example, I have code that converts a UCS-2 character (16-bit value) to the equivalent UTF-8 string (1, 2 or 3 bytes long), and another that converts a UTF-8 string to a UCS-2 character. So it is possible with a simple for loop to convert 65,536 possible UCS-2 input values to UTF-8 and then back again and test we have the same value we started with. (Clearly this must be combined with other tests as it doesn't say anything about whether the intermediate UTF-8 is correct.) Sometimes I use files of sample real-world data. For example, Windows executables from which the embedded file version information is extracted. The unit test suite may include files that have caused specific problems in the field. Once a bug is fixed and the file that exposed the bug is included in the unit tests I know that bug will never again resurface without me knowing. Unit tests are not always the appropriate way to test code, but I’ve found them useful even when at first sight I didn’t think they applied. For example, I have some code to identify the Windows operating system. (Sadly, this is much trickier than you might hope.) This code calls various Microsoft APIs and, of course, is always going to give just one answer, according to the version of Windows it is currently running on. So how can it be unit tested? Maybe it's not worth the effort. And so I thought. However, perhaps because of the arcane nature of the APIs, the code was not always giving the right answer; perhaps it would report Windows 2003 Advanced Server when it should have reported Windows Server 2003 Enterprise Edition, or whatever. So I tried a bit harder to write unit tests for this code. I divided the code into the part that gets the raw data from the various Windows APIs from the part that interprets this raw data. This separation allows me to (a) obtain the raw data from many different flavours of Windows independently of the unit test suite, and then (b) unit test the interpretation part by playing in the different sets of raw data and testing that the results are as expected. So the unit test doesn’t test the entire module, but at least it tests the more complex interpretation part. The good effects It’s tedious and unreliable to do much testing by hand; proper testing involves lots of tests, lots of inputs, and lots of comparisons of outputs. Testing should therefore be done by programs, which don’t get tired or careless. It’s worth taking the time to write a script or trivial program that encapsulates all the tests, so a complete test suite can be run by (literally or figuratively) pushing a single button. The easier a test suite is to run, the more often you’ll run it and the less likely you’ll skip it when time is short. The Practice of Programming, Kernighan & Pike Unit tests will not bring to light all the defects in a piece of code, but they do have some advantages over other techniques (such as code inspections): Regression testing: unit tests are repeatable at zero cost. This means that if you change the code and break something you get to know about it there and then. This in turn gives you confidence when working on the code. Documentation: unit tests document the code, showing how you expected the code under test would be called. Pause for thought: the process of creating unit tests forces me to put the implementation details to one side for a moment and think clearly about the interface to the code; is my interface simple to use? What do I want it to do when it gets given invalid inputs? Encourage good code structure: if the code is going to be capable of being driven by a unit test it is going to have to be parameterisable. I’ve found code designed to be unit tested is often easier to reuse in new situations. Framework for debugging: When something goes wrong at a remote customer site you may be able to take a file or snippet of log data from them, create a new unit test from it and reproduce the problem. A few final thoughts The English Positivist philosophers Locke, Berkeley, and Hume said that anything that can’t be measured doesn’t exist. When it comes to code, I agree with them completely. Software features that can’t be demonstrated by automated tests simply don’t exist. I am good at fooling myself into believing that what I wrote is what I meant. I am also good at fooling myself into believing that what I meant is what I should have meant. So I don’t trust anything I write until I have tests for it. The tests give me a chance to think about what I want independent of how it will be implemented. Then the tests tell me if I implemented what I thought I implemented. Extreme Programming Explained, Kent Beck I consider myself a careful programmer but, like every other human being, I sometimes make mistakes and when I write some code that I believe to be correct, then write some unit tests, I often find at least one bug. In the book Test-Driven Development Kent Beck suggests that you write the unit test first and see it fail, then you write the code to make the test pass as simply as possible, then you refactor the code if necessary. In the book Code Complete Steve McConnell says that unit testing will typically only find about 25% of the defects in a given piece of code, compared with code inspections which may detect 60%. He recommends combining two or more quality improving techniques together. Finally, here is a complete unit test program for a simple The problem is simple: Art is never defect-free. Things that are remarkable never meet spec because that would make them standardized, not worth talking about. Linchpin, Seth Godin Post a Comment
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943845.78/warc/CC-MAIN-20230322145537-20230322175537-00315.warc.gz
CC-MAIN-2023-14
9,466
40
https://www.experts-exchange.com/questions/26894814/Activesync-on-Exchange-2003.html
code
I have installed Activesync 6.5 a long time ago. Mobile Admin gives me only two options block | delete. But I would like to wipe remotely. Why I don't have remote wipe option? Is the block option same as remote wipe? I also want to create Policy for activesync users. Is there any article to do that step by step? When I push out remote wipe, it will forcely do it without a notification. Thanks in advance
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221213691.59/warc/CC-MAIN-20180818154147-20180818174147-00227.warc.gz
CC-MAIN-2018-34
406
3
https://webdesignfacts.net/en/entry/404error-template-2/
code
We introduced a template that utilizes CSS animations from 403 errors and 404 error pages (mainly 403 errors). There are a lot of access comparatively in this site, and it is a lot of content that there are a lot of people who are anxious. So this time, I will introduce the CSS animation template that was the main 404 error page in the thing of the second bullet. It is often detached by the error page, but it may lead to the improvement rate of the site by devising the error page a little. If you are building a site by all means, why not try to refer to. - The error page where the count of the number goes up fast from 0 and stops at 404 is beautiful. - Mac Crash Image Wind 404 Error Page HTML/CSS Template - Animated HTML/CSS template where the train that says 404 error keeps running on the track - 404 error page HTML/CSS template for light brighter or darker - Animated HTML/CSS template where 0 parts of 404 errors can be swayed in a cage - AliensMonster?Handwritten wind 404 error page HTML/CSS template that works - 3D wind 404 error page HTML/CSS template made only with CSS - Animation 404 error page in the background 404 flows in pieces - 404 error page template with js code - Ingenious and cute 404 error page template - Animated CSS template with 404 characters and ship objects swaying in waves - CSS Animation 404 Error Page Where Astronauts Float in Space - Animated CSS template with 404 characters moving - Animated CSS template with 404 errors spinning in 3D - Animated CSS template that moves around in 404 characters with color - Animation CSS template with 404 0 colors changing - Animated 404 error page template like character input - 404 error page CSS template featuring interesting movements and vibrant colors - 404 error page animation CSS template like old PC screen - 404 0 Vampire Style Error Page Animated CSS Template - Month-inspired error page template - Simple and sophisticated animated CSS404 error page - Futuristic Animation 404 Error Page CSS Template - SVG Animation 404 template for bicycles and various elements to move - Blue Screen Wind 404 Error Page Template - Bubble stylish geometric 404 error page template - Error page template that represents the image that is out of power - Simple 404 error page template where spaceship is sucked into a circle - Animation 404 error page template where the right polygon moves to breathe - Animation 404 error page where the background looks like a video - Moving Polygon Wind 404 Error Page Animation Template
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510358.68/warc/CC-MAIN-20230928031105-20230928061105-00519.warc.gz
CC-MAIN-2023-40
2,509
36
https://github.community/t/claiming-the-name-of-an-old-dead-empty-organization/187991
code
I wanted to create an org for a project of mine with a set of repos that recently receives a gained interest of contributors. So far so nice. But the best fitting name is already used as an orga. This orga has exactly one forked repository and is essencially dead since 6 years, only 1 followers, no members. So obviously (from my point of view), this account is essentially dead. How can I claim that name?
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046156141.29/warc/CC-MAIN-20210805161906-20210805191906-00031.warc.gz
CC-MAIN-2021-31
407
2
http://www.linux.ie/lists/pipermail/ilug/2005-June/080520.html
code
Having a small problem using linux on a home lan.. I'm using eircom broadband, the modem is a netopia 3340 also running as a dhcp server for the home lan. The problem is mostly KDE programs (konqueror, kopete, kmail, knode) running very slow. For example, to load www.google.com in konqueror takes about 60 seconds. Everything on the windows machines works fine, And other programs (firefox, ping) work fine too. Kopete doesn't manage to log on at all, neither does kcheckgmail. netstat -r gives the routing table but takes about 15 seconds to show it, netstat -nr gives it immediately, so here the DNS lookup is taking time. Not sure why mozilla and other apps aren't affected though. Also, if I enable IP passthough on the modem for the linux box, every app works fine, but I prefer to keep the linux box on the internal network to access shared printers etc. Has any anyone seen this before? Is it related to DNS lookups? Any help would be greatly appreciated, Maintained by the ILUG website team. The aim of Linux.ie is to support and help commercial and private users of Linux in Ireland. You can display ILUG news in your own webpages, read backend information to find out how. Networking services kindly provided by HEAnet, server kindly donated by Dell. Linux is a trademark of Linus Torvalds, used with permission. No penguins were harmed in the production or maintenance of this highly praised website. Looking for the Indian Linux Users' Group? Try here. If you've read all this and aren't a lawyer: you should be!
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368696383156/warc/CC-MAIN-20130516092623-00060-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
1,525
23
https://www.mail-archive.com/[email protected]/msg08955.html
code
On 01/05/2021 01:11, David Kelly wrote: > Has been a long time for me but Once Upon A Time it wasn’t just a matter > of “not using functions in the library”. AVR-gcc required primatives > other than startup code. It still does - not just on AVR - also on ARM and others. It was quite amusing when I implemented the "internal" memcpy() - in C - only to find that the compiler outsmarted me and implemented it as a call to itself (which obviously crashed the stack). doh! So I've "borrowed" a few bits from avr-libc and avr-gcc to allow my project to build independently of them. -Ian
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100739.50/warc/CC-MAIN-20231208081124-20231208111124-00708.warc.gz
CC-MAIN-2023-50
588
2
https://nyaa.si/view/1209897
code
Here's v2 of my subs. There were quite a few typos, some bad wording, as well as some mis-translations I found after doing a full editing pass, so many things have been fixed. As suggested by some people on nyaa, I've used [neko's](https://nyaa.si/view/1206475) 1080p release and muxed the subs into that for max quality. .ass file [here](https://drive.google.com/open?id=1ruwrfTITac9GL2YWabPEj7GiWa2yK42x) Kimi to, Nami ni Noretara - Ride Your Wave v2 [Yamenaideoneesama].mkv (6.7 GiB)
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571758.42/warc/CC-MAIN-20220812200804-20220812230804-00680.warc.gz
CC-MAIN-2022-33
486
4
https://keyoptimize.com/tail/tail-f-windows/
code
Best of tail f windows at KeyOptimize(Out of 2.87 Million in result | Last check 21 September 2015) Tail for Win32 - Home Page Tail for Win32. This is the homepage of Tail for Win32 - the Windows version of the UNIX 'tail -f' command.. Tail for Win32 is used to monitor changes to files; displaying the changed lines in realtime. This makes Tail ideal for watching log files.. T... Q&A for computer enthusiasts and power users Stackify - DevOps Agile Support for Agile Developers Stackify enables agile developers to provide agile support by giving developers production access to their applications, servers, and databases to improve their ability to do application support and troubleshooting. Bare Metal Software > Tools for Computer Professionals Bare Metal Software > Tools for Computer Professionals Last updated May 04 2016 11:09:52 Copyright © 2003, 2004, 2005, 2006 Bare Metal Software Pty Ltd. Home | BareTail | BareTailPro | BareGrep | Bare... Stack Overflow is the largest online community for programmers to learn, share their knowledge, and advance their careers Q&A for system and network administrators ophilipp.com | Main Page Olivier PHILIPP main page LazyJeff. Friday, June 9, 2017. Friday, March 17, 2017. Thursday, August 18, 2016. Wednesday, August 17, 2016. Friday, August 5, 2016. Tuesday, July 12, 2016. Monday, June 27, 2016. Follow us on Twitter. Custom Search. About Me. Popular Posts. Labels.... Forward | making fun out of craziness making fun out of craziness CodeProject - For those who code Free source code and tutorials for Software developers and Architects.; Updated: 15 Jun 2017 Atlassian Documentation - Atlassian Documentation Atlassian Documentation. Atlassian Documentation. Find help using and administering Atlassian products. Looking for something else?. Developers. Atlassian Cloud. Enterprise. Cloud Server. Cloud Server. Cloud Server. Cloud Server. Cloud Server. Cloud S... A-Z of Windows CMD commands, batch files, DOS and PowerShell Learn about Windows CMD Commands, Batch scripts, Dos and PowerShell Free software downloads and software reviews - CNET Download.com CNET Download.com provides free downloads for Windows, Mac, iOS and Android computers and mobile devices. Every category of desktop software and mobile apps, including security, utilities, games, video, and audio software. Free software downloads and reviews - Softonic Download free software from Softonic. Safe and 100% virus-free. Discover apps for Windows, Mac and mobile, tips, tutorials and videos, and much more. The website created to help you enjoy the best software.
s3://commoncrawl/crawl-data/CC-MAIN-2017-34/segments/1502886110578.17/warc/CC-MAIN-20170822104509-20170822124509-00433.warc.gz
CC-MAIN-2017-34
2,593
25
https://blog.sellingenergy.com/breaking-sales-down-to-a-neuroscience?hs_preview=mTzyZVhb-8770034486
code
What is happening in your brain and body during a high-stakes negotiation? If you knew, how could that tip things in your favor? NBC News has provided a helpful breakdown of how to better understand your impulses and temper your instincts while making a sale. Most of these suggestions align well with tactics I’ve recommended in the past – do your homework, keep things simple, etc. That said I would highly recommend you delve into their suggestions and read them directly! These are impactful, no-nonsense tips that will help you on the job. You can find out more about these tactics by visiting here.
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600402127397.84/warc/CC-MAIN-20200930172714-20200930202714-00025.warc.gz
CC-MAIN-2020-40
608
3
https://forums.mirc.com/ubbthreads.php/posts/265409
code
$urlget() does not process relative redirects properly. Thanks for testing these out. Fixing these has turned out to be more complicated than I expected. I am trying to use standard windows APIs for URL parsing but their limitation means that I need to either write my own custom URL parsing routine, which is not advisable, or use a URL parsing library, of which many exist at differing levels of sophistication and size, ranging from tens of lines to thousands of lines of code. In addition, it's hard to know how well-tested these libraries are. Some of them implement recent security fixes. As for relative redirects, again, I really should be using rfc-compatible, established, tested code instead of writing my own. I will need to look into this.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100534.18/warc/CC-MAIN-20231204182901-20231204212901-00686.warc.gz
CC-MAIN-2023-50
752
4
http://www.coderanch.com/t/144413/po/certification/Security-related-certifications
code
This week's book giveaway is in the OCAJP 8 forum. We're giving away four copies of OCA Java SE 8 Programmer I Study Guide and have Edward Finegan & Robert Liguori on-line! See this thread for details. Hi guyz, What is the scope of Security related certifications. I have seen very rare IT professionals who focus certification in this area. EC-Council offers some certification in field of Security. ISACA is also a famous organization for providing such certifications, like CISM, CISA etc. Looking for your valuable comments. Bye, Viki.
s3://commoncrawl/crawl-data/CC-MAIN-2015-35/segments/1440645264370.66/warc/CC-MAIN-20150827031424-00296-ip-10-171-96-226.ec2.internal.warc.gz
CC-MAIN-2015-35
539
2
https://www.bls-design.com/projects/keystone-buillding
code
Containing 1,000,000 S.F. of state government offices, the Keystone Building is a display of Pennsylvanian pride and accomplishment. Architecturally the project was designed to be "timeless" with the goal of looking modern and clean for decades to come. As such, the lighting design needed to be very simplistic and modern without the possibility of looking dated. Therefore no decorative fixtures or highly stylistic elements were used. Clean lines of light were carefully coordinated with the structure of the building to allow consistent exterior views of the building as well as future interior relocations under a consistent grid. The office environment was illuminated with a mere 0.6 watts per square foot. That may not sound impressive today, but at the time it was exceptional. BLS still features this project on our website and challenges you to guess the projects completion date?
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585203.61/warc/CC-MAIN-20211018124412-20211018154412-00447.warc.gz
CC-MAIN-2021-43
891
2
https://stackoverflow.com/questions/17044296/quaternion-rotation-without-euler-angles/17047931
code
An orientation is the way that a transform will orient an object within a coordinate system. An orientation is an absolute quantity, like a position or a scalar. An orientation is conceptually a value. And there are operations one can apply to orientations, depending on their representation. Unlike vectors and scalars, orientations can be represented in a wide variety of ways. What does it mean to "Use Euler Angles"? Euler angles are a series of 3 rotations about 3 fixed, orthogonal axes. The order in which these are applied is important and is generally established by convention. To "use Euler angles" means that Euler angles are how your code stores and manipulates the orientation of an object. How you eventually compose these angles to generate a matrix is of no consequence. What matters is that your code will treat the orientation as 3 angles. For example, when you apply a rotational offset to the orientation, it will be provided as offsets to rotation angles, and these offsets will be applied to the stored Euler angles directly. What does it mean to "Use Matrices"? I know nobody said that, but I have a point to make here. To "use matrices" means that a rotation matrix is how your code stores and manipulates the orientation of an object. If some piece of code wants to rotate the object, they will apply a matrix to it, either on the left side or the right. Even if that matrix is computed via some axial rotation, the code is still performing the basic operation on a matrix, not an angle. What does it mean to "Use Quaternions"? For the purposes of this discussion, a "quaternion" is a 4-element unit vector which is used to encode an orientation. Quaternions can have matrix-like operations done on them, such as composition and inversion. Quaternions must remain normalized in order to properly encode an orientation. To "use quaternions" means that you are storing the orientation and manipulating of the object as a quaternion. All of your operations on orientations, at their most fundamental level, are dealing with quaternion math. How to adjust the orientation Euler angles are often used because they are (theoretically) intuitive to adjust: you just increment or decrement an angle. If you want to turn the object -10 degrees in the X, you just subtract 10 from the X axial rotation. But we don't want to use them, because they're terrible, so let's look at the other orientation representations. To adjust an orientation as a matrix, you have to do two things. You must multiply the current orientation with an offset rotation matrix (if you want to rotate by -10 degrees in the X axis, you create an angle/axis matrix for that and right-multiply it). And then, because computers have finite precision, you must re-orthonormalize the matrix. If you don't do the second step, your matrix will eventually stop being orthonormal and thus stop being an orientation. Orthonormalizing a matrix is hard. That's (part of) the reason why we use quaternions instead. Normalizing a quaternion is easy; it's just 4-element vector normalization. And since quaternions and matrices have analogous operations, the same math will work with both. So they look pretty much identical.
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585215.14/warc/CC-MAIN-20211018221501-20211019011501-00122.warc.gz
CC-MAIN-2021-43
3,201
15
http://rjaluminum.com/large_projects.htm
code
Large projects are jobs that you expect to require over $20,000 of Kawneer material. If you are an existing customer please contact the estimator you typically work with. If you are a new customer please email [email protected] and an estimator will be assigned to your quote request. - Bid date - All other information that will help expedite the quoting process (Finish, window type quantities, square feet, warranties, etc.) Note: Please provide as much information as possible to help us provide you a quote in a timely manner.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218191984.96/warc/CC-MAIN-20170322212951-00352-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
531
4
https://www.thefastmode.com/technology-solutions/11738-intel-and-hyper-partner-openstack-to-launch-open-source-kata-containers
code
The OpenStack Foundation has unveiled a new open source project, Kata Containers, which brings Intel Clear Containers and the Hyper runV technologies together to provide a secure base for running containers in the cloud. The project which aims to unite the security advantages of virtual machines (VMs) with the speed and manageability of container technologies. It is designed to be hardware agnostic and compatible with the Open Container Initiative (OCI) specification, as well as the container runtime interface (CRI) for Kubernetes. Kata Containers offers the ability to run container management tools directly on bare metal without sacrificing workload isolation. When compared to running containers on virtualized infrastructure (which is the standard practice today), benefits include increased performance, faster boot time and cost efficiencies. In addition to contributions from Intel and Hyper, the following companies are supporting the project at launch: 99cloud, AWcloud, Canonical, China Mobile, City Network, CoreOS, Dell/EMC, EasyStack, Fiberhome, Google, Huawei, JD.com, Mirantis, NetApp, Red Hat, SUSE, Tencent, Ucloud, UnitedStack and ZTE. JD.com, China’s largest eCommerce platform by revenue, currently offers a container service powered by runV, the technology from Hyper.sh that will form the basis for Kata Containers. The Kata Containers project will initially comprise six components, including the Agent, Runtime, Proxy, Shim, Kernel and packaging of QEMU 2.9. It is designed to be architecture agnostic, run on multiple hypervisors and be compatible with the OCI specification for Docker containers and CRI for Kubernetes. Contributors can expect to work upstream across multiple infrastructure and container orchestration communities, including Kubernetes, Docker, OCI, CRI, CNI, QEMU, KVM, HyperV and OpenStack.
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986666959.47/warc/CC-MAIN-20191016090425-20191016113925-00031.warc.gz
CC-MAIN-2019-43
1,845
7
https://louis.oercommons.org/courseware/lesson/491/student/?section=5
code
A Combined Example The U.S. Postal Service is facing difficult challenges. Compensation for postal workers tends to increase most years due to cost-of-living increases. At the same time, increasingly more people are using email, text, and other digital message forms such as Facebook and Twitter to communicate with friends and others. What does this suggest about the continued viability of the Postal Service? Figure and the text below illustrate this using the four-step analysis to answer this question. Since this problem involves two disturbances, we need two four-step analyses, the first to analyze the effects of higher compensation for postal workers, the second to analyze the effects of many people switching from “snail mail” to email and other digital messages. Figure (a) shows the shift in supply discussed in the following steps. Step 1. Draw a demand and supply model to illustrate what the market for the U.S. Postal Service looked like before this scenario starts. The demand curve D0 and the supply curve S0 show the original relationships. Step 2. Did the described change affect supply or demand? Labor compensation is a cost of production. A change in production costs caused a change in supply for the Postal Service. Step 3. Was the effect on supply positive or negative? Higher labor compensation leads to a lower quantity supplied of postal services at every given price, causing the supply curve for postal services to shift to the left, from S0 to S1. Step 4. Compare the new equilibrium price and quantity to the original equilibrium price. The new equilibrium (E1) occurs at a lower quantity and a higher price than the original equilibrium (E0). Figure (b) shows the shift in demand in the following steps. Step 1. Draw a demand and supply model to illustrate what the market for U.S. Postal Services looked like before this scenario starts. The demand curve D0 and the supply curve S0 show the original relationships. Note that this diagram is independent from the diagram in panel (a). Step 2. Did the change described affect supply or demand? A change in tastes away from snail mail toward digital messages will cause a change in demand for the Postal Service. Step 3. Was the effect on demand positive or negative? A change in tastes away from snailmail toward digital messages causes lower quantity demanded of postal services at every given price, causing the demand curve for postal services to shift to the left, from D0 to D1. Step 4. Compare the new equilibrium price and quantity to the original equilibrium price. The new equilibrium (E2) occurs at a lower quantity and a lower price than the original equilibrium (E0). The final step in a scenario where both supply and demand shift is to combine the two individual analyses to determine what happens to the equilibrium quantity and price. Graphically, we superimpose the previous two diagrams one on top of the other, as in Figure. Following are the results: Effect on Quantity: The effect of higher labor compensation on Postal Services because it raises the cost of production is to decrease the equilibrium quantity. The effect of a change in tastes away from snail mail is to decrease the equilibrium quantity. Since both shifts are to the left, the overall impact is a decrease in the equilibrium quantity of Postal Services (Q3). This is easy to see graphically, since Q3 is to the left of Q0. Effect on Price: The overall effect on price is more complicated. The effect of higher labor compensation on Postal Services, because it raises the cost of production, is to increase the equilibrium price. The effect of a change in tastes away from snail mail is to decrease the equilibrium price. Since the two effects are in opposite directions, unless we know the magnitudes of the two effects, the overall effect is unclear. This is not unusual. When both curves shift, typically we can determine the overall effect on price or on quantity, but not on both. In this case, we determined the overall effect on the equilibrium quantity, but not on the equilibrium price. In other cases, it might be the opposite. The next Clear It Up feature focuses on the difference between shifts of supply or demand and movements along a curve. What is the difference between shifts of demand or supply versus movements along a demand or supply curve? One common mistake in applying the demand and supply framework is to confuse the shift of a demand or a supply curve with movement along a demand or supply curve. As an example, consider a problem that asks whether a drought will increase or decrease the equilibrium quantity and equilibrium price of wheat. Lee, a student in an introductory economics class, might reason: “Well, it is clear that a drought reduces supply, so I will shift back the supply curve, as in the shift from the original supply curve S0 to S1 on the diagram (Shift 1). The equilibrium moves from E0 to E1, the equilibrium quantity is lower and the equilibrium price is higher. Then, a higher price makes farmers more likely to supply the good, so the supply curve shifts right, as shows the shift from S1 to S2, shows on the diagram (Shift 2), so that the equilibrium now moves from E1 to E2. The higher price, however, also reduces demand and so causes demand to shift back, like the shift from the original demand curve, D0 to D1 on the diagram (labeled Shift 3), and the equilibrium moves from E2 to E3.” At about this point, Lee suspects that this answer is headed down the wrong path. Think about what might be wrong with Lee’s logic, and then read the answer that follows. Answer: Lee’s first step is correct: that is, a drought shifts back the supply curve of wheat and leads to a prediction of a lower equilibrium quantity and a higher equilibrium price. This corresponds to a movement along the original demand curve (D0), from E0 to E1. The rest of Lee’s argument is wrong, because it mixes up shifts in supply with quantity supplied, and shifts in demand with quantity demanded. A higher or lower price never shifts the supply curve, as suggested by the shift in supply from S1 to S2. Instead, a price change leads to a movement along a given supply curve. Similarly, a higher or lower price never shifts a demand curve, as suggested in the shift from D0 to D1. Instead, a price change leads to a movement along a given demand curve. Remember, a change in the price of a good never causes the demand or supply curve for that good to shift. Think carefully about the timeline of events: What happens first, what happens next? What is cause, what is effect? If you keep the order right, you are more likely to get the analysis correct. In the four-step analysis of how economic events affect equilibrium price and quantity, the movement from the old to the new equilibrium seems immediate. As a practical matter, however, prices and quantities often do not zoom straight to equilibrium. More realistically, when an economic event causes demand or supply to shift, prices and quantities set off in the general direction of equilibrium. Even as they are moving toward one new equilibrium, a subsequent change in demand or supply often pushes prices toward another equilibrium.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00132.warc.gz
CC-MAIN-2023-50
7,209
25
https://support.quest.com/migration-manager-for-exchange/kb/57010/free-busy-information-is-visible-only-for-a-specific-time-interval
code
After Free Busy synchronization was implemented and FB data has been synchronized, it can be seen only going back for 2 or 3 months. Why does this happen? Did FB agent synchronize the FB information incompletely? FB agent cannot synchronize the FB information partially. FB information for a user is stored inside a so called "message" file (this behavior was changed in Exchange 2007 and FB can be stored inside the mailbox), and FB agent does synchronize the entire message. The mentioned above issue with the FB information not being visible only for a specific period of time is environment related and could be caused by Outlook settings. By default FB information is being published for 2 months. For more details please see the attached screenshot which shows the setting in Outlook 2007.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662522270.37/warc/CC-MAIN-20220518115411-20220518145411-00363.warc.gz
CC-MAIN-2022-21
795
4
https://www.dfki.de/en/web/research/projects-and-publications/publication/4599
code
A Framework for Ubiquitous Content SharingAlexander Kröner; Michael Schneider; Junichiro Mori In: IEEE Pervasive Computing, Vol. 8, No. 4, Pages 58-65, IEEE Computer Society, 10/2009. The popularity of the ubiquitous sharing of user-created content motivates the authors to research a general content-sharing framework. They focus on sharing digital memories automatically created by intelligent environments. On the basis of three different application scenarios and several user studies, they provide insight into the framework's basic concepts, including a memory model. They also discuss various kinds of shared content and methods for managing access to such content in the memory model.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102469.83/warc/CC-MAIN-20231210123756-20231210153756-00573.warc.gz
CC-MAIN-2023-50
693
3
https://insights.sei.cmu.edu/blog/improving-system-and-software-security-with-aadl/
code
Improving System and Software Security with AADL As our world becomes increasingly software-reliant, reports of security issues in the interconnected devices that we use throughout our day (i.e., the Internet of Things) are also increasing. This blog post discusses how to capture security requirements in architecture models, use them to build secure systems, and reduce potential security defects. This post also provides an overview of our ongoing research agenda on using architecture models for the design, analysis, and implementation of secure cyber-physical systems and to specify, validate, and implement secure systems. Why Secure Software Matters Some security breaches are less concerning, while others require immediate attention and can even be life-threatening. For example, in July 2015, Miller and Valasek reported a software vulnerability in the Jeep Cherokee that eventually urged Chrysler to recall 1.4 million cars. A software defect caused Ford to recall 433,000 cars the same year when a defect raised concerns about both theft and safety. But these are not isolated cases, and security problems are not specific to the automotive industry: malware and viruses also impact critical medical software . The FDA reported that 24 percent of medical device recalls are due to software issues, and that the industry must emphasize locating security problems and detecting malware. These cases show a general trend: as our world increasingly relies on software, more software-related issues will be reported, and security issues will continue to grow until we change the way we design software, especially when it is integrated in devices that are critical to safety and health. Current software development processes used for cyber-physical systems are not appropriate to handle the new security challenges of the Internet of Things (IoT). Stories of breaches and defects are evidence that existing development processes and tools no longer scale. We need new methods that consider security from the very beginning. We need to capture security characteristics early in the development process, when designing the system architecture and validating the security policy, instead of later when end users are experiencing security problems. We also need to ensure the use of appropriate isolation methods, prevent data leaks, and avoid covert channels. Model-Based Development Approach for Secure Systems The SEI has led the design of the Architecture Analysis and Design Language (AADL) for 15 years and has been a key contributor to several extensions to the language, including the Error Model Annex and the ARINC653 Annex). The AADL community, which includes a team of SEI researchers, has used the language for the design, analysis, and implementation of cyber-physical systems in which collaborating computational elements control physical entities. Developing a new security-specific extension in AADL is an important next step in this work. By extending an existing standardized language (rather than creating a new language from scratch), we provide the ability for AADL practitioners to extend their existing models with security annotations, use analysis tools (such as for latency and scheduling), and take advantage of new, security-specific tools. Our AADL security annex details how to use the core AADL semantics to specify security and isolation mechanisms. The annex also uses the AADL property extension mechanisms to add the following capabilities: - Specification of physical exposure: Can someone access and impact the component? For example, can someone replace the memory? - Specification of trust: Is a component verified so that it can be trusted (no propagation of fault or vulnerability)? - Security levels and domains: What are the criticality levels and domains of components? Does a component handle several domains or levels? - Specification of encryption mechanism: Is data encrypted when it is transported between two components? Is the encryption mechanism strong enough? - Specification of authentication mechanism: Does the system use an authentication mechanism (user/password, password, etc.)? Can we trust it? Using the AADL core semantics and the security-specific extensions, system designers and developers can detect potential vulnerabilities in the system and analyze how they would propagate in the architecture before building it. Analyzing the software architecture offers the opportunity to detect vulnerabilities early in the design process and change the architecture either to mitigate or avoid them. For example, when a system will execute components in different security domains, the designer might want to avoid cross-domain interaction and isolate each domain by isolating components in partitions using a separation kernel. We started by designing two analysis methods for AADL, the attack surface and the attack impact: - The attack surface is a list of all vulnerabilities of all system components. This analysis method infers vulnerabilities using the core AADL semantics (e.g., time and space partitioning through different memory or virtual components for each security domain) and the security extension (e.g., authentication, encrypted connections). The result of this analysis is a spreadsheet listing the vulnerabilities of each component of the AADL model. - The attack impact shows how a vulnerability affects other components and propagates through the architecture via buses, shared resources, and other pathways. For example, if a process is compromised, it can then affect all the other processes executed on the same processor, unless there is a security measure to avoid this (such as isolating processes using a separation kernel). The attack impact representation shows the AADL components, their associated vulnerabilities, and their impacts on other components. We designed a new Eclipse tool using the Sirius framework to represent and edit the attack impact. These methods have been implemented in OSATE so that users can generate analysis reports from the AADL model. Beyond the generation of reports, we are also working on the generation of code--specifically the security policy--from the AADL model. In particular, the new code generator will automate the development of security policies, such as the configuration and use of encryption or authentication protocols or the deployment of software components in isolated partitions. This research has many benefits and will help OSATE users - simplify the development of secure systems: Engineers will not need to learn the specific configurations and deployment aspects of secure operating systems. - ensure development process consistency: By using the same artifact (the AADL model) for the analysis and implementation of the system, we ensure that the implemented system will comply with the validated specification. - avoid manual and error-prone manual code production: By using predefined code generation patterns that transform one high-level representation (an AADL model) into a low-level one (C code), we avoid mistakes of traditional code development (syntax and semantic errors, misunderstanding security requirements, etc.). reduce re-engineering efforts due to a post-mortem security discovery: By helping users discover security issues early, this approach reduces potential post-mortem security defects and avoids recalls and updates that incur expensive costs and impact an organization's reputation. Application to an Automotive System Miller and Valasek published a technical report in 2014 that lists the attack surface and attack impact of several automotive systems. SEI researchers reused the data analysis from this report, established AADL models for several of these systems, and generated the attack surfaces and attack impacts automatically from these models. Our goal was to demonstrate that these analyses can be automatically derived from the AADL model and the results are similar to those established manually by Miller and Valasek Once these analyses are quickly and automatically derived from architecture models, engineers can use the same models for other analysis purposes as well. Figure 1 shows a high-level representation of the electronic control units (ECUs) for a 2006 Toyota Prius and their interconnections using different buses in an AADL model, as shown in the technical report. This model contains only the ECUs and their connections to the physical networks; it does not detail software and other implementation components. One aspect of this system is that the gateway component (shown in the center of the system) is inter-connected to all other networks. We assumed that such a component would be carefully designed, analyzed to ensure separation across networks, and configured to avoid any propagation of data from one network to another. Hence, we annotated this component as verified by the system designer. Figure 2 below shows an extract from the spreadsheet representation of the attack impact for this system. Specifically, the figure shows how an attack on the Bluetooth or radio system would be propagated through the system. Because these networks are physically accessible, attackers could gain entry and try to compromise the device driver (these are complex protocols with a lot of code that might contain errors so that drivers or network stacks might be vulnerable to remote attacks). An attack could propagate through the navigation components and other connected ECUs, but it would not go beyond the gateway ECU. As the gateway ECU is validated and trusted, it would not be affected by the attack. We also implemented a graphical representation of the attack impact; Figure 3 below shows an extract. Using this tool, we can graphically show the impact of a vulnerability on the overall architecture by changing the background of affected components to red. In this example, we show the impact of a vulnerability of the Bluetooth bus, which affects all components sharing the physical resource (in this case, the network). On the other hand, the propagation stops at the gateway component: Because this component is verified, we expect that it will stop the propagation of the vulnerability. Readers can check that this graphical representation is consistent with the spreadsheet representation in Figure 2. After generating the attack impacts, the next step is to generate configuration and deployment code of the execution platform. Our research efforts are moving toward that goal, and we are investigating an opportunity to generate code that targets seL4, which is a microkernel that has been formally verified and used for the High-Assurance Cyber Military Systems (HACMS) program. By automating the production of seL4 code from high-level models, we plan to make the development of secure applications easier, faster, and more accessible. Conclusion and Future Work Recent reports of vulnerabilities have shown that IoT and cyber-physical systems domains need new development methods and tools to develop secure systems. This blog post presented how we are enhancing AADL to support the design, analysis, and implementation of secure systems. Using the AADL approach to model-based engineering, we can specify security requirements in a model, analyze the model to check the security policy before implementation, and generate the implementation from the model so that we are sure the code matches the validated requirements. We will present our new AADL-specific security extension at the spring 2016 meeting of the AADL standardization committee. We will also release the analysis tools during 2016, and we are working on a code generator to automate the configuration and deployment of software on top of secure platforms, such as the formally verified seL4 microkernel. We are also working on a case study that will demonstrate the complete development process, from design to implementation. We are targeting an affordable hardware platform, with a total cost of hardware under $200, and will release all necessary software and models under an open-source license so that students, teachers, and hobbyists can start learning (and potentially improving) these technologies. This case study will be a platform to learn, study, and practice the development of cyber-physical systems using model-based engineering methods. We expect to release the models and tools by the end of the year. Learn more about AADL. View our SEI Webinar Architecture Analysis with AADL. Read all of our SEI Blog posts on AADL.
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474526.76/warc/CC-MAIN-20240224080616-20240224110616-00440.warc.gz
CC-MAIN-2024-10
12,531
35
https://www.shopstyle.ca/browse/women/albino
code
Extra 20% Off: REALAlbino Virgin Wool Chain-Link Top Tan Albino virgin wool top with short sleeves, chain-link trim at neckline and exposed zip closure at center back. Extra 20% Off: REALAlbino Striped Mini Dress Green and grey Albino striped sleeveless mini dress with V-neck, pleating at bust and waist and concealed zip closure at side. Size not listed, estimated from measurements.
s3://commoncrawl/crawl-data/CC-MAIN-2017-39/segments/1505818693240.90/warc/CC-MAIN-20170925182814-20170925202814-00562.warc.gz
CC-MAIN-2017-39
385
4
https://www.thebigwobble.org/2017/04/have-united-states-geological-survey.html
code
Below the original graph posted on my blog in 2014 If we take USGS’s new data, which I down loaded on the 4th of April 2017 major quakes have been relatively stable since the 50’s and the big picture looks good. This graph below is from my 2014 data if I use the new 2017 data we have a completely different picture as the graph above. Did USGS take historical data from the period 1900-1950 and place the data on the historical data of 1950-2000 to create a more stable graph? Below a graph from my old 2014 data showing mag 6+ quakes per decade showing a more pronounced spike. Conclusion; The total number of mag 6+ quakes officially on the USGS web site, from 1900 to the last day of 2016 which I downloaded and graphed in 2014 came to a total of 9181 If one was to do the same search now the total would be 10,998, from Jan 1st 1900 to the 31st of Dec 2016 the total would be 10,998 quakes. What does that mean? Since 2014 when I did my original search an astonishing 1,817 mag 6+ quakes have been added. Why would they add more quakes? Because if the data is put together in a graph it will make the graph appear more stable, more of a flat line, see below. Take away the extra 1,817 quakes USGS have added since 2014 and you get a more true but scarier picture, with a massive increase clearly seen over the last 116 years, see below Below a picture of my well worked data from 2014
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964358520.50/warc/CC-MAIN-20211128103924-20211128133924-00062.warc.gz
CC-MAIN-2021-49
1,393
10
https://uit.stanford.edu/service/cgi/faq
code
Table of contents - I'm wondering about running scripts using some interpreter that's not Perl or PHP. How do I do it? - Using the suexec debug mode, the error says No such file or directory: exec failed even though the permissions are correct. - How can I send email? I can't find the sendmail program. - What logging is available? I'm wondering about running scripts using some interpreter that's not Perl or PHP. How do I do it? Your CGI programs can be any executable for the server OS, but if it requires an interpreter it will only work if the interpreter is installed on the machine. Currently only Perl, PHP, and Python are officially supported. For Perl put "#!/usr/bin/perl" as your first line in the script. For PHP you do not have to add a line. Using the suexec debug mode, the error says No such file or directory: exec failed even though the permissions are correct. Open your script in vi, and make sure it does not contain ^M characters on ends of lines (this happens when you ftp files, or copy into AFS from Windows). If it does, run this command at the Unix command-line to convert the file: dos2unix <current_name> <new_name> How can I send email? I can't find the sendmail program. For sending email, direct SMTP connections can be utilized. A sendmail emulator is available to CGI scripts at the path /usr/sbin/sendmail but is not guaranteed to work. You can also use Perl modules to send mail; see the Net::SMTP example on the Example CGI Scripts page. Important: Please be aware that it violates Stanford security policy to allow users of your scripts to freely set the recipient address or in any other way abuse the emailing capability of the CGI service. It is recommended you only use this feature to send administrative notifications to yourself. What logging is available? The error log is no longer available for online viewing due to increasing privacy concerns. Users are advised to take advantage of the suexec debug mode, described in the Debugging Programs. If you do need to know what is in the error logs, file a HelpSU and we can work with you to get the part of the error logs relevant to you.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510214.81/warc/CC-MAIN-20230926143354-20230926173354-00170.warc.gz
CC-MAIN-2023-40
2,134
15
https://social.msdn.microsoft.com/Forums/en-US/79c0a86b-5123-4bcd-8bb5-4fd579f26fe6/how-can-i-copy-the-data-from-one-datacolumn-to-another-in-the-same-datatable-in-an-optimized-way?forum=netfxcompact
code
I can't use the original column. As i have to show original column(say COL1) value to user and the another datacolumn(say DUMMY) is for technical calcuations which will be changed after performing business validations on each input of the user. I can't put my entire business validation into the expression of the computed column(DUMMY). I also have the requirement where i need to show business validated data(DUMMY column data) in to the original column(COL1) and the user can modify the values and viceversa. So, is using computed column with expression set is the only option ?
s3://commoncrawl/crawl-data/CC-MAIN-2017-09/segments/1487501171043.28/warc/CC-MAIN-20170219104611-00123-ip-10-171-10-108.ec2.internal.warc.gz
CC-MAIN-2017-09
581
3
https://mail.python.org/pipermail/python-list/2003-January/175647.html
code
max() of a list of tuples maxm at mxm.dk Tue Jan 21 12:25:58 CET 2003 Mario Wehbrink wrote: > i have a list of tuples that look like: > [(1,3,5), (8,16,2), (2,56,4)] > what i am interested, in is the tuple with the greatest value in pos 3. > So in this case it would be (1,3,5). Is there a way to tell > max(mylistoftuples) to only look at the last position of the tuples? l = [(1,3,5), (8,16,2), (2,56,4)] print max([(i[-1],i) for i in l]) hilsen/regards Max M Fremtiden, videnskab, skeptiscisme og transhumanisme More information about the Python-list
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578526228.27/warc/CC-MAIN-20190418181435-20190418202412-00040.warc.gz
CC-MAIN-2019-18
553
14
https://davidnielsen.wordpress.com/2009/05/10/windows-7-mini-review/
code
Windows 7 mini review I got my hands on the Windows 7 RC 64 bit build, and having tried it for a while I have to say that for the most part I really like what Microsoft has done. Unlike Linux on this laptop it feels smooth, the audio settings are easy and works a charm for managing and testing 5.1 setups like my own. I think Microsoft did good work, for an RC it is very stable and the only application I have found that doesn’t work unfortunately Google Chrome. I have though only used the OS for a few hours, more extensive testing will be needed to weed out all the little trouble spots but the initial presentation is very pleasant. I love the audio settings and testing, I hope Pulseaudio gets to a stage where we can universally offer such UI enabled testing and preferences. It’s really that easy and comfortable in use. It just works(tm). The little UI enhancements are great, unlike Compiz which seems more focused on making things burn, beam up or worse these really make a difference in use. E.g. when you click and drag a window to the top your cursor gives a little sonar blip and the window border is shown expanding to fullscreen. It is those little things that make it pleasant to the eye and adds to the experience. A good UI should aid the user and explain functionality, Windows 7’s revision of Aero does this very well and it remains smooth while doing so. Much has been written on the new taskbar and I have to say it is the sexiest new UI design Microsoft has done in a while. Peek is excellent in use, it is a visually pleasing way to solve the problem of application launching and task listing. Something in my opinion that has yet to be done either in Linux or OS X. The one problem I have seen is that there is a tendency for dialogs to pop under which leads to missing them for a while. I am very impressed. I do miss the ability from metacity (and other window managers to put a window “always on top”. I use this a lot when chatting with the webcam on while working, it is nice to be able to see the person I am talking to on skype (I use a rather complicated setup where I have msn for the webcam on the laptop but I use skype on my nokia n810). All in all Windows 7 RC is a very solid OS, it performs very smoothly and feels good in use. Windows users will see this as a nice upgrade. They have applied some of their prior successes more extensively e.g. users will find the Ribbon toolbar from the last Office release in Wordpad. Some might remember that I wasn’t at all fond of Vista at the same stage in the game, and as a someone who has used nothing but Linux for more than a decade I am not familiar with the “Windows experience” but Windows 7 strikes me as being a nice solid offering. I am very pleased that Microsoft decided to bring their A game, hopefully this will spur competition and innovation.
s3://commoncrawl/crawl-data/CC-MAIN-2018-13/segments/1521257648177.88/warc/CC-MAIN-20180323024544-20180323044544-00404.warc.gz
CC-MAIN-2018-13
2,858
9
https://dappervolk.com/news/20-technical-difficulties
code
You may have noticed that the site went down right as the event was completed by the userbase. A pretty significant error came up while the site was trying to distribute prizes to all participants, forcing the site to go into error mode. For the moment, we have brought the site back up in maintenance mode to investigate the issue and try to resolve it. We're currently unsure of how long it will take to fix this, but we will be sure to update everyone when we get a better idea of what exactly went wrong. As always, thank you for your patience!
s3://commoncrawl/crawl-data/CC-MAIN-2019-51/segments/1575540543850.90/warc/CC-MAIN-20191212130009-20191212154009-00422.warc.gz
CC-MAIN-2019-51
548
2
https://www.tindie.com/products/tleracorp/grasshopper-lorawan-development-board/
code
STM32L082 Development Board with SX1276 LoRa Radio programmable using Arduino IDE via USB ConnectorDesigned by Tlera Corp in United States of America New Grasshopper production in stock now! Unfortunately, rising component, production, and shipping costs have forced me to raise the price... Now supporting LoRa radio, FSK radio, and LoRaWAN! What i…Read More… New Grasshopper production in stock now! Unfortunately, rising component, production, and shipping costs have forced me to raise the price... Now supporting LoRa radio, FSK radio, and LoRaWAN! This is Grasshopper, a small (0.71 " x 1.76") development board with Murata's CMWX1ZZABZ-078 FCC certified module containing ST Microelectronics' STM32L082 32 MHz Cortex M0+ MCU with 192 kByte of flash and 20 kBytes of RAM and Sematech's SX1276 LoRa radio. The development board exposes 19 GPIOs to the user as well as 3V3, GND, VIN, and VREF (for the analog sector), has an indicator led on GPIO 13 as well as a power-on led that can be disabled via a solder jumper for lowest power usage, and has an on-board antenna suitable for either 868 or 915 MHz. In fact, the chip antenna is tuned for a wide band (858 - 928 MHz) which allows the SX1276 LoRa radio to be used in a surprisingly large number of regions of the world including: The Grasshopper development board is intended to be programmed using an Arduino IDE (just like Ladybug, Butterfly, and Dragonfly), flashing new programs and receiving serial output through the microB USB connector. But we have exposed the SWD port as well for those users who prefer to use traditional tool chains and debuggers. We have extended our successful STM32L4 Arduino core to the Grasshopper STM32L082 variant to allow all of the usual serial protocols and peripheral utilities expected for an Arduino-programmable development board. First drop of the (alpha) STM32L0 Arduino core is reposited here. We have a GitHub repository of Arduino sketches that run on the Grasshopper here. Here (adapted from Simon Levi's LadybugFC tutorial) is how to get started if you are new to Arduino or have forgotten how to set it up. The board can be powered from the USB connector or from a 1S LiPo battery (3.5 < VIN < 5.5 V). There is a JST port for connecting a LiPo or power may be applied to VIN and GND on the board edge. The Grasshopper LoRa development board uses an NCV8170 3V3 LDO with 150 mA output for power management. This LDO has a quiescent current of just 500 nA allowing the ultra-low potential of LoRa to be realized in this design. When the power-on led is disabled (cut the trace between solder pads on the back), the Grasshopper uses just 2.1 uA in STOP mode with full data and state retention. The LoRaWAN radio API is designed to keep the MCU in stop mode as long as possible. Proper construction of your Arduino sketch will allow the Grasshopper plus sensor add-ons to last for months on a small LiPo battery. This test has the Grasshopper blinking the built-in led for 100 ms and then stopping for 5 seconds. The average current is roughly proportional to chosen clock speed. Here is more discussion. Initial tests show reception out to 150 meters with no direct line of sight (through houses and cars, etc) and >500 meters out in the open. One report shows reception at a 30 meter tower antenna 1.4 km away with RSSI -115 and SNR of -9. This is pretty good performance for this simple pcb antenna! We have added an u.Fl connector so even longer-range can be achieved with an external antenna. BLE and wifi are great and each has its niche. BLE requires low average power (~ 1 mA) and is great for streaming small amounts of data (~1 kByte per second) at short range (<10 meters), while wifi can stream large amounts of data (100s of kBytes per second) at relatively longer range (~100 meters) but at much larger power budgets (10s of mA). LoRa promises the best of both worlds, offering ultra-low power usage (< 1 mA average power) and ultra-long range (> 1 km). We wanted to get started in this wonderful new radio sector and what better way than with Murata's new LoRa radio module, which offers a compact and complete solution that doesn't require an external antenna and allows a super small development board perfect for remote applications and even for wearable use! This is a small development board that has everything you need to get started using the next big thing in wireless technology. Order some pcbs from OSH Park and assemble some of your own or buy a fully assembled and tested board here and see how easy it can be to make LoRa work in your applications! No country selected, please select your country to see shipping options. No rates are available for shipping to . Enter your email address if you'd like to be notified when Grasshopper LoRaWAN Development Board can be shipped to you: Thanks! We'll let you know when the seller adds shipping rates for your country. |Shipping Rate||Tracked||Ships From||First Item||Additional Items| Jc | June 18, 2021 William | Dec. 20, 2020 Hiroshi | Dec. 8, 2020 Brett | Sept. 7, 2020 Daniel | July 3, 2020 Andrew | May 30, 2020 Keith | Dec. 16, 2019 Karl | Oct. 31, 2019 Amir | Aug. 14, 2019 Mike | July 5, 2019 Charles-Henri | June 17, 2019 Julien | Jan. 26, 2019 We recognize our top users by making them a Tindarian. Tindarians have access to secret & unreleased features. We look for the most active & best members of the Tindie community, and invite them to join. There isn't a selection process or form to fill out. The only way to become a Tindarian is by being a nice & active member of the Tindie community!
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510781.66/warc/CC-MAIN-20231001041719-20231001071719-00719.warc.gz
CC-MAIN-2023-40
5,589
33
http://mathgene.usc.es/snipper/analysispopfile2.html
code
Thorough analysis of population data with an Excel file of populations Step 1: Data input (population) Select your local Excel file of populations in the required format. You can download a valid example file if necessary to clarify ideas. Step 2: Choose kind of analysis for the population data Try to classify all individuals in the sample with the best SNPs. Perform a verbose cross-validation analysis of my population data with the best SNPs. Perform a nonverbose cross-validation analysis of my population data with the best SNPs. Compute bootstrap error of my population data with repeat number (200 recommended repeat number).
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464049281876.4/warc/CC-MAIN-20160524002121-00176-ip-10-185-217-139.ec2.internal.warc.gz
CC-MAIN-2016-22
634
9
https://help.altair.com/panopticon/authoring/onlinehelp/340_AddinganIframePart.htm
code
The Iframe Part allows a web page to be displayed within a dashboard or page. 1. After double-clicking or drawing a rectangle on the dashboard canvas, click on the Select Part pane then click the Iframe icon. The Iframe pane is displayed, and the Iframe part is added on the dashboard canvas. 2. Enter the URL of the page you want to embed in the dashboard. 3. Enable Scrollbars is enabled by default. Tap the slider to disable. This change will be displayed in the View mode. 4. To set the style of the Text Label, click Style . The page updates to display the Style pane. 5. See Defining the Style of General Parts to set the style. 6 Click Update Style and select any of the following options: · Set current as default – Save the changes and set it as the default. · Create custom style – Save the changes and set it as a custom style. The Style pane updates to display the Title control. ¨ Enter the custom style Title. ¨ If there are additional changes made, click Update Current Style in the Update Style drop-down. The new custom style is added in the Workbook > Theme > Custom Styles list. If published, the custom style configuration of the text label will be added to the Global custom styles list and can be applied to other parts. · Reset to default – Revert to the original default settings. 10. Click the Save icon on the toolbar to save the changes. When saved, the notification is displayed.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100499.43/warc/CC-MAIN-20231203094028-20231203124028-00877.warc.gz
CC-MAIN-2023-50
1,418
20
https://lists.swift.org/pipermail/swift-evolution/Week-of-Mon-20160815/026346.html
code
[swift-evolution] PITCH: New :== operator for generic constraints xiaodi.wu at gmail.com Tue Aug 16 19:48:20 CDT 2016 On Tue, Aug 16, 2016 at 7:43 PM, Charles Srstka <cocoadev at charlessoft.com> > On Aug 16, 2016, at 7:08 PM, Xiaodi Wu <xiaodi.wu at gmail.com> wrote: > On Tue, Aug 16, 2016 at 6:59 PM, Karl <razielim at gmail.com> wrote: >> On 17 Aug 2016, at 00:34, Charles Srstka via swift-evolution < >> swift-evolution at swift.org> wrote: >> On Aug 16, 2016, at 5:30 PM, Xiaodi Wu <xiaodi.wu at gmail.com> wrote: >> On Tue, Aug 16, 2016 at 5:19 PM, Charles Srstka via swift-evolution < >> swift-evolution at swift.org> wrote: >>> On Aug 16, 2016, at 5:13 PM, David Sweeris <davesweeris at mac.com> wrote: >>> Any proposal that expands the power of generic programming gets an >>> almost automatic +1 from me. >>> I can't think of any circumstances in which I wouldn't want to use ":==" >>> instead of ":". Are there any downsides to expanding ":" to mean what ":==" >>> Incidentally, I kinda thought things either already worked like this, or >>> would work like this after generics were "completed", but I can't tell you >>> why I thought that. >>> Me neither, but the last time I proposed that, people stated that there >>> were some cases where this could not work. No concrete examples were given, >>> but I assume it probably has something to do with associated type >>> wackiness. :== seems like a workable compromise to me. >> If an existential of a protocol P doesn't conform to itself, what can you >> do inside the body of a generic function that has a generic constraint >> specified with `:==`? In other words, what would we know about what's in >> common between such an existential of a protocol and types that conform to >> the protocol? >> My proposal is that in such cases, using :== would lead to a compiler >> swift-evolution mailing list >> swift-evolution at swift.org >> I think the point is that existentials not conforming to their protocols >> is the underlying reason this doesn’t work already. >> From the previous thread: >> There are a couple of reasons this is the case. IIRC in some cases it actually isn't possible for the existential to conform to the protocol in a sound way. And even when it is possible, I believe it has been said that it is more difficult to implement than you might think. Hopefully the situation will improve in the future but I'm not aware of any specific plans at the moment. >> It seems like a reasonably straightforward axiom. I would be interested >> to learn more about those edge-cases. > Hmm, re-reading that makes me worry about this proposal at a practical > level. IIUC, this is something that is pretty much desired across the > board, and if we could have it for `:` it'd be best. > But, it sounds like the reason `:` doesn't work that way isn't that the > core team has a different opinion, but rather that it's very difficult to > implement. And, IIUC, the situation is that no protocol existential > currently conforms to itself, not that some do and some don't. The > implementation work wouldn't be any easier if we called the operator > There are various ways to work around the problem using a new operator, > though, depending on how much work you wanted to do in implementing it. At > the very least you could take the ‘preprocessor’ approach and turn one > function using :== into two separate functions, one using == and one using > :, with both functions sharing the same body. This would still have the > code bloat in the binary, but at least it wouldn’t be bloating up the > source. We could then solve some of the binary bloat by spinning off the > function body into a third function and having both the two original > functions call that. Or maybe we could have the : variant reinterpret the > sequence as an == sequence and send it to the == variant. There are > multiple ways that this could be handled without forcing protocols to > conform to themselves. Not an expert, but wouldn't this blow up a whole bunch of compile-time "stuff" like the type checker? If no protocol existential conforms to itself, and it's unknown to the compiler whether it's even theoretically possible for a particular protocol, then what's to say what the body of a function that uses this constraint should be able to do? -------------- next part -------------- An HTML attachment was scrubbed... More information about the swift-evolution
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100164.87/warc/CC-MAIN-20231130031610-20231130061610-00375.warc.gz
CC-MAIN-2023-50
4,423
65
http://dinoboyben.tumblr.com/
code
Let's have a tryst at the witching hourMy Face A True Religion Into my life What I've Made Question my motives Whatchya got? TBH I never understood the whole “a key that opens many locks is a masterkey but a lock opened by many keys is a shitty lock” Locks are actually opened by two types of keys. The master keys which unlocks a set of locks, and there’s a key specifically for that lock. So locks instantly have two keys. Also if you live with people aside from yourself they’ll probably have a variation of one of the keys, or it might be a copy. So no a lock opened by many keys is just a fucking lock. There’s also locks designed to take many keys, and keys designed to only open one lock. So basically keep your keys out of my vagina. my rabbit is getting mad at me because i’m not paying attention to him so he keeps rubbing his face on my laptop and sitting on the keys and now he is just running in circles around me HONKING FURIOUSLY “MY CHIEF RABBIT HAS TOLD ME TO DEFEND THIS WARREN AND I SHALL NOT MOVE UNTIL HE ARRIVES”
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368705939136/warc/CC-MAIN-20130516120539-00088-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
1,050
10
http://larryborsato.com/blog/2009/03/i-just-have-one-question/
code
I was reading Thomas Friedman’s column, Mother Nature’s Dow, in today’s New York Times and saw this: “In our more recent global model simulations,” explained M.I.T., “the ocean heat-uptake is slower than previously estimated, the ocean uptake of carbon is weaker, feedbacks from the land system as temperature rises are stronger, cumulative emissions of greenhouse gases over the century are higher, and offsetting cooling from aerosol emissions is lower. Not one of these effects is very strong on its own, and even adding each separately together would not fully explain the higher temperatures. [But,] rather than interacting additively, these different effects appear to interact multiplicatively, with feedbacks among the contributing factors, leading to the surprisingly large increase in the chance of much higher temperatures.” "Leading to the surprisingly large increase in the chance of much higher temperatures"? There’s a statement that says nothing useful at all. How large is the increase in the chance? How much was the chance to start with? How much higher temperatures? These questions are never answered. I just have one question for all of these scientists who use these sophisticated models: Please tell me what the temperature will be tomorrow, for the location of your choice. Idon’t really expect an answer. I am supposed to believe that their models will predict 50 years from now, but I am absolutely sure that they won’t be able to predict tomorrow. We just don’t understand the climate well enough, and the best models have numerous variables that are basically guesses. I doubt that they could even predict last week’s weather. But that all pales in comparison to this comment: “Finally,” said Harvey, “we need a price on carbon.” Polluting the atmosphere can’t be free. Just because somebody decides to call carbon a pollutant doesn’t make it so. A pollutant is harmful or poisonous. Something we exhale and plants require could hardly be termed a pollutant. Except in a world of doublespeak. Powered by Bleezer
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875145859.65/warc/CC-MAIN-20200223215635-20200224005635-00298.warc.gz
CC-MAIN-2020-10
2,076
10
https://excel.uservoice.com/forums/304921-excel-for-windows-desktop-application/suggestions/37885639-hi-their
code
I use Microsoft Office 365 and for windows 10 x64 which is lasted update from my company side. so the most of problem when I use Microsoft excel in my laptop is that once I open excel file for edit my information and use touchpad or mouse to score task bar in excel file, the application will be hang state. the work around from my side must be close the application and re-open it again and then use the cursor arrow key board to move pointer instead. so on this problem, that is not comfortable to use Microsoft for me it says everything
s3://commoncrawl/crawl-data/CC-MAIN-2019-35/segments/1566027315811.47/warc/CC-MAIN-20190821065413-20190821091413-00353.warc.gz
CC-MAIN-2019-35
539
4
https://kasurdev.blogspot.com/2016/06/
code
Ouch! No posts for a long time :( It doesn't mean that I had vacations :) Recently I have updated Blocks Breaker. I am sure you know the game very well :) For the first view not many things has changed. Main changes are in the source code. We are preparing the game for the new features. At this stage it is a bit risky to put all the changes/features at once. We have to do it step-by-step, so there won't be too many bugs and you won't have to give us 1 star :P ;) Be sure that we are still working on the game. We are reading your reviews and comments. We also try very hard to solve all the issues you experience (some of them are harder than others and it takes much more time to fix them :(). Once again I would like to thank you for all your support and feedback :) Btw. we already have "list of the features" we want to add to the Blocks Breaker. Maybe you want something special to be added to the game? We are definitely open minded for any suggestions from you :)) That's it... for now :P As usual, here are the links to the Blocks Breaker :)
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817819.93/warc/CC-MAIN-20240421194551-20240421224551-00270.warc.gz
CC-MAIN-2024-18
1,053
7
https://community.logmein.com/t5/Pro/Is-there-a-keyboard-shortcut-to-switch-full-screen-in-remote/td-p/63468
code
Usually when login secure.logmein.com, I have to click "remote control", then click "switch to full screen mode" button on top right. If I want to go back to my local desktkop, I have to click "minimize window" button. Once I'm done on local and want to switch back to remote desktop, I need to switch the the browser that has logmein session open, and click "switch to full screen mode" again. It's annoying to click that "switch to full screen mode" button every time. I was wondering if there's a keyboard shortcut for it, or even make the full screen mode active. Can the community please advise? Thanks.
s3://commoncrawl/crawl-data/CC-MAIN-2017-43/segments/1508187825147.83/warc/CC-MAIN-20171022060353-20171022080353-00413.warc.gz
CC-MAIN-2017-43
608
2
https://gatekeeperhelp.zendesk.com/hc/en-us/articles/360040173153-Understanding-the-GateKeeper-Hub-dashboard-
code
Dashboard - GateKeeper Hub The GateKeeper Dashboard page provides an overview of GateKeeper activity on your network. Provided below is a breakdown of all components and screenshot of the Dashboard page. There are clickable elements and links that exist on every page view in the Hub. |Can search the knowledge base to find guides and FAQs for using the GateKeeper system. Internet connection is required. Enter questions on how to use the GateKeeper solution.| |The link redirects the user to the Dashboard page.| |The link sends the user to the GateKeeper Customer Portal website.| |The Support link opens the user’s default email program to contact the GateKeeper support team.| |The Untethered Labs, Inc. link sends the user to the GateKeeper homepage.| At the top of most pages are the following buttons. |Switch to "Dark Mode" theme. Helps save power and is easier on the eyes.| |The Notifications icon - view and manage all notifications. From the dropdown menu, users can click any notification to go to the related page. This will be elaborated more in the Notifications icon section of this document.| |The gear icon opens the Administration page. This page includes other sections such as Hub Administration, Client Administration, and Off-site Hub Access Management. These sections are explained in the Administration section of this document.| The status bar is located on top of the Dashboard page. These four views provide real-time information on how many Computers are currently registered to Hub, Users currently registered to Hub, Locks and Unlocks being performed using GateKeeper Hub. The numbers change according to the usage of the application. ‘GateKeeper Locks’ shows how many auto-locks have been performed using GateKeeper. The GateKeeper Unlocks status view shows how many unlocks have been performed using GateKeeper. ‘Total Session Time (Hrs)’ shows how many hours of sessions time has happened using GateKeeper. ‘Money Saved (USD)’ shows how much money has been saved in productivity from automating password typing and avoiding forgotten passwords. Dashboard page also shows a summary of your weekly and monthly GateKeeper activity analytics. Sessions and Logged in Time This display shows the organization’s GateKeeper activity of secured sessions each day of the week. When the user hovers their mouse over the data points, information will be displayed in hours. Lock and Unlock Events Shows the organization’s GateKeeper lock and unlock activity for the past and current week. Top Active Computers: This section keeps track of how actively users are using their GateKeeper tokens to log in and log out of each computer. The list displays each computer’s name with Total Sessions, Total Time, Sessions Today, and Time Today. Users can view past data with the calendar option. Top Active Users: This section keeps track of how actively users are using their GateKeeper tokens to lock and unlock computers. The list displays each users name with Total Sessions, Total Time, Sessions Today, and Time Today. Users can view past data with the calendar option. Number of Session Heat Map shows the frequency of sessions during the times of day and days of week. Clicking the GateKeeper Hub icon will redirect to the Dashboard. Clinking the username will bring up the ‘Profile Settings’ button. This will redirect the user to the ‘User Profile’ page. Click the user’s profile picture and a dropdown will appear with two options: Profile Settings and Logout. Click on Profile Settings to edit your name, email, phone number, password, upload new photo, and option to receive monthly GateKeeper activity email reports. On the Password tab, update current password and choose a code to recover their password. Other helpful links for admins: For any additional questions or concerns regarding proximity settings, computer locking, or credential management, or compliance, please contact GateKeeper Enterprise support using the Support Ticket form on https://gkaccess.com/support/ or email [email protected] "What is the GateKeeper Hub dashboard?" "What is the Hub dashboard?"; GateKeeper dashboard explained.; How to use GateKeeper Hub dashboard?; What is the Hub dashboard used for?; my profile; admin profile; hub software; what to do with hub; how to use hub; start with hub; hub explanation; hub guide; guide to gk hub; hub gk how to use; The GateKeeper Hub dashboard explained.;
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506669.30/warc/CC-MAIN-20230924191454-20230924221454-00529.warc.gz
CC-MAIN-2023-40
4,451
35
http://www.mdtutorials.com/gmx/complex/09_analysis.html
code
Step Nine: Analysis Recentering and Rewrapping Coordinates As in any simulation conducted with periodic boundary conditions, molecules may appear "broken" or may "jump" back and forth across the box. To recenter the protein and rewrap the molecules within the unit cell to recover the desired rhombic dodecahedral shape, invoke trjconv: gmx trjconv -s md_0_10.tpr -f md_0_10.xtc -o md_0_10_center.xtc -center -pbc mol -ur compact Choose "Protein" for centering and "System" for output. Note that centering complexes (protein-ligand, protein-protein) may be difficult for longer simulations involving many jumps across periodic boundaries. In those instances (particularly in protein-protein complexes), it may be necessary to create a custom index group to use for centering, corresponding to the active site of one protein or the interfacial residues of one monomer in a complex. To extract the first frame (t = 0 ns) of the trajectory, use trjconv -dump with the recentered trajectory: gmx trjconv -s md_0_10.tpr -f md_0_10_center.xtc -o start.pdb -dump 0 For even smoother visualization, it may be beneficial to perform rotational and translational fitting. Execute trjconv as follows: gmx trjconv -s md_0_10.tpr -f md_0_10_center.xtc -o md_0_10_fit.xtc -fit rot+trans Choose "Backbone" to perform least-squares fitting to the protein backbone, and "System" for output. Note that simultaneous PBC rewrapping and fitting of the coordinates is mathematically incompatible. Should you wish to perform fitting (which is useful for visualization, but not necessary for most analysis routines), carry out these coordinate manipulations separately, as indicated here. Analyzing Protein-Ligand Interactions and Ligand Dynamics This tutorial cannot possible cover all analysis methods that you may wish to perform. A few basic operations will be illustrated here. The 2-propylphenol ligand can engage in a hydrogen bond with the Gln102 side chain. The GROMACS hbond module can easily be employed to calculate the number of hydrogen bonds between any groups of atoms, but in our case, the only values will be 1 or 0. For a more detailed look at how the ligand is interacting with Gln102, we will compute the distance between the hydroxyl group of JZ4 and the carbonyl O atom of Gln102. For a hydrogen bond to be formed, the typical criterion is that the donor and acceptor atoms will be separated by a distance ≤ 3.5 Å (0.35 nm). Use the distance module to calculate the distance over the course of the trajectory, using command-line selection syntax (see gmx help selections for examples and more syntax). gmx distance -s md_0_10.tpr -f md_0_10_center.xtc -select 'resname "JZ4" and name OAB plus resid 102 and name OE1' -oall The average distance is 0.31 ± 0.05 nm, consistent with the formation of a hydrogen bond. The second criterion usually applied in determining the presence of a hydrogen bond is the angle formed among the donor, hydrogen, and acceptor atoms. There are different conventions for calculating the angle. In the GROMACS hbond module, the angle is defined as hydrogen-donor-acceptor, and this angle should be ≤ 30°. To perform this analysis, first create index groups for the donor atoms (which must include both the donor heavy atom and the bonded hydrogen) and the acceptor atom: gmx make_ndx -f em.gro -o index.ndx ... > 13 & a OAB | a H12 (creates group 23) > 1 & r 102 & a OE1 (creates group 24) > 23 | 24 > q Analyze the angle formed by these three atoms using the angle module: gmx angle -f md_0_10_center.xtc -n index.ndx -ov angle.xvg Note that angle takes no -s argument, unlike most other GROMACS analysis modules. Angle calculations do not require mass or periodicity information, atom names, etc. so the trajectory is processed without a .tpr or coordinate file. The value returned by the command should be roughly 23 ± 9°. This outcome may be somewhat unexpected, as the index group we constructed was in the order of OAB, H12, OE1, which would correspond to the donor-hydrogen-acceptor distance, which we expect to be close to linear (~180°). Inspect the contents of the index file and you will find: [ JZ4_&_OAB_H12_Protein_&_r_102_&_OE1 ] 1616 2624 2636 make_ndx has sorted the atom numbers automatically from low to high, thus the outcome of the calculation is the acceptor-donor-hydrogen angle, the same angle that the hbond module would have calculated. So the result is consistent with formation of a hydrogen bond, since it is ≤ 30°. To get the desired angle of donor-hydrogen-acceptor, we would have to manually edit the index group in a text file to reorder the atom numbers (2624 2636 1616). Re-running the angle calculation with this index group yields an average value of 147 ± 11°. Finally, we may be interested in quantifying how much the ligand binding pose has changed over the course of the simulation. To compute a heavy-atom RMSD of just JZ4, create a new index group for it: gmx make_ndx -f em.gro -n index.ndx ... > 13 & ! a H* > name 26 JZ4_Heavy > q Execute the rms module, choosing "Backbone" for least-squares fitting and "JZ4_Heavy" for the RMSD calculation. By doing so, the overall rotation and translation of the protein is removed via fitting and the RMSD reported is how much the JZ4 position has varied relative to the protein, which is a good indicator of how well the binding pose was preserved during the simulation. gmx rms -s em.tpr -f md_0_10_center.xtc -n index.ndx -tu ns -o rmsd_jz4.xvg The calculated RMSD should be about 0.1 nm (1 Å), indicating only a very small change in the ligand's position. Protein-Ligand Interaction Energy To quantify the strength of the interaction between JZ4 and T4 lysozyme, it may be useful to compute the nonbonded interaction energy between these two species. GROMACS has the ability to decompose the short-range nonbonded energies between any number of defined groups. It is important to note that this quantity is NOT a free energy or a binding energy. In fact, most force fields are not parametrized in such a way that this quantity is actually physically meaningful. CHARMM is parametrized to specifically target quantum mechanical interaction energies with water, so it is intrinsically balanced against meaningful quantities, and as such the interaction energy can be useful. Calculation of an interaction energy is carried out via the gmx grompp -f ie.mdp -c npt.gro -t npt.cpt -p topol.top -n index.ndx -o ie.tpr Next, invoke mdrun with the -rerun option to recalculate energies from the existing simulation trajectory: gmx mdrun -deffnm ie -rerun md_0_10.xtc -nb cpu Note the use of -deffnm to read ie.tpr and write all output files to ie.* as their file names. The -rerun option takes the name of the trajectory for which you want to recompute energies, and -nb cpu tells mdrun to only attempt to run on CPU hardware and ignore any GPU that might be available. As stated above, this type of calculation cannot be performed on a GPU. The rerun should be very fast, completing in just a few minutes. Extract the energy terms of interest via the energy module. The terms we are interested in are Coul-SR:Protein-JZ4 and LJ-SR:Protein-JZ4. gmx energy -f ie.edr -o interaction_energy.xvg The average short-range Coulombic interaction energy is -20.5 ± 7.4 kJ mol-1 and the short-range Lennard-Jones energy is -99.1 ± 7.2 kJ mol-1. It may be tempting to draw conclusions from the relative magnitudes of these quantities, but even though CHARMM was parametrized against explicit water interaction energies, decomposition of interaction energies further into these components is not necessarily real. There is no way to experimentally verify these quantities, so it is impossible to know whether they are meaningful. The total interaction energy, however, is useful in this case. That value (after propagating the error according to the standard formula for addition of two quantities) is -119.6 ± 10.3 kJ mol-1. Site design and content copyright Justin Lemkul Problems with the site? Send them to the Webmaster
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656788.77/warc/CC-MAIN-20230609164851-20230609194851-00489.warc.gz
CC-MAIN-2023-23
8,037
39