url
stringlengths 13
4.35k
| tag
stringclasses 1
value | text
stringlengths 109
628k
| file_path
stringlengths 109
155
| dump
stringclasses 96
values | file_size_in_byte
int64 112
630k
| line_count
int64 1
3.76k
|
---|---|---|---|---|---|---|
http://stackoverflow.com/questions/7082270/isolating-the-inheritance-into-a-function
|
code
|
Your code seemed a bit complex. See a simpler example (remember to switch on a debugging tool to see log messages).
The prototype link is stored within an object whenever an object is created and points to the object as specified in the
prototype property of the object's constructor function. You can inspect the prototype in Firefox by checking an object's
In the linked example, there are 3 constructors:
- createPrototype (helper to get an empty object with defined prototype link)
In the linked example, there are 2 prototype objects:
- Shape.prototype (contains shared properties for shapes)
- Triangle.prototype (contains shared properties for triangles)
First a shape is created by calling
new Shape(). This creates a new object since
new is written in front of the function named
Shape. The prototype link of the object (
__proto__ in Firefox) points to
Shape.prototype because this property of the constructor function gives the prototype link's target. The link is set on object instantiation.
As a result whenever you try to access a property of the
shape the property is retrieved as follows. First,
shape is searched for the property. If it's there, use it. If not, the prototype object
shape.__proto__ is retrieved which refers to the same object as
Shape.prototype. Now, the prototype object is searched for the property.
For the case of triangle the thing is a bit more complex because multiple prototype links are involved. The important thing is that we need to create an empty object to hold the triangles' shared properties which also needs to have its prototype link set to point to
Shape.prototype. This makes shape's prototype the fallback of triangle's prototype.
It is archived by the anonymous function that includes
createPrototype. It needs to be included because every invocation of the anonymous function needs to manipulate the
prototype property of a constructor function (called
createPrototype in our case). After the empty prototype object with the prototype chain is created, it is instantly returned and assigned to
Triangle.prototype. After that any object created by
new Triangle() has the desired prototype chain.
Once this is set, we can add all shared properties of triangles into the
Triangle.prototype object that was just created. This is shown by overriding
paint and by adding
getArea. Note this overriding actually works because the
paint function for triangles is found earlier than the
paint method for shapes and the first found reference/property is used.
To summarize, all property accesses on objects use prototype chains for fallbacks. In our case the chain for
Shape.prototype and the one for
You might want to assign a name to the anonymous function (that includes
createPrototype) to have a tool for created object hierarchies. This is shown in the updated example and ends up with the following helper:
// We need a new object whose prototype link points to parent.prototype
createPrototype.prototype = parent.prototype;
return new createPrototype();
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1419447554236.61/warc/CC-MAIN-20141224185914-00037-ip-10-231-17-201.ec2.internal.warc.gz
|
CC-MAIN-2014-52
| 3,010 | 40 |
http://labs.kortina.net/posts/quick-add-event-to-google-calendar-with-google-chrome-address-bar-shortcut/
|
code
|
I have been using the Chrome Address bar as a universal input / command line for the web, sort of how I use Quicksilver for my desktop activity, and recently came up with a new favorite: quick add to Google Calendar.
I have set Chrome so I can type something like “ca 4pm coffee [email protected]” to create a calendar event+invitation. Here is what it looks like:
To set this up, right click on the Chrome address bar, click Edit Search Engines, then click the + and add a new search engine with these details:
Name: gcal quickadd (venmo) Keyword: ca URL: http://www.google.com/calendar/event?ctext=+%s+&action=TEMPLATE&pprop=HowCreated%3AQUICKADD (Google Apps URL use:)http://www.google.com/calendar/hosted/yourAppsDomain.com/event?ctext=+%s+&action=TEMPLATE&pprop=HowCreated%3AQUICKADD
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368707436824/warc/CC-MAIN-20130516123036-00085-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 792 | 4 |
https://leaf.dragonflybsd.org/mailarchive/users/2009-09/msg00019.html
|
code
|
|From:||"Alex Hornung" <ahornung@xxxxxxxxx>|
|Date:||Wed, 2 Sep 2009 21:11:38 +0100|
I've recently commited both the kernel and userland part of unix98 ptys, so I'm giving a short description of what happened and what to do if problems arise.
What are unix98 ptys?
Unix98 ptys are just a new standard for ptys. They basically revolve around /dev/ptmx (to open a master pty) and /dev/pts/XXX, where XXX is a number, for slaves.
BSD ptys are limited to 256 ptys, due to the chosen nomenclature. Unix98 ptys are limited to 1000 ptys due to the line length of utmp (8 bytes), which allows for at most "pts/999" (plus a terminating '\0'). See utmp(5) man page for more info on this.
New userland functions in libc are:
* posix_openpt - Implemented as standard dictates (basically just opening /dev/ptmx)
* ptsname - Implemented as standard dictates
* grantpt - No-op, as the kernel already creates the pty dynamically with all the right permissions and ownership (see permissions further down). Following the standard would add a security risk here, imho. Every single bit of code I've ever seen using grantpt, only does so to follow the standard, not expecting it to do anything.
* unlockpt - No-op, as it really has no use whatsoever with dynamically created ptys.
I've also migrated openpty(3) to first try and use unix98 ptys, and if any part of that fails, to fall back to the old BSD ptys. Old BSD ptys can still be used as they always have been used; nothing has changed for them. As a matter of fact some programs, as xterm < 247 and aterm don't even use openpty(3) and just find a free BSD pty (/dev/pty**), so expect to still see quite a few /dev/pty** and family.
Permissions (as specified in grantpt standard) are the following:
For slaves: <real uid>, group "tty", 0620
For master: <real uid>, group "wheel", 0600 but it doesn't matter, because the master device cannot be opened more than once. Every time /dev/ptmx is opened, a different master is acquired.
Make sure you have all the commits relating to unix98 ptys. If something is still wrong, please do:
This will enable some basic debugging for unix98 ptys which should be enough for most (critical) problems. If you find any other problem, especially with some program doing "something" weird, don't hesitate to contact me.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587623.1/warc/CC-MAIN-20211025030510-20211025060510-00401.warc.gz
|
CC-MAIN-2021-43
| 2,289 | 17 |
https://osu.ppy.sh/community/forums/topics/141240?start=2439581
|
code
|
Is there a fair use limit? (e.g. no more than XX requests per day)
For get_user, I suppose there is a mode parameter for getting user information for Taiko, CtB and osu!mania? Or do I have to file an issue in GitHub? Nevermind, I found it, the parameter to add is called "m" I have edited the GitHub wiki.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303729.69/warc/CC-MAIN-20220122012907-20220122042907-00152.warc.gz
|
CC-MAIN-2022-05
| 305 | 2 |
https://community.toradex.com/t/is-a-fan-required-for-proper-thermal-management-on-apalis-imx8qm/8262
|
code
|
Is a fan for active cooling required on the Apalis iMX8QM? If so, which kind of fan is required?
First off, it is safe to operate the Apalis iMX8QM without fan. The SoC will throttle GPU/CPU at 85°C temperature which will affect performance, but it won’t do any damage to the hardware. In fact, internal tests even showed that throttling works nicely even without heatsink at 125°C the system will do a thermal shutdown. But operating without heatsink is definitely not recommended!
At 85°C and higher the GPU is throttles rather extrem to a 1/64 of its regular performance. Which is often a problem in real world applications. Hence you typically want to cool the system to operate below 85°C.
[ 1649.875796] System is too hot. GPU3D will work at 1/64 clock. [ 1650.255775] Hot alarm is canceled. GPU3D clock will return to 64/64
Whether active cooling is needed ultimately depends on your application. Running glmark2 (which loads the GPU) and load two A53 CPUs fully allowed to run the system over longer period of time without throttling (>20min). However, when loading all cores, the system started to throttle after about 2 minutes.
During development it is likely not yet needed to run the CPU and GPU over longer periods of time at full load, so operating without fan is probably for a lot of development activities just fine.
In a final system, more factors need to be considered, e.g. beside typical CPU/GPU load also things like varying ambient temperature or casing. E.g. a fan is not very helpful if the case is closed anyway…
You can read the temperature of the system using sysfs. There are 5 thermal zones:
/sys/class/thermal/thermal_zone0/temp: A53 /sys/class/thermal/thermal_zone1/temp: A72 /sys/class/thermal/thermal_zone2/temp: GPU0 /sys/class/thermal/thermal_zone3/temp: GPU1 /sys/class/thermal/thermal_zone4/temp: DRC
If you want to be on the safe side, plan with a fan!
Fan: The screw holes in the heat sink fit a regular 40x40mm fan. Be careful to not use too long screws since the screw holes go through the heatsink and screws could touch (destroy) the modules PCB! The Mini-Kaze SY124010L and the Noctua NF-A4x10 FLX are two fans we currently use at Toradex. Both of those Fans fit with M2.5x14 screws.
Thanks for pointing out FAN models. My board is getting quite hot even while compiling. I’ve got Mini-Kaze fan from Amazon but it just came without screws. Would you mind telling what kind of screws supposed to be used? Really do not like to go to a hardware store with the board.
You can use that screws - https://www.amazon.com/XunLiu-Button-Socket-Screws-M2-5X14/dp/B0756SDFD2
Or any other M2.5x14 screws
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587877.85/warc/CC-MAIN-20211026103840-20211026133840-00443.warc.gz
|
CC-MAIN-2021-43
| 2,647 | 14 |
https://chancellorfiles.com/exchange-bluehost-server-settings/
|
code
|
Exchange Bluehost Server Settings
Discovering a premium economical host carrier isn’t easy. Every website will certainly have different needs from a host. And also, you need to contrast all the attributes of a holding company, all while seeking the most effective deal feasible.
This can be a lot to sort with, particularly if this is your first time buying hosting, or developing a site.
The majority of hosts will certainly use extremely low-cost introductory rates, only to raise those prices 2 or 3 times greater once your initial call is up. Some hosts will certainly give complimentary perks when you subscribe, such as a cost-free domain, or a cost-free SSL certificate.
While some hosts will have the ability to use better performance and high levels of security. Exchange Bluehost Server Settings
Listed below we dive deep right into the most effective affordable web hosting plans out there. You’ll discover what core holding functions are crucial in a host and also exactly how to analyze your own organizing demands to ensure that you can select from among the best inexpensive hosting carriers listed below.
Disclosure: When you acquire a webhosting plan via links on this web page, we gain some payment. This aids us to maintain this website running. There are no added expenses to you in any way by using our links. The list below is of the most effective economical webhosting plans that I have actually directly utilized as well as examined.
What We Think about To Be Low-cost Web Hosting
When we describe a web hosting package as being “Affordable” or “Budget” what we imply is hosting that comes under the cost brace between $0.80 to $4 each month. Whilst looking into cheap holding providers for this guide, we looked at over 100 different hosts that fell under that cost array. We after that analyzed the top quality of their most affordable hosting package, worth for cash and client service.
In this article, I’ll be looking at this first-rate site hosting firm as well as stick in as much pertinent information as possible.
I’ll discuss the functions, the prices alternatives, as well as anything else I can consider that I think may be of advantage, if you’re deciding to join to Bluhost and obtain your websites up and running.
So without additional trouble, allow’s check it out.
Bluehost is one of the greatest web hosting firms on the planet, obtaining both enormous advertising and marketing support from the business itself and associate online marketers who advertise it.
It truly is a substantial firm, that has actually been around for a long time, has a big credibility, and is definitely among the top choices when it pertains to web hosting (absolutely within the leading 3, a minimum of in my publication).
However what is it precisely, and also should you obtain its services?
Today, I will answer all there is you require to understand, offered that you are a blogger or an entrepreneur that is searching for a host, and also does not understand where to start, considering that it’s a terrific remedy for that audience generally.
Let’s picture, you intend to host your sites and also make them noticeable. Okay?
You currently have your domain name (which is your website location or URL) but now you want to “turn the lights on”. Exchange Bluehost Server Settings
You need some organizing…
To complete all of this, and to make your web site noticeable, you require what is called a “web server”. A web server is a black box, or device, that keeps all your website data (documents such as pictures, messages, videos, web links, plugins, and other info).
Currently, this web server, needs to get on regularly and also it needs to be connected to the internet 100% of the moment (I’ll be mentioning something called “downtime” later on).
Additionally, it likewise requires (without getting as well elegant as well as into information) a file transfer protocol frequently called FTP, so it can show web browsers your website in its designated type.
All these points are either pricey, or need a high degree of technical ability (or both), to produce and also preserve. And also you can completely go out there and also discover these points by yourself and set them up … yet what concerning instead of you buying and keeping one … why not simply “renting hosting” instead?
This is where Bluehost can be found in. You rent their servers (called Shared Hosting) and also you introduce a web site making use of those servers.
Because Bluehost maintains all your documents, the firm additionally allows you to establish your material management systems (CMS, for short) such as WordPress for you. WordPress is a super popular CMS … so it just makes good sense to have that choice offered (nearly every organizing company now has this choice too).
In other words, you no more require to set-up a web server and afterwards incorporate a software application where you can build your content, independently. It is already rolled into one bundle.
Well … picture if your web server is in your home. If anything were to happen to it whatsoever, all your documents are gone. If something fails with its inner procedures, you need a professional to fix it. If something overheats, or breaks down or gets damaged … that’s no good!
Bluehost takes all these troubles away, as well as takes care of whatever technological: Pay your web server “rental fee”, and they will look after every little thing. And once you purchase the solution, you can after that start focusing on including content to your site, or you can put your effort right into your advertising and marketing campaigns.
What Solutions Do You Receive From Bluehost?
Bluehost uses a myriad of different services, however the primary one is hosting of course.
The organizing itself, is of different kinds by the way. You can rent a shared web server, have a devoted web server, or also an onlineexclusive web server.
For the purpose of this Bluehost testimonial, we will concentrate on organizing services and other solutions, that a blogger or an online business owner would certainly require, as opposed to go too deep right into the bunny opening and discuss the various other services, that are targeted at even more knowledgeable folks.
- WordPress, WordPress PRO, as well as e-Commerce— these hosting solutions are the bundles that allow you to host a website making use of WordPress and WooCommerce (the latter of which enables you to do e-commerce). After buying any one of these bundles, you can begin developing your website with WordPress as your CMS.
- Domain name Industry— you can also purchase your domain from Bluehost as opposed to other domain name registrars. Doing so will certainly make it much easier to aim your domain name to your host’s name servers, because you’re utilizing the exact same industry.
- Email— as soon as you have bought your domain, it makes good sense to additionally get an e-mail address connected to it. As a blogger or on the internet entrepreneur, you should virtually never ever utilize a cost-free e-mail service, like Yahoo! or Gmail. An e-mail like this makes you look less than professional. Fortunately, Bluehost offers you one free of charge with your domain name.
Bluehost likewise supplies dedicated web servers.
And also you may be asking …” What is a specialized web server anyhow?”.
Well, the important things is, the standard webhosting packages of Bluehost can just a lot website traffic for your site, after which you’ll need to upgrade your hosting. The factor being is that the usual web servers, are shared.
What this indicates is that server can be servicing two or even more sites, at the same time, one of which can be your own.
What does this mean for you?
Exchange Bluehost Server Settings
It implies that the single server’s resources are shared, as well as it is doing several tasks at any given time. Once your web site starts to hit 100,000 website visits each month, you are going to require a dedicated web server which you can likewise get from Bluehost for a minimum of $79.99 each month.
This is not something yous ought to fret about when you’re beginning but you need to maintain it in mind for sure.
Bluehost Prices: Just How Much Does It Price?
In this Bluehost testimonial, I’ll be focusing my attention mainly on the Bluehost WordPress Hosting packages, since it’s the most preferred one, as well as very likely the one that you’re searching for and that will suit you the most effective (unless you’re a massive brand name, company or site).
The 3 available strategies, are as complies with:
- Basic Plan– $2.95 monthly/ $7.99 routine cost
- Plus Plan– $5.45 per month/ $10.99 routine rate
- Choice Plus Plan– $5.45 each month/ $14.99 normal price
The initial cost you see is the cost you pay upon sign up, and also the second price is what the price is, after the first year of being with the firm.
So primarily, Bluehost is mosting likely to bill you on an annual basis. And you can also select the amount of years you want to host your site on them with. Exchange Bluehost Server Settings
If you select the Basic plan, you will certainly pay $2.95 x 12 = $35.40 starting today as well as by the time you enter your 13th month, you will certainly now pay $7.99 each month, which is likewise charged per year. If that makes any sense.
If you are serious about your website, you need to 100% obtain the three-year option. This suggests that for the basic strategy, you will certainly pay $2.95 x 36 months = $106.2.
By the time you hit your 4th year, that is the only time you will pay $7.99 each month. If you think of it, this technique will certainly save you $120 in the course of three years. It’s not much, however it’s still something.
If you intend to obtain greater than one internet site (which I highly recommend, and also if you’re significant, you’ll probably be getting more eventually in time) you’ll intend to take advantage of the choice plus plan. It’ll enable you to host limitless websites.
What Does Each Plan Deal?
So, when it comes to WordPress holding strategies (which are similar to the common organizing strategies, but are extra geared in the direction of WordPress, which is what we’ll be focusing on) the features are as adheres to:
For the Basic plan, you get:
- One website just
- Guaranteed internet site via SSL certification
- Maximum of 50GB of storage space
- Cost-free domain name for a year
- $ 200 marketing credit score
Remember that the domains are acquired separately from the holding. You can obtain a complimentary domain name with Bluehost right here.
For both the Bluehost Plus hosting and also Choice Plus, you get the following:
- Limitless number of web sites
- Free SSL Certification. Exchange Bluehost Server Settings
- No storage space or data transfer restriction
- Complimentary domain name for one year
- $ 200 marketing credit report
- 1 Workplace 365 Mail box that is free for 30 days
The Choice Plus strategy has an included advantage of Code Guard Basic Back-up, a back-up system where your documents is saved and replicated. If any kind of crash happens as well as your website data goes away, you can restore it to its initial form with this feature.
Notice that even though both strategies set you back the exact same, the Choice Strategy then defaults to $14.99 each month, normal price, after the collection quantity of years you’ve selected.
Exchange Bluehost Server Settings
What Are The Advantages Of Using Bluehost
So, why pick Bluehost over other host solutions? There are thousands of host, most of which are resellers, yet Bluehost is one pick couple of that have stood the test of time, and it’s probably one of the most well known out there (as well as completely reasons).
Right here are the three major advantages of selecting Bluehost as your web hosting company:
- Server uptime— your internet site will not be visible if your host is down; Bluehost has more than 99% uptime. This is exceptionally crucial when it concerns Google Search Engine Optimization and also rankings. The greater the far better.
- Bluehost speed— exactly how your server response establishes exactly how rapid your web site shows on an internet browser; Bluehost is lighting quickly, which suggests you will certainly reduce your bounce price. Albeit not the best when it concerns loading speed it’s still widely essential to have a rapid speed, to make user experience much better as well as much better your ranking.
- Endless storage space— if you get the And also strategy, you need not bother with the amount of files you keep such as videos– your storage capability is unlimited. This is truly vital, due to the fact that you’ll probably encounter some storage issues later down the tracks, and also you do not want this to be a hassle … ever before.
Finally, consumer assistance is 24/7, which suggests despite where you remain in the globe, you can speak to the support team to repair your internet site concerns. Pretty typical nowadays, however we’re taking this for approved … it’s also extremely crucial. Exchange Bluehost Server Settings
Also, if you have actually obtained a complimentary domain with them, then there will be a $15.99 fee that will be subtracted from the quantity you initially bought (I visualize this is because it type of takes the “domain name out of the marketplace”, not sure about this, however there probably is a hard-cost for registering it).
Finally, any requests after thirty days for a reimbursement … are void (although in all honesty … they must probably be rigorous below).
So as you see, this isn’t always a “no doubt asked” policy, like with a few of the other organizing choices around, so make sure you’re okay with the policies before continuing with the hosting.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320304287.0/warc/CC-MAIN-20220123141754-20220123171754-00703.warc.gz
|
CC-MAIN-2022-05
| 13,890 | 84 |
https://math.answers.com/Q/What_are_the_next_2_numbers_in_this_sequence_20118491
|
code
|
The numbers are increasing by 1,4,9,16,25,36.... which are square numbers so the next increase is 49. Making the next number in the sequence 141
Two possible answers spring immediately to mind. First, this sequence appears to be a list of the first five prime numbers; in this case, the next number in the sequence would be 13. Second, the intervals between these numbers comprise the sequence "1 2 2 4", in which the nth number equals the product of the (n-1)th and (n-2)th numbers. Based on this, the next number in the given sequence would be 11 + (4*2) = 19.
This list of numbers is the list of prime numbers. Following 11, the next two numbers in the list are 13 and 17.
The next number in the sequence would be 23. The sequence consists of prime numbers.
15... you're dividing by 2 each time.
13, 21 - it is the Fibonacci sequence
6 and 10
6, 2, ⅔
The next four number in the sequence are... 4,5,5 & 6
21. Add the last 2 numbers to get the next.
Fibonacci found a way to present mathematical numbers so that each number in the sequence is the sum of the two previous numbers. For example, if the sequence starts at 0 and 1, then next number in the sequence is 1, the next number would be 2, and then the next number would be 3, and then 5.
That's the Fibonacci sequence! XD They're 21 and 34 if you add up the last two numbers to get the next one.
It appears as if the pattern is doubling, therefore the next three numbers are 16, 32, and 64.
The next number is 70.The sequence is the central spine numbers of Pascal's Triangle (see related link and related question below).
These are all prime numbers. The next one is 17
8, if it is the Fibonacci sequence; 7, if it the sequence of non-composite numbers (1 and primes); there are other possible answers.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780057303.94/warc/CC-MAIN-20210922011746-20210922041746-00404.warc.gz
|
CC-MAIN-2021-39
| 1,763 | 16 |
https://careerfoundry.com/en/blog/data-analytics/data-analytics-blogs/
|
code
|
Just discovered data analytics and want to learn more? Perhaps you’re considering a career in the field? Or maybe you’re a seasoned data analyst looking for specialized topics? Wherever you’re at on your data analytics journey, you’ll find an abundance of great data analytics blogs to help you. These include beginner’s guides, student support, and career development for those looking to expand their expertise.
However, with so many data analytics blogs available, it’s all too easy to spend more time searching for the right one than actually reading about the topics that interest you. To save you from the quagmire of Google’s search results, we’ve compiled our personalized list of top data analytics blogs that we think you can’t do without. We’ll cover:
- Best blogs for data analysts: total beginners
- Best blogs for data analysts: data analytics students
- Best blogs for data analysts: best practices for the field
- Best blogs for data analysts: specialized topics
Ready to explore the best blogs for data analysts? Let’s jump right in.
1. Best blogs for data analysts: total beginners
Created by data scientist and founder of KDD conferences (Knowledge Discovery and Data Mining), Gregory Piatetsky-Shapiro, KDNuggets is one of the leading data science blogs. Perfectly pitched at beginners, it covers everything from AI to machine learning and other data-related topics. Standing for ‘Knowledge Discovery’, KDNuggets also dives deep on industry meetings, upcoming events and data analytics software reviews.
While the UX design of KDNuggets leaves a little to be desired, its breadth of content more than makes up for this. It boasts tutorials, opinion pieces, and if you want to go beyond learning (and straight into doing) it recommends high-quality datasets that you can dabble with. If you prefer content popping up on your socials rather than trawling the blog itself, follow KDNuggets on LinkedIn, Facebook, or Twitter, where you’ll get regular updates straight to your newsfeed.
Towards Data Science
With over 600,000 subscribers, Towards Data Science is a Medium blog that publishes a range of data analytics concepts, ideas, and code. What’s great about this blog is its breadth of authors and independent data bloggers, who are mostly all professionals working in the field. This keeps it diverse, relevant, and up to date. The bloggers all use a friendly, accessible language, making this ideal for beginners who want to learn about topics ranging from machine learning to data visualization, as well as practical guides to Python and other programming tips.
If you’re not sure where to start, we recommend checking out Towards Data Science’s Editors’ Picks. This curates some diverse subjects, such as what you can learn about data from playing the viral hit Wordle. As one Reddit user writes, “This is less of a blog to follow and more of a mandatory landing page in your browser tab.”
We couldn’t agree more!
CareerFoundry data analytics blog
The CareerFoundry data analytics blog is specifically aimed at those with limited experience of data analytics, but who may be considering a career in the field. You’ll find everything from beginner guides to data analytics, to how it’s used in different industries, as well as introductory explainers like how to apply different MS Excel functions.
You’ll also discover posts covering the latest on the data analytics job market, including interview tips, salary guides, data analytics portfolio examples, and topics exploring the difference between different data analytics roles. The CareerFoundry data analytics blog always uses inclusive, straightforward language, making it a great resource for those who are dipping their toe into the topic for the first time.
2. Best blogs for data analysts: data analytics students
Full Stack Python blog
A fundamental tool for data analysts—whether beginner or expert—is the Python programming language. While Python is meant to be easy to pick up, many of the resources for learning it are vastly overcomplicated, and aren’t written using very accessible language. The Full Stack Python blog is not one of these. This excellent blog covers Python’s many applications in fields from web development to app deployment and, naturally, data analytics.
Written by various contributors, the blog underscores concepts in simple, non-technical language, offering links to the best tutorials for given topics. The data analytics section covers everything from the basics of relational databases to Python data types. And where possible, it uses real-world examples to help illuminate the concepts. For an example, see this post which explores how to learn the Python package, pandas, using Covid-19 data.
Kaggle Winner’s Blog
Machine learning and data science community, Kaggle, is an excellent data analytics resource in its own right. It offers free support, free datasets, and code to all its members. It’s also known for running regular competitions, where data analysts compete against one another to win data- and coding-related challenges. This alone makes it a useful sandpit for data analytics students to test their skills.
In addition, though, is Kaggle Winner’s Blog, where you can read interviews with past Kaggle challenge winners, discovering what they’ve learned, what their backgrounds are, what approach they took to winning the challenge, and where you can get your hands on their code! It’s a great way to learn about applied data analytics, and is a prime first step for understanding how to use your newfound skills once you enter the job market.
Cross Validated by Stack Exchange
Well-written data analytics blogs can be helpful, but what happens when you have specific questions that need answering? Given the complexity of the field, this is a common issue for many data analytics students. Enter Cross Validated by Stack Exchange. As much of a community hub as anything else, Cross Validated gives you the option to see real data analytics queries answered by experts, in more or less real-time.
For instance, how do you deal with perfect separation in logistics regression? And why is accuracy not the best measure for assessing classification models? Helpfully, the most commonly asked questions rank more highly. You can also sort articles by topic, which makes it much easier to find the answer you’re looking for. If necessary, you can also ask your own questions, comfortable in the knowledge that the community offers pretty swift replies.
3. Best blogs for data analysts: best practices for the field
Data Science Central
If you’re a professional data scientist working in the field, you’ll no doubt want to stay abreast of the latest developments. Enter Data Science Central, which everything professional data practitioners could need. The best thing about this data analytics blog is the granularity of the content. Drill down by industry news and data trends, by programming language, or by technical topics, covering everything from linguistics to data security.
Perhaps most helpful for data professionals, though, is that the blog breaks down articles by sector type, meaning you can stay up to date on data analytics news within your industry. Want to learn about financial services, manufacturing, or healthcare? You’ll be spoiled for choice. And if you’re not in the mood to read, Data Science Central also has a great selection of podcasts, videos, and webinars that you can listen to, watch or sign up for.
Forrester Big Data Blog
Research and advisory firm, Forrester, is known for having its finger on the pulse when it comes to professional practice—and that includes data. Unlike some providers, the firm’s big data blog doesn’t try to cover all bases, instead focusing specifically on big data in the context of operations and business management. Perfect if you’re climbing the career ladder and want fresh insights into companies’ approaches to data strategy.
The Forrester Big Data blog includes data-related topics ranging from industry event summaries to pressing IT issues and useful questions to ask your BI platform provider. Although it doesn’t offer the more generic content you might expect from other blogs, it offers a range of voices and points of view, and you’ll find topical content in all its professional contexts.
One sector that has embraced data analytics like almost no other is healthcare. Enter Statistical Thinking, a blog devoted to data analytics’ impact on the sciences. Run by Frank Harrell, Professor of Biostatistics at Vanderbilt University’s School of Medicine, the blog focuses on the theoretical and critical thinking behind data analytics. It addresses topics such as how to maximize the use of information, how to avoid common statistical pitfalls, and explores issues related to statistical approaches; all within the biomedical sciences.
We’ll be honest, this blog isn’t the lightest read, but it’s definitely worth checking out if you’re fascinated by healthcare analytics. Using many real-world examples, you’ll learn about the applications of data analytics in clinical trials to improving drug research and medical diagnosis, all straight from the mouths of the scientists who have done the work.
4. Best blogs for data analysts: specialized topics
Statistics: Simply Statistics
Run by three biostatistics professors (Jeff Leek, Roger Peng, and Rafael Irizarry), Simply Statistics covers everything you need to know (and everything you didn’t know you needed to know!) about applied statistical techniques. It looks at things like the role of theory in data analytics, as well as other hands-on topics. To provide insight into the role of statistics in the real world, the blog also includes a series of compelling interviews with data scientists, such as this one with biostatistician Stephanie Hicks.
And it’s popular—Simply Statistics has a whopping 65,000 followers on Twitter. Two of the blog’s authors, Jeff Lee and Roger Peng, also produce a regular podcast, very much reflecting the blog’s relatable tone and direct approach to complex topics. While the blog itself isn’t always super technical (which is arguably not a bad thing), should you need to follow up with explanations of statistical methods, we can recommend the Statistics How To website.
Data visualization: datavis.blog
We love a bit of beautiful data, and datavis.blog does not disappoint. This blog instructs you exactly how to create data visualizations from scratch using the visualization software, Tableau. Run by Mark Reid, a certified Tableau professional and former ambassador to the brand, it covers the wide range of functionality that the software offers, with foolproof step-by-step guides complete with helpful screenshots to direct you through the process.
From ‘flashy’ visualizations such as how to create animated transitions to more prosaic (but still surprisingly delightful) applications such as visualizing floor plan data, the blog is a great introduction to Tableau. And yes, while there are other data viz tools available, Tableau is arguably one of the most popular, making this blog a must-read. Mark has also done some fascinating talks on this topic if that’s more your thing. You can find a list of them here.
Artificial Intelligence: DeepMind Blog
Last, but not least… if, like us, you’re fascinated by artificial intelligence (AI), there are few better resources than the DeepMind blog, from Alphabet’s artificial intelligence arm. The blog explores the latest research and developments, from leaps forward in so-called ‘nowcasting’ (the ability to forecast weather in the immediate term) to how DeepMind is using AI to predict gene expression.
The blog keeps explanations as straightforward as possible, going into the technical detail of their research just enough to satisfy your curiosity. However, it offers a tantalizing insight into what the future holds. And while the DeepMind blog mostly inspires, if you’re looking to develop the underlying skills, we can also recommend checking out Machine Learning Mastery, a blog that aims to help developers grasp the practicalities of ML techniques.
There we have it, our handpicked top 12 best data analytics blogs! While there are many more fantastic blogs and other free resources available, we all have to start somewhere. We highly recommend using these as your jumping-off point, before digging a bit deeper. What other great blogs can you find?
Whether you’re just starting out in data analytics, have been in the field for a while, or just want to expand your skills, blogs are a quick, free and simple way of building your knowledge base and staying up to date with the latest trends.
To learn more about data analytics, sign up for this free, 5-day data analytics short course or check out the following:
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473518.6/warc/CC-MAIN-20240221134259-20240221164259-00080.warc.gz
|
CC-MAIN-2024-10
| 12,908 | 49 |
http://lanyrd.com/coverage/?topics=erlang,mapreduce-1,python
|
code
|
1 conference presentations on Python and MapReduce and Erlang.
See Python conferences.
Your current filters are…
from The Disco MapReduce Framework at PyData Workshop, 2nd-3rd March 2012
Added 1 year ago
Browse and track events by topic
Follow @lanyrd on Twitter.
Lanyrd on Facebook
+ Cookies · Email us
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368699273641/warc/CC-MAIN-20130516101433-00015-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 306 | 9 |
https://rebeccahogue.com/2016/04/24/on-hybridity-and-conference-presentations/
|
code
|
Last updated on December 28th, 2018 at 06:34 pm
On Wednesday morning, at the OLC Innovate conference, we (me, Autumm Caines, Maha Bali, Whitney Kilgore, Apostolos Koutropolous, Andrea Rehn, and Alan Levine) presented a 90-minute workshop on Meeting the Potential of Hybridity: Equity, Access, and Inclusion.
Our presentation itself was both innovative and technically risky. We had some previous experience running a hybrid workshop at the dLRN conference, however, that session did not go as well as we would have liked. We learned some lessons from that session, which informed this session. Our biggest lesson was to ensure that we had solid buddy pairs – and that the onsite and virtual buddies were well prepared to connect during the session. This was emphasized a lot in our planning meetings.
Leading up to the conference I was swamped dealing with unexpected renovations and a home move. Fortunately, Autumm stepped in and got us on track. She setup a planning Google Doc and setup a couple of conference calls. One suggestion that she made I loved, that was to use the workshop activity time to do an empathy experiment. More specifically, to get the folks in the room talking to the virtual folks to help them better understand what it meant to attend a conference virtually.
Coordinating a large group of co-presenters is a challenge. Our conference calls cycled through many great ideas for implementation, but they kept getting complicated. If we were going to pull this session off, we needed to simplify things. So, I took in all the great ideas, and consulted directly with Autumm and Maha to put together a simpler and cohesive workshop plan. We got buy-in from all the co-presenters.
To setup the workshop we needed to:
- Have a mainstage Google Hangout where all the virtual presenters could speak from the main stage
- Good enough Internet connection to support video conferencing
- Microphones and audio to the main stage laptop (tested before the session)
- Mainstage laptop was turned to face the room, so that the virtual presenters could see the entire room
- Each buddy pair (Autumm/AK, Andrea/Alan, Whitney/Maha) setup a separate virtual connection on their laptops. Each used a different technology for this video session (demonstrating that we are technology agnostic). Most of the virtual presenters chose to use different devices for the mainstage connection and the one-to-one connection, to make it easier, but also it gave them two views of the room.
- At all times, the onsite presenters made a special effort to ensure that the virtual presenters could hear!
Our workshop went like this:
- I introduced the workshop and myself
- Each presenter introduced themselves. We intentionally setup the introduction order to alternate between virtual and onsite, trying not to privilege either in the introductions.
- Autumm introduced the empathy experiment. She had setup a Google Doc for each table to take notes in. One person at each table was asked to take notes in the Google Doc, so that the virtual person could see the notes.
- The room was split into three groups. We had about 8 people per table, which was the perfect number of attendees. One of the buddy pairs sat at each table, and the virtual buddy talked about their experience as a virtual attendee. They talked about their environment and why they were attending virtually. The workshop participants had a chance to ask questions and interact directly with the virtual person. The onsite buddies did a great job of keeping the participant who was speaking in view. Many people commented that it felt like the virtual person was actually there. The virtual presenters also commented that they felt like they were in the room.
- Whitney ran a quick debrief of the empathy experiment allowing each of the tables to share ah-ha moments.
- Andrea introduced the action plan activity. Now that the workshop participants had a better understanding of the virtual experience, they were asked to come up with an action plan on what they would do to help support virtual attendees. Again, each buddy pair went to the same table, and the conversations at the tables continued. Notes were taken in the Google Docs (Andrea/Alan, Autumm/AK, Whitney/Maha).
- Rather than having someone in the room present the results, we turned things around again and had the Virtual presenters (on the main stage) present the learnings from their tables.
- We had a little time at the end to talk about Virtually Connecting. Since we had another session planned that demonstrated Virtually Connecting – the Virtually Connecting Fishbowl led by Autumm – we advertised that session as the follow up to the workshop.
The design of the workshop itself involved a lot of technology. We relied heavily on the conference internet connection. I am still rather amazed that we managed to get four video conference sessions (mainstage and each buddy pair) running at the same time without any glitches. We also managed to get audio to work well enough for the virtual presenters to hear everything!
The magic in this workshop came right after the empathy experiment, when the tables were reporting on their ah-ha moments. At that time, the onsite buddies brought each of the virtual buddies to the table. At one point, two of them bumped into each other and the virtual presenters saw each other on the laptops. It was a funny, sort of surreal experience generating a lot of laughter. It was something that we never thought of.
As the lead facilitator for this session, my job was to watch the time and keep the workshop flowing. It also allowed me time to walk around the room and take pictures.
I am so very proud that we were able to pull this off. All the co-presenters did an amazing job. Autumm orchestrated all the logistics (like having bit.ly links to all the Google Docs, and paper printouts for each table to make it easier), without which things may have been chaotic instead of running smoothly. I’m a little jealous that I wasn’t one of the buddies, so I didn’t get to experience the amazing connections that happened at each table. I watched as connections began to form between all the participants at the various tables. It was pretty awesome to see.
Maha, AK, and Alan each blogged about their experience as virtual presenters:
- All I Wanna Do…Is Sit at Your Table #OLCinnovate Hybridity Workshop by Maha Bali
- Missing…but not missing OLC this year by Apostolos Koutropolos
- On Hybridity and Disappearing Endpoints by Alan Levine
Were you there? What did you think of the workshop?
Here is an album of photos from the session:
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947473824.13/warc/CC-MAIN-20240222161802-20240222191802-00223.warc.gz
|
CC-MAIN-2024-10
| 6,622 | 31 |
https://www.bbc.co.uk/bitesize/guides/z8vrd2p/revision/1
|
code
|
Operating system functions
In any computer, the operating system:
- Controls the backing store and peripherals such as scanners and printers.
- Deals with the transfer of programs in and out of memory.
- Organises the use of memory between programs.
- Organises processing time between programs and users.
- Maintains security and access rights of users.
- Deals with errors and user instructions.
- Allows the user to save files to a backing store.
- Provides the interface between the user and the computer - for example, Windows Vista and Apple OSX. For more information, see the User Interfaces study guide.
- Issues simple error messages.
In a larger computer such as a mainframe the operating system works on the same principles.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439739048.46/warc/CC-MAIN-20200813161908-20200813191908-00415.warc.gz
|
CC-MAIN-2020-34
| 735 | 12 |
http://forums.gardenweb.com/discussions/1763330/have-downloaded-picasa-how-do-i-upload-pics-here-from-picasa
|
code
|
Have downloaded Picasa: How do I upload pics here from Picasa?
Ok, I downloaded Picasa and have been storing pictures there for years, so I'm glad to hear that 'somehow' I can upload them from Picasa to here.......
So anyway, I asked this question a few times over the last few months over at the dahlia forum and elsewhere, and one person sent me a link to this site's picture download instructions.
So, the instruction page tells me to join this certain web photo site, and so I clicked on the link there, but was sent to another site telling me that the web photo site is closed, and the site name might be for sale, so it was a dead end.
But the instruction page also told me of a 'simpler way' to upload pics. They said to look at the forum list, and find the forums with a camera symbol beside them, those forums will accept photos. So, I go back to the dahlia forum, which had a camera symbol, but I see nothing about uploading photos!
So, another person had mentioned another site called Photobucket. Well, I go and join there, look through the site to familiarize myself with it, then go and try uploading photos.... But after I searched, found and clicked on the photos I wanted to upload there, and then here, the site caused my computer to slow down considerably, then even after 45 minutes, not a single picture would download there!
So, I went and joined Flickr.... I was able to join it and upload pics there, but I dont see any way to send them here!
Also, another person told me to 'simply' include the hotmail codes! But they look something like this: **&%FE>>..)__h&^le??&^%kkd*65((2k++k4856z&%#(*&.....
Well, so I tried typing a bunch of random, cluttered numbers, symbols and letters, but 'surprisingly', my pics still didnt upload! Go figure..... (Just kidding, I didnt really try that!)
But anyway, I do have Picasa, so maybe once I've been taught the 496 'simple' steps to use Picasa for uploading, I'll finally be able to get it done!
By the way, I was able to figure out how to upload to the dahlia gallery, but that's different from the main forums, and it has an easy to locate area to search and upload pics. Plus, I was only able to do 1 picture.
|
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131302318.88/warc/CC-MAIN-20150323172142-00191-ip-10-168-14-71.ec2.internal.warc.gz
|
CC-MAIN-2015-14
| 2,176 | 11 |
https://www.law.cornell.edu/regulations/minnesota/agency-151/chapter-1350
|
code
|
Chapter 1350 - MANUFACTURED HOMES
- Part 1350.0100 - DEFINITIONS
- Part 1350.0200 - AUTHORIZATION
- Part 1350.0300 - ENFORCEMENT
- CONSTRUCTION SEALS AND LABELS (Part 1350.0400 to 1350.1200)
- APPROVALS (Part 1350.1300 to 1350.2000)
- INSPECTIONS (Part 1350.2100 to 1350.2400)
- CONSTRUCTION REQUIREMENTS (Part 1350.2500 to 1350.3850)
- CONSUMER COMPLAINTS (Part 1350.3900 to 1350.5700)
- ADMINISTRATIVE MATTERS (Part 1350.5800 to 1350.6900)
- LICENSING OF MANUFACTURERS, DEALERS, LIMITED DEALERS, AND DEALERS' SUBAGENCIES (Part 1350.7000 to 1350.9200)
State regulations are updated quarterly; we currently have two versions available. Below is a comparison between our most recent version and the prior quarterly release. More comparison features will be added as we have more versions to compare.
No prior version found.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945433.92/warc/CC-MAIN-20230326044821-20230326074821-00263.warc.gz
|
CC-MAIN-2023-14
| 822 | 13 |
http://kb.blackbaud.com/articles/Article/86643
|
code
|
1. Look at the Uploaded Date values in UL_Interactions:
Select * from UL_Interactions Where Process_ID = <process id>2. Make sure that the uploaded date values are in the correct format, based upon the Vendor date format:
Select * from Vendor_Date_Formats where Vendor_Code = <upload_file_code>3. If the data does not match the Vendor date formats, then alter either the data or the vendor date formats in order to make them match.
4. One possible cause for data being in the wrong format is that a file created from Excel drops the leading zeros. This can be fixed by using a different column format in Excel.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-22/segments/1558232258058.61/warc/CC-MAIN-20190525124751-20190525150751-00129.warc.gz
|
CC-MAIN-2019-22
| 610 | 4 |
http://www.customerlobby.com/reviews/19659/pfeffer-floor-covering/review/418229/
|
code
|
Very good experience
I have lived in my house for almost thirty years, and have had Pfeffer Floor Covering do everything that has been done here. They have done the wallpaper, tile, and carpet. If I have work in my house that needs to be done, I always go to Pfeffer. They do good work, are friendly, and I like the atmosphere. The workers are cooperative and they come here to work. Another thing I like is they are local. I live thirty miles from the nearest city, and I try to do everything locally.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323585460.87/warc/CC-MAIN-20211022052742-20211022082742-00655.warc.gz
|
CC-MAIN-2021-43
| 502 | 2 |
https://elbflorace.de/en/2014/07/silverstone-tag-2-3/
|
code
|
Silverstone Day 2 & 3
On Thursday we set off to our pit already at 07:30. After we thought about solutions of our technical problems over the night, we went immediately to our pit to solve them in the next morning. In the evening we had our big team photo with all participating teams on the racetrack.
On Friday we had to do the static events. We started with the Design Report at 09:00 o’ clock and continued with the Cost Report at 10:00 o’clock. There we had also to present our Real Case Scenario, which we could convey very convincing. The task of the Real Case Scenario was to develop an own concept of a mass production steering wheel, which must have a high performance as well as a good sustainability and cost optimization. In the afternoon Stefan, Nathaniel and Steven presented our Business Plan in front of the judges. So we could complete all static events at about 2:30 pm without any problems. Now we hope for good results. Between the static events we kept on working until night to make JulE fit for scrutineering.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817103.42/warc/CC-MAIN-20240416155952-20240416185952-00884.warc.gz
|
CC-MAIN-2024-18
| 1,037 | 3 |
http://techtrainingnotes.blogspot.com/2015/03/word-stemming-in-sharepoint-2013-search.html
|
code
|
Word stemming is when a search engine resolves a word to its root form and then returns variations of the word.
For example, search for one of these and return the rest:
- run, ran runner, running, runs
- fish, fishes, fisher, fishing
SharePoint 2013 Word Stemming
SharePoint 2013 only does "stemming" on singulars and plurals. So all we get for "run" is "runs" and for "fish" is "fishes". The exact stemming depends on the language.
SharePoint 2007 and 2010 did support an expanded form of word stemming, but you had to enable it in the search results web parts.
So what do we do?
Search using "OR".
fish OR fishing OR fisher
run OR ran OR running OR runs
Remember that the Boolean operators like "OR" must be typed in upper case and that mixtures of AND and OR usually will need parentheses.
race AND (run OR ran OR running OR runs)
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218195419.89/warc/CC-MAIN-20170322212955-00454-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 834 | 13 |
https://dshacker.com/
|
code
|
- Why is Python slow? - In this series of articles, I present some Python features that cause the execution time to be extended and some popular workarounds to make your code run faster. In the first part, I explain why Python is slower than low-level languages such as C or C++ and other high-level languages like Java or C#. Let’s …
- The EU AI Act and its global impact. - April 21, 2021. the European Commission has published a proposal for a regulation, that establishes harmonized rules for artificial intelligence (EU AI Act). The EU AI Act is currently under discussion by the European Parliament and the Council of Ministers. The new regulation will enter into force on the 20th day following its publication in …
- One of the best books to get started with Data Science - Some years ago, during my studies at the University of Bonn, I had a Computational Statistics lecture. It was one of the elective courses within the Econometrics and Statistics specialization. Until today, you can read on the syllabus of this lecture: “The course explains ideas and methodological issues of computationally intensive statistical methods. There will …
3 ways to create a Deep Neural Network model with Keras and Tensorflow 2.0 – Sequential, Functional and Subclassing API
In this article you will learn about three ways to create deep neural network models using Keras and Tensorflow 2.0 You will learn about their advantages and limitations, and see examples of how these methods are used.
Artificial Intelligence, Machine Learning and Deep Learning – let’s explain some buzzwords
For people who are curious about what Machine Learning, Deep Learning, and Artificial Intelligence are. In this article, you will learn in general what these buzzwords stand for and what example problems are possible to solve with them.
Artificial intelligence in our daily life – Revolution 4.0
The global AI market will grow by $126 billion by 2025. 97% of mobile users are already using AI-powered voice assistants. AI technology can enhance business productivity by up to 40%. 72% of execs believe that AI will be the most significant business advantage of the future. Statistics about artificial intelligence are impressive.
DS Tech Hacker
This category of articles is mainly intended for more technical people. Here you will find, among others, articles on the following topics and technologies
DS Non-Tech Hacker
This category of articles is for anyone interested in data science, new technologies and artificial intelligence. Here, among others, you will find articles on the following topics
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882573172.64/warc/CC-MAIN-20220818063910-20220818093910-00495.warc.gz
|
CC-MAIN-2022-33
| 2,598 | 13 |
http://popbi.wordpress.com/
|
code
|
To download the admin install go to http://msdn.microsoft.com/en-us/data/hh297027, download the ssdtsetup executeable for SQL Server 2014, and also vs2010, vs2012, vs2013. From the command prompt run ssdtsetup /layout <destination> where <destination> is the path of the USB stick / network / local drive you want to install to.
This may take a while to download the full install files.
If that’s all a bit to hard just smell this cool SSDT feature here http://msdn.microsoft.com/en-us/library/dn266029(v=vs.103).aspx.
The entry point is pretty simple, just right click your database and select Database Comparison.
SSAS: Access Denied – The file specified in the restore command is damaged or is not an AS backup file
You have attempted a database restore in Analysis Services from a .abf file and get the error : “The file specified in the restore command is damaged or is not an AS backup file. The following system error occurred : Access is denied”. The key clue in the error is the last part.
Go to the actual file, i.e. not the folder, right click, select properties, the click the Security tab. Edit the file’s security so that the Analysis Services service account has sufficient permissions i.e. full permissions will work. If you don’t know the Analysis Services Services account, go to SQL Server Configuration Manager and find your Analysis Services service where you will see the service account.
Looking forward to the new features in Windows 8 ? Taking a flying leap but make you flinch at first. If you have no Upgrade Apps option chances are you are Installing the Windows 8.1 Enterprise media which doesn’t support upgrade apps – try the Professional edition media instead. If you are chasing the Hyper V host this is available in both Professional and Enterprise but otherwise you will notice Professional doesn’t get a handful of “Enterprisey” things. Get along to the Features v Editions page to see what you are missing between Enterprise and Professional http://www.microsoft.com/en-us/windows/enterprise/products-and-technologies/windows-8-1/compare/default.aspx.
Even if you are happy to punch out a clean install there is a Windows 8.1 Upgrade Assistant, which will give you an assessment on what is compatible and what isn’t.
Note, if you want the upgrade option, there are several options here, summarised down, these are essentially,
1. Keep Nothing (clean install)
2. Keep Personal Files (make sure your files are in your Desktop or Documents folder)
3. Keep Apps (if you don’t see this try the Professional edition media)
If you get along to here you will find more details about the upgrade process http://windows.microsoft.com/en-au/windows-8/upgrade-from-windows-7-tutorial.
The following workaround http://up10it.blogspot.com.au/2013/07/VS2012-projects-not-loading.html was tested successfully for SQL Server Data Tools for Visual Studio 2012. You come across the error “One or more projects in the solution were not loaded correctly” on opening a SSIS solution file in SQL Server Data Tools for Visual Studio 2012 and then encounter a head scratching moment.
Steps taken to work around :
1. Close SQL Server Data Tools for Visual Studio 2012
2. Navigate to the C:\Users\<Your UserName>\AppData\Local\Microsoft\VisualStudio\11.0
3. Rename folder ComponentModelCache to ComponentModelCache.old
4. Re-open SQL Server Data Tools for Visual Studio 2012
5. Open the Solution again
Migrating your Reporting Services instances to SQL Server 2012/2014 has a few key considerations.
First, the oldest version you can upgrade from is Reporting Services 2005 and that must be patched to SP4 (9.00.5000).
Next, any SQL Server 2005 report data sources are still supported in SQL Server 2012/2014. Here are the full list of data sources supported in SQL Server 2014 http://msdn.microsoft.com/en-us/library/ms159219.aspx. However your Report Server databases themselves can’t be hosted on SQL Server 2005 database instances http://support.microsoft.com/kb/2796721/en-nz.
Importantly, those pesky Report Models are depreciated in Reporting Services 2012/2014 http://msdn.microsoft.com/en-us/library/ms143509.aspx. They will migrate but you won’t be able to make changes after the migration – so at some point they will need to have their datasets rewritten. Getting a handle on how many reports hang off Report Models and giving your customers some options is a good way to manage this issue.
Finally, the full migration process is outlined here step by step http://msdn.microsoft.com/en-us/library/ms143724.aspx. There are risks in any major version migration, but running side by side environments and getting a business acceptance sign-off is the best way to mitigate those risks.
The SSISDB contains a wealth of statistical data for your SSIS package executions and messages. In a package failure scenario, trawling through SQL Management Studio to get detailed reports becomes quite tedious. For a very quick and easy dashboard looking at the most recent events try a simple Reporting Services report with two tables and two datasets. The two datasets are outlined in more detail below.
The first dataset takes the last 3 days worth of execution history for your packages as per the top table. Whilst this dataset returns one row per execution as displayed, adjusting the groupings in this query will give you interesting perspectives on Average Duration and Execution Count.
The second table contains the last 15 messages. In a failure scenario the second dataset will typically hold the most recent failure if no other packages have been run subsequent to the failure. However you may need to adjust the dataset to suit, where TOP is specified, or parameterise as required – add a little Dijon mustard :)
Execution Summary – Last 3 Days
SELECT folder_name, COUNT(*) AS tally_executions, SUM(DATEDIFF(ms, start_time, end_time))/1000 AS total_duration_s, package_name, CASE status WHEN 1 THEN 'Created' WHEN 2 THEN 'Running' WHEN 3 THEN 'Cancelled' WHEN 4 THEN 'Failed' WHEN 5 THEN 'Pending' WHEN 6 THEN 'Ended Unexpectedly' WHEN 7 THEN 'Succeeded' WHEN 8 THEN 'Stopping' WHEN 9 THEN 'Completed' END AS Status, start_time FROM catalog.executions AS e WHERE start_time > getdate()-3 GROUP BY folder_name, package_name, status, start_time ORDER BY start_time DESC
Message Detail – Last 15 Messages
SELECT TOP (15) event_message_id, message, package_name, event_name, message_source_name FROM (SELECT event_message_id, operation_id, message_time, message_type, message_source_type, message, extended_info_id, package_name, event_name, message_source_name, message_source_id, subcomponent_name, package_path, execution_path, threadID, message_code FROM catalog.event_messages AS em WHERE (operation_id = (SELECT MAX(execution_id) AS Expr1 FROM catalog.executions)) AND (event_name NOT LIKE '%Validate%')) AS q ORDER BY message_time DESC
Here’s a couple of chilly reads that go a little deeper.
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802778085.5/warc/CC-MAIN-20141217075258-00074-ip-10-231-17-201.ec2.internal.warc.gz
|
CC-MAIN-2014-52
| 6,958 | 34 |
https://flylib.com/books/en/2.355.1.52/1/
|
code
|
The binaries were installed in the location specified during installation. The default location is C:\Program Files\Microsoft Office Servers\12.0. Here you will find global files for the installation and applications. For instance, the C:\Program Files\Microsoft Office Servers\12.0\Data\Applications\(instance ID)\Config folder contains global configuration files used by the search engine, like the language-specific noise word and Thesaurus files along with the Thesaurus schema xml file. Other folders are also installed as follows:
Projects This is the location for the various indexes.
Single sign-on Common files are installed to C:\Program Files\Microsoft Shared \Microsoft Office 12\ Single Sign-on.
Global executables C:\Program Files\Common Files\Microsoft Shared \OFFICE12 contains the dll's used globally.
1033 This folder is used for US English. Other folders will appear as you install additional language packs.
Setup files Critical setup files that might be needed later for re-running certain aspects of the setup and Configuration Wizard are placed at C:\Program Files\Common Files\Microsoft Shared\SERVER12.
Web services Common files are installed to C:\Program Files\Microsoft Shared\Web server extensions\.
The new "12 hive" C:\Program Files\Common Files\Microsoft Shared \Web server extensions\12 is the equivalent of what we affectionately called the "60 hive" in SharePoint Portal Server 2003.
Some files that you find here are global, some are language specific (En-us or enus is US English), and some are application (Web site) specific.
In addition, there is a hierarchy to many of the files. For instance, in C:\Program Files\Common Files\Microsoft Shared\Web server extensions\12\Data\Config, you will find another set of noise word and thesaurus files that supersede those discussed previously. In the C:\Program Files\Common Files\Microsoft Shared\Web server extensions\12\Data\Applications\SPS2\Config folder, you will find a set of noise word and thesaurus files that are specifically for the SPSv2 application. Under this folder, you will also find other search files and logs specific to this application.
In the C:\Program Files\Common Files\Microsoft Shared\Web server extensions\12\TEMPLATE\LAYOUTS folder, you will find the administrative pages address by the _layouts relative path on your sites. Also, in the C:\Program Files\Common Files\Microsoft Shared\Web server extensions\12\TEMPLATE\images is the _images relative path for images addressable anywhere in your sites.
The Configuration Wizard makes hundreds of registry entries as it installs and registers dlls, services, and features. For example, the installation of SharePoint Server 2007 adds several entries to the registry under HKEY_LOCAL_MACHINE\Software\Microsoft\Office Server and HKEY_LOCAL_MACHINE\Software\Microsoft\Shared Tools\Web Server Extensions\12.0.
The creation of the first SSP adds 48 keys to the registry, many of which have up to 36 entries within the key. These changes are found in a file named RegistryBlob.reg located in the SSP: C:\Program Files\Microsoft Office Servers\12.0\Data\Office Server\Applications\(Site GUID) directory.
Configuring the Search and Index server adds 186 keys to the registry, many of which have up to 53 entries within the key. These changes are found in a file named Registry-Blob.reg located in the C:\Program Files\Microsoft Office Servers\12.0\Data\Applications\(site GUID) directory. These registry changes are also stored in the configuration database so that other WFEs can replicate them.
No changes were made to IIS during the installation of SharePoint Server 2007. However, the Configuration Wizard made several changes, including the following ones:
The following two application pools were created:
SharePoint Central Administration v3 using the SQL service account specified during the wizard
OfficeServerApplicationPool using the Network Service account
The Central Administration Web site was created using the SharePoint Central Administration 3.0 application pool.
The Office Server Web Services Web site was created using the OfficeServerApplicationPool.
With SharePoint Server 2007, new Web sites and new application pools, such as Corporate Portal, must be created from within Central Administration so that the process includes storing the configuration in the configuration database. Also, modifications to IIS configuration, with the exception of adding more host headers, should be made with Central Administration.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141195687.51/warc/CC-MAIN-20201128155305-20201128185305-00245.warc.gz
|
CC-MAIN-2020-50
| 4,494 | 21 |
https://dzone.com/articles/a-declarative-java-orm-speaks-fluent-sql
|
code
|
A Declarative Java ORM Speaks Fluent SQL
Learn more about the fundamentals and principles of a declarative Java ORM that brings a number of advantages over legacy ORMs and standards like Hibernate and JPA.
Join the DZone community and get the full member experience.Join For Free
As a developer, you do not want to be micromanaged with detailed lists of instructions. So when you ask your ORM to give you data, why do you have to supply the database query to be executed?
Clearly, that has historical reasons, and an ORM that is free to create queries by itself needs to have an API that declaratively describes the expected result as a combination of data retrieval and modification operations. Java 8 streams provided the needed language support for that. The time had come for a declarative ORM.
Working at Speedment, I am often eager to describe the fundamental advantages of a declarative ORM and the following is an attempt to do so. The reader will be presented with an analogy of a factory working in two phases to describe how micromanagement of internal steps of a larger task creates barriers for efficiency improvements, just as explicit SQL in a database application constrains the application to a specific solution when a framework with more freedom could find optimizations on a larger scale.
The Furniture Factory Analogy: The Manufacture and the Assembly Teams
A typical Java-based database application consists of two steps of computation — first the database query and then the JVM code operating on the data from the database. As an analogy, consider a furniture factory that operates in two steps; manufacturing of parts and then the assembly of the parts into complete products.
The furniture company consists of two teams — the manufacturing team that creates parts and the assembly team that uses the parts to create complete products. Both teams have declarative work instructions, which means that the instructions describe the expected output rather than a sequence of operations to perform. The factory output, in terms of complete furniture, is thus fully determined by the assembly team's instructions, but factory efficiency is also highly dependent on well-tuned manufacturing team instructions. If the parts sent to assembly are too small and simple, then assembly may not be possible, and if they are too complex, the manufacturing process becomes too expensive.
Telling the manufacturing team to take instructions from the assembly team will make managing the factory easier and allows the teams to cooperate to find the best solution. The assembly team has thus been promoted to a design team, since it has the responsibility of designing the parts. Instead of detailed descriptions of all parts needed, the factory instructions now only describe the end result, and instead of being constrained by the given part schemas, the design team may freely decide upon the whole process.
Recent technology advances allow for an analogous revolution for relational data Java applications, where the manufacturing team corresponds to the database engine, the assembly team is a traditional ORM, and the design team that replaces the assembly team is a declarative ORM.
How Java Database Applications Relate to the Furniture Factory Analogy
SQL is a well-known example of declarative programming, and the SQL query works just as the instructions to the manufacturing team in the analogy above — you leave it to the database engine to figure out an optimal execution plan for how to compute the result described by the query. Similarly, the pipeline of a Java stream is a description of a sequence of abstract operations, conceptually similar to the assembly team instructions above, where the framework implementing the stream termination determines the actual execution path.
Putting the two together, a Java application using relational data typically uses an ORM. The current standard API for ORMs is JPA, and Hibernate may be the most well-known implementation of that API. Leveraging the declarative power of the SQL language, Hibernate, in a rather transparent way, exposes the user to the Hibernate Query Language (HQL) that can be seen as SQL for Java objects. While this is useful for developers used to SQL, it does introduce a mix of languages — the Java code will contain HQL code. Therefore, using the furniture factory analogy, even though SQL is replaced with HQL, we are still stuck with detailed manufacturing team instructions as long as Hibernate is used.
Just as the furniture factory suffered from maintaining two sets of instructions with implicit dependencies, the mix of Java and HQL comes with a price. Apart from being error-prone and creating a high maintenance cost, such a mix of languages also creates a barrier over which functional abstraction cannot take place. The situation calls for a solution similar to replacing the furniture factory assembly team with a design team. In order to fully leverage the declarative nature of a functional Java streams application, the language barrier of the ORM framework needs to be removed.
The Language Barrier Limiting Declarative Power
Ever since the 1970s, SQL has allowed applications operating on relational data to leverage a declarative approach to data handling. An application developer does not need to know about decades of database engine research since the code she writes will only describe what data it needs, not how it is to be retrieved. This clever separation of concerns decouples the application from the database engine details, minimizing maintenance and development cost.
The introduction of streams in Java allows for a declarative programming style conceptually similar to SQL in the sense that the streams created are a description of a sequence of operations, rather than an explicit sequence of imperative instructions. The description is fed to the framework defining the termination of the stream, allowing the framework to reason about the whole sequence of operations before actually executing any data operations. Thus, just as the SQL query is a declarative statement about what data to retrieve, the stream is a declarative statement about the operations to be executed on the data. Just as the database engine is free to optimize the query execution as long as the result is the same, the stream termination may alter the data operations as long as the semantic invariants hold.
Until recently, a typical relational data application leveraging Java streams would consist of two distinct parts defining a two-step process; first, data is retrieved via a database query and then operations are carried out on the collection of data that is returned in the result set from the database. The two frameworks that reason about query and streams respectively are confined to their respective realms; no optimizations may span both domains. Java streams do have expressive power enough to span both domains, since they can be seen as declarative constructs.
Declarative Java Streams Applications
Functional programming has received solid language support in Java with the introduction of streams and lambdas. Allowing the user to create pipelines of abstract operations on a stream of data, the new language constructs introduce a higher order functional approach to programming. Higher order functions take other functions as input and thus allow abstract reasoning about behavior, which opens up a whole new level of abstractions. For instance, we now have language support to create programs that modify other programs.
Consider the following code that describes the first 10 even integers that are not divisible by 10.
IntStream.iterate(0, i -> i + 1) .map(n -> n * 2) .filter(n -> n % 10 != 0) .limit(10) .forEachOrdered(System.out::println);
A reader used to, for example, Unix pipes would perhaps interpret this piece of code as a source of data creating an unbounded sequence of integers on line 1, doubling each number on line 2, removing the numbers evenly divisible by 10 on line 3, and then on line 4, throwing away all numbers except for the first 10 before printing them when reaching line 5. This is a very useful intuition, even though it is quite far from what will happen when the code is executed.
Interpreting this example as a stream of data being manipulated from top to bottom by each operation yields a correct understanding of the resulting output while creating minimal cognitive encumbrance on the reader. It makes it possible for a reader and even the designer of the code to correctly understand the meaning of the code in terms of output without really thinking about how the expression actually will be evaluated.
What actually does happen in lines 1 through 4 is that a function is created and modified. No integers are created, let alone filtered or mapped, until we reach line 5. That last line is a terminating operation of the stream entailing that it operates on all aspects of the stream, including both the source of data and the operations to finally return the result. Having access to the information about the entire operation and the source, the terminator of the stream can deliver the result without performing unnecessary operations on items what will be discarded by the limit operation.
This lazy evaluation is possible since the program describes the requested operations rather than actually executing them. What at first may seem like a simple sequence of function invocations on a sequence of integers is actually a creation of a function that is passed to another function. The program simply describes what is computed while leveraging previous work invested in the design of the used stream components that determine how the computation will take place. This is the kind of expressive power that is needed to create an ORM that breaks the language barrier by reasoning about the whole task including both in-JVM and database engine operations.
Breaking the Language Barrier with Java Streams
The language barrier between the database engine and the JVM forces the designer to design, optimize, and then maintain the structure of the data as transferred from the database since it constitutes output from the first part of the solution and input to the next. Speedment on GitHub is a declarative ORM that breaks this language barrier. Taking the declarative approach from its starting point in two declarative building blocks all the way to its logical conclusion of a unified declarative construct, the Speedment toolkit and runtime abstracts away the SQL query and allows the user of the framework to create a design based solely on streams.
Consider the fully declarative way of counting the users belonging to a particular department in the following code snippet.
long count = users.stream() .filter(User.DEPARTMENT.equal(1)) .count();
The source of the stream is a manager instance called users, which is instantiated from code generated by the toolkit analyzing the database metadata. As described above, viewing a stream as a sequence of objects flowing from the source and modified on each following line will give the correct understanding of the result of the operation while not necessarily any insight to the actual execution of the program. The same applies here. Retrieving all the users from the database in line 1, then in line 2 filtering out the users belonging to department number 1 and finally counting the remaining users would yield the desired result of the operation.
This understanding of the algorithm has a strong appeal in its abstract simplicity and allows the Speedment runtime to decide on all the details of the execution. Not only does it optimize the operations on the data in the JVM, but since the relational database operations are also covered by the abstraction, the generated SQL query will take the full pipeline of operations into account.
By means of a sequence of reductional operations on the pipeline, the runtime will collapse the operations to a single SQL statement that relieves the JVM from any operations on user data instances. The following query will be executed:
SELECT COUNT(*) FROM user WHERE (department = 1)
In this minimalistic example the database engine performs all the data handling operations since the generated SQL query gives the full result, but in general, the framework will have to execute part of the pipeline in the JVM. The power of the fully declarative approach is that the framework can freely decide on these aspects. This freedom also opens up for more elaborate optimizations, for example, in-JVM-memory data structures for faster lookup of data. The open-source Speedment ORM has an enterprise version that exploits this to provide efficiency boosts of up to several orders of magnitude.
Expressing SQL as Java Streams
As seen above, Speedment removes the polyglot requirement for Java database applications by abstracting away SQL from the business logic code. When analyzing the similarities between the two declarative constructs, one will find striking similarities between the corresponding constructs in SQL and Java streams.
Traditional ORMs employ an explicit query language for database interaction. This micromanagement imposes unnecessary constraints on the ORM which can be unleashed by instead using a fully declarative approach. Such an approach is enabled by the declarative nature of Java streams, which allows expressing both database data retrieval and in-JVM data operations in the same language. The declarative nature of the resulting application provides decoupling from the imperative interpretation which enables seamless adjustment to a multi-threaded and/or in-JVM-memory accelerated solution since all details of execution and database-to-JVM data transfer have been abstracted away.
Published at DZone with permission of Dan Lawesson, DZone MVB. See the original article here.
Opinions expressed by DZone contributors are their own.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488544264.91/warc/CC-MAIN-20210623225535-20210624015535-00416.warc.gz
|
CC-MAIN-2021-25
| 13,936 | 41 |
https://bdgastore.com/products/stussy-lsd-tee
|
code
|
Free US shipping on orders over $100. Use code SHIPPING2021
Subscribe to our newsletter and get 10% off your next order
Suggested search term if you're going to wear this shirt: Timothy Leary G. Gordon Liddy debate.
If a size is not listed, it is sold out.
Your wishlist has been temporarily saved. Please Log in to save it permanently.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323588242.22/warc/CC-MAIN-20211027181907-20211027211907-00400.warc.gz
|
CC-MAIN-2021-43
| 336 | 5 |
https://github.com/Audiveris/proxymusic
|
code
|
ProxyMusic allows to marshal/unmarshal Java objects in memory to/from MusicXML 4.0 data in a Document, a stream or a file.
This binding provides an easy way for Java programs dealing with music symbolic information (such as score scanners, music editors, music sequencers, etc) to read or write files in MusicXML.
ProxyMusic supports the following MusicXML features:
- Marshalling/unmarshalling of ScorePartwise
- Marshalling/unmarshalling of Opus
- Handling of standard (uncompressed)
- Handling of compressed
All MusicXML elements and attributes are implemented as about 325 Java classes that are automatically generated from the MusicXML defining schema as found on its vendor site.
The main advantage of this automated approach is to result in an efficient and error-free implementation.
Building ProxyMusic is easily achieved with the following terminal command:
$> mvn clean package
This command will (re)build the ProxyMusic Maven artifacts (binary, source and doc),
taking as input the schema definition files
A utility Java class, named
proxymusic.util.Marshalling, is available to ease the handling
of both marshalling and unmarshalling of ScorePartwise and Opus entities.
A few examples of use:
- A small example is available in the
proxymusic.utilpackage located in the test branch, its name is
This example performs marshalling and unmarshalling of the classical HelloWorld as available in the MusicXML tutorial.
- Another small example, focused on the marshalling and the unmarshalling of a part-list element,
is available as
- For marshalling and unmarshalling Opus entities, see
proxymusic.opus.OpusTest.javasimple example or
proxymusic.opus.MxlOpusTest.javamore realistic example.
- For dealing with compressed
- A real size example is provided by the companion Audiveris project.
Audiveris is an Optical Music Recognition software (OMR) which uses ProxyMusic to handle the marshalling layer.
For detailed information, refer to Audiveris ScoreExporter and PartwiseBuilder Java classes.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882571950.76/warc/CC-MAIN-20220813111851-20220813141851-00443.warc.gz
|
CC-MAIN-2022-33
| 2,002 | 29 |
https://nevelexlabs.com/knowledge_base/dashboard-report-incidents-cumulative-overview-report-time-grouped/
|
code
|
Incidents Cumulative Overview Report-Time Grouped
This report generates incident totals grouped by status and time intervals over a specified duration. The report's starting totals include all incidents matching the search criteria, regardless of when the incidents were created.
|Stacked Bar Graph||Creates a stacked bar graph based on the selected report options.|
|Line Graph||Creates a line graph based on the selected report options.|
|Area Graph||Creates an area graph based on the selected report options.|
|Bar Graph||Creates a bar graph based on the selected report options.|
|Statuses||Limits matching incidents to the set of selected statuses.|
|Interval||Defines the date-time grouping interval, which is the unit of time for grouping results.
This is a required field.
|Incident Categories||Limits matching incidents to the set of selected categories.|
|Duration||Defines the relative time span of the report. For example, some possible values are
|Span: Value of X||When required by the chosen
|Assignee||Restricts the report to the assignee.|
|Reference||The end date/time of the report.|
Nevelex Labs, Main Office
Metro Office Park
2950 Metro Drive, Suite 104
Bloomington, MN 55425
Phone: +1 952-500-8921
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224657169.98/warc/CC-MAIN-20230610095459-20230610125459-00654.warc.gz
|
CC-MAIN-2023-23
| 1,220 | 19 |
http://www.webdeveloper.com/forum/search.php?s=ec1d6e7cf7206acafd1cc5dcae0dd338&searchid=14004849
|
code
|
Type: Posts; User: Arctic Fox
Also keep in mind that once you've clicked inside an iFrame, you have in fact set the focus to a new window. You will need to click on a blank area of the original page to gain its focus, and perhaps...
Have you tried TARGET="_top" ?
In order to have coloured Iframe scrollbars you need to put that code in the Iframe page itself.
What's wrong with using frames? (or even iFrames)
More frames and Iframes than I like to admit... :)
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824109.37/warc/CC-MAIN-20160723071024-00315-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 461 | 6 |
http://www.linuxquestions.org/questions/linux-newbie-8/chroot-tool-749115/
|
code
|
Linux - NewbieThis Linux forum is for members that are new to Linux.
Just starting out and have a question?
If it is not in the man pages or the how-to's this is the place!
Welcome to LinuxQuestions.org, a friendly and active Linux Community.
You are currently viewing LQ as a guest. By joining our community you will have the ability to post topics, receive our newsletter, use the advanced search, subscribe to threads and access many other special features. Registration is quick, simple and absolutely free. Join our community today!
Note that registered members see fewer ads, and ContentLink is completely disabled once you log in.
If you have any problems with the registration process or your account login, please contact us. If you need to reset your password, click here.
Having a problem logging in? Please visit this page to clear all LQ-related cookies.
Introduction to Linux - A Hands on Guide
This guide was created as an overview of the Linux Operating System, geared toward new users as an exploration tour and getting started guide, with exercises at the end of each chapter.
For more advanced trainees it can be a desktop reference, and a collection of the base knowledge needed to proceed with system and network administration. This book contains many real life examples derived from the author's experience as a Linux system and network administrator, trainer and consultant. They hope these examples will help you to get a better understanding of the Linux system and that you feel encouraged to try out things on your own.
Click Here to receive this Complete Guide absolutely free.
.. it's getting all technical now. I thought CHROOT was to put somebody in jail (So my son told me!) So that my user SSH123 only had access to the folder xyz. I've got debian lenny and the package manager offers me 1 million tools to do the job, which one do I go for?
1. chroot temporarily eg when fixing up a broken system from the linux rescue mode
2. setting up a chrooted env permanently for a given user or process eg bind (DNS server) is usually setup that way these days.
See 16.1.3 http://www.linuxtopia.org/online_boo...5_ch-bind.html for an example.
Ludo -- While using the CHROOT command is *extremely simple*, setting up a chroot-jail is a little more complex.
That said, having read the whole page you linked to, my opinion is that the instructions there are *very* good, and if you take the time to read the page and understand what they're telling you to do, you can do it
Note: it's just a personal thing of mine, but in regards to the section about needing to patch the sshd to accomplish one of the methods described, I don't like it. For the same reason that I prefer my kernel to be the way it is presented by kernel.org -- unpatched! The way I see it, if the developers figure it needs to be patched, then it *would* be patched already when it's released as stable. Again though, this is just my feeling on such things.
If you want to set up a chroot jail for ssh, read that page, follow the examples; take your time! And if/when there's something you don't grasp, well, that's why you're here (why we're all here) -- someone will help you out.
That article seems to be specifically talking about the difficulties of setting up an ssh server in a chrooted environment, not setting up a chrooted environment itself. Setting up a chrooted environment is pretty easy. Are you wanting to set up an ssh server in a chrooted environment? If so, how many users are you trying to support? If you are this new to Linux and the concept of a chroot, I'm guessing you probably don't even need an ssh server, but I could be wrong.
Ok dokey GrapefruiTgirl, why does the page I refered to have an "easy way" of doing what I require (sorry forrestt your wrong. I need SSH server and a jail for just a few users) and a "hard way" of achieving the same task!
My ever so simple question is "what is the right way to do it?"
I'm quite happy to dive in and experiment, but asking advice from other users that have "been to linux hell and back" makes much more sense to me
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917125881.93/warc/CC-MAIN-20170423031205-00456-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 4,079 | 24 |
https://github.com/CHESSduino
|
code
|
GitHub is home to over 40 million developers working together. Join them to grow your own development teams, manage permissions, and collaborate on projects.
the beginning of magnet cloud chess board.
Newest chessboard sensor array - with magnet.
Frist sample system using 2 servo control laser direction to demo sudoku.
ChessArm project for Cloud chess board
chess board puzzle, to let the kids got the rules of board coordinates by themself who never know board before.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496668682.16/warc/CC-MAIN-20191115144109-20191115172109-00018.warc.gz
|
CC-MAIN-2019-47
| 471 | 6 |
https://www.nicksherlock.com/2017/09/upgrading-a-proxmox-5-macos-sierra-guest-to-high-sierra/
|
code
|
macOS 10.13 High Sierra has finally been released, and the good news is that it works with Proxmox 5!
Here’s how I upgraded my Proxmox 5 Sierra installation, which has been previously updated to use Clover/UEFI boot and is stored on a passthrough NVMe SSD. Your setup may differ and your upgrade steps may need to change. I doubt these instructions would work for enoch/chameleon boot.
Take a snapshot of Sierra
I cannot stress this enough! If your filesystem gets completely trashed by the installer, you really need to be able to roll it back to a snapshot!
Since my install is on a passthrough NVMe SSD, and so doesn’t support Proxmox-managed snapshots, I shut down my Sierra VM, then cloned the VM to create a backup of its configuration. On the clone VM, I removed the passthrough-SSD from the config, then added a SATA disk in its place which was somewhat larger than the original SSD. I used
dd if=/dev/nvme0n1 of=/dev/tank/vms/vm-999-disk-1 bs=4096 to fill that backup disk with a copy of the contents of the SSD. Don’t just copy that command blindly, because you will end up erasing the wrong device!!
Then I used Proxmox’s interface to create a snapshot of the clone VM, which will snapshot the new SATA disk. At this point I could have tested the High Sierra upgrade on the clone, while leaving my original VM (and its corresponding SSD) completely untouched. But you only live once, so let’s upgrade the real thing instead!
Download the installer
In the App Store, search for High Sierra and hit the Download button to download the installer.
My installation of Sierra boots using Clover, so I first upgraded that to the latest version, r4359, by running the Clover installer in the guest.
After the installer finishes, but before macOS is restarted, it’ll leave the EFI partition mounted for us. We need to add an EFI driver to Clover to support Apple’s new filesystem, “apfs.efi”. You can get this from the “Install macOS High Sierra” installer in your Applications folder. Just right click on it, click Show Package Contents, then navigate to
Contents/SharedSupport and open
BaseSystem.dmg. From inside there, the driver is found at
usr/standalone/i386/apfs.efi copy that to your Clover EFI partition at
I rebooted to ensure that this upgraded Clover worked correctly.
Note that my Clover is set to use an SMBIOS of iMac 14,2. I think setting an SMBIOS manually like this will be a requirement, as the default SMBIOS doesn’t seem to work correctly for me. You can use Clover Configurator Vibrant to do that if you haven’t chosen an SMBIOS already.
Build the install ISO
Use Disk Utility’s File menu to create a new virtual disk image to copy the installation data into, 8GB is a good size.
I chose a filename of HighSierra.dmg, and a volume name of HighSierra. After creation, that empty image should get mounted to
/Volumes/HighSierra for you.
Now run the High Sierra installer’s built-in
createinstallmedia command to fill that image up:
sudo "/Applications/Install macOS High Sierra.app/Contents/Resources/createinstallmedia" --volume /Volumes/HighSierra
Eject the completed “Install macOS High Sierra” image using finder, then convert the image into an ISO:
hdiutil convert HighSierra.dmg -format UDTO -o HighSierra.iso mv HighSierra.iso.cdr HighSierra.iso
Upload the resulting HighSierra.iso file to your Proxmox installation’s ISO storage (by default I believe this is
Add this ISO as a new SATA CD drive to your Sierra VM. Clover can’t see CD drives for some reason, so edit the VM’s config file and edit the line for the CD drive to remove “media=cdrom” and add “cache=writeback” to turn it into a pseudo-harddrive. The resulting line in my config ended up being:
Remove any hacked NVMe drivers
I had installed a modified
/System/Library/Extensions in order to support my Samsung 950 Pro SSD. This SSD will be supported natively in High Sierra, and the presence of this leftover Sierra kext will wreck the boot process after the upgrade to High Sierra completes.
To remove it, I first had to change my VM’s configuration to comment out the “hostpci0” line that passed through the SSD, then I added it back as a SATA disk instead using “sata0: file=/dev/nvme0n1”. This way it appears as a simple SATA drive to macOS, and it won’t need the hacked NVMe driver to boot. Proxmox needed to be rebooted so that the NVMe would be available for use in this way (if I pass it through, it becomes unavailable for non-passthrough tasks until the next host reboot for some reason).
Then I booted Sierra from the SSD (using this SATA emulation) and from it I ran
sudo rm -rf /System/Library/Extensions/HackrNVMeFamily.kext to delete the hacked kext. (You might also have had a
IONVMEFamilyBorg.kext in there, which needs to be deleted too.)
Finally, and critically, after shutting down the VM, I removed the SATA device from the config, and added back the SSD passthrough. The High Sierra installer won’t upgrade the filesystem to APFS for us if the drive doesn’t appear to be an SSD.
Start the upgrade
If your VM was booting from an NVMe SSD originally, it should now have any hacked NVMe drivers removed from its filesystem. In the VM configuration, the NVMe SSD should once again be passed-through using a hostpciX line. Any passthrough of an NVidia video card should be commented-out.
One last configuration change: I upgraded the “machine” line in the VM config to “machine: pc-q35-2.5” (I was using 2.4 previously). I’m not sure if this was needed or not, but it doesn’t seem to hurt.
Boot your VM, and at the Clover menu, choose the option to boot the High Sierra installer. Follow through the prompts to install to your disk.
Pretty soon, the system will reboot, and you should pick the “Boot macOS install from (your main disk)” entry to continue installation (it should be selected by default).
After this section, the installer will reboot again, because installation is complete. But this time things look a little freaky:
This time there will be two new options, “Boot macOS from (your drive)” and “Boot FileVault Preloader from Preboot”. I believe the second option would only apply to systems using FileVault encryption (I’m not using it and I’m not sure if it’s compatible with Clover yet), so I’m using the “Boot macOS” one instead. I hit space on it to customise the boot options:
I ticked Verbose, so I could see how well the first-boot went. Now you can “boot with selected options” and you should get to your login screen and log in!
Now all that’s left to do is to upgrade your NVidia web drivers (if you were using them) to the latest version and restart!
After successfully booting with NVidia enabled, you can grab the latest CUDA drivers too.
If everything went well, you should see in Disk Utility that your SSD was upgraded to APFS during installation! I’m hoping that this improves my filesystem integrity on the rare occasion that my VM locks up.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474470.37/warc/CC-MAIN-20240223221041-20240224011041-00584.warc.gz
|
CC-MAIN-2024-10
| 6,993 | 46 |
https://discussion.dreamhost.com/t/domain-not-working/39955
|
code
|
they were working fine for me at home last night. As you can see i went into the setup and did the intial setup for it. I will be home from work in 3 hours. ill check then.
They dont work at work tho.
Im confident i know wat the broken link is
I have had a few ppl tell me that they have the same problem as me.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891812327.1/warc/CC-MAIN-20180219032249-20180219052249-00532.warc.gz
|
CC-MAIN-2018-09
| 311 | 4 |
http://www.sevenforums.com/performance-maintenance/201311-fluctuating-dpc-latency-5-80-a.html
|
code
|
I recently started paying attention to my DPC Latency and noticed that it was around 80 so I decided to do some tweaking and it turns out setting the timer resolution to .5 decreased my DPC Latency significantly, but only in groups of 4 seconds. Every 4 seconds the Latency fluctuates between about 5 and about 80. What could be causing this?
I have attached an image of this happening. Before the timer resolution change it was around a constant 80
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386164819343/warc/CC-MAIN-20131204134659-00090-ip-10-33-133-15.ec2.internal.warc.gz
|
CC-MAIN-2013-48
| 449 | 2 |
https://maja-mataric.web.app/index.html
|
code
|
I am motivated by the vast need for improving the human condition, and the equally vast potential for affordable human-centered technologies, such as socially assistive robotics (SAR)
, as means of empowering people and improving human quality of life. As a pioneer of SAR and founder and director of the Interaction Lab
at the University of Southern California
, my research is aimed at endowing machines with the ability to help people
, especially those with special needs. My lab's focus is on developing technologies that help people help themselves, using technology to augmentat human ability rather than to automate human work. I am passionate about conveying the importance and promise
of interdisciplinary research and careers in STEM to all, with a particular focus on K-12 students and teachers, women
and other underrepresented groups in engineering, the media, and policy makers.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949573.84/warc/CC-MAIN-20230331051439-20230331081439-00388.warc.gz
|
CC-MAIN-2023-14
| 893 | 7 |
https://www.microsoft.com/en-us/research/publication/adaptive-run-length-golomb-rice-encoding-of-quantized-generalized-gaussian-sources-with-unknown-statistics/
|
code
|
We present a simple and efficient entropy coder that combines run-length and Golomb-Rice encoders. The encoder automatically switches between the two modes according to simple rules that adjust the encoding parameters based on the previous output codeword, and the decoder tracks such changes. This adaptive Run-Length/Golomb-Rice (RLGR) coder has a fast learning rate, making it suitable for many practical applications, which usually involve encoding small source blocks. We study the encoding of generalized Gaussian (GG) sources after quantization with uniform scalar quantizers with deadzone, which are good source models in multimedia data compression, for example. We show that, for a wide range of source parameters, the RLGR encoder has a performance close to that of the optimal Golomb-Rice and Exp-Golomb coders designed with knowledge of the source statistics, and in some cases the RLGR coder improves coding efficiency by 20% or more.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469258948913.96/warc/CC-MAIN-20160723072908-00055-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 948 | 1 |
https://www.my.freelancer.com/job-search/hourly-based-project/2/
|
code
|
...want to sell ASIN BJAS091302 in Canada, so I need to source the same ASIN from USA. So, when creating listing I will write BJAS091302 (source) BJAS091302 (place of sale) 2) Hourly update price (re-pricing) and product availability according to Amazon sources 3) Re-pricing formula should be customizable 4) Automatic ordering feature is required. As
hi at the top of bid write the name of two psychology tests that can be used for hiring people i need research support with a business task i need someone who can start now and send progress each 1 hr need about 1500 words and refs in 4 or 5 hrs time from acceptance budget 25-45
...be based on opencv, just to be safe. I see you have a higher hourly price than most others and i hope more safety in terms of quality and dialogue comes with the price. Would you like to have a chat about this, and what you would charge for this? Im open for suggestions. Add me on whatsapp before any work is done, so we can discuss this project. Phone
13 years as motorsports event photographers, we have our own custom viewing/cart software. It is PHP based using F3 Fat Free Framework, MySQL, and FFMPEG. I am looking for a developer to take our existing cart which is local (LAN) only and flesh it out for online public use. This will entail adding security to the software - right now it's wide open
...services to US based companies. We are an information technology and software development consulting and managed service provider based in Denver, Colorado with a decade of experience in the industry. All leads, technology and a proven sales process will be provided. This position includes an opportunity for hourly and commission based pay depending
...online measurement records on backend server. 7. Company manager account can view all records from all staff accounts under his account. 8. User accessibility to modules is based on subscription. Each module can be subscribed individually by company manager account and assigned to staff accounts 9. The system integrates subscription management. Subscription
We're building a website for io games and want to build out the conte...need to be sure you can do the work, so please reply back with a sample task shown in the attachment. Please let me know your hourly rate, and how many of these you think you can get done in an hour. This is a small (1 day) project. If done well there will be future similar work!
Airbnb like functioning script (calendar based send requests) adapted for work experience scheme for Secondary School students. We have implemented a "credits table" but system is no not sending requests anymore. Our programmer is not retriavable, for any interested we are lookign to pair him up with another programmer anyway so long term relationship
We want to use coupons in our Joomla + MijoShop (Opencart fork) installation, but there is an issue. There is an option to add categories, but we can't add them because they aren't loaded in the field.
I need a quick coder who can search out and correct issues quickly. Will pay hourly but I don't wish to pay an amateur hourly. Current freelancer must sleep, but this cannot wait.
...Solution Expert for that - (possibly with developer team - but not mandatory). Expert will initially be working on planning phase with us and then will function as Technical project manager during development phase. Requirements of expert- - Understands multi-tenant architecture and has delivered intermediate to large scale SaaS projects in past with
Hi, I'm looking for a video editor to work on an ongoing time tracker project. Main tasks will be basic video editing. ex: adding an existing clip to the end of another video. reframing the existing video into different size format Adding some overlay effect on an existing video (progress bar, like instagram videos) Adding some caption (Title in
Need a dev to rewrite website in WP to create a new modern look. Experience essential. Pay based on proven experience/examples of work. Hourly or project pay base. Australian small IT business, with website hosted in SiteGround.
We built a website from scratch using angular 1.5 on the front end and Mongo DB for the back end. We are supported by Heroku and use GitHub, Trello, and Slack. We need a full-stack programmer who has a complete and high level understanding of all of these platforms. Within 2 weeks we plan on launching and we need a person with fresh eyes that can help debug in all aspects of our site. You won'...
...designs ) and turning them into agile code. • A suite suitable for cross platform testing. • An efficient work ethic ( there is a pipeline of work on this project ) . • Strong English. • A good hourly price to output coefficient. Sixty bucks an hour and slow doesn’t work but neither does 15 and slow. We will study your proposal carefully initially givi...
This is Ongoing Project to build WordPress FrontEnd + BackEnd. If you have hourly rate between $4~$8, please bid on this project. I will share details then.
...with our team members over phone calls, Skype, WhatsApp, and freelancer. While bidding please share: 1) past sample work 2) skill set you have We have a fixed budget for hourly payouts from Rs150 to Rs250 depending upon your skill sets. We would also give regular bonus as an appreciation of your work. You would be permanently hired in our Delhi branch
Purpose of this project is for hourly rental of an item, say an e-scooter or bike. User downloads and app (android/iOS) and scans a QR code to initiate the rental. Once user returns the item the amount is deducted from the users account. Android/iOS apps Register Confirm tn Confirm email Need camera access for qr reading Add payment method
Required a experienced PHP developer who can write code in OOP's concept. We can hire based on fixed price or hourly basis project (as per your wish) but the candidate has to go through small interview process. Interested canidate can appy.
Write and create documents about pile load test. Based on ASTM standards for static deflection tests. The work can be an ongoing hourly rated project with a max hourly rate of $4/hour. Any offer higher than this rate will be rejected.
MOHPlayer are leaders in professional telecom audio (message on hold). We are looking for a UK based person who can work from home to call around our registered dealer base to remind them about our services and to ask them if they need any help using our system. THIS IS NOT COLD CALLING - these people have already asked for an account on our system
Hi Esmir, I noticed your profile. We are [log masuk untuk melihat URL] project, geographically based in Limassol, we need Graphic/Web designer for hourly jobs, also bigger projects are in pipeline, but start from smaller ones. At the moment banners correction/ creation is needed. Are you fine to discuss further ? Thank you, Dmitris
I am working on mining data from several different websites and am looking for assistance on an hourly basis in doing so. Some of these websites expose data via JSON APIs - which we'd hit directly. Please have experience in: - Scrapy - Dealing with authentication - Data extraction from web pages - Reverse engineering of API endpoints - Data extraction
...[log masuk untuk melihat URL] The goals of this project. - establish a B2B market, a client base, in which the product is used and NOT sold. - plan and build a process to promote sales activities. - prepare sales materials, phone script, presentations and others. This work is paid based on meetings. Hourly based. Please do your own research on the product
Seeking Graphic Designer / Tshirt Design for Hourly Project...NOW! ... Need designer to edit 2 designs (.AI) and upload to multiple color tshirt options
Hi AstroDezigner, I noticed your profile. We are [log masuk untuk melihat URL] project, geographically based in Limassol (so sometimes physical meeting possible to discuss details of a bigger project), we need Graphic/Web designer for hourly jobs, also bigger projects are in pipeline, but start from smaller ones. At the moment banners correction/ creation is needed. Are
...Cart" button on WooCommerce site as ManyChat's bot subscriber - Add/Update/Remove Tags in ManyChat based on what the subscribers did on WooCommerce site - Get Order Status information from WooCommerce and feed it into ManyChat's tags to send message based on the Order Status. For example, if Order Status changes to Order Complete, the tag for that particular
We are a US based marketing agency that focuses on consulting; however, we are interested in taking on more website development projects. We are looking for top quality HTML WordPress developers and HTML designers. Listed below are our key requirements. Please note… we are looking for individuals, not companies. We are interested in hiring multiple
I need you to write some articles. You will be given your assignments for the project and expected to submit completed and ready to submit articles within 72 hours. You will receive completed instructions, a brief description of each article (please state number you can provide best work between the one article minimum and our three article maximum
...is an ongoing project and offers good opportunities for you to demonstrate your talents and skills. You need to have a good understanding of international marketing on specific targeted group (scholars/practitionars/professionals in creative arts education and arts therapy/health/well-beings/body-mind). We offer a combination of hourly fee and commission
...individuals. Please ignore the budget. State your hourly rate based on experience and location. Only British English speakers without significant accent! If you do not comply to this requirement, you will be reported. If the person in the interview is different to the person that will perform the job, the project will instantly be terminated, payments disputed
Please ignore the budget. State your hourly rate based on experience and location. Only German native or near-native speakers without heavy accent! If you do not comply to this requirement, you will be reported. If the person in the interview is different to the person that will perform the job, the project will instantly be terminated, payments disputed
In my project I am using angular 6 as front end and service in Drupal..As this is a music related site I am using audio plugins which I have taken from old site . This audio has some j query which i kept in js files and gave path in [log masuk untuk melihat URL] file in script [log masuk untuk melihat URL] is working fine if am using the audio tag for single music or using even
...the spreadsheet we wish to automate. Please respond with why I should select you, your confidentiality agreement, hourly rate and cost estimate to complete this project (to the nearest NZD$250). I will shortlist likely candidates based on this response....
A simple task for a person proficient in excel. I need to convert event based state / duration data into a hourly breakdown of the device state. Given that the event state can span over many hours. Attached is the data in question, solution must include the excel functions to calculate the times.
I need to hire an experienced Web developer for hourly ongoing work. + bonus at the end of every project. Wordpress, html, css experience a must. Photoshop and Graphic design is a huge plus. Must be willing to work with timer app. Work can include create new sites, modify existing ones, or find bugs or coding issues. Must have experience in creating
...comprehend the nature of the orientation data to be input to and output from the underlying cube functioning. So I am not really sure where this leaves the present state of the project overall (except for now having even less money to spend on it). One possible forward features might include linking a video (even 2D) to corresponding sensor orientation data
We are looking to develop a game-like annotation system with 3 types of tasks: 1. choose a title for image out of a few options 2. mark the center of images 3. set a bound...back-end, react&material for front-end, google authentication. Fixed price for the first version, if things go well we have a big feature list we'll need which can be hour based.
...we are looking for Dotnet(VB.NET/C#) Freelance developers who can work on our projects along with our team. Developer have a choice to work on hourly/weekly or monthly basis. We are starting with small project and request you to read the requirement carefully and revert back with the proposal. This requirement is ONLY for committed developers who who
An Indipendent Male in Kerala looking for part-time jobs or agent who can provide Clint's to him on commission basis Graduate, available anytime anywhere at your door steps.
I need a fullstack developer in .net, c# , Angular 6, CSS ,HTML5, For front end and For back end Bootstrap...and ready to work daily 3-4 hours remotely like team viwer and IST morning time in between 7 to 11am We have fixed monthly paid long term project so budget is monthly based that is for 30 days, not accepted hourly or less then 30 days bid.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376829115.83/warc/CC-MAIN-20181217183905-20181217205905-00496.warc.gz
|
CC-MAIN-2018-51
| 13,147 | 41 |
https://www.experts-exchange.com/questions/29007944/Identify-administrator-account-use-for-server-desktop-services.html
|
code
|
I am trying to identify one of my retired admin (user) account and disable the account. But before I disable the account, I need to scan my domain if his account was used on any of the server or desktop services. Is there a tool or scrip that I can use to scan my network and identify the devices where his account was used. Please advise.
You can use this solution from scripting guy to show all services and then see if this user is set to run any services https://blogs.technet.microsoft.com/heyscriptingguy/2012/02/15/the-scripting-wife-uses-powershell-to-find-service-accounts/
Lionel, thank you. this will only give me to log in to each of the devices I know and run the power shell. I need to be able to scan the network for the unknown. I'm trying to scan my network to see if I missed any device that has his account setup to run the services.
Sorry then I don't know how to help -- only thing I do is to disable the account and see if anything goes wrong but that can be a tricky and dangerous approach to take.
Yes I thought about that too.
Hi expert, Is there a tool or another solution to identify the domain admin/user account if use for any services or task scheduler in the network?
ASKER CERTIFIED SOLUTION
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Did my last comment help? If not what is it not doing; i.e. what is missing?
No further response from questioner so I am assuming my final suggestion worked to solve the issue.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474700.89/warc/CC-MAIN-20240228080245-20240228110245-00841.warc.gz
|
CC-MAIN-2024-10
| 1,511 | 11 |
https://wp31.ru/show-total-amount-month-and-year-wise-codeigniter-framework-php/
|
code
|
The time can be formatted with or without seconds, and it can be set to European or US format. If only the timestamp is submitted it will return the time without seconds formatted for the U. This function can take a number poorly-formed date formats and convert them into something useful. It also accepts well-formed dates. The function will return a UNIX timestamp by default. You can, optionally, pass a format string the same type as the PHP date function accepts as the second parameter. The first parameter must contain a UNIX timestamp. The second parameter must contain a timestamp that is greater that the first timestamp. The thirdparameter is optional and limits the number of time units to display. The most common purpose for this function is to show how much time has elapsed from some point in time in the past to now.
Codeigniter Active Record: Insert, Select, Update, Delete
Data is the bloodline of most applications. The data needs to be stored in such a way that it can be further analyzed to provide insights and facilitate business decisions. The data is usually stored in the database.
To get current date time you have to use the function mdate() in codeigniter. This function is similar to PHP date() but allows you to use MySQL.
Mike Mukul. The future of CodeIgniter is anything but clear. As rival frameworks, especially Laraval, grew, many were sounding the death bells for CodeIgniter. However, CodeIgniter is back with a new version. Used by many developers, it gained popularity because of its easy implementation and low-learning curve for beginners. In mid EllisLab decided not to support the framework anymore, and the search began for the prospect who would maintain it. Questions flooded into the open-source industry.
What did the future hold? Would it be better or worse? The community has appreciated this end result. Many things changed in the third version. For a more detailed list of what changed between CI version 2 and CI version 3, read our blog.
If you are running or considering running a multi-byte character set for your database connection, please pay close attention to the server environment you are deploying on to ensure you are not vulnerable. CodeIgniter User Guide Version 2. Change Log Version 2. Version 2. Updated timezones in Date Helper. The Encrypt Class now requires the Mcrypt extension to be installed.
There is no builtin date validation in Codeigniter form_validation Library, but you can use its callback to call a function and validate the date.
Vicario i think its also possible with ‘regex’. It’s impossible to implement reliable date validation with regular expressions. Yours is actually quite good but, for instance, it claims that is not valid. Yeah, right, if you have the patience you can probably hard-code all the exceptions including missing days due to transition to Gregorian calendar but you know what I mean: regular expressions are not the best tool. I think this is the way to go too. One thing, the name of the function has to be without “callback”.
Using proper date functions is the way to go.
CodeIgniter Date or DateTime
Returns the current time as a Unix timestamp, referenced either to your server’s local time or GMT, based on the “time reference” setting in your config file. If you do not intend to set your master time reference to GMT which you’ll typically do if you run a site that lets each user set their own timezone settings there is no benefit to using this function over PHP’s time function. The benefit of doing dates this way is that you don’t have to worry about escaping any characters that are not date codes, as you would normally have to do with the date function.
The first parameter must contain the format, the second parameter must contain the date as a Unix timestamp. Takes a Unix timestamp referenced to GMT as input, and converts it to a localized timestamp based on the timezone and Daylight Saving time submitted.
change date format in codeigniter, how to convert date format in php codeigniter, codeigniter change date format, how to display date in dd-mm-yyyy format in.
A controller is a simple class file. As the name suggests, it controls the whole application by URI. You will find two files there, index. These files come with the CodeIgniter. Keep these files as they are. This class must be extended whenever you want to make your own Controller class. This indicates the class name of controller.
How to change date format in PHP Codeigniter?
When used together, they form a powerful foundation for rapidly developing usable Web sites and applications. This article shows how to integrate these two systems into a single framework and how to use jQuery to improve the UI of an existing Web application. It assumes that you have both CodeIgniter version 1.
Converting date format using language in codeigniter. |. | Add code below to language directory in codeigniter. | application/language/indonesia/date_lang.php.
Edit Report a Bug. I ran into an issue using a function that loops through an array of dates where the keys to the array are the Unix timestamp for midnight for each date. The loop starts at the first timestamp, then incremented by adding seconds ie. However, Daylight Saving Time threw off the accuracy of this loop, since certain days have a duration other than seconds. I worked around it by adding a couple of lines to force the timestamp to midnight at each interval. The following script will do the conversion either way.
If you give it a numeric timestamp, it will display the corresponding date and time. If you give it a date and time in almost any standard format , it will display the timestamp.
Laravel vs CodeIgniter: Which is Better?
Codeigniter Date Helper : Codeigniter provides the helper which is used to work with dates. Here in this tutorial we are going to explain how you can use date helper in Codeigniter. You can use our online editor run and see the output of the example.
CodeIgniter is an MVC-based framework introduced by EllisLab in February With these changes, it will be easy to stay up to date with the latest standards.
Laravel is an open-source widely used PHP framework. The platform was intended for the development of web application by using MVC architectural pattern. Laravel is released under the MIT license. Therefore its source code is hosted on GitHub. It is a reliable PHP framework as it follows expressive and accurate language rules. What is CodeIgniter? CodeIgniter is a powerful PHP framework. It is built for developers who like a simple and elegant toolkit to create full-featured web applications.
CodeIgniter is one of the best options for creating dynamic websites using PHP.
Codeigniter – Date format – Form Validation
Some time ago, a client called me and asked me to tell him when someone had logged in and out of the network. It was a reasonable request but it presented a challenge for which I had to develop a quick solution. In developing the application, I made use of a PHP language framework, called CodeIgniter, that I have been using successfully for my development project.
The purpose of this article is to show you how I solved the problem and, at the same time, introduce you to CodeIgniter, a lightweight, easy to use PHP framework that you can use to build high quality, robust, PHP web sites and applications.
As a CodeIgniter developer, sometimes you end up in a situation that we’ll replace all the occurrences of [DATETIME] with the current date.
There are several ways that a new Time instance can be created. The first is simply to create a new instance like any other class. When you do it this way, you can pass in a string representing the desired time. You can pass in strings representing the timezone and the locale in the second and parameters, respectively. If no locale or timezone is provided, the application defaults will be used. The Time class has several helper methods to instantiate the class.
The first of these is the now method that returns a new instance set to the current time. This helper method is a static version of the default constructor. Returns a new instance with the date set to the current date, and the time set to midnight. It accepts strings for the timezone and locale in the first and second parameters:.
Creating a Robust Web Application with PHP and CodeIgniter
This pattern allows information to be retrieved, inserted, and updated in your database with minimal scripting. In some cases only one or two lines of code are necessary to perform a database action. CodeIgniter does not require that each database table be its own class file. It instead provides a more simplified interface. Beyond simplicity, a major benefit to using the Active Record features is that it allows you to create database independent applications, since the query syntax is generated by each database adapter.
It also allows for safer queries, since the values are escaped automatically by the system.
To set the timezone in Codeigniter by extending date helper is an alternative way. For doing that need to follow the following two step activity. Extend date helper.
Tutorial Knowledge-Base Awesome. Why and how to solve it? Asked By Me hdi. Codeigniter database date-compare Im having a problem comparing dates in a database to a week from now using activerecord. I’m trying to return a list of events with their start date less than a week from now. Asked By Matt James. Time difference between a Date and current Time?
Assume I have a funny video site that shows funny videos to users.
PHP – Date Of Birth Validation In Codeigniter
As a member of Amazon Associates program, I earn a small commission when you purchase products through our links at no additional cost to you. It helps keep this site running and allows us to create better content. Now that we have created our database table, it’s time to setup our frontend actions that allow us to add events.
What is CodeIgniter? CodeIgniter is a powerful PHP framework. CodeIgniter is one of the best options for creating dynamic websites using PHP. It provides complete PHP Date & Time Function with Example. What is PHP.
You can use the PHP date function. Learn more. How to get current date in codeigniter Ask Question. Asked 7 years, 4 months ago. Active 2 years, 5 months ago.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178370239.72/warc/CC-MAIN-20210305060756-20210305090756-00341.warc.gz
|
CC-MAIN-2021-10
| 10,324 | 41 |
https://mail.python.org/archives/list/[email protected]/message/PQX6AXELWXY5LBULXTKUH5BGCFAGDP6B/
|
code
|
On Wed, Feb 20, 2002 at 06:49:53PM -0800, Chuq Von Rospach wrote:
On 2/20/02 5:36 PM, "Jay R. Ashworth" [email protected] wrote:
So, you're saying because you protect yourself from the spammers, that EVERYONE should, too?
As a matter of fact, yes, I am saying that. There are cost-free, not especially difficult to set up, facilities for all environments
Okay, what system exists for AOL users? How do you set up a system if you live on a corporate account with an imap mail box and no shell access to the server? What about a hotmail or yahoo account?
Show me the systems, jay, that work for real people, not us geeks that run our own boxes on our own desks.
Volvos are very safe, Toyotas are in the middle, sand rails are *just not safe at all*.
The risks are easy to discover for each category, and the same is true for choosing an email service. I overstated *slightly* in saying "all" environments; let me rephrase it:
For any given business or personal environment, a solution exists to be chosen which permits the filtering of unwanted mail. People can choose this solution, or they can choose others.
In the corporate situation, the responsible party is the MIS department, for whom this freedom of choice also exists.
Hotmail and Yahoo are jokes. They're free; you take what you're paying for.
As for IMAP, the Bat will filter just fine, thanks.
To move back to the burglary analogy, you've just told me that (a) if you do get burgled, you won't call the police, and (b), the police department should be shut down, because everyone should take care of themselves. Which, I guess, means if you get burgled, you'll pull out the gun, find the burglar, and shoot him yourself, right?
Actually, yes. Gun control is being able to hit your target. Anyone foolish enough to burgle my house in the middle of the night is running (hopefully knowingly) the risk of getting shot.
Only if you're home. And if he's IN your home, be my guest. But your analogy implies that you don't believe in the police, you believe in hunting him down and shooting him whenever you find him. Once you leave the confines of your property, your rights change radically here.
Because I've been around long enough -- not that you haven't certainly -- to see the value in the way things are if the tool does *not* circumscribe useful things, and I do not see fit to let the Bad Guys make that utility go away. Aren't we having this argument with John Ashcroft right now about US civil rights?
We? No, actually.
*Lots* of people are having that argument with the AG, and I'm one of them.
Cause my way is right? :-)
Nope. Don't buy that. Especially for all those list admins in the three cases I gave you above. Once you solve THOSE problems, though, maybe we can start to talk. I'm really curious how you'll solve the problem of my mother doing her own anti-spam processing on her earthlink account. Because if you can't solve that problem, or the AOL problem -- you can't solve the problem, except for us geeks, and we can't write Mailman just for geeks.
Spaminator. You picked precisely the example I had in mind. If the masses *demand* solutions, those solutions *will* happen.
See, that's the other failure of your analogy. You assume everyone WANTS to have a gun and hunt down their own burglar. The vast majority of the public doesn't. They want to call the police.
No, I merely don't value the email address's privacy as highly as you do.
Fair enough. But I think that disqualifies you from making design decisions about privacy issues then. It's Barry's call, but I'd argue that you take a position that is unacceptable in the design of this software for these issue.
See *all* my other commentary on the specific topic of "design decisions for Mailman"; I'm sure Barry will chime in here sometime soon...
That's nice. But -- does that override the need to protect the admin from spammers? Again, do we only do things that you approve of, or for the common good, is this something where you compromise your position?
The admin works for me. Not the other way around.
Apologies if you think that sounds snotty or self-important.
Yes, it does.
Again, apologies. If you can convince me that one Right outweighs the other one, for a sufficiently statistically significant number of possible cases, I'll change my outlook. I don't claim to be perfect.
Solve the problem for real users (the AOL account. The corporate IMAP account. The earthlink account. The hotmail account) and then maybe we'll talk. Until then, your solution only works for geeks, and is unacceptable for a tool designed to be used by regular people, not JUST geeks.
See above: no, some of those cases (specifically Yahoo and Hotmail) are in fact insoluble, but that's *Hotmail* and *Yahoo's* fault, and their user's problem. AOL needs to solve it's own problem -- they've made the bed, their users are laying in it. Deals with the devil never work out well.
But perhaps the availability of things like Earthlink and the Mindspring Spaminator will realign the playing field on that point -- Earthlink certainly appears to think so, given what they're spending on ads this year.
The IMAP account solution I've mentioned already.
And as for Earthlink, well... see above. :-)
Jay R. Ashworth [email protected] Member of the Technical Staff Baylink RFC 2100 The Suncoast Freenet The Things I Think Tampa Bay, Florida http://baylink.pitas.com +1 727 647 1274
"If you don't have a dream; how're you gonna have a dream come true?" -- Captain Sensible, The Damned (from South Pacific's "Happy Talk")
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-33/segments/1659882572161.46/warc/CC-MAIN-20220815054743-20220815084743-00334.warc.gz
|
CC-MAIN-2022-33
| 5,550 | 37 |
https://osf.io/mgxf5/
|
code
|
Independent storage of different features of real-world objects in long-term memory.
Date created: | Last Updated:
: DOI | ARK
Creating DOI. Please wait...
Description: People can store thousands of real-world objects in visual long-term memory with high precision. But are these objects stored as unitary, bound entities, as often assumed, or as bundles of separable features? We tested this in two experiments. Participants memorized specific exemplars of real-world objects presented in a particular state (e.g., open/closed; full/empty; etc), and then were asked to recognize either which exemplars they had seen (e.g., I saw this coffee mug), or which exemplar-state conjunctions they had seen (e.g., I saw this coffee mug and it was full). Participants frequently committed ‘swap’ errors, misremembering which states went with which exemplars. Furthermore, participants were very good at remembering which exemplars they had seen independently of whether these items were presented in a new or old state. Thus, the features of real-world objects that support exemplar discrimination and state discrimination are not bound, suggesting visual objects are not unitary entities in memory.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817442.65/warc/CC-MAIN-20240419172411-20240419202411-00159.warc.gz
|
CC-MAIN-2024-18
| 1,194 | 5 |
http://www.theautomotiveindia.com/forums/loan-insurance-rto/27193-need-help-rto-transfer-delhi-kolkata-half-done.html
|
code
|
| | Need Help: RTO Transfer From Delhi To Kolkata - Half-Done
I got transferred from Delhi to Kolkata in May 2015 and got hold of an agent to transfer my motorcycle (Pulsar 200 NS). Had already got the NOC before leaving Delhi.
Till now, I got :
1. Full West Bengal Lifetime Tax certificate based on my DL bike no.
2. Got new RC (based on my new Kolkata address and my DL bike no.)
BUT, my bike number is still DL based. The new RC's and Lifetime RoadTax generated bear the DL number on them.
The agent took 8,000 but did not complete the process. Now, how do I get my number changed from DL to WB and I am guessing I also need to get my new RC, Lifetime Tax docs updated as well.
Any guidance or help regarding this would be highly appreciated. Its been nearly 1.5 years and I am still trying to get everything sorted out.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589726.60/warc/CC-MAIN-20180717125344-20180717145344-00014.warc.gz
|
CC-MAIN-2018-30
| 823 | 8 |
https://www.pixata.co.uk/2020/04/21/windows-10-built-to-last/
|
code
|
Whilst I’m getting increasingly frustrated with Windows 10, the number of errors that seem to crop up, and the number of basic features that seem to stop working for no good reason, it has produced more than its fair share of amusements.
Today’s suggests that Microsoft have an amazing level of confidence in the staying power of Windows 10. This is an event from the Windows Application event log…
Notice that the event was logged on 21st April 2020 at 17:18:08 (just now), but the scheduled restart mentioned in the error message is for 28th March 2120 at 16:18:08, almost 100 years from now!
Do they honestly think that I will still be using this installation of Windows 10 on this PC in 100 years time? They obviously have more confidence in it than I do (which isn’t saying much actually!).
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100724.48/warc/CC-MAIN-20231208045320-20231208075320-00009.warc.gz
|
CC-MAIN-2023-50
| 803 | 4 |
https://community.ivanti.com/thread/4910
|
code
|
I am trying to create a new process based off of the Full Incident process. I imported it into our Test system. With the imported process, the Declare Major Incident action works fine. However, when I copy the process, Declare Major Incident stops working. I tried the scripts in one of the other articles for fixing Declare Major Incident when you make a change to that action, but those scripts didn't fix the problem. Any suggestions?
The script within the post http://community.landesk.com/support/docs/DOC-5073 should resolve this issue.
NOTE: As always, before carrying out these instructions, I would recommend that you try this out on a test system initially, check you are happy with the results, then roll the changes out to your LIVE database. When making the changes in your LIVE environment, please ensure that you have a full working backup of your database - and that all users are out of Console and the serviceportal. If there are any issues, restore the database backup you took immediately prior to making the changes.
I had tried that once before posting and it didn't work. I tried it again just to make sure and it works now. I think I might have gotten something out of order the first time. Thank you for your help.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-39/segments/1537267160568.87/warc/CC-MAIN-20180924145620-20180924170020-00481.warc.gz
|
CC-MAIN-2018-39
| 1,239 | 4 |
http://aslme.org/List_Programs?conf_id_sel=7
|
code
|
Practical Applications of Genetics: What the Genomics Revolution Means to You and Your Company
Presenter: George J. Annas, J.D., MPH
Presenter: Barry A. Guryan, Esq.
Presenter: Wayne A. Keown, J.D., Ph.D
Presenter: Eric S. Lander, Ph.D.
Presenter: J. Alexander Lowden, M.D., Ph.D
Presenter: Philip R. Reilly, M.D., J.D.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218191444.45/warc/CC-MAIN-20170322212951-00004-ip-10-233-31-227.ec2.internal.warc.gz
|
CC-MAIN-2017-13
| 319 | 7 |
https://benjamin-fuller.uconn.edu/
|
code
|
I am an assistant professor of computer science and engineering at the University of Connecticut. I'm a member of the Comcast Center of Excellence for Security Innovation and the Connecticut Cybersecurity Center.
Prior to joining UConn I was a cryptographic researcher building secure systems at MIT Lincoln Laboratory from 2007-2016 in the Secure, Resilient Systems and Technology Group. I completed my Ph.D. at Boston University. While at BU I contributed to the BUSEC group. You can follow me on twitter at @fuzzycrypto
My primary research area is cryptography spanning from complexity/reduction-based cryptography, information theory, and applied cryptography necessary to deploy systems. Ideally, I'm able to take a real problem, develop a theoretically sound approach, and work with others to implement a proof of concept.
The CSE and ECE departments are jointly organizing a security seminar throughout the 2018-2019 academic year. We're always looking for exciting speakers.
I also work with UConn's cyber security club. I encourage interested students to attend a meeting or talk to me about possible problems in cyber security.
Due to Coronavirus I am working remotely and should be reached by email for appointments.
371 Fairfield Way
Storrs, CT 06269
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107869933.16/warc/CC-MAIN-20201020050920-20201020080920-00587.warc.gz
|
CC-MAIN-2020-45
| 1,262 | 8 |
https://www.mythic-beasts.com/support/hosting/spam
|
code
|
Unsolicited commerical email (spam) is a significant problem for just about all Internet users, and unfortunately there is no silver bullet. All anti-spam approaches are a compromise between getting rid of as much spam as possible, and the risk of rejecting legitimate email.
At Mythic Beasts, we've always believed in putting users in control by giving you your email almost completely unfiltered, and letting you decide how aggressively you want to filter it.
The only compulsory filtering that we apply to all mail is to refuse mail from hosts on the SpamHaus ZEN block list (which includes the SBL, SBLCSS, XBL and the PBL). This stops a huge amount of spam, and we believe that it does so very safely.
We then pass all incoming mail through rspamd. rspamd is a popular, open source spam filtering package. rspamd assigns a score to each message based on many different aspects of the e-mail. Spam messages will be given a high score; legitimate messages will be given a low (or even negative) score.
You can use the rspamd score to filter mail as you wish. An example is shown below.
You have the option to simply discard (irretrievably) all mail that exceeds a specified rspamd score. This is configured through the control panel: follow Hosting accounts and then the Anti-spam link next to the domain you wish to configure. We would not recommend setting a threshold of less than 5 as this will filter mail very aggressively and will often result in legitimate email being characterised as spam. A higher threshold of 10 or 15 will result in much more conservative mail filtering with a lower risk of false positives.
Sender verify and Greylisting
As well as the rspamd options, you may see reference to two other spam reduction methods: sender verify and greylisting.
We strongly recommend leaving these switched off (the default for all new accounts). They were quite useful 10 years ago. Today, they catch very little spam, but do cause problems receiving mail from legitimate (if poorly configured) senders. At some point we shall remove these options.
Custom mail filtering
If you have a shell account, you can configure your own custom mail filtering, for complete control. The easiest way to filter mail is to look for a spam flag header. rspamd marks all mail that it considers spam by adding the following header:
You can use an Exim filter file to sort on this header, by putting the
following text in your
# Exim filter if $header_x-spam-status: begins "Yes" then save Maildir/.spam/ else save Maildir/ endif
In this case, we are saving any spam in a folder called
spam. Other mail will be delivered as normal to the inbox.
For more advanced cases, one could use procmail. To do this, create a
.forward file in your home directory with the following
Then create a
.procmailrc file containing:
:0: * ^X-Spam-Status: Yes Maildir/.spam/
This filter does the same as the above Exim filter.
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439738735.44/warc/CC-MAIN-20200811055449-20200811085449-00314.warc.gz
|
CC-MAIN-2020-34
| 2,903 | 22 |
http://cdm.link/2017/05/18/
|
code
|
Ableton has accustomed a lot of us to the idea of having a grid of bits of ideas we can trigger and layer (among other similar metaphors in drum machines and the like). So of course that same functionality would make sense elsewhere. Maschine Jam took Native Instruments’ groove workstation into a different direction by […]Read more
brings together the latest breaking news on music, technology, gear, and live visuals. Got a project, found a news tip, or want to share your product? Submit to us directly.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267860776.63/warc/CC-MAIN-20180618183714-20180618203714-00071.warc.gz
|
CC-MAIN-2018-26
| 511 | 2 |
https://annals-csis.org/Volume_30/drp/197.html
|
code
|
Using Transformer models for gender attribution in Polish
Karol Kaczmarek, Jakub Pokrywka, Filip Graliński
Citation: Proceedings of the 17th Conference on Computer Science and Intelligence Systems, M. Ganzha, L. Maciaszek, M. Paprzycki, D. Ślęzak (eds). ACSIS, Vol. 30, pages 73–77 (2022)
Abstract. Gender identification is the task of predicting thegender of an author of a given text. Some languages, including Polish, exhibit gender-revealing syntactic expression. In this paper, we investigate machine learning methods for gender identification in Polish. For the evaluation, we use large (780M words) corpus``He said she said'', created by grepping (for author's gender identification) gender-revealing syntactic expres- sions and normalizing all these expressions to masculine form (for preventing classifiers from using syntactic features). In this work, we evaluate TF-IDF based, fastText, LSTM, RoBERTa models, differentiating self-contained and non-self-contained approaches. We also provide a human baseline. We report large improvements using pre-trained RoBERTa models and discuss the possible contamination of test data for the best pre-trained model.
- T. B. Brown, B. Mann, N. Ryder, M. Subbiah, J. Kaplan, P. Dhariwal, A. Neelakantan, P. Shyam, G. Sastry, A. Askell, S. Agarwal, A. Herbert-Voss, G. Krueger, T. Henighan, R. Child, A. Ramesh, D. M. Ziegler, J. Wu, C. Winter, C. Hesse, M. Chen, E. Sigler, M. Litwin, S. Gray, B. Chess, J. Clark, C. Berner, S. McCandlish, A. Radford, I. Sutskever, and D. Amodei. Language models are few-shot learners. Advances in neural information processing systems, 33:1877–1901, 2020.
- B. Bsir and M. Zrigui. Bidirectional LSTM for author gender identification. In International Conference on Computational Collective Intelligence, pages 393–402. Springer, 2018.
- T. Chen and C. Guestrin. XGBoost: A scalable tree boosting system. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD ’16, pages 785–794, New York, NY, USA, 2016. ACM.
- A. Conneau, K. Khandelwal, N. Goyal, V. Chaudhary, G. Wenzek, F. Guzmán, E. Grave, M. Ott, L. Zettlemoyer, and V. Stoyanov. Unsupervised cross-lingual representation learning at scale. arXiv preprint https://arxiv.org/abs/1911.02116, 2019.
- C. Cortes and V. Vapnik. Support-vector networks. Machine learning, 20(3):273–297, 1995.
- S. Dadas, M. Perełkiewicz, and R. Poświata. Pre-training Polish Transformer-Based language models at scale. In L. Rutkowski, R. Scherer, M. Korytkowski, W. Pedrycz, R. Tadeusiewicz, and J. M. Zurada, editors, Artificial Intelligence and Soft Computing, pages 301–314, Cham, 2020. Springer International Publishing.
- J. Devlin, M. Chang, K. Lee, and K. Toutanova. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. CoRR, abs/1810.04805, 2018.
- Y. Gal and Z. Ghahramani. Dropout as a Bayesian approximation: Representing model uncertainty in deep learning. Proceedings of The 33rd International Conference on Machine Learning, 06 2015.
- A. Go, R. Bhayani, and L. Huang. Twitter sentiment classification using distant supervision, 2009.
- F. Graliński, Ł. Borchmann, and P. Wierzchoń. “He Said She Said” — a male/female corpus of Polish. In N. Calzolari, K. Choukri, T. Declerck, S. Goggi, M. Grobelnik, B. Maegaard, J. Mariani, H. Mazo, A. Moreno, J. Odijk, and S. Piperidis, editors, Proceedings of the Tenth International Conference on Language Resources and Evaluation (LREC 2016), Paris, France, 2016. European Language Resources Association (ELRA).
- F. Graliński, R. Jaworski, Ł. Borchmann, and P. Wierzchoń. Gonito.net – open platform for research competition, cooperation and reproducibility. In A. Branco, N. Calzolari, and K. Choukri, editors, Proceedings of the 4REAL Workshop, pages 13–20. 2016.
- F. Graliński, R. Jaworski, Ł. Borchmann, and P. Wierzchoń. Vive la petite différence! Exploiting small differences for gender attribution of short texts. Lecture Notes in Artificial Intelligence, 9924:54–61, 2016.
- S. Hochreiter and J. Schmidhuber. Long short-term memory. Neural Comput., 9(8):1735–1780, Nov. 1997.
- S. Hussein, M. Farouk, and E. Hemayed. Gender identification of Egyptian dialect in Twitter. Egyptian Informatics Journal, 20(2):109–116, 2019.
- A. Joulin, E. Grave, P. Bojanowski, and T. Mikolov. Bag of tricks for efficient text classification. arXiv preprint https://arxiv.org/abs/1607.01759, 2016.
- D. Kingma and J. Ba. Adam: A method for stochastic optimization. International Conference on Learning Representations, 12 2014.
- D. Kodiyan, F. Hardegger, S. Neuhaus, and M. Cieliebak. Author Profiling with bidirectional RNNs using Attention with GRUs: Notebook for PAN at CLEF 2017. In CLEF 2017 Evaluation Labs and Workshop–Working Notes Papers, Dublin, Ireland, 11-14 September 2017, volume 1866. RWTH Aachen, 2017.
- S. Krüger and B. Hermann. Can an online service predict gender? On the state-of-the-art in gender identification from texts. In 2019 IEEE/ACM 2nd International Workshop on Gender Equality in Software Engineering (GE), pages 13–16. IEEE, 2019.
- T. Kudo and J. Richardson. SentencePiece: A simple and language independent subword tokenizer and detokenizer for neural text processing. In E. Blanco and W. Lu, editors, Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, EMNLP 2018: System Demonstrations, Brussels, Belgium, October 31 - November 4, 2018, pages 66–71. Association for Computational Linguistics, 2018.
- Y. Liu, M. Ott, N. Goyal, J. Du, M. Joshi, D. Chen, O. Levy, M. Lewis, L. Zettlemoyer, and V. Stoyanov. RoBERTa: A Robustly Optimized BERT Pretraining Approach. CoRR, abs/1907.11692, 2019.
- M. Mintz, S. Bills, R. Snow, and D. Jurafsky. Distant supervision for relation extraction without labeled data. In Proceedings of the Joint Conference of the 47th Annual Meeting of the ACL and the 4th International Joint Conference on Natural Language Processing of the AFNLP: Volume 2-Volume 2, pages 1003–1011. Association for Computational Linguistics, 2009.
- M. Ott, S. Edunov, A. Baevski, A. Fan, S. Gross, N. Ng, D. Grangier, and M. Auli. fairseq: A fast, extensible toolkit for sequence modeling. In Proceedings of NAACL-HLT 2019: Demonstrations, 2019.
- J. Read. Using emoticons to reduce dependency in machine learning techniques for sentiment classification. In Proceedings of the ACL student research workshop, pages 43–48, 2005.
- A. Siewierska. Gender distinctions in independent personal pronouns. In M. S. Dryer and M. Haspelmath, editors, The World Atlas of Language Structures Online. Max Planck Institute for Evolutionary Anthropology, Leipzig, 2013.
- N. Srivastava, G. Hinton, A. Krizhevsky, I. Sutskever, and R. Salakhutdinov. Dropout: A simple way to prevent neural networks from overfitting. J. Mach. Learn. Res., 15(1):1929–1958, Jan. 2014.
- A. Vaswani, N. Shazeer, N. Parmar, J. Uszkoreit, L. Jones, A. N. Gomez, L. Kaiser, and I. Polosukhin. Attention is all you need. CoRR, abs/1706.03762, 2017.
- R. Veenhoven, S. Snijders, D. van der Hall, and R. van Noord. Using translated data to improve deep learning author profiling models. In Proceedings of the Ninth International Conference of the CLEF Association (CLEF 2018), volume 2125, 2018.
- A. Wang, Y. Pruksachatkun, N. Nangia, A. Singh, J. Michael, F. Hill, O. Levy, and S. R. Bowman. SuperGLUE: A stickier benchmark for general-purpose language understanding systems. arXiv preprint 1905.00537, 2019.
- A. Wang, A. Singh, J. Michael, F. Hill, O. Levy, and S. R. Bowman. GLUE: A multi-task benchmark and analysis platform for natural language understanding. 2019. In the Proceedings of ICLR.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710771.39/warc/CC-MAIN-20221130192708-20221130222708-00157.warc.gz
|
CC-MAIN-2022-49
| 7,743 | 33 |
https://forums.unrealengine.com/t/build-error-missing-precompiled-manifest-for-onlinesubsystempico/483991
|
code
|
I am using pico virtual reality glasses and plugin for it. So he gives an error. I’ve tried everything under the heaven and Google to get this fixed. I have no idea what is going wrong with the build process.
Any ideas what I am doing wrong?
ERROR: Missing precompiled manifest for ‘OnlineSubsystemPico’. This module was most likely not flagged for being included in a precompiled build - set ‘PrecompileForTargets = PrecompileTargetsType.Any;’ in OnlineSubsystemPico.build.cs to override.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510358.68/warc/CC-MAIN-20230928031105-20230928061105-00516.warc.gz
|
CC-MAIN-2023-40
| 499 | 3 |
https://cyber-sport.io/usertag_csgo-rating
|
code
|
HOW DOES RANKING WORK IN FACEIT?
Players that have been active on the platform and have played for a time are given the FACEIT Elo statistic by the website. In conclusion, the FACEIT Elo rating system demonstrates how skilled players are in a certain game. But, the FACEIT Elo is unrelated to any other Elo you may be familiar with. For instance, your FACEIT Elo won't be affected by your League of Legends Elo. This Elo system, which functions somewhat similarly to a leveling system, is the ideal approach to distinguish between various types of gamers. Only in FACEIT will you discover this, and only while you are on the server does it matter.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296816465.91/warc/CC-MAIN-20240412225756-20240413015756-00719.warc.gz
|
CC-MAIN-2024-18
| 647 | 2 |
https://www.mis.mpg.de/publications/preprint-repository/article/2019/issue-23
|
code
|
Delve into the future of research at MiS with our preprint repository. Our scientists are making groundbreaking discoveries and sharing their latest findings before they are published. Explore repository to stay up-to-date on the newest developments and breakthroughs.
Adaptive Step Size Control for Polynomial Homotopy Continuation Methods
In this paper we develop an adaptive step size control for the numerical tracking of implicitly defined paths in the context of polynomial homotopy continuation methods. We focus on the case where the paths are tracked using a predictor-corrector scheme with only a prescribed maximal number of allowed correction steps. The adaptive step size control changes the step size based on computational estimates of local geometric information, in particular a local Lipschitz constant and the local error of the used predictor method, as well as its order. The developed adaptive step size control is implemented in the software package HomotopyContinuation.jl and its efficiency over the currently commonly used adaptive step size control is demonstrated on several examples.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679103558.93/warc/CC-MAIN-20231211045204-20231211075204-00773.warc.gz
|
CC-MAIN-2023-50
| 1,112 | 3 |
https://simplechinesefood.com/recipe/spanish-seafood-risotto-489
|
code
|
Today I recommend a relatively coarse Western food-Spanish paella. This paella uses a variety of seafood ingredients and has a very rich taste. The seemingly complicated process is actually not troublesome at all. As long as you have enough ingredients, you can do it at home. Make it, let’s try it with me.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320303385.49/warc/CC-MAIN-20220121131830-20220121161830-00061.warc.gz
|
CC-MAIN-2022-05
| 309 | 1 |
https://helloartie.com/clickfunnels-bluehost/
|
code
|
Discovering a high-grade inexpensive host company isn’t easy. Every website will have various requirements from a host. Plus, you need to compare all the attributes of an organizing firm, all while trying to find the very best bargain possible.
This can be a whole lot to type with, specifically if this is your very first time buying hosting, or developing an internet site.
Many hosts will provide incredibly economical initial rates, only to raise those rates 2 or 3 times greater once your preliminary contact is up. Some hosts will certainly give totally free perks when you register, such as a totally free domain name, or a free SSL certificate.
While some hosts will have the ability to supply much better efficiency and also high degrees of security. Clickfunnels Bluehost
Below we dive deep into the best economical host plan there. You’ll discover what core hosting functions are crucial in a host and also exactly how to assess your own organizing requirements to ensure that you can select from among the most effective low-cost organizing suppliers listed below.
Disclosure: When you buy a webhosting package via links on this page, we make some commission. This aids us to keep this site running. There are no extra costs to you in any way by utilizing our web links. The list below is of the most effective economical host packages that I’ve personally used and also examined.
What We Consider To Be Low-cost Webhosting
When we describe a webhosting plan as being “Inexpensive” or “Budget” what we suggest is hosting that falls into the price bracket in between $0.80 to $4 per month. Whilst looking into inexpensive organizing companies for this guide, we considered over 100 various hosts that fell under that price range. We then examined the high quality of their most inexpensive hosting bundle, value for money and customer service.
In this write-up, I’ll be discussing this world-class web site hosting firm and stick in as much pertinent info as possible.
I’ll go over the attributes, the pricing choices, as well as anything else I can consider that I think may be of benefit, if you’re deciding to register to Bluhost as well as get your websites up and running.
So without additional trouble, allow’s check it out.
Bluehost is one of the largest host companies in the world, obtaining both enormous advertising and marketing assistance from the company itself and also affiliate marketing experts that promote it.
It really is an enormous firm, that has actually been around for a very long time, has a huge reputation, as well as is most definitely one of the leading choices when it pertains to webhosting (certainly within the leading 3, a minimum of in my publication).
However what is it precisely, and also should you get its solutions?
Today, I will address all there is you require to understand, supplied that you are a blog owner or a business owner who is looking for a webhosting, and doesn’t know where to get going, given that it’s a great service for that audience as a whole.
Allow’s imagine, you want to host your sites as well as make them visible. Okay?
You currently have your domain name (which is your website destination or URL) and now you want to “transform the lights on”. Clickfunnels Bluehost
You require some organizing…
To achieve all of this, as well as to make your website visible, you need what is called a “web server”. A web server is a black box, or tool, that stores all your website data (files such as images, messages, video clips, links, plugins, and also various other information).
Now, this web server, has to be on constantly and it has to be linked to the internet 100% of the time (I’ll be pointing out something called “downtime” in the future).
On top of that, it likewise needs (without obtaining as well expensive as well as into information) a file transfer protocol generally called FTP, so it can show internet internet browsers your website in its desired type.
All these points are either costly, or require a high degree of technological skill (or both), to produce and maintain. And also you can totally go out there as well as learn these points on your own and also set them up … but what concerning rather than you buying as well as maintaining one … why not just “renting holding” rather?
This is where Bluehost can be found in. You rent their web servers (called Shared Hosting) and also you launch an internet site using those web servers.
Since Bluehost maintains all your data, the company additionally permits you to set up your web content management systems (CMS, for short) such as WordPress for you. WordPress is a very preferred CMS … so it simply makes good sense to have that alternative readily available (practically every organizing firm now has this choice as well).
In other words, you no more need to set-up a server and afterwards integrate a software application where you can construct your content, separately. It is already rolled right into one bundle.
Well … envision if your web server is in your house. If anything were to take place to it at all, all your data are gone. If something fails with its interior procedures, you need a professional to repair it. If something overheats, or breaks down or gets damaged … that’s no good!
Bluehost takes all these headaches away, as well as deals with everything technical: Pay your web server “lease”, and they will deal with whatever. And when you get the service, you can after that begin focusing on adding content to your site, or you can place your effort right into your advertising and marketing projects.
What Services Do You Obtain From Bluehost?
Bluehost provides a myriad of different solutions, yet the key one is hosting of course.
The holding itself, is of different types incidentally. You can rent out a common web server, have a specialized server, or likewise an onlineprivate server.
For the purpose of this Bluehost evaluation, we will certainly concentrate on hosting solutions and also various other solutions, that a blog writer or an on the internet business owner would require, as opposed to go unfathomable right into the rabbit opening and also discuss the other solutions, that are targeted at even more knowledgeable people.
- WordPress, WordPress PRO, as well as e-Commerce— these organizing solutions are the plans that allow you to host a web site using WordPress and also WooCommerce (the latter of which enables you to do e-commerce). After acquiring any one of these plans, you can start building your web site with WordPress as your CMS.
- Domain Market— you can likewise buy your domain from Bluehost rather than various other domain name registrars. Doing so will make it less complicated to aim your domain name to your host’s name web servers, given that you’re utilizing the same industry.
- Email— when you have actually purchased your domain, it makes sense to additionally obtain an email address linked to it. As a blog owner or online business owner, you ought to practically never make use of a free e-mail solution, like Yahoo! or Gmail. An e-mail like this makes you look less than professional. The good news is, Bluehost gives you one free of charge with your domain.
Bluehost also uses dedicated servers.
And also you may be asking …” What is a committed web server anyway?”.
Well, things is, the standard web hosting plans of Bluehost can just so much website traffic for your site, after which you’ll need to upgrade your organizing. The factor being is that the common servers, are shared.
What this implies is that web server can be servicing two or more web sites, at the same time, among which can be your own.
What does this mean for you?
It suggests that the solitary server’s sources are shared, and it is doing several jobs at any kind of provided time. Once your web site starts to hit 100,000 site check outs each month, you are mosting likely to need a specialized server which you can additionally receive from Bluehost for a minimum of $79.99 each month.
This is not something yous ought to stress over when you’re beginning however you ought to keep it in mind for certain.
Bluehost Prices: Just How Much Does It Cost?
In this Bluehost evaluation, I’ll be focusing my interest mostly on the Bluehost WordPress Hosting packages, considering that it’s the most popular one, and most likely the one that you’re trying to find and that will certainly match you the very best (unless you’re a significant brand, company or website).
The 3 available strategies, are as complies with:
- Standard Plan– $2.95 per month/ $7.99 normal cost
- Plus Plan– $5.45 monthly/ $10.99 regular price
- Selection Plus Plan– $5.45 per month/ $14.99 regular cost
The very first price you see is the rate you pay upon subscribe, and the second rate is what the price is, after the initial year of being with the firm.
So essentially, Bluehost is going to bill you on an annual basis. As well as you can likewise pick the quantity of years you want to organize your site on them with. Clickfunnels Bluehost
If you pick the Standard plan, you will certainly pay $2.95 x 12 = $35.40 beginning today and by the time you enter your 13th month, you will certainly now pay $7.99 monthly, which is likewise billed per year. If that makes any kind of sense.
If you are serious about your internet site, you must 100% obtain the three-year alternative. This suggests that for the fundamental strategy, you will pay $2.95 x 36 months = $106.2.
By the time you strike your fourth year, that is the only time you will pay $7.99 monthly. If you think about it, this technique will certainly conserve you $120 during three years. It’s not much, yet it’s still something.
If you wish to obtain greater than one website (which I very suggest, as well as if you’re significant, you’ll probably be obtaining even more at some time in time) you’ll wish to take advantage of the choice plus plan. It’ll allow you to host unrestricted internet sites.
What Does Each Strategy Offer?
So, when it comes to WordPress holding strategies (which resemble the common hosting plans, however are much more geared towards WordPress, which is what we’ll be concentrating on) the features are as adheres to:
For the Fundamental plan, you get:
- One web site only
- Secured internet site through SSL certification
- Optimum of 50GB of storage
- Totally free domain for a year
- $ 200 advertising credit report
Bear in mind that the domains are purchased individually from the hosting. You can obtain a totally free domain name with Bluehost here.
For both the Bluehost Plus hosting and Choice Plus, you obtain the following:
- Limitless number of web sites
- Free SSL Certification. Clickfunnels Bluehost
- No storage or bandwidth restriction
- Cost-free domain name for one year
- $ 200 advertising and marketing credit
- 1 Office 365 Mail box that is complimentary for 1 month
The Choice Plus strategy has an included advantage of Code Guard Basic Back-up, a back-up system where your documents is saved and also replicated. If any kind of collision occurs and also your web site data vanishes, you can recover it to its original form with this attribute.
Notification that even though both plans cost the exact same, the Choice Strategy then defaults to $14.99 per month, normal rate, after the collection amount of years you have actually chosen.
What Are The Conveniences Of Using Bluehost
So, why select Bluehost over other webhosting services? There are numerous webhosting, a number of which are resellers, but Bluehost is one choose couple of that have actually stood the test of time, as well as it’s probably one of the most well known out there (as well as forever factors).
Here are the three major advantages of choosing Bluehost as your webhosting service provider:
- Web server uptime— your website will not be visible if your host is down; Bluehost has greater than 99% uptime. This is incredibly crucial when it involves Google SEO and positions. The higher the better.
- Bluehost rate— how your server reaction determines how quick your internet site shows on a web browser; Bluehost is lighting quickly, which means you will certainly minimize your bounce rate. Albeit not the very best when it comes to loading speed it’s still extremely essential to have a quick rate, to make user experience far better and also better your ranking.
- Unlimited storage space— if you get the And also strategy, you need not fret about the amount of data you store such as video clips– your storage space ability is unrestricted. This is really important, because you’ll most likely encounter some storage issues later on down the tracks, and you don’t desire this to be a problem … ever before.
Lastly, consumer support is 24/7, which suggests no matter where you are in the globe, you can call the support group to fix your website concerns. Pretty basic nowadays, however we’re taking this for approved … it’s likewise extremely crucial. Clickfunnels Bluehost
Additionally, if you’ve obtained a free domain with them, after that there will be a $15.99 fee that will be subtracted from the quantity you initially purchased (I visualize this is due to the fact that it sort of takes the “domain name out of the market”, unsure concerning this, yet there possibly is a hard-cost for registering it).
Finally, any kind of requests after one month for a refund … are void (although in all honesty … they ought to most likely be stringent here).
So as you see, this isn’t necessarily a “no doubt asked” plan, like with some of the various other organizing choices around, so make sure you’re fine with the plans before proceeding with the holding.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964363134.25/warc/CC-MAIN-20211205005314-20211205035314-00500.warc.gz
|
CC-MAIN-2021-49
| 13,774 | 81 |
http://loucosporwap.com/simulation/android-status-bar-notification-icons.php
|
code
|
Main / Simulation / Android status bar notification icons
Android status bar notification icons
Name: Android status bar notification icons
File size: 635mb
Status bar icons are used to represent notifications from your application in the status bar. As described in Providing Density-Specific Icon Sets Android and Later - Overview of changes - Example icons - Android Appearances on a device. Status bar and notification drawer. When you issue a notification, it first appears as an icon in the status bar. Lock screen. Beginning with Android , notifications can appear on the lock screen. App icon badge. Wear OS devices. Notification actions. Expandable notification. Create a Notification - Material Design for Android - Create and Manage. Large icon is a bitmap and it is shown in notification drawer, small icon is shown in notification area but also in the notification drawer, in the bottom right corner of the large icon. It must be entirely white. If the small icon is colorful, it is shown as a white square in the notification area.
It seems that the icons in the status and notification bar get shaken up with every major Android update, sometimes changing appearance or. Android's status bar can get junky pretty fast—especially if you're using notifications are housed as they come in, shown simply as icons to let. If you have android 7 or above then swipe down notification panel and hold settings icon on it It will show u an advance menu to switch off useless system icons.
Galaxy S8 status icons and notification icons in the status bar offer you a quick . In Android Oreo update for Galaxy S8 and S8+, the data saver icon was. Use an instance of the Notification class to define the properties of your status bar notification, such as the status bar icon, the expanded message, and extra settings such as a sound to play. The NotificationManager is an Android system service that executes and manages all Notifications. Because these apps use battery and possibly data, Android requires that users are made When a notification arrives, an icon usually appears in the status bar.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195529175.83/warc/CC-MAIN-20190723085031-20190723111031-00532.warc.gz
|
CC-MAIN-2019-30
| 2,102 | 7 |
https://curiousfridays.wordpress.com/2013/06/07/detecting-gestures-via-wi-fi/
|
code
|
Researchers at the University of Washington have developed a way to detect and track human gestures using only wi-fi frequencies. It’s sensitive and broad enough to detect human motion in separate rooms.
Why I’m Curious
As demonstrated in the video, the current examples are basic in nature. However, as this technology matures it could have a profound impact on consumer electronics and user interface. Imagine controlling household electronics with a simple gesture, or navigating TV channels or a web browser.
Another curious angle is that of privacy. If the technology becomes advanced enough one could essentially monitor movement in a large space, public or private. That opens up a number of ethical and legal questions. Would this be considered spying or eavesdropping if someone accidentally picked up on their neighbors movement? Is it a technology governments or corporations would use to monitor the public? It’s a technology that could redefine what personal boundaries are.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267868135.87/warc/CC-MAIN-20180625150537-20180625170537-00296.warc.gz
|
CC-MAIN-2018-26
| 993 | 4 |
https://www.math.ucdavis.edu/~saito/publications/sonic_rev3.html
|
code
|
Extraction of Geological Information from Acoustic Well-Logging Waveforms
Using Time-Frequency Wavelets, (with R. R. Coifman), Geophysics, vol.62,
no.6, pp.1921-1930, 1997.
We apply recently developed classification
and regression methods to extract geological information from acoustic well-logging waveforms. First, we classify acoustic waveforms into the ones propagated through sandstones and the ones through shale using the Local Discriminant Basis [LDB] method. Next, we estimate the volume fractions of minerals (e.g., quartz andgas) at each depth using the Local Regression Basis [LRB] method. These methods first analyze the waveforms bydecomposing them into a redundant set of time-frequency wavelets, i.e., the orthogonal wiggles localized both in time and frequency. Then, these automatically extract the local waveform features useful for such classification and estimation/regression. Finally, these features are fed into conventional classifiers or predictors. Because these extracted features are localized in time and frequency, they allow intuitive interpretation. Using the field dataset, we found that it was possible to classify the waveforms without error into sandstone and shale classes using the LDB method. It was more difficult, however, to estimate the volume fractions,in particular, that of gas, from the extracted waveform features. We also compared the performance of the LRB method with the prediction based on the commonly used ratio of compressional and shear wave velocities, Vp/Vs and found that
our method performed better than the Vp/Vs method.
Get the full paper: PDF file.
Get the official version via doi:10.1190/1.1444292.
me if you have any comments or questions!
back to Naoki's Publication Page
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250606696.26/warc/CC-MAIN-20200122042145-20200122071145-00004.warc.gz
|
CC-MAIN-2020-05
| 1,741 | 10 |
https://railsatscale.com/2024-01-18-shopify-at-rubyconf-2023/
|
code
|
Shopify continues investing in Ruby and Rails to help ensure that they are 100-year tools. Moving them forward and bringing the community with us are a large part of that work, and participating in community events like RubyConf is an important part of that.
The first day at RubyConf—appropriately titled Community Day—was a chance for people to learn and work together on open-source. The most important event on that day for us was Hack Day, which was very similar to something we do at Shopify; Ufuk Kayserilioglu was part of the committee planning & organizing that day of the conference, and he brought up some of his personal experience to help set it up.
During Hack Day, contributors from different open source projects mentored attendees into making contributions; many members from the Ruby and Rails Infrastructure team participated or led projects.
Many pull requests came out of the collaboration with the community—too many to list them all here. Some of the contributions include:
- The Ruby LSP and the official VS Code extension got contributions for things like ERB support exploration, an add-on for rubyfmt, inlay hints for omitted hash values, and more.
- Prism (formerly known as YARP) got several bug fixes and multiple improvements.
- IRB, which we also contribute to as part of our effort in improving developer experience, got improvements and a new feature.
- RubyGems / Bundler also had people starting to contribute with improvements and new features (PRs should be open soon!).
- We got more familiar with the developer experience using Steep (both for inspiration and potential contributions in the future), and also helped the Steep maintainer get started with building a Ruby LSP add-on for Steep (which could allow him to not have to maintain a separate extension, and further reduce fragmentation in the Ruby tooling ecosystem).
- Ruby itself had coverage improvements to Variable Width Allocation, general bug fixes, and volunteers also did some tidying up on the issue tracker.
The contributions, pairing, and collaboration didn’t stop at Community Day: many people used Shopify’s booth to continue the work in the following days as well, like we did at RailsConf 2023.
Three Shopifolk presented talks at the conference, and the recordings are already available on YouTube.
These three talks were all about education: demystifying concepts, ideas, and tools so more people can use and contribute to the community.
Kevin’s talk also acted as an example of and a call-to-action regarding reducing fragmentation in the community. We strongly believe that the community can be much stronger and that our tools can be much better if we focus our efforts; this has been reflected in our approach with projects such as Prism and the Ruby LSP, which have been quickly replacing multiple competing (and often unmaintained) projects that do the same thing in slightly different ways.
Matz echoed that point in his keynote: we’re stronger when we contribute and work together; he also mentioned that it’s no longer enough to improve a language: the ecosystem and the developer tools are more important than ever, and we should invest heavily in them. This is further validation for our team’s goals and approach.
Last but not least, we’re happy to announce that Ufuk joined the board of directors of Ruby Central, an important step in our ongoing collaboration with Ruby Central and the community as a whole.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947475701.61/warc/CC-MAIN-20240301193300-20240301223300-00163.warc.gz
|
CC-MAIN-2024-10
| 3,455 | 16 |
http://www.demonauthor.com/2010/06/traileriffic.html
|
code
|
It took a long time for me to knock out this trailer... I can't quantify the hours I spent pondering the idea for it... the hours my wife spent pondering the idea for it. I didn't want it to look homemade, which is why I guess I went with the idea for epilepsy causing strobed images. The voice is mine, altered by software and the rain/thunder effects are from a 'sounds of Halloween' CD... The images are of me, my wife, some triple 6's, simple pentagrams, a cool photo of a wolf, all doctored up with Photoshop and then edited and synched together with some video software that came with my computer.
I'm not sure if it came out looking "Not Homemade", but at least it's hi-def :)
Always wanted to make movies, but just don't have the patience.
Time actually spent at the computer editing photos, audio and video: 10 hours.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917123048.37/warc/CC-MAIN-20170423031203-00640-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 826 | 4 |
https://tradingqna.com/t/keyboard-for-scalping/62176
|
code
|
Is there any keyboard which can place buy or sell order by just one click or keys are adjustable macros?
Autohot key. needs little bit coding
Thanks, learning language but got help from community and now i can place any order from just one click. Configured extra 2 keys on mouse also for 1 lot sell and buy.
for which broker ?
its an windows app.
i have different scripts for every work i do on computer, it makes work easier.
check how it works on youtube, example: https://www.youtube.com/watch?v=n_9-QkD-zJ4
Can you open pi from script? Mine is closing after entering pin but it opens manually.
There is also “WinAutomation”, this software allows you to program macros but not free to use.
Bhai koi gaming keyboard kharid le. PubG khelne ke bhi kaam aayega
Ohh great, can you please guide it here too…
Yeah, why not but this thing is only helpful if u place trade for 15 to 20 mnts.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514575168.82/warc/CC-MAIN-20190922053242-20190922075242-00504.warc.gz
|
CC-MAIN-2019-39
| 892 | 12 |
https://www.bleepingcomputer.com/forums/t/1224/smilies/
|
code
|
I was hoping to develop a library of the ones I like that I could go to anytime.
That's easy to do. Create a folder in My Documents and/or My Pictures and name it something like GIFS. Paste any smilies you like into that folder and they will be handy when you want to copy and paste into an email or message board. Don't know why it won't animate in Word.
I would strongly advise that you get rid of Smiley Central. When you install it the MyWay toolbar (which they call Speedbar) comes along with it plus other Fun Web Products like Cursor Mania and PopSwatter that you didn't ask for. There are several reasons to get rid of it that I could go into further if you like, but the main point is that it is unnecessary if all you want is the smilies. And the program is invasive and known to cause performance problems. See this page for an example:http://www.nwfusion.com/newsletters/web/2003/1208web2.html
If you want to keep the Smiley Central smilies, go to the MyWay (or whatever it is called) folder in the Program Files directory. Look for a subdirectory that contains the animated GIF's. Copy and paste those into the library you want to make and they'll be there for the asking without having Smiley Cental installed.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741192.34/warc/CC-MAIN-20181113020909-20181113042909-00551.warc.gz
|
CC-MAIN-2018-47
| 1,224 | 4 |
https://ibmcloud.ideas.aha.io/ideas/IDEA-I-630
|
code
|
I am evaluating Bluemix - Liberty of Java. It has many features but missing some essentials.
1. The JS and CSS are not served with GZIP compression, this leads 3X slower than a server which has GZIP compression. Just enabling it 3X faster loading.
2. Timezone, we dont have an option to change the runtime timezone, programatically we can change but it leads code modification.
3. Database the MAJOR issue, I am using Postgres you have provided Compose database service. But the problem here is the data transmission over the network. I 2 -6 seconds delay for the data transfer in the network. If you have some runtime or contianer to have Postgres in the same network where Java or any other runtime is running. Then we can avoid this time delay. 2 - 6 seconds is very huge delay. This is the reason i am thinking of moving out of bluemix. Other above issues can be fixed. But database service an essential one is missing.
Please look into it. Thanks!
NOTICE TO EU RESIDENTS: per EU Data Protection Policy, if you wish to remove your personal information from the IBM ideas portal, please login to the ideas portal using your previously registered information then change your email to "[email protected]" and first name to "anonymous" and last name to "anonymous". This will ensure that IBM will not send any emails to you about all idea submissions
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-34/segments/1596439737178.6/warc/CC-MAIN-20200807113613-20200807143613-00162.warc.gz
|
CC-MAIN-2020-34
| 1,364 | 6 |
https://community.rtcamp.com/t/wordpress-does-not-send-email/8922
|
code
|
first of all, check whether the port 25 is open using command
telnet <IP>:25 .
also check if the service is running and binded on port 25 using
netstat -ntlp|grep :25
if postfix is not installed you can use
ee stack install --postfix
if all the above conditions met and still issue is there, try sending mail from command line using
(you may need to install mail utilities using.
apt install mailutils)
and check whether the mail is delivered or not.
To debug further, check mail queue using
and also you may check the logs for better idea.
tail -f /var/log/mail.log
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-51/segments/1512948579564.61/warc/CC-MAIN-20171215192327-20171215214327-00702.warc.gz
|
CC-MAIN-2017-51
| 566 | 13 |
https://de.coursera.org/learn/excel-data-analysis-fundamentals/reviews?authMode=signup&page=10
|
code
|
17. Juli 2020
Well done. A small thing, though: in the quizzes, the grading could be made more fault-tolerant. Example: an answer such as AND(y,x) instead of AND(x,y) is deemed wrong, which borders on the nasty.
10. Juli 2020
Super fun and and intellectual course. Real need of hour to excel in Excel :) . This course helped a lot, in improving skills in excel analytics.\n\nspecial thanks to both the instructors !!!!!!!
von Yunus Ö•
13. Feb. 2021
Very useful piece of information with quite clear expressions. Thanks in advance.
von Yong V K•
7. Okt. 2020
Excellent course that gives me what I needed to know about Excel as an accountant
von Teerapipat P•
24. Juli 2020
Very useful for fundamental level of data analysis. Love this course. Thank you.
von Bronwen P•
11. Sep. 2021
Excellent structure and resources. Both challenging and satisfying to complete
von Md. M A•
23. Aug. 2021
It was great course for learning excel data calculation and easy to understand.
von Y.Chandra S•
14. Sep. 2020
Thank You for gaining more Knowledge from Excel Fundamentals for Data Analysis.
von Radwa M•
4. Feb. 2022
an excellent interactive course that requires dediction to follow and complete
von Diego A A G•
27. Dez. 2021
This course gives you a solid foundations of excel even if you are a beginner.
von Kevin H•
30. Sep. 2021
Great course - gave me a great starting point for dealing with large data sets
von Roy C J•
20. Okt. 2020
The course has many important techniques that are important to apply at work!!
von Samuel O•
1. März 2021
Thank you so much for such an excellent Course. Hoping to learn more from you
von Pramote S•
10. März 2022
recommend for those who would like to deepen excel using for data analysis.
von Quy N N•
22. Dez. 2021
Good course, I've learnt a lot. Thank you for all of lesson and knowledges.
von MOHAMAD E M Z•
3. Apr. 2021
This course is great. I'd like how the material is organized systematically
von vaibhav s•
20. Juli 2020
Thank you for making it free. Excellent teaching and professors are genius!
von Arpan T•
24. Feb. 2022
This course cover basic excel commands and explained each topic very well.
von Dac A T P•
29. Juni 2021
Such a straight-forward course, easy to understanding and very applicable.
14. Aug. 2021
Very good course, Also very excellent examples provided for each practice
von chandan k•
19. Juli 2021
its a wonder platform to study . i am very happy to complete this course.
14. Juli 2021
Amazing course, the teach in very simple way. I love the way of teaching.
von MD S I•
31. Dez. 2021
I enjoyed the learning, especially the tests. Highly recommended course.
von Jason L•
30. Juli 2021
This is a good course to give ideas for use-cases for numerous formulas.
von Miloš Ž•
8. Mai 2021
I enjoyed this course very much because it was good challenge for brain!
von Sinta S•
6. Dez. 2021
Very helpful course and good presentation/teaching from both Teachers!!
von Arabindu C•
4. Juli 2021
Enhance your skills to conquer day to day challenges regarding MS excel
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662558015.52/warc/CC-MAIN-20220523101705-20220523131705-00109.warc.gz
|
CC-MAIN-2022-21
| 3,063 | 77 |
https://targetjobs.co.uk/employer-hubs/reply/745365-graduate-data-analyst
|
code
|
Graduate Data Analyst
ARE YOU A GRADUATE OR GRADUATING THIS SUMMER AND UNDERSTAND THE IMPACT RIGHT TECHNOLOGY SOLUTIONS CAN HAVE ON THE SUCCESS OF A BUSINESS? THEN WHY NOT COME AND JOIN REPLY
WE ARE NOW LOOKING TO DEVELOP THE NEXT GENERATION OF BUSINESS SAVVY IT CONSULTANTS TO HELP BUILD ON OUR SUCCESS.
WE OFFER A TAILORED GRADUATE PROGRAMME WITH REGULAR TRAINING SESSIONS COUPLED WITH WORKING ON LIVE PROJECTS ON CLIENT SITES. YOU WILL EITHER BE WORKING AS PART OF A TEAM OR SHADOWING ONE OF OUR HIGHLY EXPERIENCED AND WELL RESPECTED CONSULTANTS
- Build your expertise by actively contributing to live consulting engagements;
- Research industry developments and sharing knowledge with your colleagues.
- Listening to, understanding and interpreting a brief;
- Pre-processing data for analysis (collate, clean, filter, reshape, enrich, etc);
- Employing exploratory analysis techniques to arrive at good answers faster;
- Building, fitting and validating Machine Learning models;
- Using statistical / technical knowledge and domain understanding to arrive at sensible conclusions and to identify major assumptions;
- Efficiently communicating progress and persuasively presenting findings to relevant stakeholders.
Skills & experience:
- Talented graduates with a minimum First Class BSc Hons Degree, demonstrate interest in and experience of the Data Science field
- Keen Kagglers
- Be highly numerate and methodical;
- Be able to articulate complex concepts cogently;
- Have experience or knowledge of statistical modelling and machine learning, working with large data sets and distributed computing;
- Have serious Data Science coding skills (Scala, Python, R, Weka, etc) and experience of using different database technologies (NOSQL (Key/Value), RDBMS (SQL), etc).
- Have good inter-personal skills
- Have VERY strong analytical, reporting and presentational skills
- Be independent, assuming responsibilities without being asked
- Be intellectually curious (thought leader / product developer)
- Be a self-starter and ambitious
- Have a global horizon / multi-cultural outlook
Remember to mention TARGETjobs when contacting employers!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221209755.32/warc/CC-MAIN-20180815004637-20180815024637-00032.warc.gz
|
CC-MAIN-2018-34
| 2,145 | 26 |
http://www.justusboys.com/forum/threads/395443-Do-you-take-good-care-of-your-looks
|
code
|
So do you take care of you face, skin or your looks? Do you use skin products and what not?
I was hanging out with a friend the other day, and she asked me to go with her to a skin care shop so she can buy some oxygen masks. I didn't know that she actually use them as she usually wears pretty casual.
For me I pop some zits now and then but generally I don't really go through extreme lengths to take care of my face or skin. I watch what I eat and eat a lot of oranges and kiwi but I don't really buy any skin care products. I used to use a lot of pimple creams when I was a teenager though.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122720.81/warc/CC-MAIN-20170423031202-00170-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 593 | 3 |
https://support.microsoft.com/en-us/topic/security-and-quality-rollup-for-net-framework-3-5-4-5-2-4-6-4-6-1-4-6-2-4-7-4-7-1-4-7-2-4-8-for-windows-8-1-rt-8-1-and-windows-server-2012-r2-kb4579979-3bf83e97-9a73-408a-1e46-18fb18cb22e4
|
code
|
Microsoft .NET Framework 3.5 Microsoft .NET Framework 4.5.2 Microsoft .NET Framework 4.6 Microsoft .NET Framework 4.6.1 Microsoft .NET Framework 4.6.2 Microsoft .NET Framework 4.7 Microsoft .NET Framework 4.7.1 Microsoft .NET Framework 4.7.2 Microsoft .NET Framework 4.8
An information disclosure vulnerability exists when the .NET Framework improperly handles objects in memory. An attacker who successfully exploited the vulnerability could disclose contents of an affected system's memory. To exploit the vulnerability, an authenticated attacker would need to run a specially crafted application. The update addresses the vulnerability by correcting how the .NET Framework handles objects in memory.
To learn more about the vulnerabilities, go to the following Common Vulnerabilities and Exposures (CVE).
For a list of improvements that were released with this update, please see the article links in the Additional Information section of this article.
As a reminder to advanced IT administrators, updates to .NET Framework 3.5 for Windows 8.1 and Windows Server 2012 R2 should only be applied on systems where .NET Framework 3.5 is present and enabled. Customers who attempt to pre-install updates to .NET Framework 3.5 to offline images that do not contain the .NET Framework 3.5 product enabled will expose these systems to failures to enable .NET Framework 3.5 after the systems are online. For more extensive information about deploying .NET Framework 3.5, see Microsoft .NET Framework 3.5 Deployment Considerations.
All updates for Windows 8.1, Windows RT 8.1, and Windows Server 2012 R2 require that update KB 2919355 is installed. We recommend that you install update KB 2919355 on your Windows 8.1-based, Windows RT 8.1-based, or Windows Server 2012 R2-based computer so that you receive updates in the future.
If you install a language pack after you install this update, you must reinstall this update. Therefore, we recommend that you install any language packs that you need before you install this update. For more information, see Add language packs to Windows.
Additional information about this update
The following articles contain additional information about this update as it relates to individual product versions.
4578953 Description of the Security and Quality Rollup for .NET Framework 3.5 for Windows 8.1, RT 8.1, and Windows Server 2012 R2 (KB4578953)
4578956 Description of the Security and Quality Rollup for .NET Framework 4.5.2 for Windows 8.1, RT 8.1, and Windows Server 2012 R2 (KB4578956)
4578962 Description of the Security and Quality Rollup for .NET Framework 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, 4.7.2 for Windows 8.1, RT 8.1, and Windows Server 2012 R2 (KB4578962)
4578976 Description of the Security and Quality Rollup for .NET Framework 4.8 for Windows 8.1, RT 8.1, and Windows Server 2012 R2 (KB4578976)
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711042.33/warc/CC-MAIN-20221205164659-20221205194659-00756.warc.gz
|
CC-MAIN-2022-49
| 2,841 | 13 |
https://stackoverflow.com/questions/17106544/how-to-set-calculation-mode-to-manual-when-opening-an-excel-file
|
code
|
The best way around this would be to create an Excel called 'launcher.xlsm' in the same folder as the file you wish to open. In the 'launcher' file put the following code in the 'Workbook' object, but set the constant
TargetWBName to be the name of the file you wish to open.
Private Const TargetWBName As String = "myworkbook.xlsx"
'// First, a function to tell us if the workbook is already open...
Function WorkbookOpen(WorkBookName As String) As Boolean
' returns TRUE if the workbook is open
WorkbookOpen = False
On Error GoTo WorkBookNotOpen
If Len(Application.Workbooks(WorkBookName).Name) > 0 Then
WorkbookOpen = True
Private Sub Workbook_Open()
'Check if our target workbook is open
If WorkbookOpen(TargetWBName) = False Then
'set calculation to manual
Application.Calculation = xlCalculationManual
Workbooks.Open ThisWorkbook.Path & "\" & TargetWBName
Set the constant 'TargetWBName' to be the name of the workbook that you wish to open.
This code will simply switch calculation to manual, then open the file. The launcher file will then automatically close itself.
*NOTE: If you do not wish to be prompted to 'Enable Content' every time you open this file (depending on your security settings) you should temporarily remove the 'me.close' to prevent it from closing itself, save the file and set it to be trusted, and then re-enable the 'me.close' call before saving again. Alternatively, you could just set the False to
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030334332.96/warc/CC-MAIN-20220925004536-20220925034536-00108.warc.gz
|
CC-MAIN-2022-40
| 1,431 | 19 |
https://spectrum.ieee.org/intel-starts-rd-effort-in-probabilistic-computing-for-ai
|
code
|
Intel announced today that it is forming a strategic research alliance to take artificial intelligence to the next level. Autonomous systems don’t have good enough ways to respond to the uncertainties of the real world, and they don’t have a good enough way to understand how the uncertainties of their sensors should factor into the decisions they need to make. According to Intel CTO Mike Mayberry, the answer is “probabilistic computing,” which he says could be AI’s next wave.
IEEE Spectrum: What motivated this new research thrust?
Mike Mayberry: We’re trying to figure out what the next wave of AI is. The original wave of AI is based on logic and it’s based on writing down rules; it’s closest to what you’d call classical reasoning. The current wave of AI is around sensing and perception—using a convolutional neural net to scan an image and see if something of interest is there. Those two by themselves don’t add up to all the things that human beings do naturally as they navigate the world.
An example of this would be where you are startled by something—let’s say a car siren. You’d automatically be thinking of different scenarios that would be consistent with the data you have and you would also be conscious of the data you don’t have. You would be inferring a probability. Maybe the probability is figuring out whether the siren is coming from ahead of you or behind you. Or whether it is going to make you late for a meeting. You automatically do things that machines have trouble with. We run into those situations all the time in real life, because there’s always uncertainty around what is the current situation.
Currently AI and deep-learning systems have been described as brittle. What we mean by that is they are overconfident in their answer. They’ll say with 99 percent certainty that there something in a picture that it thinks it recognizes. But in many cases the probability is incorrect; confidence is not as high as [the AI] thinks it is.
So what we’d like to do in a general research thrust is figure out how to build probability into our reasoning systems and into our sensing systems. And there’s really two challenges in that. One is the problem of how you compute with probabilities and the other is how do you store memories or scenarios with probabilities.
So we’ve been doing a certain amount of internal work and with academia, and we’ve decided that there’s enough here that we’re going to kick off a research community. The goal is to have people share what they know about it, collaborate on it, figure out how you represent probability when you write software, and how you construct computer hardware. We think this will be... part of the third wave of AI. We don’t think we’re done there, we think there are other things as well, but this will be around probabilistic computing.
Mayberry: We’re using [probabilistic computing] in a slightly different sense than before. For example, stochastic computing is about getting a good enough answer even with errors. Fuzzy logic is actually closer to the concept that we’re talking here, where you’re deliberately keeping track of uncertainties as you process information. There’s statistical computing too, which is really more of a software approach, where you’re keeping track of probabilities by building trees. So again, these are not necessarily new concepts. But we intend to apply them differently than has been done in the past.
Spectrum: Will this involve new kinds of devices?
Mayberry: We’re going to approach it initially by looking at algorithms. Our bias at Intel is to build hardware, but if we don’t really understand how the use model is going to evolve or how the algorithms are going to evolve, then we run the risk of committing to a path too early. So we’re initially going to have research thrusts around algorithms and software frameworks. There will be a piece that will be around what would hardware optimization look like if you got to that point. And, can these things be fooled? You have to think about security early on. Those are the things we’ll be approaching.
Spectrum: How does this fit with Intel’s existing AI efforts?
Mayberry: This is intended to be part of a larger system that incorporates our existing work…. You don’t want your logic system to assume that your sensing is 100 percent accurate, but you don’t want the sensor to necessarily have false information about confidence either. So you have to build a system around how those two components talk to each other and keep track of that kind of information. So perhaps the sensing system reports, “I’ve just had a change in brightness”—therefore my answer is a little less confident than before.
Keeping track of that kind of information is part of what the system design will look like. We don’t know exactly how we’ll implement that from a software framework point of view.
Spectrum: What are some potential applications?
Mayberry: Certainly one of our targets is having better autonomous machines, whether they’re cars or household robots or something like that. We think [probabilistic computing] is an important part of making systems more robust. Systems that are highly constrained are less likely to need this kind of capability. The more that you put the system into an open environment, where there are more things to change, the more likely it is you’re going to need to supplement the systems we use today.
We are of course hopeful that this will turn into products within a few years time, but this is pre-roadmap. So we’re not committing to anything at this time.
Spectrum: Can you share any more about the time frame?
Mayberry: Proposals are expected on 25 May. And we’ll try to launch this activity this year. As I said we’d like to influence our roadmap in the next few years, but this is pre-roadmap, so we don’t have a specific product implementation date.
A correction to this article was made on 20 May 2020.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817491.77/warc/CC-MAIN-20240420060257-20240420090257-00400.warc.gz
|
CC-MAIN-2024-18
| 6,017 | 19 |
http://www.iris.edu/hq/internship/blogs/entry/chopsticks
|
code
|
An interesting problem I was working with when designing methods to bin and average our anisotropy data into a grid format stemmed from the fast-axis calculations: the range of the arctan function, and the fact that each trend representing the fast axis orientation can be described by two angles over azimuth range [0,360]. Gabi and I thought through two approaches to this problem. However, because the first approach is best explained by visuals, and the second approach requires a combination of visuals and equations, it's a little unorthodox but the rest of this blog entry will be shown or described in the following figures. Also - this is a work in progress. If you have interesting suggestions or see an error in logic, I'd be happy to hear about it and make adjustments to my current set of calculations (which is based on the geometric explanation below).
You must be logged in to post a comment.
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122159.33/warc/CC-MAIN-20170423031202-00307-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 908 | 2 |
https://docs.rapid7.com/tcell/packages-and-vulnerabilities/
|
code
|
Packages and Vulnerabilities
Packages are software modules that perform operations which, when compiled together, make up an application. Though applications are built for many purposes, most of them rely on familiar functionality, such as authentication or compression. As a result, it is common practice for developers to build applications by writing some of their own packages (first party code) and by incorporating existing packages (third party code) to handle these routine operations.
You can also use the API to manage your packages. Test the APIs here.
Benefits of Packages
These existing packages allow for faster application development and access to highly specialized operations that application developers rarely want to rewrite, but they come with risk. That’s because they are written and maintained by someone outside of your organization, or a community of individuals (open source code), so it is impossible to know if packages were developed with security in mind. Since many of these third party packages are available for free, attackers have access to them and can discover mechanisms to exploit their vulnerabilities. While leveraging third party packages helps organizations go to market faster, they also introduce application-layer attack vectors.
Risks of Packages
Many organizations do not enforce which third party packages their development teams leverage, so they do not have visibility into which third party packages are deployed in their applications. In addition, even if an organization were able to catalog these packages, comparing them against the list of known vulnerabilities in the National Vulnerability Database (NVD) would involve hours of manual labor.
tCell by Rapid7, in partnership with Snyk, provides a means for detecting third party packages which contain known vulnerabilities.
What you'll learn in this article
- Learn about tCell's Packages and Vulnerabilities feature
- Get started
- Assess data and set alerts
- Learn about our partnership with Snyk
What makes tCell's Packages and Vulnerabilities feature different?
Because tCell agents run inside applications, our agents have access to the application’s information, including what third party and open source packages the application leverages. During startup time, the tCell agent sends package information to the tCell cloud. The tCell cloud then communicates with a threat database, populated in partnership with Snyk, to match the packages reported in the application with any known vulnerabilities in the database. This allows tCell to provide a comprehensive view of an application’s package-level risk without manual review. Customers can then configure tCell to send alerts when new packages and vulnerable packages are detected.
Unlike other tools that conduct third party package analysis during build time, our Packages and Vulnerabilities feature inspects applications at runtime. As a result, you have the assurance that any packages reported are being loaded by the application, leading to more accurate analysis. Our Packages and Vulnerabilities feature provides visibility into:
- Third party packages in your application
- Versions for each third party packages
- Newer versions available for your third party packages
- Common known vulnerabilities and exposures (CVEs) that exist in your third party packages
- Any applications which are using different versions of the same package
How does Packages and Vulnerabilities work?
tCell gets an application’s package information from the application and sends it to the tCell Cloud, which is part of the Rapid7 Insight Platform. Our cloud service sources a variety of threat data from many places, including Snyk, which we surface in tCell’s Packages and Vulnerabilities dashboard.
Before you begin
This feature is not applicable to WSAs. We currently support Java, Python, Ruby, and Node.js as long as one is leveraging our Application Server Agent (ASA) instrumentation.
Log into tCell.
Choose the application that you want to learn more about its packages.
Click Packages and Vulns from the left-hand navigation menu.
On the next page, you’ll see a list of packages that are running in your environment, as well as some high-level details, such as the dates and times a package was first and last active, the latest version, the versions found, and any vulnerabilities through the Snyk integration.
**Unknown** status in the Version(s) Found column
If you see an unknown status in the Versions Found column, it is likely because the package has been modified or is private. tCell can only look up the version for publically available packages.
Click on the blue dot (arrow) at the far right to see more detailed information and vulnerability cards.
How do I assess data?
If a package has a vulnerability, you’ll find more information about it on the detailed view. The card will tell you the vulnerability type, publish date, CVE ID, Severity, a brief description, and a list of the other places or applications where you can be impacted by the same vulnerability. Use the Agents dashboard to see other places affected by a specific vulnerability.
You can compare the packages that are running in your production environment and the latest versions, so you can determine if you want to upgrade. Click the URL link to see even more vulnerability details, such as CVSS Score, attack types, affected environments, and remediation steps, if available.
Every time tCell finds a vulnerability, it will automatically post an alert in the Newsfeed on the home page. If you do not want to be notified for that package vulnerability, click Ignore.
How do I set up alerts?
You can set up alerts to notify you when new package vulnerabilities are discovered.
- In the tCell console, choose the application you want to set up an alert for.
- Click Settings in the left hand navigation menu.
- Click Alerts.
- In the Alerts section, click + Add to add an alert.
- In the dropdown, select New package vulnerability detected.
- Check the appropriate boxes for your preferred alert mechanism.
- Click Save.
Our partnership with Snyk allows us to gain visibility into risk without the need for manual review by leveraging their comprehensive Vulnerability Database. If you are a Snyk customer, you can leverage their Open Source Security Management to accelerate fixing of third party risk throughout your development process by leveraging their CI/CD pipeline integrations to automatically patch your application by updating a package to the most recent, less-vulnerable version. To learn more, visit the Snyk website.
Snyk feeds are updated daily
tCell pulls vulnerability information from Snyk daily.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817128.7/warc/CC-MAIN-20240417013540-20240417043540-00376.warc.gz
|
CC-MAIN-2024-18
| 6,681 | 48 |
http://blog.kejsarmakten.se/all/software/2011/04/15/AFP-login-error-on-ubuntu.html
|
code
|
Problem with authentication on APF on Ubuntu
15 Apr 2011
After setting up an APF share on my Ubuntu machine I was unable to authenticate correctly when I tried to connect to it with my OS X machine.
The login window claimed that I used a incorrect username or password.
I found the solution to it here on the ubuntu forum:
Simply edit the /etc/netatalk/afpd.conf config file and replace ‘uams_dhx.so’ with ‘uams_dhx2.so’ so the line looks like so:
- -transall -uamlist uams_randnum.so,uams_dhx2.so,uams_guest.so -nosavepassword -advertise_ssh
I set up the share while following this great guide so I expect that a lot of Ubuntu users following the guide will run into the same problem.
Also: Since I used Ubuntu 10.10 Netatalk already seems to contain the necesary encryption and I could skip compiling it myself and I simply got it by grabbing it from the repository with
sudo apt-get install netatalk
|
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917122167.63/warc/CC-MAIN-20170423031202-00586-ip-10-145-167-34.ec2.internal.warc.gz
|
CC-MAIN-2017-17
| 910 | 10 |
https://list-archive.xemacs.org/archive/list/[email protected]/thread/CEPUWEODVRSB7VY34J7NKU2ZW27TJDJQ/
|
code
|
Michael Hohmuth writes:
I have set mwheel-follow-mouse to t and run mwheel-install, with the
intent that the mouse wheel scrolls only the XEmacs window that
contains the mouse.
My problem occurs when an XEmacs frame (an X window) displays more
than one XEmacs window (each with one buffer). When the point
(cursor) is positioned in one buffer, but the mouse points to another
buffer, the mouse wheel always scrolls *both* XEmacs windows. (A
third windows that contains neither mouse nor point is not affected.)
Works as expected for me, on an XEmacs built from source current as of
Jan 5, on Mac OS X (displaying to X11).
We'll keep looking at this (eg try on other platforms), but in the
meantime you should report the bug to the vendor, as they may have
patches we know nothing about.
XEmacs-Beta mailing list
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400198942.13/warc/CC-MAIN-20200921050331-20200921080331-00369.warc.gz
|
CC-MAIN-2020-40
| 811 | 15 |
https://super-unix.com/ubuntu/ubuntu-intellij-idea-community-edition-cannot-set-gradle-home/
|
code
|
I installed Gradle from the repository. Then I downloaded Intellij Idea Community Edition from the official website and installed it.
I set the Java JDK and now I am trying to open a Gradle Project, but the problem is that it doesn't accept my Gradle home:
~/Documents/idea-IC-141.2735.5/bin$ whereis gradle gradle: /usr/bin/gradle /usr/share/gradle /usr/share/man/man1/gradle.1.gz
Edit: now I can choose the first option
Use default gradle wrapper (recommended)
Probably because I restarted, I don't know
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100769.54/warc/CC-MAIN-20231208180539-20231208210539-00656.warc.gz
|
CC-MAIN-2023-50
| 505 | 6 |
http://meta.christianity.stackexchange.com/users/197/mad-scientist
|
code
|
Top Network Posts
- 958Don't throw away all votes when a user is deleted
- 205Is storing a delimited list in a database column really that bad?
- 153Did people think the Earth was flat?
- 147Add escalation system to chat flags
- 139Python: Using .format() on a Unicode-escaped string
- 115Do bigger or more monitors increase productivity?
- 115What is the advantage of currying?
- View more network posts →
Top Tags (5)
19 Are questions from atheists welcome here? Sep 9 '11
5 Answer deleted with, imho, poor arguments Sep 20 '11
4 Why was this question closed as duplicate? Sep 4 '11
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257824201.56/warc/CC-MAIN-20160723071024-00122-ip-10-185-27-174.ec2.internal.warc.gz
|
CC-MAIN-2016-30
| 586 | 13 |
https://docs.microsoft.com/en-us/previous-versions/dynamicsnav-2013/hh173058%28v%3Dnav.70%29
|
code
|
How to: Track Entries in Planning Lines
The order tracking function offers you an overview of the documents that are related to the current planning line.
To track entries in planning lines
In the Search box, enter Planning Worksheet, and then choose the related link.
Select the line you want to track.
On the Actions tab, in the Functions group, choose Order Tracking.
On the Actions tab, in the General group, choose Show to view the tracked line.
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-47/segments/1573496670729.90/warc/CC-MAIN-20191121023525-20191121051525-00440.warc.gz
|
CC-MAIN-2019-47
| 450 | 7 |
https://support.jetglobal.com/hc/en-us/articles/219401247-Configuring-Row-Level-Data-Warehouse-Security
|
code
|
When users are reporting from the data warehouse it is often necessary to restrict what they can see based on the data contained within a table. This type of security configuration is referred to as row-level security. This article covers the following:
- What is Row-Level Security?
- Configuration of Row-Level Security
Row-level Security is about constraining access to data for a database user at a very granular level.
By default, the SQL Server relational engine can only limit user access to a certain level of granularity. For example, SQL Server can limit access to a table and columns, but does not provide security within tables (i.e. based on the data contained within the table). Said another way, the grain of SQL Server Security is at the object level. What we want is access at a more granular level (at the row level).
Since SQL Server does not have native support for row-level Security we have to build a model to support the needs of the business. There are many different approaches to implementing row-level security, but the one we will cover in this article is through the use of custom views.
This example provides the basics of how to configure row-level security within your project.
Our organization has a business rule that states that each user should only see sales data from their respective company unless they are a manager. Managers are allowed to see data from all companies.
- Annette Hill should only see records from the Canadian company
- Bart Duncan should only see records from the American company
- Peter Saddow should see records from both the Canadian and American company
To support the scenario above we will need to build the schema/model to support it.
Right-click the Tables node select Add Table.
Assign a name for the table and click OK. In this example, we've named the table Access Rights.
Right-click the table and select Add Fields.
In this example, we have added two fields called User Name and Company
If you have additional attributes that you would like to constrain on then you will have to add additional fields. In this example, we only have a single condition.
Right-click the table again → Advanced → Custom Data
This list contains the name of the user and the company name to which the user has access. The ALL keyword signifies that Peter should have access to every company.
You will most likely need to format these names as they appear in your active directly using the Domain\Username format. In this example, the domain is omitted as this example uses local users.
If a user needed access to multiple companies you could add another row with the company name. For example, if Bart Duncan also needed to see data from the Canadian company, you could add another row for Bart.
If there are a larger number of users that require restricted access, it is recommended that you create an Excel sheet and then load this into your project as a second data source and drag the loaded table into the data warehouse. For more information see: Adding an Excel Data Source.
We will use views to enforce row-level security. Views allow a predefined query to be presented to a user as if it were a table. Also, users can be granted access to a view but denied access to the underlying tables. This prevents the user from bypassing the view and going straight to the base table. We will construct a view which applies all the necessary logic to enforce row-level security.
Create your view. Below is a sample view that you can use as a guide.
In this example, we are performing a cross join on our fact table and our Access rights table. We are also stating several conditions in our WHERE clause. The logical OR operator allows us to give users access to all companies by adding the ALL string to the Access Rights table.
View Code Example
CREATE VIEW [dbo].[vRestrictedPostedSalesTransactions]
,Fact.[Sell-to Customer No]
FROM [dbo].[Sales Posted Transactions_V] AS Fact
CROSS JOIN [dbo].[Access Rights_V] AS Rights
Fact.[Company] = Rights.[Company]
Rights.[Company] = 'ALL'
Rights.[User Name] = SYSTEM_USER
Once your view is created, you will need to add it to the project. To do this, right-click on the Views node in the data warehouse and select Add Custom View.
3. Paste your code into the window. In the Name as in script, the field enters the name of the script as it is in the view code. Once finished click OK.
If prompted with the following warning click Yes.
If prompted with this message click Yes.
At this point deploy and execute all modified objects in your project. One way to do this is to click on the top-most node and select Deploy and Execute.
This will open a window allowing the user to select Only the modified tables and views and click Start.
Lastly, right-click the view and select Read View Fields. This will allow you to visually verify that the proper fields were added to the view.
We now need to grant our users access to the view.
Using SQL Server Management Studio, create a SQL Server login for the user(s).
Using SQL Server Management Studio, create a user in the data warehouse. Click User Mapping and then tick the box for your data warehouse (in this example it is named JetNavDwh). Grant access to the public role.
Create a script that grants each user access to the view. In this example, we have 3 separate GRANT statements for each user.
In the project right click Script Actions → Add Custom Step
Assign a name for the script and paste the code from step 3 into the window
Right-click on the view and then select Advanced → Set Pre- and post scripts
From the Post Step drop-down, select your scriptYou can also apply this script at the database level as opposed to the view level.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817699.6/warc/CC-MAIN-20240421005612-20240421035612-00032.warc.gz
|
CC-MAIN-2024-18
| 5,691 | 48 |
https://www.codyhosterman.com/2015/04/updated-pure-storage-content-pack-for-vrealize-log-insight-2-5/
|
code
|
VMware vRealize Log Insight is a product I have been quite fond of since it first came out–I liked it for a variety of reasons–one is the simplicity of use. As far as VMware’s entire management suite, it is the easiest to install/configure and understand how to use. You can really become an accomplished user in a day. Anyways, I finally got around to updating the Pure Storage FlashArray Content Pack to expand support for version 2.5 and also leverage some new functionality from Purity syslog messages.
- Seven more dashboard widgets
- Seven additional extracted queries
- One more alert
- Two additional custom queries
The majority of the updates come by leveraging some new visualizations in the dashboards which, I think, makes the information much easier to quickly digest than it was before. As far as the actual information, the updates focused around better auditing messages and more information concerning replication. In Purity 4.1 we added a lot more auditing information to our syslog output, like for instance invalid login attempts and access methods. I’ve also added a widget on protection groups that have been delayed and a new alert that can tell you when changes have occurred to protection schedules. Here are some examples of the new dashboards (I’ve excluded hardware because it hasn’t changed):
Also, one of the cool new features of Log Insight 2.5 is the ability to edit the dashboard widgets in-place. This saves a lot of time when you want to make a change to the underlying query–this also makes the content packs (once imported into user space) much easier to alter if you so choose.
You now do not have to go to the Solution Exchange to get the Content Packs, you can download them from right inside Log Insight in the Marketplace listing:
Of course you can still download it from the Solution Exchange if you want. If you would like to review the white paper I wrote you can check it out here:
- VMware vRealize Log Insight 2.5
- FlashArray 400 Series
- Purity 4.x. Some of the new auditing information in 4.1 is leveraged though, so if you are not running Purity 4.1 or later, some of the Auditing dashboards widgets will not populate. We still support this content pack with 4.0 though.
Check out a video demonstration of it here:
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474697.2/warc/CC-MAIN-20240228044414-20240228074414-00544.warc.gz
|
CC-MAIN-2024-10
| 2,280 | 13 |
http://www.sguforums.us/index.php/topic,41690.msg9428465.html
|
code
|
so, I FINALLY got my first muscle-up last Sunday (a year ago I hadn't even heard of them).
...no more than 3 in a set, and struggling tragically for the third. it was after a day's workout, so hopefully I can do better.
my transition from pull-up to dip up is really halted rather than gracefully seamless, hopefully that'll improve as I get a bit more strong and dynamic. but, regardless, I'm pretty damn happy.
I've neglected 'pulling' exercises for most of this time I've started exercising again (after years of laziness), so it's nice that I've gotten there, and hopefully progress will be quicker now, since that's about all the encouragement I need to do a hell of a lot more of it!
|
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802767274.159/warc/CC-MAIN-20141217075247-00060-ip-10-231-17-201.ec2.internal.warc.gz
|
CC-MAIN-2014-52
| 689 | 4 |
https://github.com/Mehrpouya
|
code
|
Create your own GitHub profile
Sign up for your own profile on GitHub, the best place to host code, manage projects, and build software alongside 28 million developers.Sign up
Prototype as part of After Money project based at University of Edinburgh. Experimenting with digital currencies.
Forked from socketio/socket.io
Realtime application framework for Node.JS, with HTML5 WebSockets and cross-browser fallbacks support.
Forked from bebraw/yeswejekyll
Yes We Jekyll. Or if we don't yet, we will after reading this guide. Read on.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-51/segments/1544376826968.71/warc/CC-MAIN-20181215174802-20181215200802-00595.warc.gz
|
CC-MAIN-2018-51
| 532 | 7 |
https://mono.github.io/mail-archives/mono-list/2004-November/024249.html
|
code
|
[Mono-list] Re: [Mono-winforms-list] Another portable GUI toolkit ?
Miguel de Icaza
Thu, 04 Nov 2004 00:17:07 -0500
> Thanks in advance for the suggestion
I think that it would be best if we join forces and complete the
There are a few open projects in Windows.Forms, but also some large-ish
projects that we could use some help on.
For instance, I think we should port Tk's text editor over to C# and use
this to implement the Rich Text control.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510238.65/warc/CC-MAIN-20230927003313-20230927033313-00330.warc.gz
|
CC-MAIN-2023-40
| 446 | 9 |
http://thefiringline.com/forums/showpost.php?p=5344273&postcount=36
|
code
|
Ok I got the info you need. I'm PMing a link directly to you. Nice thing about this site. His prices are posted. A nice menu to look over.
"Do not follow where the path leads, rather go where there is no path and leave a trail for others to follow."
Last edited by Sure Shot Mc Gee; December 30, 2012 at 05:03 PM.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-36/segments/1471982292607.17/warc/CC-MAIN-20160823195812-00108-ip-10-153-172-175.ec2.internal.warc.gz
|
CC-MAIN-2016-36
| 313 | 3 |
http://stackoverflow.com/questions/8374702/sproutcore-1-6-or-2-0
|
code
|
Sproutcore 1.x and 2.x are indeed targeting different types of applications. So, the decision to choose 1.x or 2.x mainly boils down to the question which application type you are going to develop.
Choose 1.x if you need a set of predefined components, e.g. if you plan to develop an internal CRUD-like application. You might use the new template-based approach in some places but your main application will be composed with predefined components. SC 1.x clearly targets desktop-like applications.
On the other hand if you plan to build the next twitter or github or stackoverflow, you should use SC 2. It's easier to embed into webpages and you are in control over the complete layout, html and css but it is clearly more work to do in regards to html/css. If you've to implement your own design it's probably easier with SC2 because you are in full control. If you've already profund jQuery knowledge you can use this with SC2, it's no problem to combine the two, in fact since SC2 fully builds upon jQuery it's already included ... where SC 1.x only uses a special stripped down embedded jQuery version. If you plan to use certain plugins this might be a problem.
The programming model for your model and controller parts is nearly the same and it is very easy to transfer those parts from SC 1.x to 2 (and vice versa), the main difference is the view part.
|
s3://commoncrawl/crawl-data/CC-MAIN-2016-22/segments/1464051268601.70/warc/CC-MAIN-20160524005428-00036-ip-10-185-217-139.ec2.internal.warc.gz
|
CC-MAIN-2016-22
| 1,360 | 4 |
https://solace.community/discussion/199/view-or-peek-messages-on-a-queue-queue-browsing
|
code
|
View or peek messages on a queue - queue browsing
Want to see what's on a queue without consumi.ng the messages? Got a poison message that's killing your app but dont know why? Here's an example of this type of question: https://solace.community/discussion/198/possible-to-export-message-payload-in-queue-level#latest
What you need is a queue browser. This reads a message from a queue but doesn't consume it - the message remains on the queue.
The simplest way to do this is with sdkperf. Use the -sql option to bind to the queue, -qb to enable queue browsing and -md to view the contents as text. If you are using a binary format or serialisation package, you'll probably need to write an application: browsing is a flow property.
|
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296819067.85/warc/CC-MAIN-20240424045636-20240424075636-00044.warc.gz
|
CC-MAIN-2024-18
| 732 | 4 |
https://devpost.com/software/horsethereum-0jwhrt
|
code
|
Horse racing is a thrilling and immersive sport -- and it's made even more exciting with the addition of a clever wager or two.
What it does
With Be My Bookie, Amazon Alexa will give you up-to-date horse racing info and allow you to directly place wagers (in Ether!) on your favorite horses. Drawing on real horse racing data, it dynamically updates and allows you to get updated information on the go.
How we built it
The backend is in Ruby and Sinatra and draws on tables of real historic horse racing data to give accurate odds for each race, timed just like live horseracing. The front-end is in Python and makes use of AWS lambda functions to interact directly with Alexa and have her respond to verbal cues.
Challenges we ran into
Timestamps were, as always, a unique challenge. Having Alexa account for the dynamically updating tables also took some careful consideration, as well as working in a confirmation dialogue -- so that Alexa verifies your bet before committing it to the system.
Accomplishments that we're proud of
None of the members of the team had worked with Alexa or Smart Skills before -- we were inspired by the presentations at the booths here and made a quick pivot in our plan to incorporate using Alexa. Much more engaging than a traditional UI!
What we learned
Breaking up tasks is critical -- and having a strongly integrated environment from the getgo helps gets things off the ground. Pari-mutuel wagering is a tremendously complicated system all on its own
"Be My Bookie" is a way to bet on horse racing, hands-free and on the go! Try it out for yourself! You will need to implement an Alexa Skill on your Amazon developer account so that you can use Alexa from your Amazon Echo/Alexa Reverb app. Head into our git repo at https://github.com/horsethereum/ui to have access to what you need, then follow the instructions here: https://developer.amazon.com/alexa-skills-kit/alexa-skill-quick-start-tutorial, but replace the alexa-skills-kit-color-expert-python example with our horsebetmanager.py, then copy the ARN that is generated to associate with your built skill. When you add a new skill, call it "Horse Bet Manager" -- and make your invocation "Be my bookie." Add the intents.json file from our repo directly into the code tab when building the interaction model.
Once you have made your skill and have verified that it is running smoothly, you can explore "Be My Bookie." Alexa opens with a welcome message. Ask her, "When is the next race?" When she responds, follow up with "What are the horses running?" Listen carefully to the horses and the odds, and select your favorite runner. Tell Alexa "I'm feeling lucky today!" She will prompt you to make a bet. Say "Put amount ether on horse number in race number". Alexa will confirm that you want to blow this much cash on a wager (don't worry -- we are not on the ethereum network yet, so all this money is hypothetical! Spend as much as you'd like and keep the farm too). Now, confirm it!
Did you listen to the time of the race? Once the race time is over, open up Be my Bookie and ask Alexa, "What are the results of race number?" She will recite them to you. Don't remember your horse's info? Ask Alexa "Am I rolling on gold?" to find out what kind of profits (or lack thereof) you've added to your account.
The race card changes every day -- come back tomorrow for a chance to win all that precious Ether back! Thanks for playing with Alexa's "Be My Bookie" -- making the world a bettor place.
What's next for Horsethereum
We plan to move forward to launching this application on the Ethereum blockchain, making use of the trustless network to allow people to make real wagers in Ether and play against the "house" for a truly immersive wagering experience!
Log in or sign up for Devpost to join the conversation.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945381.91/warc/CC-MAIN-20230326013652-20230326043652-00554.warc.gz
|
CC-MAIN-2023-14
| 3,808 | 18 |
https://www.certificationcamps.com/bootcamp-type/windows-server/
|
code
|
$2,795 CLASSROOM LIVE
Price includes: Instructor Led Class, Official Courseware, Labs and Exams
This 5 day deep dive is designed for Windows Server 2019 administrators to learn administrative tools, implement services, manage network infrastructure, virtual machines, remote access, service monitoring and other admin task.
Select Delivery Format:
Check Box To Include:
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-39/segments/1631780058263.20/warc/CC-MAIN-20210927030035-20210927060035-00234.warc.gz
|
CC-MAIN-2021-39
| 369 | 5 |
https://www.kempmillcivic.org/community-day/
|
code
|
Community Day 2020
It is with deep regret that the KMCA board and Community Day planning committee have decided to indefinitely postpone Community Day 2020.
Updates will be posted here and sent out on KMCA mailing list if/when a new date is chosen.
Check back for more details.
Community Day 2019 photo gallery
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656103639050.36/warc/CC-MAIN-20220629115352-20220629145352-00422.warc.gz
|
CC-MAIN-2022-27
| 310 | 5 |
https://repository.royalholloway.ac.uk/items/d9d57bb7-8bcc-7ca5-cc78-eaeef3218945/1/
|
code
|
Cinzia Rienzo (2011)
Essays on Wage Inequality: the Role of Composition, Immigration and the Cost-of-living.
Full text access: Open
This thesis focuses on the role of composition, immigration and the cost-of-living on wage inequality.
I begin by investigating to what extent changing characteristics of the labour force can help explain the fact that residual or within-group wage inequality –wage dispersion among workers with the same education and experience- is generally thought to account for most of the growth in wage inequality observed in several industrialised countries over the last thirty years. I compare the results for men and women in Italy, the UK, and the US from 1987 to 2003 or 2004. I find that even though residual does account for most of the wage variation in all countries, there is no common increasing trend in residual inequality. I also find that workforce composition does not always act to increase the residual wage inequality.
In the second part of the thesis, I investigate the effects of immigration on residual wage inequality in the UK and the US between 1994 and 2008, by assessing whether and to what degree immigration contributed, along with technology, institutions and traditional explanations, to widening inequality.
The analysis reveals that residual wage inequality is higher amongst immigrants than amongst natives. However, such differences do not contribute (much) to the increasing residual wage inequality observed in the two countries.
The final section of this thesis questions how existing estimates of inequality change when differences in the cost-of-living and the differential concentrations of individuals with different levels of education across regions are taken into account. I focus on changes in the difference in the hourly wage for workers with a college degree and high school degree in the UK between 1997 and 2008. Results show that the national RPI underestimates the cost-of-living of workers living in the most expensive regions (London, South East) and overestimates the cost-of-living for “cheaper” regions (Northern Ireland, Scotland). When deflating hourly wages by the regional RPI, the average level of wages is lower, by 8% to 11% an hour for all workers in London and the South East, whilst it is higher, by around 2% to 9% in the remaining regions; similarly the level, but not changes, in wage inequality is lower when deflating by the real regional RPI.
This is a Accepted version
This version's date is:
is not peer reviewed
Deposited by () on
in Royal Holloway Research Online.Last modified on 15-Feb-2017
(C) Cinzia Rienzo whose permission to mount this version for private research and study is acknowledged.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224649293.44/warc/CC-MAIN-20230603133129-20230603163129-00792.warc.gz
|
CC-MAIN-2023-23
| 2,705 | 14 |
https://uzh.unige-cofunds.ch/projetsarchives/monitoring-land-surface-phenology-over-switzerland-using-the-swiss-data-cube-satellite-earth-observations-time-series/
|
code
|
Land Surface Phenology (LSP) is defined as theseasonal and inter-annual variation in land surface vegetation photosynthetic activity,as measured by satellite vegetation indices. LSP is a key indicator for understanding the dynamics (e.g., responses and feedbacks) of ecosystems to changing climate system and environmentalstresses, as well as for representing these in terrestrial biosphere models. Byallowing the quantification of vegetation phenological trends at various scales, LSP fills the gap between traditional phenological (field) observations and the large-scale view of global models.
The important role of LSP is recognized by its contribution to the Remote Sensing enabled Essential Biodiversity Variables (RS-EBVs)projectinitiated by the European Space Agency (ESA). RS-EBVs are defined as the measurements required to study, report, and manage biodiversity changesusing satellite data. They provide information on the status and trendsof biodiversity, and have the potential to act as brokers between monitoring initiatives and decision makers.
The Swiss Data Cube (SDC – http://www.swissdatacube.ch) is an innovative analytical cloud-computing platformallowing usersthe access, analysisand visualizationof35 years of optical (e.g., Sentinel-2; Landsat 5, 7, 8) and radar (e.g., Sentinel-1) satelliteEarth Observation (EO) Analysis Ready Data. Importantly, the SDCminimizes the time and scientific knowledge required for national-scale analyses of large volumesof consistentlycalibrated and spatially aligned satellite observations.
The objective of the SDC is to support the Swiss government for environmental monitoring and reporting, as well as enabling Swiss scientific institutions to benefit from EO data for research and innovation. Additionally, the SDC allows for highspatial and temporal resolution LSP monitoring, thereby facilitating the study of seasonal dynamics of vegetated land surfacesin response to climate and environmental change.
In the frameworkof theESA-fundedGlobDiversityproject (https://www.globdiversity.net),UZH has develop a new algorithm for monitoring LSP. It has been tested and validated in the Laegern region (10 km2) and shows promising results. In order to provide national information on the biodiversity of terrestrial ecosystems and simultaneously generate a decision-ready product,the LSP monitoring algorithm now requires to be scaled up from the development stage to the operational level, encompassing entire Switzerland. Such a product could be readily used as a basis for the design, implementation and evaluation of policies, as well as developing policy advice, programs and regulation.
Consequently, the aims of the project are touse the SDC platform to:
- Implement the LSP algorithm developed by UZH and consider improvements;
- Generate an LSP product retrieval from EO data for the entire Switzerland to contribute to provide baseline data for monitoring biodiversity;
- Demonstrate the use and capability of processing open and freely available Big EO data on a cloud-computing platform;
- Review and evaluate the variability and evolution of satellite-derived growing season length (GSL) nationwide;
- Test start- and end-of-season metrics (SOS and EOS, respectively) for linear trends as well as for significant trend shifts over the study period.
Dr. Gregory Giuliani, University of Geneva
Dr. Claudia Röösli, University of Zurich
Dr. Vladimir Wingate, University of Zurich
Dr. David Small, University of Zurich
Prof. Michael Schaepman, University of Zurich
Bruno Chatenoux, University of Geneva
Charlotte Poussin, University of Geneva
Prof. Pascal Peduzzi, University of Geneva
Prof. Anthony Lehmann, University of Geneva
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250606696.26/warc/CC-MAIN-20200122042145-20200122071145-00262.warc.gz
|
CC-MAIN-2020-05
| 3,699 | 20 |
https://www.hugin.com/biotracer/
|
code
|
The BIOTRACER project
By the end of 2011, the BIOTRACER project was completed successfully. The objective of BIOTRACER was to create tools and models for the improvement of tracing accidental and deliberate microbial contamination of feed and food, including bottled water.
HUGIN has made important contributions to the success of the BIOTRACER project. This includes the development of new software tools and extensions and improvements of the existing HUGIN tools. You can find some information on HUGINs involvement in BIOTRACER at these sites: http://milk.hugin.com, http://data.biotracer.hugin.com and http://biotracer.hugin.com.
Visit the official BIOTRACER web-site for more information.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224644571.22/warc/CC-MAIN-20230528214404-20230529004404-00414.warc.gz
|
CC-MAIN-2023-23
| 694 | 4 |
https://www.glocktalk.com/threads/wts-sparks-g19-watch-6-and-pouch.1191256/
|
code
|
I have a very lightly used Milt Sparks Watch 6 holster and Kramer mag pouch. Both pieces are black horsehide for a RH shooter with 1.5" belt loops. Selling as a set only. $115 shipped Priority mail with confirmation. First "I'll Take it" gets the rig.
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084887660.30/warc/CC-MAIN-20180118230513-20180119010513-00517.warc.gz
|
CC-MAIN-2018-05
| 251 | 1 |
https://superuser.com/questions/588248/osx-mountain-lion-logs-out-after-login
|
code
|
I open the lid of the laptop and the computer wakes up. I fill in my password and log in. I'm shown the desktop for a second and then the screen goes black. I then have to hit a key or two to wake it up again. Then I'm force to log in once more.
Anyone seen this? How can I fix it?
|
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107876307.21/warc/CC-MAIN-20201021093214-20201021123214-00427.warc.gz
|
CC-MAIN-2020-45
| 281 | 2 |
http://jamestesh.com/2017/06/21/more-css-animations/
|
code
|
More CSS animations
It has been a while since I last posted anything, I’ve been very busy doing some project work in the day and that has made me quite tired in the evenings! But today, I got an urge to play with some basic CSS animations again.
One of the things I have been working on with my current contract is a dashboard for a piece of software that should allow for more efficient testing. I have been involved with creating both the back-end and front-end code and it has proven very interesting and good for my development. One of the technologies we have been using is Java with Spring MVC and it is my first real exposure and application of that language, very interesting I must admit!
One of the things I have had at the back of my mind is that business applications are usually quite boring in appearance and sometimes that can affect how the end-user perceives it. If its boring, they will be reluctant to use it. As a developer I want people to use the thing that I have created.
Oh, and here’s a pure CSS loading animation that I’ve been playing about with:
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039747665.82/warc/CC-MAIN-20181121092625-20181121114625-00541.warc.gz
|
CC-MAIN-2018-47
| 1,080 | 5 |
https://fortnitevbuckshack.win/how-to-get-aimbot-in-fortnite-aimbot-fortnite-hack-fortnite-aimbot-hack-ps4xbox-onepcmobile/
|
code
|
How To Get “AIMBOT” in FORTNITE! Aimbot Fortnite Hack (Fortnite Aimbot Hack PS4,XBOX ONE,PC,MOBILE) in this video I show you How to get aimbot in fortnite and this works on fortnite aimbot pc, fortnite aimbot ps4, fortnite aimbot xbox one, fortnite aimbot mobile! #fortnite #sota #aimbot
Video Rating: / 5
FORTNITE SEASON 7 AIMBOT! Fortnite Battle Royale Aimbot! Fortnite Season 7 Hacks Fortnite Battle Royale AIMBOT HACK! how to get aimbot in fortnite battle royale, how to get aimbot in fortnite season 7. Hope you enjoyed the video, if you did make sure to subscribe, turn on notifacations, drop a like, and comment down below… oh and stay active for future videos! #FortniteSeason7 #FortniteAimbot
You do not have to subscribe, turn on notifications or drop a like to be entered into this giveaway. it is ONLY a recommendation For more information on giveaways refer to youtube’s contest policies: https://support.google.com/youtube/#topic=7505892
Copyright Disclaimer Under Section 107 of the Copyright Act 1976, allowance is made for “fair use” for purposes such as criticism, comment, news reporting, teaching, scholarship, and research. Fair use is a use permitted by copyright statute that might otherwise be infringing. Non-profit, educational or personal use tips the balance in favor of fair use.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488534413.81/warc/CC-MAIN-20210623042426-20210623072426-00567.warc.gz
|
CC-MAIN-2021-25
| 1,320 | 5 |
https://www.ag-grid.com/javascript-data-grid/server-side-model-refresh/
|
code
|
It is possible to get the grid to refresh its rows. In other words reload previously loaded rows. This is useful when the data has changed at the source (typically on the server) and the UI needs refresh.
The grid has the following API's to assist with refreshing:
Refresh a server-side level. If you pass no parameters, then the top level store is purged. To purge a child level, pass in the string of keys to get to the desired level.
Returns an object representing the state of the cache. This is useful for debugging and understanding how the cache is working.
The following example demonstrates the refresh API. The following can be noted:
- Button Refresh Top Level refreshes the top level. Note the Version column has changed its value.
- Button Refresh [Canada] refreshes the Canada cache only. To see this in action, make sure you have Canada expanded. Note the Version column has changed it's value.
- Button Refresh [Canada,2002] refreshes the 2002 cache under Canada only. To see this in action, make sure you have Canada and then 2002 expanded. Note the Version column has changed it's value.
- Button Print Block State prints the state of the blocks in the cache to the console.
- Toggle Purge to change whether loading rows are shown or not during the refresh.
When a purge is executed (
params.purge=true) then the data is replaced with loading rows
while the data is refreshed. There are a few more subtle differences between purging and
refreshing which are as follows:
- While purging, the loading icons prevent the user from interacting with the data while the rows are re-fetched.
- When purging, all open groups will always get closed and children destroyed. This is explained in more detail
in the section Maintaining Open Groups below.
- When Infinite Scroll is used (i.e. data is loaded in blocks), purging will destroy all blocks
and remove them from the cache and only re-create blocks needed to show data the user is looking at.
For example if the user had scrolled down and 5 blocks are in the cache, after a purge it could be only 1 block exists in the cache after purging. This means only one block request is sent to the server.
Refreshing however will refresh all existing blocks. Thus if 5 blocks exist in the cache, all blocks will get refreshed resulting in 5 requests sent to the server.
It is possible to have open groups remain open during a refresh, thus maintaining the context of open groups.
Maintaining open groups is achieved when all of the following are configured:
- Refreshing (
params.purge=false). When using a purge, groups and children will be lost.
- Row IDs are provided (
getRowId()implemented, see Row IDs). If not providing Row IDs, groups and children will be lost
When all the above is true, when a refresh is done, open groups will remain open and children will be kept.
The example below shows refreshing and keeping group state. The example is similar to the
previous example with the addition
getRowId() is implemented. Note the following:
- When 'Purge' is not checked, refreshing using any refresh button will maintain any open groups and children at that level.
For example expand 'United States' and hit 'Refresh Top Level' - note that the top level countries are refreshed (the version column changes once the load is complete) and the open 'United States' group is left open and the child rows (displaying year groups) are left intact.
- When 'Purge' is checked, refreshing using any refresh button will close all open groups and destroy all children at that level.
For example expand 'United States' and hit 'Refresh Top Level' - note that the list of countries is reset, including closing 'United States' and losing all child rows to 'United States'. When 'United States' is expanded again, the child rows are loaded again from scratch.
Because the grid is getting provided ID's with via
getRowId() it allows the grid to update rows rather than
replace rows. This also means when grid property
enableCellChangeFlash = true the cells will flash when their data
getRowId() is not implemented, rows are replaced and cells are re-created from scratch, no flashing
Continue to the next section to learn how to perform Pivoting.
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446711108.34/warc/CC-MAIN-20221206124909-20221206154909-00804.warc.gz
|
CC-MAIN-2022-49
| 4,194 | 41 |
https://www.thejobauction.com/job/25082373/us/lead-tax-cto-taxtech-supv
|
code
|
RSM US, LLP is looking for a development professional with 3-5 years of experience delivering results to join our growing tax technology development team.
You will assist with the design, analysis, development, implementation, and deployment of new data-driven applications.
You will use your experience in development and documentation creation to support existing Excel VBA tools and bring new capabilities to the team while creating new solutions using a variety of platforms and languages, and document functionality of the solutions.
Additionally, you will participate in the entire software development life cycle, debugging applications and configuring existing systems.
Be responsible for hands-on coding and review other team members' work.
Work with business leads in defining the requirements and developing solutions.
Document new developments, procedures, or test plans as needed.
Interact with other development teams to ensure a consistent, uniform approach to software development.
Prepare technical design documents using enterprise standard documentation tools.
Support system testing by following up on and closing defect tickets in a timely manner.
Responsibilities:Working individually and part of a team to design and build new solutions that address business need or opportunityPeer review of code and additional internal testing/validation effortsDocument new and existing solutions including business requirements/user stories, technical design documents, and production run-booksProvide Level 2 and Level 3 support when users have issues they cannot resolve Various administrative tasksOther duties as assigned, including supporting training efforts, assisting in other projects, etcBasic Qualifications:Undergraduate degree in Computer Science, Information Science, Data ScienceUndergraduate degree in any field AND either professionally-recognized certification in programming or business process improvementAdvanced Excel proficiencyMicrosoft Office proficiencyProficiency in VBA Development1-3 years software development and/or support within a client-centric industry3-5 years Advanced Excel2 years Excel VBAExperience with developing and maintaining click-once deployment client-side Windows applications Experience with Preferred Qualifications:US Federal Income Tax, US State Income Tax, or US Taxation and information reporting for Foreign OperationsCurrent CPA or CPA-EligibleConducted testing effort of new software in a corporate environmentProcess mapping softwareDeveloped/deployed a solution using one or more new technologies (e.g.
data visualization, RPA, big data, blockchain)3-5 years of experience in .Net developmentSolid knowledge of SQL, Excel Programming, VSTO applications, and .NET Windows Forms-based software developmentExcel including VBA and commands such as offset and lookupExperience with SQL, SQL Server and.NetExtensive experience in designing and developing enterprise grade softwareExperience with source control management systems and continuous integration/deployment environmentsProficiency in building VSTO and Windows Forms-based applicationsIn-depth knowledge of at least one of the .NET languages (like C# and Visual Basic .NET)Understanding of n-tier Application Architecture (e.g.
WCF, MVC, SOA) and Design PatternsHas worked in remote teamsTeam player with good interpersonal and communication skillsAble to work with limited supervision Diligent and attentive to detailAttention to detail to document code thoroughlyExperience troubleshootingYou want your next step to be the right one.
You've worked hard to get where you are today.
And now you're ready to use your unique skills, talents and personality to achieve great things.
RSM is a place where you are valued as an individual, mentored as a future leader, and recognized for your accomplishments and potential.
Working directly with clients, key decision makers and business owners across various industries and geographies, you'll move quickly along the learning curve and our clients will benefit from your fresh perspective.
Experience RSM US.
Experience the power of being understood.
RSM is an equal opportunity/affirmative action employer.
Job ID req10316Line of Business: Tax ServicesSubFunction: Business Tax CTOJob Type: Full TimeReq : req10316Location: 1861 International Drive, Suite 400, McLean, VA Region: NationalJob Category: TaxEmployment Type: ExperiencedDegree Required:BachelorTravel: Yes
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570986659097.10/warc/CC-MAIN-20191015131723-20191015155223-00542.warc.gz
|
CC-MAIN-2019-43
| 4,439 | 21 |
https://daniel.feldroy.com/posts/2010-02-pycon-2010-report-i
|
code
|
This was originally posted on blogger here.
[Pycon](https://us.pycon.org/) was an incredible learning experience and networking opportunity. I met many good friends again and made just as many new ones. In addition, this was the first time I presented and did so on [Pinax](https://pinaxproject.com/) two times. Furthermore, in the name of diversity, this instance of Pycon saw the premiere of the [Financial Assistance Grant for Women](https://us.pycon.org/2010/registration/financial-aid/). We also had a dedicated talk on [Diversity as a Dependency](https://us.pycon.org/2010/conference/schedule/event/77/). The benefit this focus on diversity was that...
Did I learn a lot at pycon? Heck yeah. Networking was life changing. And unlike previous conferences, I'm in a position to take advantages of opportunities offered. The next few weeks and months will see a lot of changes and challenges for me.
: I've got to keep some things under wraps for now so I'm going to have to aggressively moderate comments. Feel free to comment, just don't take comment rejections personally.
Note II: For reference, this post is mostly about Audrey Roy and some about the job offering I got at PyCon 2010.
6 comments captured from original post on Blogger
Unknown said on 2010-02-24
eleddy said on 2010-02-24
awesome to finally meetup. lets get going on codename "zopango" proj in the next couple of months. woop de woop!
Doug Napoleone said on 2010-02-24
For those wondering about the odd comment filtering, it really is not a big issue. I understand and respect it (I would do the same). But it is one of those things where the filter makes things sound nefarious or something, when it's really not.
pydanny said on 2010-02-24
My filtering is always nefarious!
kcunning said on 2010-02-25
Moderate me, will you? I'll show you moderate!
But it was awesome :) I need to get my blog up so I can write my own report!
Michael said on 2010-02-26
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679099942.90/warc/CC-MAIN-20231128183116-20231128213116-00647.warc.gz
|
CC-MAIN-2023-50
| 1,928 | 17 |
https://www.domainindia.com/login/knowledgebase/435/Running-MongoDB-in-a-Docker-Container-on-CentOS-AlmaLinux-and-RockyLinux.html
|
code
|
Whether you're setting up a development environment, trying out MongoDB, or even deploying it into a production setting, running MongoDB in a Docker container can be an efficient and clean way to get started. Docker abstracts away many of the complexities of setting up a MongoDB server and makes it easier to manage, scale, and replicate your MongoDB database.
Here is a detailed guide on how to run MongoDB in a Docker container on CentOS, AlmaLinux, and RockyLinux, even if Docker isn't already installed on your system.
Before we get started, ensure your system meets the following requirements:
- Operating System: CentOS, AlmaLinux, or RockyLinux
- User privileges: A user with `sudo` privileges
- Network: An active internet connection
Step 1: Install Docker
If Docker isn't already installed on your system, you'll need to install it. Docker is a platform that allows developers to develop, deploy, and run applications easily using containerization.
Here's how you can install Docker:
1. Update your system's package database:
sudo yum update -y
2. Install the necessary packages for Docker installation:
sudo yum install -y yum-utils
3. Add the Docker CE (Community Edition) repository to your system:
sudo yum-config-manager --add-repo https://download.docker.com/linux/centos/docker-ce.repo
4. Install Docker CE:
sudo yum install -y docker-ce docker-ce-cli containerd.io
5. Start the Docker service and enable it to start on boot:
sudo systemctl start docker
sudo systemctl enable docker
6. Verify the installation:
sudo docker --version
This command will print out the Docker version if the installation was successful.
Step 2: Pull the MongoDB Docker Image
With Docker installed, you can now pull the MongoDB Docker image from Docker Hub:
sudo docker pull mongo
This command will download the latest MongoDB Docker image to your system.
Step 3: Run MongoDB in a Docker Container
With the MongoDB image now available on your system, you can start a Docker container running MongoDB:
sudo docker run --name mongodb -d -p 27017:27017 mongo
This command does the following:
- `--name mongodb`: Names the Docker container "mongodb"
- `-d`: Runs the container in detached mode, which means the container runs in the background
- `-p 27017:27017`: Maps port 27017 inside the Docker container to port 27017 on the host machine, allowing you to connect to MongoDB
- `mongo`: Specifies the Docker image to use (in this case, the MongoDB image you just pulled)
After running this command, MongoDB will be accessible on your machine on port 27017, which is the default MongoDB port.
Step 4: Verify the MongoDB Server
You can use the `docker ps` command to check if the MongoDB server is running:
sudo docker ps
This command will show you a list of all running Docker containers. If MongoDB is running correctly, you should see the "mongodb" container in this list.
Additionally, you can check the logs of the MongoDB server:
sudo docker logs mongodb
If MongoDB is running correctly, you should see standard MongoDB startup logs.
This guide has shown you how to install Docker and run MongoDB in a Docker container on CentOS, AlmaLinux, or RockyLinux. With MongoDB running in a Docker container, you can now start building your applications with MongoDB as your database.
To uninstall the current MongoDB container and pull a MongoDB 4.4 Docker image, you need to follow these steps:
1. First, you need to stop the existing MongoDB Docker container by running the following command:
sudo docker stop mongodb
2. Then, you have to remove the stopped container:
sudo docker rm mongodb
3. Now, you can pull the MongoDB 4.4 image from Docker Hub:
sudo docker pull mongo:4.4
4. Finally, run the MongoDB 4.4 Docker container with the following command:
sudo docker run --name mongodb -d -p 27017:27017 mongo:4.4
Now, MongoDB 4.4 will be running on your machine on port 27017, the default MongoDB port.
Please note that running MongoDB in a Docker container has its own set of complexities. It might not be suitable for production environments without appropriate data persistence and backup strategies. Always ensure your data is safe and secure when using Docker for database services.
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511055.59/warc/CC-MAIN-20231003060619-20231003090619-00547.warc.gz
|
CC-MAIN-2023-40
| 4,180 | 55 |
http://www.techyv.com/questions-solutions/anonymous/anonymous-questions?page=31&quicktabs_top_posts=1
|
code
|
Buddies is there anyone who can really help me to explore "best buy private auction Canada" top 10 agents or online websites?
I am using windows 7 in which i have installed pro tools 7.1.Friends, Pro Tools 7.1 is the widely used audio production software, which enable you to record, compose, edit, and mix the sound.
I want to download ssl plug in bundle from waves so please anybody can help me from where can i download plugin ssl 400 for my pro tools audio software?
Waiting for your help.
I am looking for the right license to use for the Atmel device on the system. There are 3 which are available: Pro mode, Standard mode and Lite mode. I would like to know the compatibility of these Hitech C Compiler licenses for Atmel 8051 Architecture Microcontroller. What would you recommend for me to use and why?
Please help in resolving Heroes 6 Internal Server Error Issue. It takes hell of a lot of time for the game to begin. Often 5 to 50 Minutes one would have to wait for the Game to start. It is really irritating the 'never ending waiting', for the otherwise so fabulous and entertaining game to go break free. Appreciate any help. Thanks.
I just bought an Android based tablet and have been told to download streamingvideox for watch movies. Is this something I really need?
|
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704713110/warc/CC-MAIN-20130516114513-00093-ip-10-60-113-184.ec2.internal.warc.gz
|
CC-MAIN-2013-20
| 1,283 | 7 |
https://chrome.google.com/webstore/detail/webuyz/bchdkhnggdehkbpfjdccpbpkcgilkbnh
|
code
|
WeBuyz chrome app will help you to browse and dropship from Taobao easier
1- While browsing Taobao the chrome extension will change the prices automatically from CNY to USD. works with: search page , Shop page, Product page.
2- You can open shop page or products page within the dashboard.
Our Shopify app: https://app.webuyz.com/
If you encounter any problem please send us an email at : [email protected]
|
s3://commoncrawl/crawl-data/CC-MAIN-2019-30/segments/1563195524475.48/warc/CC-MAIN-20190716015213-20190716041213-00497.warc.gz
|
CC-MAIN-2019-30
| 406 | 5 |
https://ancientsolarsystem.blogspot.com/2015/05/is-time-distorted-across-universe.html
|
code
|
Then, to make matters much worse, along comes dark energy: An even more mysterious force, which we also cannot directly detect, that is effecting the rate at which the universe itself expands.
Above: The odd way galaxies spin, and why dark matter is proposed to explain it, all presented at a high school maths level - thank you TheCosmicWeb
Scientists really don't like having to explain the things they see in the universe by resorting to invisible matter, undetectable energy, or anything else unseeable. It's just too easy, as you can use it to explain almost anything. And the failure - to date - of our most sensitive instruments, including the alpha magnetic spectrometer mounted on the hull of the ISS, to find any definitive evidence of dark matter (beyond its gravitational effects which is what it was was proposed to explain) has led to some interesting non-dark matter explanations for the strange way we see galaxies spin, and the way the expansion of the universe seems to be accelerating.
|Above: The Alpha Magnetic Spectrometer, a tool for hunting dark matter, mounted onto the side of the ISS. Courtesy of NASA|
Mostly these explanations fall under the umbrella term of MOND (MOdified Newtonian Dynamics) a collection of theories that suggest that gravity doesn't work quite the way we think it does long distances. By and large they haven't managed to usurp dark matter and dark energy as the leading explanations for the strange observations, but they do represent some interesting thinking.
Above Neil deGrasse Tyson explains the MOND vs dark matter debate in a radio interview. Courtesy of Startalk radio
Today, however, I've run across a deceptively simple alternative to both dark matter and MOND. The idea being tentatively proposed, by P. Magain and C. Hauret from the Institut d’Astrophysique et de G ́eophysique in Belgium, is that maybe it isn't matter or gravity that isn't behaving like we expect.
Maybe it's time.
Einstien's theories of general and special relativity tell us that it's possible for the flow of time toi be changed locally by either an object moving very fast, or an object having a very powerful gravitational field. But on the largest scales cosmologists usually assume that the flow of time is pretty much even. Magain and Heurets suggestion - which fits some observations almost perfectly but has yet to be tested against others - is that the flow of time on very large, universal, scales is tied to the entropy of the universe, and so might vary. If time can vary as we look out across the universe, then that might explain some of the strangely moving things we see - they are moving according to the physical laws we know, no dark matter or energy needed, but we are seeing them out of sync with each other..
I'm only going to put up this quick note on the subject at the moment, but the simplicity and audacity of the idea makes me wonder if it doesn't have alot of potential, so watch this space. The paper is here
|
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337287.87/warc/CC-MAIN-20221002052710-20221002082710-00309.warc.gz
|
CC-MAIN-2022-40
| 2,974 | 10 |
https://qamath.com/grade-10-math/math-10-chapter-5-lesson-2-charts.html
|
code
|
Math 10 Chapter 5 Lesson 2: Charts
1. Summary of theory
1.1. Column histogram
To describe the frequency distribution table of classifiers, people erect vertical columns (contiguous or separate) whose width is equal to the length of the class, and the height of the column is equal to the frequency of the corresponding class.
1.2. Frequency curve
On the coordinate plane define the points \((C_i, f_i) i = 1, 2, 3, …\) where \(C_i\), is the representative value of the \(i\)th layer. , \(f_i\) is the frequency of the \(i\)th class. The bend line connecting the points \((C_i, f_i)\) in the order \(i = 1, 2, 3, …\) is the frequency curve.
Attention: The layered frequency distribution table can be described using a bar graph or frequency curve.
1.3. Fan chart
Draw a circle with center \(O\) and then draw fan shapes with vertices \(O\), the angle at the top is proportional to the frequency of the layers. Such a visual representation of a frequency distribution table is called a fan histogram.
Attention: Layered frequency tables can also be depicted with a fan plot.
2. Illustrated exercise
Question 1: Given the following frequency distribution table:
The average temperature of December in Vinh city from 1961 to 1990 (30 years).
Describe Table 6 by plotting bar and column histograms and frequency curves.
Verse 2: Based on the fan diagram in Figure 37 below, make a table of the structure as shown in example 2.
(1) State-owned enterprise zone
(2) Non-state sector
(3) Foreign investment sector
Structure of domestic industrial production value in 1999, by economic sectors (%)
3.1. Essay exercises
Question 1: For fan charts
Based on the given fan charts, make a table showing the target structure of the Vietnamese people in 1975 and 1989.
Verse 2: Given the following table of frequency distribution and frequency of layering:
Average temperature of December in Vinh city from 1961 to the end of 1990 (30 years)
a) Calculate the average of tables 6 and 8.
b) From the results calculated in question a), what do you notice about the temperature in Vinh city in February and December (of the 30 years surveyed)
3.2. Multiple choice exercises
Question 1: Which of the following chart types is the most suitable for the representation of the frequency distribution table?
A. Fan chart
B. Column chart
C. Map Organizer
D. Frequency polygon plot
Verse 2: Which of the following chart types best shows a comparison of a component to the whole?
A. Column chart
B. Map Organizer
C. Frequency polygon plot
D. Fan chart
Question 3: Statistics of math test scores in an exam of 400 students. It was found that the number of papers with 10 points accounted for 2.5%. What is the frequency of the value xi = 10?
Question 4: To investigate the children in each family of a 100-family apartment complex. People selected 20 families on the 4th floor and obtained the following data sample:
2 4 2 1 3 5 1 1 2 3
1 2 2 3 4 1 1 2 3 4
How many different values are there in the sample data above?
Question 5: Statistics of math test scores in an exam of 400 students. It is found that there are 72 problems with a score of 5. What is the frequency of the value xi = 5?
Through this lesson, you should know the following:
- Recognize different types of charts.
- Know how to draw graphs.
|
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587877.85/warc/CC-MAIN-20211026103840-20211026133840-00200.warc.gz
|
CC-MAIN-2021-43
| 3,281 | 46 |
https://community.oracle.com/customerconnect/discussion/486300/sso-sp-for-bui
|
code
|
SSO SP for BUI
SummarySingle Sign On - Service Provider initiated for Browser user Interface
I'm missing the SP part in my SSO konfiguration settings. I have it available on my test site but not in prod. I checked the system configurations *sso* to see if I missed something but the settings seem to be identical.
(hidden settings have been enabled by Oracle)
I most likely missed something but can't figgure out what..
Any ideas? :-)
|
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100164.87/warc/CC-MAIN-20231130031610-20231130061610-00891.warc.gz
|
CC-MAIN-2023-50
| 434 | 6 |
http://www.tobyandjoann.com/blog/2008/12/11/ubuntu-on-the-vm/
|
code
|
I fired up the VM server again this evening and got Ubuntu running again. I really like it, but being restricted to the software that I use on Windows but can’t run on Linux. I came across a post on LifeHacker Blog about running Windows apps in Linux using VirtualBox. I am going to see if I can’t set this up and try it out.
It seems strange to run a visualization within a visualization, but I’m thinking of installing Ubuntu directly on a system, and this is a great way to test it!
|
s3://commoncrawl/crawl-data/CC-MAIN-2018-09/segments/1518891816647.80/warc/CC-MAIN-20180225150214-20180225170214-00410.warc.gz
|
CC-MAIN-2018-09
| 491 | 2 |
Subsets and Splits
No community queries yet
The top public SQL queries from the community will appear here once available.