url
stringlengths
13
4.35k
tag
stringclasses
1 value
text
stringlengths
109
628k
file_path
stringlengths
109
155
dump
stringclasses
96 values
file_size_in_byte
int64
112
630k
line_count
int64
1
3.76k
http://www.overclock.net/t/1414624/recurring-bsod-caused-by-ntoskrnl-exe-driver-verifier-enabled-dmp-file-within/10
code
Great to hear! If the WD diagnostics happen to not find anything, you can see if Seatools recognizes the drive - http://www.seagate.com/support/downloads/seatools/ If it does, run everything but Fix All and Long Generic as tests. Is there a way for me to give you rep points or anything? Ha, no, as I am a Forum Moderator I no longer gain reputation. It's okay, I do it all for the love of blue screens!
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889473.61/warc/CC-MAIN-20180120063253-20180120083253-00186.warc.gz
CC-MAIN-2018-05
403
4
https://forum.telus.com/t5/Internet-Home-Phone/Lost-IPv6-Address/td-p/136020
code
My IPv6 was working fine since last year, but starting last week, I suddenly lost IPv6 connection (0/10 at https://test-ipv6.com/) I've tried to contact customer service, a technician also helped on site, but no one could solve the issue. I'm using TELUS Wi-Fi Hub (Arcadyan), with 1 Gig fibre connection. I have tried resetting the router (customer service also tried that), but it didn't work. Besides the telus wifi hub, I also tried to plug the SFP module to my own router, which was working by using DHCPv6 with delegation length 56. But it stopped working since last work. I had the same IPv6 issue when moving to Burnaby last year, and it was fixed by the telus support team remotely (I guess they changed some config on their end). But I had no luck this time even if I asked the same person who helped me last time, as he said that the person he contacted is no longer there... I've also heard from the technician that this is common in the Burnaby area, wondering if people have same issue and anyone could help 🙏 Thanks! I'm using https://test-ipv6.com/ as an example. I'm pretty sure that IPv6 is completly down for me, since on my TELUS Wi-Fi Hub admin page, under the "Network Status" tab, there is no IPv6 address at all. And all kinds of IPv6 tests indicates that it's not working. And if I use my own router, when it was working, I got log message like "Dynamic IPv6 acquirement succeeded" But now I only get messages saying "DHCPv6 solicit timeout"
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817790.98/warc/CC-MAIN-20240421163736-20240421193736-00261.warc.gz
CC-MAIN-2024-18
1,469
8
https://math.osu.edu/events/geometry-and-data-seminar-crichton-ogle
code
Title: The local structure of modules indexed by small categories Speaker: Crichton Ogle - The Ohio State University Abstract: For a (small) category C, a C-module (over a field k) refers to a covariant functor C-> (fin. dim. v.s./k). Associated to any C-module is a bi-closed multi-flag F(M) (a concept we will introduce in the talk) referred to as its local structure. In most cases of interest (e.g., if C is any finite category and k a finite field), M has stable local structure. From this structure one is able to recover (in a basis-free manner) the "blocks" of M indexed on the set of admissible subcategories of C, whose direct sum comprises the tame cover T(M) of M, also a C-module. This tame cover exists regardless of whether or not M itself is tame, and equals M when it is. These blocks may be further decomposed as a sum of generalized bar-codes when the nerve N(C) is simply-connected. In the very special case C is the categorical representation of a finite totally ordered set, one recovers the interval submodule decomposition of a finite persistence module.
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623487613380.12/warc/CC-MAIN-20210614170602-20210614200602-00594.warc.gz
CC-MAIN-2021-25
1,078
3
http://askubuntu.com/questions/tagged/processor?page=2&sort=newest&pagesize=50
code
I want to know how many processors my ubuntu box has and if they are multicore. I did cat /proc/cpuinfo and I see something like this processor : 0 vendor_id : GenuineIntel cpu family : ... Packages i386, ia64, i636, x86_64, i486, amd32, amd64, sparc, powerpc, arm, noarch... am I missing anything? Processors intel - atom, i5, i7 nvidia - tegra amd - 32, 64 am I missing anything? ...
s3://commoncrawl/crawl-data/CC-MAIN-2014-23/segments/1405997877693.48/warc/CC-MAIN-20140722025757-00038-ip-10-33-131-23.ec2.internal.warc.gz
CC-MAIN-2014-23
385
2
https://developer.happyr.com/one-year-async-aws
code
It has been one year since Jérémy Derussé and I started to work on a new API client for AWS. At the time we could never have imagined how popular it would be. In this first year we had over 1.5 million downloads over all packages. The core package alone has been downloaded more than 500.000 times. The story behind the project is simple. We wanted an AWS client that was fundamentally different from the official one. The big features are all described on async-aws.com, but in short: we use small packages, readable code, great memory management and asynchronous HTTP responses. This makes the AsyncAws client really easy to work with and it is fast! Sure, it is still HTTP…. but as quick as you can make it. Both Jérémy and I maintain a number of open source packages, but AsyncAws is special for both of us. One really interesting aspect is that most of the code is generated from a specification. The developers at AWS have specified all their API requests and responses. From these specifications we can generate PHP code that will generate the proper XML/JSON requests and response parsers. This will ensure that the API clients are always correct. When AWS updates their API specification, a bot will automatically make a PR to update the AsyncAws client code. We spent a lot of time on the code generator. We are really happy with how it turned out, but it is not yet complete. There might be some APIs that have some endpoints that are not yet supported. That is only natural because at the beginning we only focused on a handful of popular AWS services. Then we received feature requests and now we support around 20 AWS services. That is just 1% of the available AWS APIs but it covers 90% of all the usages. So the code generator only has support for features that are used, not “all” features. While working very closely with the API specifications we’ve noticed quite a few inconsistencies. They are mostly about formats and naming etc. But it is a fresh reminder that even a great company like AWS also is not perfect and has a lot of legacy code. The AsyncAws organisation has three main parts; the code generator, the authentication system, and the connection with the Symfony HTTP client. Then of course there are some docker images, bots and the website. The authentication system is considered feature complete. All the 6 official ways to authenticate are supported and working. The integration with Symfony HTTP client is what gives us the power and flexibility of asynchronous HTTP. I am also very happy to say that the relationship is mutually beneficial. The work on the Symfony’s RetryableHttpClient for example, was started by Jérémy in a PR for AsyncAws. This integration might be complex when you dig in the details, but it is simple to understand on a high level. It should make sure that all requests are always sent, throw exceptions and log things when appropriate and do as little of the slow HTTP as possible. Is it difficult to migrate from the official SDK? You probably already have an application that is using the official AWS SDK. It is surprisingly easy to migrate to AsyncAws. All services have mostly the same namespace, the ApiClient’s methods are the same, they have the same option names and values. This is thanks to the API specification mentioned earlier. If you ever are in doubt, you can open up the AsyncAws client and read the code. You also get help from static analyzer tools like Psalm and PHPStan. If your framework is using a Flysystem integration for example, the only thing you need to do is to update your config. You will also discover that it is easier to write unit tests with AsyncAws. No more mocking PSR-7 responses! What about the future? There are no big plans for the future. All current clients are stable. The bots will automatically update them when the API changes. We will add a few minor features and keep help adding more AWS clients when someone makes a request for it. There are already integrations for Laravel, Symfony, Flysystem, Monolog etc. There are even people reporting that they use AsyncAws for AWS S3 compatible services from Digital Ocean and other providers. I hope you try it out and enjoy using it as much as we have enjoyed creating it.
s3://commoncrawl/crawl-data/CC-MAIN-2021-10/segments/1614178364764.57/warc/CC-MAIN-20210302190916-20210302220916-00025.warc.gz
CC-MAIN-2021-10
4,251
12
https://data.csiro.au/dap/landingpage?pid=csiro:9989&v=5&d=true
code
Click here to view this collection in the new DAP user interface Soil and Landscape Grid National Soil Attribute Maps - Bulk Density - Whole Earth (3" resolution) - Release 1 This is Version 1 of the Australian Soil Bulk Density - Whole Earth product of the Soil and Landscape Grid of Australia. The Soil and Landscape Grid of Australia has produced a range of digital soil attribute products. Each product contains six digital soil attribute maps, and their upper and lower confidence limits, representing the soil attribu... morete at six depths: 0-5cm, 5-15cm, 15-30cm, 30-60cm, 60-100cm and 100-200cm. These depths are consistent with the specifications of the GlobalSoilMap.net project (http://www.globalsoilmap.net/). The digital soil attribute maps are in raster format at a resolution of 3 arc sec (~90 x 90 m pixels). These maps are generated by combining the best available Digital Soil Mapping (DSM) products available across Australia. Attribute Definition: Bulk Density of the whole soil (including coarse fragments) in mass per unit volume by a method equivalent to the core method; Period (temporal coverage; approximately): 1950-2013; Spatial resolution: 3 arc seconds (approx 90m); Total number of gridded maps for this attribute: 18; Number of pixels with coverage per layer: 2007M (49200 * 40800); Total size before compression: about 8GB; Total size after compression: about 4GB; Data license : Creative Commons Attribution 4.0 (CC BY); Variance explained (cross-validation): 0.4%; Target data standard: GlobalSoilMap specifications; Format: GeoTIFF. less Soil Sciences not elsewhere classified 01 Jan 1950 31 Dec 2013 Global Soil Map visible-near infrared spectroscopy 3-dimensional soil mapping Digital Soil Mapping The National Soil Attribute Maps are generated by combining the best available digital soil mapping to calculate a variance weighted mean for each pixel. Two DSM methods have been utilised across and in various parts of Australia, these being; 1) Decision trees with piecewise linear models with kriging of residuals developed from soil site data across Australia. (Viscarra Rossel et al., 2015a); 2) Disaggregation of existing polygon soil mapping using DSMART (Odgers et al. 2015a). Version 1 of the Australian Soil Property Maps combines mapping from the: 1) Australia-wide three-dimensional Digital Soil Property Maps; 2) Western Australia Polygon Disaggregation Maps; 3) South Australian Agricultural Areas Polygon Disaggregation Maps; 4) Tasmanian State-wide DSM Maps. These individual mapping products are also available in the Data Access Portal. Please refer to these individual products for more detail on the DSM methods used. We thank the CSIRO, Terrestrial Ecosystem Research Network (TERN), the Australian Government through the National Collaborative Research Infrastructure Strategy and the Super Science Initiative, for funding the project. We are grateful to the custodians of the soil site data in each state and territory for providing access to the soil site data, and all of the organisations listed as collaborating agencies for their significant contributions to the project and its outcomes. We thank also D. Jacquier and P. Wilson for their inputs. Creative Commons Attribution 4.0 International Licence CSIRO (Australia), Geoscience Australia (Australia), Northern Territory Department of Land Resource Management (Australia), NSW Office of Environment and Heritage (Australia), Queensland Department of Science, Information Technology, Innovation and the Arts (DSITIA) (Australia), South Australia Department of Environment, Water and Natural Resources (Australia), Tasmania Department Primary Industries, Parks, Water and Environment (Australia), University of Sydney (Australia), Victoria Department of Environment and Primary Industries (Australia), Western Australia Department of Agriculture and Food (Australia) Viscarra Rossel, Raphael; Chen, Charlie; Grundy, Mike; Searle, Ross; Clifford, David; Odgers, Nathan; Holmes, Karen; Griffin, Ted; Liddicoat, Craig; Kidd, Darren (2014): Soil and Landscape Grid National Soil Attribute Maps - Bulk Density - Whole Earth (3" resolution) - Release 1. v5. CSIRO. Data Collection. All Rights (including copyright) CSIRO 2014. The metadata and files (if any) are available to the public. 1181.2 TERN Facility No9 InfoGrid GRUNDY The Soil and Landscape Grid of Australia is a comprehensive fine spatial resolution grid of functional soil attributes and key landscape features across Australia. The landscape attributes are derived from the data collected by the Shuttle Radar Topography Mission, whilst the soil attribute surfaces are modelled from existing soils information. The... morese surfaces provide a consistent base upon which a broad range of analyses can be conducted. This provides essential information, not previously available, that is needed for modelling and managing Australian landscapes and ecosystems. less National Soil Grid The Soil and Landscape Grid of Australia Facility has produced a comprehensive fine-resolution grid of soil attributes and important land surface parameters. The data is consistent with the Specifications of the GlobalSoilMap and is managed as part of the Australian Soil Resource Information System (ASRIS). There are a range of soil attribute produ... morects available from the Soil Facility. Each soil attribute product is a collection of six fine spatial resolution (3 arc sec) digital soil property maps, one for each of the standard depths, and each with an upper and lower confidence limits, provided in raster format. less Raphael Viscarra Rossel
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039742020.26/warc/CC-MAIN-20181114125234-20181114150429-00042.warc.gz
CC-MAIN-2018-47
5,613
43
https://linuxacademy.com/course/lpic-2-linux-engineer-exam-202/
code
LPIC-2: Linux Engineer Exam 202 Senior Vice President of Content This course is designed to follow the Linux Professional Institute's Level 2 Exam 2 objectives. Upon completion of this course and with the associated downloadable materials, the student should be prepared to successfully complete the final exam in the LPIC-2 certification. As of August 2018 this course has been updated to v4.5 of the LPIC Objectives. About the Course We will talk through all the exam objectives and what we are going to cover in this course. About the Course Author Let's talk about the course author, what you can expect from this course, and other key information! Important Information about LPI Exam Discount Vouchers for 2019 Please view the following video for important information regarding LPI exam vouchers for 2019. Introduction to LPIC-2 and the Exam In this video, we will talk about the LPIC-2 Exam specifically and the best way to prepare. How to Use the Linux Academy Cloud Playground for this Course This video provides an initial walkthrough on how to access and use Linux Academy's new Cloud Playground. The new service has replaced our now deprecated "Cloud Servers" platform. It is important to note that some videos in this course may use/refer to the old "Cloud Servers" platform, so here are a few important notes to remember and use:_ 1) If you see the instructor using (and/or telling you to use) login credentials such as "user" or "linuxacademy" AND the password "123456" - they will no longer work. Use the specific credentials provided to you (for the server you are using) in the new Cloud Playground user interface. 2) You cannot log into the Cloud Playground servers as the root user. However, you can access the root shell by using the command NOTE: In this course, you may see the instructor running commands as the root user. In order to follow along with those commands, you must run the sudo -i command first. Otherwise, you will get a permissions error._ 3) To access the servers GUI (if you provisioned a distribution that has one), you need to select "Actions" then "Graphical Shell" for your server in the Cloud Playground._ NOTE: You cannot access the GUI via VNC Viewer as port 5901 is blocked.Detailed documentation on the new Cloud Playground can be found here: https://support.linuxacademy.com/hc/en-us/articles/360019096651-Cloud-Playground-FAQ Topic 207: Domain Name Server 207.1 - Basic DNS Server Configuration (DNS Client Configuration and Terms) Description: Candidates should be able to configure BIND to function as a caching-only DNS server. This objective includes the ability to managing a running server and configuring logging. Key Knowledge Areas: BIND 9.x configuration files, terms and utilities; defining the location of the BIND zone files in BIND configuration files; reloading modified configuration and zone files; awareness of dnsmasq, djbdns, and PowerDNS as alternate name servers. 207.1 - Basic DNS Server Configuration (BIND Installation - Caching Name Server) Install the packages needed for our BIND caching name server, and a quick walkthrough of the major components and options in the primary configuration file, /etc/named.conf. 207.1 - Basic DNS Server Configuration (BIND Service Start and rndc Command) We will be starting our named BIND service and learning about the rndc command. We will use that command to create a secure key, a secure configuration for controlling our server, and then use it to manage our caches and zones as needed. Finally, we will test our Caching DNS Server with the appropriate client utilities. 207.1 - Basic DNS Server Configuration (named-checkconf) This is a quick video covering the utility named-checkconf. 207.2 - Create and Maintain DNS Zones (Configuring for Zones) In this video, we will begin adding the necessary information on the domain (zones) that our DNS server will be responsible for. We will take a look at the master and slave configuration for both the forward and reverse lookup zones in the /etc/named.conf file. 207.2 - Create and Maintain DNS Zones (Zone Files and Record Types) This presentation will go over all the most common DNS forward and reverse zone record types you need to be familiar with for the exam and for later creation of our zone files. 207.2 - Create and Maintain DNS Zones (Finalize /etc/named.conf for Master DNS Server) We will quickly complete the service configuration (/etc/named.conf) for our instance by talking about several settings for querying and updates before we move on to creating our zone files. 207.2 - Create and Maintain DNS Zones (Create Forward and Reverse Zone Files and Testing the Configuration) As a final step, we will create the forward and reverse zone files for our test domain, test our configuration using the appropriate tools, and then run typical DNS client commands to be sure the output for our domains are what we expect. 207.2 - Basic DNS Server Configuration (named-checkzone, named-compilezone, and the masterfile-format setting) A video that covers named-checkzone, named-compilezone, and the masterfile-format setting. 207.3 - Securing a DNS Server (Split DNS Configuration for Security) Conceptually, a split DNS configuration needs some discussion. We will walk through a multi-server split DNS configuration and discuss why you would use it as well as how it would be implemented. 207.3 - Securing a DNS Server (Running BIND in a Chroot Jail) As part of a secure BIND implementation, you can configure a new "root directory" to isolate the named service from any other directory or configuration file that could potentially be a security risk. This is done through the use of 'chroot jails'. In this video, we will manually configure a jail where our service to run securely. 207.3 - Securing a DNS Server (DNS Security Tools - Discussion, Keys and Signing a Zone File) Transactions and updates between DNS servers are secured with the DNSSEC extensions. Using Transaction Signatures can help verify that an update or query comes from a trusted source. Further, using the DNSSEC tools, we can create public and private keys to use for those transactions and use them to sign zone files. 207.3 - Securing a DNS Server (DANE, TLSA records) This video covers DANE and the anatomy of a TLSA record. LPIC-2 Linux Engineer Exam 202 Domain Name Server Topic 208: Web Services 208.1 - Implementing a Web Server (Apache - Configuration File and Basic Directives) We will introduce the Apache web server and talk about some differences amongst distribution types and versions. Then we will install it and walk through the primary directives in the main configuration file that determine how the server behaves. Finally, we will enable and start the service and test that it is serving content. 208.1 - Implementing a Web Server (Enabling Modules - Perl) In this video, we will talk about how to create a server-side CGI directory and enable Perl scripts to be called and their output displayed on the web client. We will install the mod_perl package, show that it is enabled, create the appropriate directives in the primary apache configuration file, and then test that it works as intended. 208.1 - Implementing a Web Server (Enabling Modules - PHP) In this video, we will talk about how to enable PHP files. We will install the php package, show that it is enabled, and then test that it works as intended. 208.1 - Implementing a Web Server (Using Authentication for Security - htpasswd and mod_auth) In this video, we will use the mod_auth module to enable basic authentication to secure a site directory's content to valid users with a password. 208.1 - Implementing a Web Server (Using Authentication for Security - htaccess file) This video will present an alternative method of securing site content by user authentication through the .htaccess file. We will discuss how to implement it and why you may choose this method vs. the prior. 208.1 - Implementing a Web Server (Name-Based Virtual Hosts) In this video, we will demonstrate how to create name-based virtual hosts (where each host will resolve to the same IP address). 208.1 - Implementing a Web Server (IP-Based Virtual Hosts) Contrasting against the prior virtual host configuration, we will demonstrate a virtual host that is based upon having multiple IPs or network interfaces, each one responding to a site name. 208.1 - Implementing a Web Server (mod_access_compat) This is a quick video explaining what mod_access_compat is. 208.2 - Apache Configuration for HTTPS (Generating SSL Signing Requests and Self-Signed Certificates) In this video, we will use openssl and openssl-perl to generate a private key and a certificate signing request for a certificate authority to provide a full certificate for our site. Additionally, we will generate a key and a CSR and then sign the certificate ourselves to demonstrate the creation of a self-signed certificate. 208.2 - Apache Configuration for HTTPS (Configuring Apache for SSL Certificates) Now that we have generated our certificates, we will configure our Apache instance to use them and then test that SSL is serving our content. 208.2 - Apache Configuration for HTTPS (SSL and SNI) This is a quick video explaining what SNI is and when to use it. 208.3 - Implementing a Proxy Server (Squid - Forward Proxy Configuration) We will introduce various types of proxy servers briefly and then begin an installation and walkthrough of a forward proxy server called Squid. 208.3 - Implementing a Proxy Server (Squid - Testing the Service) Here we will test our squid proxy configuration by configuring a separate client instance to use lynx through it. We will disable squid as well as restricting the client network so you can see the different behaviors and then add JUST the client IP back in as an allowable client connection address. 208.4 - Implementing Nginx as a Web Server and a Reverse Proxy (Nginx - Installation and Configuration as Web Server) Nginx can be used for various things, and in this video, we will be demonstrating the basic installation and configuration necessary for Nginx to run web services on a custom site we create and then test. 208.4 - Implementing Nginx as a Web Server and a Reverse Proxy (Nginx - Basic Reverse Proxy Configuration) Wrapping up our Web Services section of the course, we will install and configure Nginx as a basic reverse proxy server. We will create a simple Apache server with custom content on a second server and configure our Nginx server to proxy that content when connected to over port 80. LPIC-2 Linux Engineer Exam 202 Web Services Topic 209: File Sharing 209.1 - SAMBA Server Configuration (Server Installation and Share Configuration) Candidates should be able to set up a SAMBA server for various clients. This objective includes setting up Samba for login clients and setting up the workgroup in which a server participates and defining shared directories and printers. Also covered is a configuring a Linux client to use a Samba server. Troubleshooting installations is also tested. Key Knowledge Areas: Samba 3 documentation, Samba configuration files, Samba tools and utilities, mounting Samba shares on Linux, Samba daemons, mapping Windows usernames to Linux usernames, user-level and share-level security 209.1 - SAMBA Server Configuration (Security and Account Management) Now that we have installed and configured both our server and intended share, we need to create the user account(s) that can access it. Once we create accounts and a usermap file, we will then use various client utilities on the server to be sure that our share(s) are available. 209.1 - SAMBA Server Configuration (Client Configuration and Testing) Finally, we have our server ready for connections, so we need to set up a client that can access, mount, and provide persistent connectivity on boot. 209.2 - NFS Server Configuration (NFSv3 Server Installation, Configuration and Testing) Candidates should be able to export filesystems using NFS. This objective includes access restrictions, mounting an NFS filesystem on a client and securing NFS. Key Knowledge Areas: NFS version 3 configuration files, NFS tools and utilities, access restrictions to certain hosts and/or subnets, mount options on server and client, TCP wrappers, awareness of NFSv4 209.2 - NFS Server Configuration (NFSv3 Client Configuration and Share Mounting) Now that our client is configured and secured as we need, we will configure a client to mount the share (both manually and automatically on boot), explain the various mount options, and show how the UID/GID mapping done previously carries permissions and ownership forward on all clients to the server. 209.2 - NFS Server Configuration (Differences between NFSv3 and NFSv4) Candidates should be able to export filesystems using NFS. This objective will explain some of the differences between NFSv3 and NFSv4. LPIC-2 Linux Engineer Exam 202 File Sharing Topic 210: Network Client Management 210.1 - DHCP Configuration (Overview and Configuration) In this video, we will talk about key terms and definitions around DHCP configuration as well as talk through how a DHCP client and server communicate. After, we will walk through an example configuration that defines a DHCP server that will provide IP addresses to the defined network it is responsible for. 210.2 - PAM Authentication (Overview) This video will serve as a basic overview of what PAM is and the advantages it offers on your system. 210.2 - PAM Authentication (Modules - pam_unix, pam_cracklib, pam_limits and pam_listfile) Although there are a large number of modules to explore, we are going to key in with examples on the four we need to know for the exam. 210.2 - PAM Authentication (Authentication Order - /etc/nsswitch.conf) Since the /etc/nsswitch.conf file can affect the order that services respond authoritatively or authenticate on your system, we will walk through the common configuration values and how they can affect PAM on our system. 210.2 - PAM Authentication (SSSD) This lesson includes an overview of SSSD. We go over what it is, how to configure it, and how it works. 210.3 - Configuring an OpenLDAP Server (Overview) This video will provide an overview of what OpenLDAP is and define the key terms we will be using throughout this section. 210.3 - Configuring an OpenLDAP Server (Installation and Initial Configuration) We will walk through the client and server packages to be installed to support an OpenLDAP server. Additionally, we will make modifications to the appropriate /etc/slapd.conf sections as an example DN for our use. 210.3 - Configuring an OpenLDAP Server (LDIF Creation for Adding Objects) Now that we have created our initial DN on our directory server, we need to learn how to create and import LDIF files containing attributes that will build OUs and allow us to associate records (people) with each. 210.4 - LDAP Client Usage (Client Utilities for Searching, Adding, and Deleting Records) We wrap up our OpenLDAP coverage by going over the client utilities that can be used to access, search, update passwords, modify records, and delete objects in our directory. LPIC-2 Linux Engineer Exam 202 Network Client Management Topic 211: Email Services 211.1 - Using Email Servers (Overview) This video will introduce the student to a list of terms and technologies that will be referred to throughout our exploration and configuration of email services during the rest of this course section. 211.1 - Using Email Servers (Postfix Key Configuration Items and Input Files) In this video, we will install (if needed) and configure postfix to handle SMTP delivery of email for our localhost/domain. We will walk through the key configuration items for our setup and then test that email works as expected. We will then create aliases for non-user accounts that will deliver to local accounts and talk about how to convert the aliases file to a binary format for our use. Finally, we will talk about the mail directory structure and logging available to monitor the delivery of email and the mail system in general. 211.2 - Managing Local Email Delivery (Rules-Based Message Management) A brief discussion around applying rules and filters to your Mail Transfer Agents so that (sometimes) complex rules can be used to filter, back up, and sort email before it is picked up by clients. 211.3 - Managing Remote Email Delivery (Dovecot - POP3 and IMAP with TLS Configuration) This video will see us install the dovecot email server used to provide POP3 and IMAP service (including TLS/SSL if desired). We will walk through the key configuration components, including the external configuration directives and their order of precedence. We will then start and test the POP3/IMAP and TLS versions of each service to be sure the referenced security certificates are valid and capable of being passed down to our hosts. 211.2 Managing Email Delivery (Sieve and Dovecot) A brief discussion around applying rules and filters to your Mail Transfer Agents so that (sometimes) complex rules can be used to filter, back up, and sort email before it is picked up by clients. LPIC-2 Linux Engineer Exam 202 Email Services Topic 212: System Security 212.1 - Configuring a Router (Configuring Linux for Routing and Using IPTables) Setting up Linux as a router is a straightforward affair requiring only minimal configuration of a few kernel parameters. After we walk through that, we will spend the rest of this video talking about iptables. We will talk about key terms and definitions and provide examples of creating rules in a chain and then discuss the best way to practice. 212.2 - Securing FTP Servers (Server - vsftpd) In this video, we will take a look at the most popular replacement FTP service called VSFTPD. Although not encrypted, this server is considered safer than standard FTP. We will walk through the installation and configuration of various directives that can help secure it in your environment. 212.2 - Securing FTP Servers (Server - pure-ftpd, proftpd, and Active/Passive Connections) This video shows us installing and then running with several command line parameters, the pure-ftpd service (as well as reviewing the man page for where to find other options). We will then enable and disable anonymous access and show the behavior. We will wrap up by discussing proftpd as an option for FTP we need to be aware of for the exam and then discuss the difference between active and passive connections. 212.3 - Secure Shell (SSH Configuration Options) We all know what SSH is, but you may not have a firm grasp at a number of common security-related configuration options available in the /etc/ssh/sshd_config and /etc/ssh/ssh_config files for both the OpenSSH-server and ssh client utilities. In this video, we will walk through those we need for the LPIC-2 exam and demonstrate how they affect user access and messages that we can display pre and post-authentication. 212.3 - Secure Shell (SSH Client Tools) Now that our server is configured, we will walk through the SSH client utilities SSH, SCP, and SFTP. We will demonstate how to connect to a system and transfer files or run commands and finally explain how these systems are tracking in our known_hosts file. 212.3 - Secure Shell (Advanced SSH - Using SSH Keys for Authentication) We can create and exchange a public key with remote systems so that we can use our private key thereafter to authenticate without a password if we choose. We will generate our keys and show two methods of exchanging them with the remote system. After, we can talk about two-factor authentication with a key passphrase to secure our keys and still have the convenience through using a special utility called the ssh-agent. 212.4 - Security Tasks (Review of Tools, Monitoring, and Organizations) Security is an important part of being a system administrator. Here we will be discussing the tools, utilities, and organizations that we can rely on to help identify, report on, and mitigate vulnerabilities. 212.5 - IPTables Firewall (Discussion) IPTables is the precursor to the "firewalld" firewall process we see in modern distributions. Let's walk through what it is and how it works while defining key concepts and terms. NOTE: Even though this video shows as 212.1, it is still relevant. The video covers iptables which covers the requirements for 212.5. 212.5 - OpenVPN Server Configuration Candidates should be able to configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections. This video will go over how to configure OpenVPN on the server side. 212.5 - OpenVPN Client Configuration Candidates should be able to configure a VPN (Virtual Private Network) and create secure point-to-point or site-to-site connections. This video will go over how to configure OpenVPN on the client side. LPIC-2 Linux Engineer Exam 202 System Security Summary and Next Steps Now that we have completed our content, let's talk about where you can go next – both inside Linux Academy and otherwise! LPIC-2 Linux Engineer Exam 202 Course Assessment Exam Take this course and learn a new skill today. Transform your learning with our all access plan.Start 7-Day Free Trial
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593657146247.90/warc/CC-MAIN-20200713162746-20200713192746-00398.warc.gz
CC-MAIN-2020-29
21,220
153
https://proclockers.com/forums/topic/cryorig-h7-ssues-fan-speed/
code
Asus Gen 3 P8768 motherboard I5 2500k cpu Cryorig H7 cooler. Installled a H7 yesterday… have it plugged into cpu fan 1. when I first booted I got a cpu fan error… Bios was reading about only 400 RPM it was in Red I then disabled the feature in bios and got to windows. Idle my computer is running at 20c. is this something I should worry about it running at 400? Shouldnt it be much faster? can I manuallly increase the speed in bios or through windows? before this I had a stock cooler. Would it get faster under load? It says the max for it is 1600?
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107884322.44/warc/CC-MAIN-20201024164841-20201024194841-00354.warc.gz
CC-MAIN-2020-45
555
2
https://realtimevfx.com/t/ue-niagara-animating-particles-after-system-deactivation/24666
code
Not sure if this is a niche use case, I found myself using it more and more and just thought I’d share! A niagara module that lets you animate particles after the system has been deactivated. Tutorial/node graph at the bottom. Scenario #1: You have an infinite particle that is supposed to fade in and out based on whether the System is Active or not Scenario #1 Infinite particle In this example, the colors are just to help visualize the ‘states’ Green - system activated, fading in Blue - done fading in and is now living infinitely (until system deactivation) Red - system deactivated, fading out Scenario #2: You have a System continuously spawning particles with very long lifetimes, however, in case the System Deactivates, you’d prefer to quickly fade out all the particles. Scenario #2 Continuous Emission In this example, the colors are again just here to help visualize things Green - the particles are living their lifetime as they normally do Red - system deactivated, fading out no matter the lifetime I found that for me, in both of these scenarios, having a separate curve to scale/erode/fade particles in the Niagara System itself is the most convenient, rather than relying on outside parameters or spawning an entirely new system with its only purpose being to fade out. This has led me to create this Niagara Module. How it works The module works in conjunction with the default ParticleState module. There is a single parameter in the module called InactiveLifetime. By default it is not used and instead, the module stops Particle Age attributes from ticking until the System/Emitter is Deactivated. This means that anything you animate by NormalizedAge will run after Deactivation. If you do use InactiveLifetime, the module won’t modify Particle Age attributes. However, it creates two extra Particle attributes ‘InactiveAge’ and ‘NormalizedInactiveAge’. These two parameters work the same way as their non-inactive variants, the difference is, again, they are ticked after System/Emitter deactivation. NodeGraph / Module link Feel free to modify or use it in whatever you like. Also to comment something absolutely trivial that achieves the same thing without the added ‘complexity’. One might also argue, that a module just straight up counting time could achieve the same things. (oh well) In any case, some known issues as well: The module has to be directly after ParticleState, if theres anything inbetween the two, NormalizedAge might tick up for a frame(?) (happened to me on UE4.26, haven’t tested on later versions). Added the option to DISABLE killing the particle when InactiveLifetime elapsed (Advanced option, defaults to kill) This can be useful for even more niche cases, where you do want to animate some Particle Attributes after the System Deactivates, but you’d also like to keep it’s full Lifetime.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100710.22/warc/CC-MAIN-20231208013411-20231208043411-00753.warc.gz
CC-MAIN-2023-50
2,871
30
https://www.hamiltonbook.com/tales-of-giant-snakes-a-historical-natural-history-of-anacondas-and-pythons-hardbound
code
TALES OF GIANT SNAKES: A Historical Natural History of Anacondas and Pythons Examines the natural history of four species of snakes known to exceed 20 feet in length. Based on the writings of explorers, missionaries, scientists, and adventurers over the past 200 years, the authors have pieced together exciting and informative glimpses into the lives of these legless giants. Illus. Item #: 477292X SNAKES OF EUROPE, NORTH AFRICA & THE MIDDLE EAST: A Photographic GuidePaperbound$9.95 $29.95 THE OFFICIAL U.S. ARMY ILLUSTRATED GUIDE TO VENOMOUS SNAKES, REVISED EDITIONPaperbound$14.95 $19.95 LIZARDS OF THE WORLD: A Guide to Every FamilyHardbound$24.95 $29.95 LIFE IN COLD BLOODHardbound$9.95 $29.95
s3://commoncrawl/crawl-data/CC-MAIN-2021-49/segments/1637964362919.65/warc/CC-MAIN-20211203212721-20211204002721-00180.warc.gz
CC-MAIN-2021-49
700
7
https://www.emra.ca/forums/index.php?search/28584/
code
Hey fast316, I'm planning to get back on track (its been a long time!) and come out on July 3. I searched the site and found the race tech requirements, but I can't find the requirements for trackday rider tech. Is there a link on the site here? In particular, what are the helmet requirements?
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945289.9/warc/CC-MAIN-20230324211121-20230325001121-00780.warc.gz
CC-MAIN-2023-14
294
1
https://www.br.freelancer.com/projects/php-internet-marketing/bulletin-board-posting-repost/
code
Trabalho Não Encontrado Sorry we couldn't find the job you were looking for. Find the most recent jobs here: I need a social services app built with API. Azure services with Xamarin might be the best, but I am open to suggestions. It needs to be able to resemble app examples I provide. Please only experience coders. NDA must be signed. I need a new website. I need you to design and build my online store. 3D Art Gallery Hello! I need 2 concept art designs created for my video game. Similar art design to what I have attached. Required - 1. Male Hero With Uzi Weapon 2. Female Hero With Baseball Bat Weapon I have a linux based server and need a web panel installed. It should be a quick and easy process for someone who knows what they are doing. It is a ubuntu based server. Here is the site of which the panel is located [login to view URL] I need a logo designed. logo and square space website for a yoga teacher that will offer download documents, youtube videos, will have a blog and will require a ton of social media campaigns. The developer should build a full stack application that allows a user to link with Amzon account by a one click integration. This application should allow the user to do whatever function in Amazon as described below. Following modules need to be developed. 1. One click Amazon Integration 2. Django application should be able to upload inventory and order data to amazon. 3. Obtain FInancial infor... I will provide you with about 50 curators , with the playlist username, I need to find 2 sources of contact information for these people If Done Well , Work Will Be Ongoing ! Pagina de promoción para mis productos de consultoría y seminarios, tendrá un blog para publicar contenido, un sitio para registrarse a recibir el boletín, un sitio para exhibir los productos (6), publicación de videos, por el estilo de [login to view URL], yo tengo el dominio, el hosting y la pagina ya esta instalada con la plantilla Lucid de wordpress. Need help with writing dental related content and SEO for a website.
s3://commoncrawl/crawl-data/CC-MAIN-2018-26/segments/1529267865995.86/warc/CC-MAIN-20180624005242-20180624025242-00273.warc.gz
CC-MAIN-2018-26
2,048
13
https://uwaterloo.ca/gamification/people-profiles/bernadette-perry
code
Bernadette Perry is a French Master’s student in applied linguistics at the University of Victoria, British Columbia. She is currently specializing in the gamification of second language acquisition. Her research consists of developing a quest-based French language learning tool, which she calls Explorez. After implementing this system into a first-year French course at UVic, Bernadette will analyze the collected data on student engagement, participation and language acquisition to determine its efficacy as a teaching aid. Master’s student, French - University of Victoria University of Victoria, British Columbia
s3://commoncrawl/crawl-data/CC-MAIN-2020-40/segments/1600400193391.9/warc/CC-MAIN-20200920031425-20200920061425-00039.warc.gz
CC-MAIN-2020-40
623
3
https://www.outlookindia.com/national/confessions-of-a-polyglot-a-language-for-every-mood-magazine-221836
code
So I’m a polyglot. I dabble in 12 languages. I used to be a bit better at them, but these days I’m too busy with my writing career in English to keep up with all of them. The exception would be in my dreams, in which case I speak a pidgin of tongues, and then I shout “Help! Help!” in English. I’m joking. But really, I have had dreams in pretty much all of the languages I speak. I have gotten lost with headless bus drivers who speak only Bahasa Indonesia. I have had chats at family gatherings in Kannada, English, and Spanish that go horribly wrong. When I dream, any language can assault me, and cause the worst of things to occur in my mind.
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030335257.60/warc/CC-MAIN-20220928145118-20220928175118-00036.warc.gz
CC-MAIN-2022-40
657
2
http://www.nicolasnova.net/pasta-and-vinegar/2004/05/11/blogging-blogging-and-gilles-deleuze
code
(Blogging) Blogging and Gilles Deleuze I already talked about the fact that I do not believe in social software (link) and I do prefer using each other's blogroll as the actual networking tool. I explained that it is because I am more interested into what people do (directly explicit in weblogs) than what people are. Last week end, while watching "L'Abécédaire" by Gilles Deleuze, I was amazed by the fact that he claims something close to that statement: he said that he prefer going to the movies, art exhibition than going to symposium or conference. He said this because he is more interested into "meeting" artefacts made by people than just meeting people. Each of these artefacts are of interest because they could foster new ideas and help him to modify his thinking. I think it's the same with weblogs: they are an explicit description of what people do, that everybody can read, watch and be aware of.
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514574050.69/warc/CC-MAIN-20190920155311-20190920181311-00087.warc.gz
CC-MAIN-2019-39
915
2
https://www.nigms.nih.gov/Research/DRCB/IDeA/Pages/IDeA-Program-Meeting-Slides.aspx
code
Below are slide presentations from the 2020 IDeA Program Meeting, held virtually on September 22, 2020. IDeA Program 2020: Progress and Initiatives - Dr. Ming Lei [PDF] IDeA Program Meeting - Dr. Jon Lorsch [PDF] Rapid Acceleration of Diagnostics (RADx): the NIH Response to Testing During the COVID-19 Pandemic - Dr. Tara Schwetz [PDF] Connect With Us:
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679102637.84/warc/CC-MAIN-20231210190744-20231210220744-00761.warc.gz
CC-MAIN-2023-50
353
5
http://fortheloveofgal.blogspot.com/2015/02/moving.html
code
This blog is moving .... because I'm under the assumption that Blogger will censor my blog and change it into some kind of private thing, as per their policy. As of today, it appears that all of my photos have already migrated ........ Please look for me at My email will still remain [email protected]
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578743307.87/warc/CC-MAIN-20190425233736-20190426015736-00145.warc.gz
CC-MAIN-2019-18
302
8
http://www.mittelstand-digital.de/DE/Wissenspool/usability-kmu,did=557554.html?view=renderPrint
code
Der Buchbeitrag "Software Usability in Small and Medium Sized Enterprises in Germany: An Empirical Study" ist in "Software for People", Springer Verlag, 2012, erschienen. Autoren: Florian Scheiber, Dominika Wruk, Achim Oberg, Johannes Britsch, Michael Woywode, Alexander Maedche, Felix Kahrau, Hendrik Meth, Dieter Wallach, and Marcus Plach Usability has become a competitive factor in the software industry. Specifically, the software industry in the United States has recognized this important factor and successfully leverages it for achieving competitive advantage. Compared to this fast development in the US, it seems questionable whether this view is also widespread among small and medium sized software producing and client companies in Germany and whether they direct sufficient attention to usability. This article presents the results of an empirical study exploring the status quo of the importance, the knowledge and the actual use of usability concepts among small and medium sized enterprises (SMEs) in Germany. Following an organizational field perspective, we investigate how interactions between actors in the software field influence the usability awareness as well as the knowledge and actual use of usability concepts. Based on the results of our study, we provide recommendations on how to increase awareness and maturity of software usability in SMEs in Germany.
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676589537.21/warc/CC-MAIN-20180717012034-20180717032034-00237.warc.gz
CC-MAIN-2018-30
1,386
3
https://misterstepan.wordpress.com/2015/10/13/pd-dreams/
code
I’ve been thinking about this for a while… What do you get when you cross Genius Hour with Startup Weekend? … a new model for PD. Take a peek at each of these videos if you’re not familiar with the terms: Startup Weekend (Yes, this video is in Spanish… But it’s also a better explanation than any English version that I could find.) Here’s what I’m thinking. *Teachers must have an idea that they want to explore/play with. They will spend 2 days working on that idea or collaborating with other educators on their ideas. Day 1 starts with some rapid fire sharing of ideas. No one gets invited without submitting an idea (no spectators). All ideas get shared right away. Then some mingling time (hopefully some educators group off to work on hybrid ideas), and full access to books, web resources and board personnel. At the end of the first day, all ideas must be re-presented to the group and a judging panel made up of superintendents/central staff/student trustees. Members will get feedback about connections that they have made to their students, current research, their school goals and board goals. Day 2 starts with a quick recap of Day 1, then (as soon as possible) groups/individuals will begin tweaking their ideas. As much as possible, they must take into account the feedback that they have received on Day 1. By lunch they must be ready to give their final pitch to the judges and other participants. After each pitch, the judges voice their compliments and concerns. Think American Idol. The judges have no say, they just draw attention to things that they love or things that participants might not have considered. The day ends with a vote. The winner gets their idea “enabled”. What does it mean to have your idea enabled? Well, having recently come from a classroom, there are a lot of times when I would say “I wish I had, more tech, more teachers to help, more supplies, etc.” When we enable an idea, we remove ALL of those obstacles. Enabling is not a forever gift, it happens in support of the idea. "We need tech” gets enabled by taking some central resources (computers, laptops, iPads, whatever) and lending them for a short time period. Enabling “more teachers” might mean central resource teachers going to help/co-teach for a short time period. Same goes for supplies or anything else that needs to be in place for the idea to happen. While this enabled teaching is happening, the process is being documented so that it can be shared and scaled. What about all of the other ideas? Good question. I’ve been toying with a “we did it anyway” prize. Any group or individual that decides to make their idea happen anyway, will be eligible for the same prize as the winner. The catch is that they will have to try their idea once without support. They’ll document the process and submit their lesson along with a reflection on how they might improve their idea. I’m not sure that this will ever happen, but sometimes sharing dreams is the first step to making them happen.
s3://commoncrawl/crawl-data/CC-MAIN-2018-17/segments/1524125946314.70/warc/CC-MAIN-20180424002843-20180424022843-00434.warc.gz
CC-MAIN-2018-17
3,036
15
https://www.thedawnjournal.in/meaning-and-usage-of-besides/
code
Besides is a preposition that has a few different meanings depending on the context. Here are the two main meanings of besides along with examples: In addition to; as well as: Example: Besides studying for the exam, I also have to finish my term paper. In this example, besides is used to indicate that the speaker has another task to complete, in addition to studying for the exam. Apart from; aside from; except for Example: I don’t want to go to the concert tonight. Besides, I have to work late. |1. Besides cooking dinner, I also have to clean the kitchen and take out the trash.| |2. I don’t eat meat, and besides, I’m allergic to shellfish, so I can’t have the paella.| |3. Besides the fact that it’s expensive, the hotel is also fully booked for the weekend.| |4. I haven’t seen John in years. Besides, I heard he moved to another country.| |5. The movie was terrible, and besides, the theater was freezing cold.| |6. Besides his impressive academic record, he’s also an accomplished athlete and musician.| |7. Besides his busy work schedule, he also has a young family to take care of.| |8. She’s one of my best friends, and besides, she always gives great advice.| |9. Besides the rainy weather, we had a great time on our trip to the coast.| |10. I don’t eat meat, and besides, I’m trying to reduce my carbon footprint.|
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506421.14/warc/CC-MAIN-20230922170343-20230922200343-00345.warc.gz
CC-MAIN-2023-40
1,351
16
http://www.modaco.com/topic/344308-framework-ginger-circles-for-ginger-stir-fry-b15-b19/page__st__20
code
Keep me posted on your progress I redownloaded zip to be sure that problem is not with it. Could be something wrong with my phone as you mentioned, but I reinstalled SS4 rom with no problems, also with circlemod. I want to have good looking rom with your theme, but now dont want to try to reinstall it again, lost already couple of hours trying to get this one running Will let you know if I get it working eventually.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368704134547/warc/CC-MAIN-20130516113534-00008-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
419
7
https://superuser.com/questions/1115034/is-this-gpu-compatible-with-this-motherboard-and-power-supply-need-second-opini
code
EDIT: I'm dumb, I missed this part of my power supply description: 53 AMP SINGLE +12V RAIL The dedicated 53A, single +12V rail provides up to 636W power output, ideal for your high-end graphics system. So looks like I'm good there. EDIT 2.0: No longer looking at the GT 730. (didn't realize it would be a step in the wrong direction) Looking at this card now, GTX 760 (link is in the comments, SU won't let me post more than 2 links -_- ): Looks like for this one I'll only need a 6pin to 8pin adapter, since I don't have an 8pin native to my power supply. So I have an older gaming rig that needs an upgrade. Mainly, the GPU from a NVIDIA GTX 560 to a EVGA GeForce GT 730 DirectX 12 04G-P3-2739-KR 4GB 128-Bit DDR3 PCI Express 2.0 Video Card, along with RAM, but that's an easier problem for me to tackle. My motherboard is this dinosaur: EVGA 120-LF-E650-TR LGA 1156 Intel P55 Micro ATX Intel Motherboard And my power supply is this guy: CORSAIR Enthusiast Series TX650 650W ATX12V/EPS12V 80 So, looking at the requirements for the 730: 300W or greater power supply with a minimum of 20 Amp on the +12 volt rail. PCI Express, PCI Express 2.0 or PCI Express 3.0 compliant motherboard with one graphics slot. Looking at the specs on my motherboard, and what my current card is, it seems to be compliant on the PCI front, and the specs for the power supply mention a single 12v rail, which the card needs, along with '+12V@53A' in the output section, which, if I am reading it correctly, seems to meet the 20amp on the 12 volt rail requirement for the card (Please correct me if I'm wrong here) Other outputs for the power supply: +3.3V@25A, +5V@25A, [email protected], [email protected] So my initial research seems to suggest yes, but I wanted a second opinion from someone smarter than me on this. :) Yes, I know that in the long run, I'd be better off just upgrading the entire thing, but for reasons beyond the scope of this question, not going that route ATM unless I have to.
s3://commoncrawl/crawl-data/CC-MAIN-2019-04/segments/1547583656530.8/warc/CC-MAIN-20190115225438-20190116011438-00021.warc.gz
CC-MAIN-2019-04
1,966
13
https://www.sitecore-cms.de/2015/10/sitecore-branch-no-longer-exists.html
code
|[branch no longer exists] -| SolutionIf items were created from template, 'MasterId' field has '00000000-0000-0000-0000-000000000000' value. MasterId field in SQL database is responsible for 'created from'. Update MasterId field to 00000000-0000-0000-0000-000000000000. How to SQL command: Do a backup. Be careful, use your own query and use filter.update [your_db_name_master].[dbo].[Items] set MasterID = '00000000-0000-0000-0000-000000000000' where TemplateID = '<your TemplateID>'
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499891.42/warc/CC-MAIN-20230131222253-20230201012253-00821.warc.gz
CC-MAIN-2023-06
485
5
http://www.highrankings.com/forum/index.php/topic/5838-quick-yahoo-ranking-question/
code
Are you a Google Analytics enthusiast? More SEO Content Quick Yahoo Ranking Question Posted 26 April 2004 - 01:37 PM I've gone through Yahoo's help pages to make sure that my site isn't breaking any rules. The only thing I can figure is that I have 2 additional domain names pointing to my site. Do you think Yahoo is considering this as spam and penalizing me? Posted 26 April 2004 - 01:46 PM If you are referring to the site in your signature, then your home page is pretty much void of any content. There is no substitute for html text content. You should try including some on your home page and see if that does not give you a boost. Posted 26 April 2004 - 02:00 PM Posted 26 April 2004 - 02:17 PM Have you checked to see if there are any pages in the index under the domain names you have pointing? That is the easiest way to rule duplication filters in or out. no pages in a 'site:' search and there can be no duplication filter. Check the backlinks on Google, MSN & Yahoo could be that G & MSN have picked up links that Yahoo has not. Also check that the backlinks are not pointing to the wrong domain. Yahoo does not handle 301's as well as MSN & Google. Someone might have backlinked to one of the pointing domains. I would sit down and look at the basics, check you have the Yahoo! Search 'flavours of the month' included on the pages and optimised properly. (Keyword and description Metas) That is the only thing that I can think of offhand (and blind) that would make such a difference between between MSN & Yahoo! other than what I have mentioned. Posted 26 April 2004 - 02:36 PM Yes, a 'site:' search in Yahoo shows that they have picked up all the pages in the site. And Yahoo does not show any listings for the other two domain names. I have keywords and description META tags on all of my main pages (about 8 pages) and they are optimized for that paricular page. But I don't have the METAs on every single page. Do you think that is neccessary? My Google backlinks look fine, but how do I check for backlinks in Yahoo? Posted 26 April 2004 - 03:44 PM Yahoo does place a lot more importance on those metas, so I would have them there, although I doubt that is what is holding your ranking back. Posted 26 April 2004 - 04:13 PM Do you think this is what's causing my low ranking in Yahoo? Any idea why those site listing would be showing up when there are no links to my web site? Posted 27 April 2004 - 02:37 PM Posted 27 April 2004 - 02:42 PM Yahoo compared with google 0 user(s) are reading this topic 0 members, 0 guests, 0 anonymous users
s3://commoncrawl/crawl-data/CC-MAIN-2013-48/segments/1386163054976/warc/CC-MAIN-20131204131734-00074-ip-10-33-133-15.ec2.internal.warc.gz
CC-MAIN-2013-48
2,560
26
https://hotinfonow.com/the-interview-of-the-founder-of-avant-garde-jack-bogol-of-the-1990s-shows-his-investment-philosophy/
code
Vanguard's founder, Jack Bogol, is known for investing for the average person through index funds – funds that match the market barometer like the S & P 500. His message was simple: why do you waste money on expensive fees and commissions complex funds when market barometers often exceed them? This message remains remarkably consistent throughout his career. Jack Blog needed a huge amount of brains and market knowledge to collect the first index fund. But for investors who want to gain from his idea, it becomes quite easy. In 1975, the founder of the Vanguard Group, who died on Wednesday, was able to turn long-standing faith into reality, that it is far more profitable to follow the market than to fight it. Most mutual fund managers who chose shares failed to deal with core indicators like the S & P 500, and even less would have found them. So he turned his mind into action, gathered the first fund that just followed the S & P 500, minus the small management costs that were much cheaper than the day's active means. »Subscribe to CNBC: http://cnb.cx/SubscribeCNBC tO CNBC: From Wall Street to Main Street" To win the award for Original Documentaries and TV Series of Reality, CNBC (1 Get the latest news: http://www.cnbc.com/ Follow CNBC of LinkedIn: https: http://cnb.cx/LinkedInCNBC Follow CNBC News on Facebook: http://cnb.cx/LikeCNBC Follow CNBC News on Twitter: http://cnb.cx/FollowCNBC Follow CNBC News on Google+: http://cnb.cx/PlusCNBC Follow CNBC News and Instagram: http://cnb.cx/InstagramCNBC Vanguard Founder Jack The 90 Years of Bogle's Interview Showcase Its Investment Philosophy
s3://commoncrawl/crawl-data/CC-MAIN-2020-29/segments/1593655890566.2/warc/CC-MAIN-20200706222442-20200707012442-00571.warc.gz
CC-MAIN-2020-29
1,612
13
http://blog.syrrys.com/2018/08/05/11-classical-time-series-forecasting-methods-in-python-cheat-sheet/
code
Not really my world, just a part of it 11 Classical Time Series Forecasting Methods in Python (Cheat Sheet) Watch “How Do Adults Make Friends?” on YouTube Watch “Kiesza – Phantom Of The Dance Floor” on YouTube Leave a Reply You must be to post a comment.
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221212910.25/warc/CC-MAIN-20180817202237-20180817222237-00283.warc.gz
CC-MAIN-2018-34
264
7
http://multcolib.bibliocommons.com/list/show/187793833_multcolib_homeworkcenter/243255157_multcolib_homework_center_picks_maps_for_students
code
Multcolib Homework Center Picks: Maps for Students Annotation:Come along as a girl maps her neighborhood to show her visiting grandmother where everything is. Simple text takes early readers step by step through the types of features a neighborhood map needs to have. Annotation:Provides information about the United States, including state flags, birds, flowers, and capitals, as well as key points about the water, people, and physical features of each state. Annotation:This atlas takes children on a voyage around the world in 144 exciting pages with more than 200 photos and 50 easy-to-understand topographic and political maps featuring superbly designed visual information. Annotation:Amazing facts, sites, and activities related to each state in the U.S., as well as car games.
s3://commoncrawl/crawl-data/CC-MAIN-2015-14/segments/1427131296169.46/warc/CC-MAIN-20150323172136-00001-ip-10-168-14-71.ec2.internal.warc.gz
CC-MAIN-2015-14
785
5
https://pypi.org/project/django-filters/
code
The Django Filters project is created for easy filter creation. There are slug and get base filters and an BaseFilterset for constructing. If you have ideas for other features please let me know. #. pip install git+git://github.com/baskoopmans/django-filters.git #. Or add the `filters` directory to your Python path. #. Add `filters` to your INSTALLED_APPS if you want to use templates and templatetags TODOs and BUGS Download the file for your platform. If you're not sure which to choose, learn more about installing packages.
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549425339.22/warc/CC-MAIN-20170725162520-20170725182520-00057.warc.gz
CC-MAIN-2017-30
529
8
http://statisticshomeworkhelp28158.timeblog.net/6528863/stata-project-help-fundamentals-explained
code
Bid now Investigate Writing Finished ...companies in fields related to finance and economics. We are seeking a skilled analyst to hitch our diverse workforce of researchers. The analyst ought to have a robust mathematical background and fantastic English together with understanding or practical experience with studies and statistical program for example MatLab, R, Stata and Eviews. Make sure you make pull requests on the grasp branch only if you wish to contribute to README, LICENSE or comparable meta info information. If you wish to create a contribution to any Stata file, then make sure you usually do not use the learn department. If you wish to generate a contribution to any Stata information that Now we have released a minimum of after, then please fork from and make your pull request on the establish branch. It's also advisable to have the ability to recognize experimental models for which you might have not acquired the right statistical examination, and try to be ready to inquire smart issues when consulting which has a statistician about this sort of experiments. Workplace several hours Polymake was (and nonetheless is) a versatile Resource for your algorithmic cure of polytopes and polyhedra. Tells you you are going to gain additional credit history although not simply how much extra credit rating. Matter is tough as it can be and he did not train it nicely. Skip him if at all possible. 3 men and women located this useful one particular person didn't come across this practical report this score considering that on ordinary men and women get 'U' accidents a year. Negative binomial -- Also made use of to study mishaps, All Stata instructions we have been working on that We have now yet to release a first Edition of, are located in the branches known as establish-Identify wherever Identify Pick your spot for getting translated written content the place out there and find out area functions and presents. Based upon your location, we advise that you choose: . On the other hand, For anyone who is knowledgeable about Yet another deal and so are snug looking through the handbook to grasp the defaults in its logistic regression process, you’ll be good. You will discover 7 homework assignments. They will be offered click here for more on the class web page a few weeks just before They can be due. The homework assignments make up a comparatively little portion of your grade, and they're going to be loosely graded; in case you Adhere to the Directions and come up with a honest energy on all portions of an assignment, you will probably get total credit history. Even with this, I recommend that Going Here you place many hard work into the homework. Lots of the competencies I hope you learn from this course can only be realized by undertaking, not by Hearing me talking, so your statistical education is going to be incomplete (and you may battle around the tests) If you don't do the homework to the ideal of your respective means. Certainly, knowing logistic regression would require some new statistical concepts, but we guarantee you: Really need to Assessment a univariate time collection in STATA. Must decompose the series into long lasting and transitory elements with condition Area making use of greatest likelihood with Kalman filter. Needed as follows: Alternately, you can use linear regression to know regardless of whether cigarette usage might be predicted depending on smoking cigarettes duration (i.e., your dependent variable might be "cigarette consumption", measured with regard to the volume of cigarettes eaten day-to-day, plus your impartial variable will be "cigarette smoking length", measured in times). In case you have two or more unbiased variables, rather than just one, you might want to use several regression. Alternatively, if you only wish to establish whether or not a linear romance exists, you could use Pearson's correlation. The ease of function creation with the consumer is among the strengths of working with R. Objects continue being area to your function, that may be returned as any information style. Beneath can be an illustration of the composition of the functionality:
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039741192.34/warc/CC-MAIN-20181113020909-20181113042909-00068.warc.gz
CC-MAIN-2018-47
4,166
14
https://lists.blender.org/pipermail/bf-committers/2012-March/035877.html
code
[Bf-committers] Geospatial Blender brylie at gnumedia.org Sat Mar 17 11:08:34 CET 2012 I am currently studying libre geospatial tools such as QGIS and GRASS, at community college in Nevada City, CA. I would like to figure out how to use Blender3D for geospatial analysis and visualization. For instance, there is a nation wide survey of elevation data, in the United States, called the National Elevation Dataset (NED). I would like to take some known terrain data (from NED, LIDAR scans, etc.) and distort a Blender3D primitive (such as a grid) to simulate the terrain. This would open up many doors such as watershed simulation, fire simulation, city planning, game development, etc.. There are several file formats involved in geospatial systems, most of which are already handled by Python GDAL/OGR. I think that my proposal is to integrate these tools into Blender3D via the compositor, game engine, or some other means. The compositor seems like a strong candidate for geospatial process modeling. I appreciate any feedback and/or mentorship that members of this community can provide. Would this be a worthwhile GSoC project? Thank you for your time and consideration. More information about the Bf-committers
s3://commoncrawl/crawl-data/CC-MAIN-2019-18/segments/1555578530176.6/warc/CC-MAIN-20190421040427-20190421061322-00046.warc.gz
CC-MAIN-2019-18
1,216
21
http://forum.pianoworld.com/ubbthreads.php/topics/1543000/Best_monitors_speakers_for_V_p.html
code
I'm about to buy a pair of speakers to a Roland V-piano but the question is what pair of speakers are best for my budget at $1000? I think the first thing you have to think about is your goal. Who is listening, where are they relative to the piano and what size is the room? And lastly what kind of "sound" are you going for? You can't buy speakers without knowing all of the above. Without the above information the advice you will get will all be of the form "I have X, they work for me". If this is the simplest case of you needing to hear what you play in a typical living room. Then you have to decide if you want monitor style near feild speakers or larger ones that "fill the room". Moniors are acturate almost to the point of being harsh and the sound will resemble what you hear in headphones. Physically larger speaers of the type designed for stereo music listening will sound more like a real piano. It is good to understand how a real acoustic piano sounds in a room. A real acoustic piano sends the sound in all directions 360 degrees. More then 99% of the acoustic piano's sound goes some direction other than to the listener. (yes almost ALL of it) But the sound hits a wall, ceiling or floor and then comes back to you and this is what you and everyone else in the room hears. Monitor speakers are more directional and you aim them directly at your ears. Bigger stereo speakers are typically set up to fill the room so that most of the sound you hear is reflected from the room. SO you have to choose which you want, a very acuate "digital" sound or a simulation of an acoustic piano that is "colored" by it's acoustic surroundings. There are many "shades of gray" too. At one extreme are headphones. The sound goes straight to the ears. At the other end of the spectrum is the Yamaha Avent Grand N3. It's speakers are vertically mounted and don't face the listeners at all, the sound first goes into the case and then is re-radiated into the room like it would be in an acoustic instrument. With $1K to spend you can afford any point along this spectrum you like. I have both kinds of speakers. I use the monitors for "post production" type tasks like editing and the larger 40" tall speakers for live play. The neat thing is that the cost is about the same If these are to be used for a public performance then you have many other considerations. Thinks like "will they fit in my car" come into play. But heck if you can fit a v-piano in it's road case you must already own a delivery van.
s3://commoncrawl/crawl-data/CC-MAIN-2017-13/segments/1490218189802.18/warc/CC-MAIN-20170322212949-00611-ip-10-233-31-227.ec2.internal.warc.gz
CC-MAIN-2017-13
2,508
10
https://nzeikayblog.com/nigeria-and-biafra-phobia-matters-arising/
code
Jesus of Nazareth was right on the mark when he said to the crowd of people watching him as he was being led to the Golgotha to be crucified, “Daughters of Jerusalem, do not weep for me; weep rather for yourselves and for your children… For if this is what is done to green wood, what will be done when the wood is dry?” (Luke 23:26-32). It was Pope Gregory, the Great, who once said, “It is better that scandals arise than the truth be suppressed.” I remembered watching a debate at Nigeria’s Senate Chamber one day, in 2018, during the Eight Senate of the National Assembly, when the popular Senator Ben Bruce of Bayelsa State, mentioned the word “Biafra” at the Senator Floor, and what ensued thereafter, marvelled me to the bone marrow. Senator Ben Bruce during his submission at the Senate Floor had cited some examples of the technological ingenuity and innovations of Biafran scientists during the Nigeria-Biafra War (1967-1970). This was to challenge the Nigerian government of the day, the necessity of promoting scientific and technological research and development in the country. Unfortunately, that occasion at the Senate Chamber turned into the usual emotional scenario for demonizing Biafra and bashing at Senator Ben Bruce for daring to mention the word ‘Biafra’ at the Nigerian Senate, of all places. Mind you, a similar incident had occurred at the Nigerian Senate sometime age, when Julius Nyerere, former President of Tanzania died, and he was to receive some commendations from the Senators at the Red Chamber at Abuja during one of their sessions. Unfortunately, some Senators fought against it, citing Nyerere’s support for Biafra during the war. Similarly, on this fateful day, at the Eight Senate, immediately Senator Ben Bruce mentioned that word ‘Biafra’ at the Senate Floor, another Distinguished Member of the Nigerian Senate, Senator Marafa of Zamfara State, shouted him down, and at the top of his voice, said to him, “Biafra is dead.” However, the question we may need to ask ourselves today is this, “Is Biafra really dead?” Especially, in the light of the present agitations for Biafra self-determination and independence! As well as in the light of the present travails of Nnamdi Kanu, leader of the Indigenous People of Biafra, IPOB, at the hands of Major General Muhammed Buhari’s regime, can we really, say, ‘Biafra is dead’? By the way, was there a time, Biafra died? Even in the history and political consciousness of Nigeria as a nation-state, from the ’60s to the present day, Biafra is ‘alive and well.’ Every relatively conscious Nigerian and the outside world know this very well. ‘Biafra never died. One of the worst mistakes of those who have been piloting the affairs of the Nigerian State since the end of the war in 1970, to the present day, is to think that by placing anathema on the word “Biafra”, and by banning the teaching of ‘Nigerian History’ in schools, ‘Biafra’ would be forgotten in human history or Nigeria’s political consciousness. History has proved them wrong. At the end of the war in 1970, the Gowon military junta of the federal government made a decree prohibiting people from using or pronouncing the word, ‘Biafra’ in Nigeria. The regime went further and changed the name of the ‘Bight of Biafra’ at the coastal zone the Atlantic Ocean in the Eastern region to ‘Bight of Guinea.’ All these with the evil intent to make sure that nothing about Biafra is heard again, in the history of Nigeria and the world. Worse still, the Nigerian federal government also prohibited the teaching of ‘History of Nigeria’ in schools, for fear of younger generations coming to read and know about the atrocities committed against the Igbos during the genocidal Nigeria-Biafra War, and about the injustice against the Igbos in the country’s geopolitical structure and system of governance. By so doing, however, the gatekeepers of the Nigerian State underrated the power of ‘Africa’s oral tradition’, the use of narrative story, through which our African forbears have passed on the history and tradition of the ancestors, from one generation to another. It showed also that the gatekeepers of Nigeria were so short-sighted that they did not foresee the coming of today’s information technology age, when the youths will, on their own, equip themselves, without attending any history class, with every information they need, past and present, through the use of the internet, computers, cell-phones, and what have you. Thus, today, despite the banning of history in Nigerian schools, the youths have come to educate themselves, on their own, about the history of the Nigeria-Biafra War (1967-1970), thanks to the revolution in information technology of this generation. Our youth, today, have in the palm of their hands, the whole information they may need to know, about the history of Nigeria and the Biafra War. Furthermore, for someone to come up today to say that Biafra is dead, is like saying that the history of Nigeria as a nation-state, is dead. To negate the existence of Biafra in the history of Nigeria, past and present, is like negating the existence of Nigeria itself as a nation-state. Such individuals forget also that Nigeria is what it is today, a ‘failed State’, simply because its gatekeepers since the end of the war to the present-day, have failed to confront themselves, realistically, with the truth about Biafra question, that is, the true history of the War. This is why the suppressed Biafra question and history have continued to wag Nigeria in the same way the tail wags the dog. Accept or reject it, the suppressed Biafra history and question is what is playing out in the ongoing saga between Nnamdi Kanu, leader of the Indigenous People of Biafra, IPOB and Buhari administration. The Biafra question, though suppressed in Nigerian history, is alive and active today than ever. It has continued to wag Nigeria beyond expectation, putting into question and doubt the features of Nigeria’s continued existence as a nation-state. Nigeria is in a mess today, as a nation-state, simply because of its continued denials and lies against the people of Biafra, especially, the Igbos. Again, do not forget that the incident at the Eight Senate of Nigeria’s National Assembly, which happened between Senators Ben Bruce and Marafa, occurred around the year, 2018. In other words, it took place after the September 2017 Python Dance II Military killings and invasion of Igboland and assassination attempt on Nnamdi Kanu’s life at his Afara-Ukwu, Umuahia ancestral home by the Nigerian military. An incident that necessitated the disappearance of Nnamdi Kanu to save his life, which was followed later, by his reappearance in Israel after the military attack of his home in Afara-Ukwu. This implies that the exchange of words on “Biafra” on the Nigerian Senate between the two Senators happened at the height of Nnamdi Kanu’s IPOB agitation and clamour for self-determination and independence of Biafra, through the legal means of a referendum. It happened when Nnamdi Kanu had already resumed his IPOB Radio Biafra Broadcasts from London, following his escape from the assassination attempt on his life by the Nigerian security operatives at Umuahia in September 2017. The Senate altercations on Biafra between Senators Ben Bruce and Marafa took place exactly, that point in time. It occurred at the time when thousands of young men and women of pro-Biafra agitators of IPOB and other pro-Biafra campaigners in Eastern Nigeria were being haunted, arrested, many killed by the Nigerian security operatives, and many others left to languish at various prisons in Nigeria, because of their activism for Biafra freedom and independence. Could we say that members of the Nigerian Senate at the time were ignorant of these realities or that they just chose not to care? Do they want to tell us that all those activisms of Nnamdi Kanu and his IPOB members and others are not enough signs to convince them that Biafra is alive and well today than ever? To date, military and police brutality, impunity and recklessness have continued to be the lot of Nnamdi Kanu’s IPOB members and most of the other pro-Biafra campaigners, mostly Igbo youths, in Eastern Nigeria. This is independent of whether any of these youths support Nnamdi Kanu’s IPOB or no. In the eyes of the present administration of President Buhari, IPOB is synonymous with the Igbo nation. Therefore, every Igbo, especially, youths, stand guilty of being harassed, humiliated, dehumanized, jailed and even killed, because of Biafra agitation, under the watch of the present government in power. In other words, Senator Marafa made his statement about Biafra being ‘dead’, at the Nigerian Senate in 2018, at the height of the federal government of President Muhammed Buhari’s Python Dance I, II, and III Military invasions and killings of Nnamdi Kanu’s IPOB members and other pro-Biafra campaigners in the Southeast and parts of South-South zones of Eastern Nigeria. Hundreds of pro-Biafra members had been killed, many wounded and jailed by the Nigerian security operatives in the Southeast and parts of South-South, at the time Senator Marafa was saying at the Senator Floor in Abuja, that ‘Biafra was dead.’ Could we say that the Distinguished Senator was oblivious of all these facts? Is he telling us that the sacrifices of those young pro-Biafra agitators, clamouring for the restoration of the Sovereign State of the Republic of Biafra, will all be in vain? Anyway, history will tell! Biafra is Alive and Well What Senator Marafa and people who think like he forgets is that, even if Biafra ‘was dead’ as claimed, ‘What of the spirit of dead Biafra?’ Is the ‘Spirit of Biafra’ dead as well? Because we all know that ‘spirit’ never dies. So, is the ‘spirit’ of the determination of a people, an ethnic nation, agitating for their survival in an unjust society or nation-state like Nigeria. Because, as long as the injustices that had awakened such spirit in them have continued to exist in the society, the agitation for survival and self-determination of such a persecuted people will never die. This is why people say, ‘no amount of army would stop the ‘idea’ (spirit of people), whose time has come.’ No amour waged against the will of a people will ever succeed. This is why in the Nigerian context people say, ‘Biafra is a spirit’ or rather, ‘Biafra is an idea.’ The ‘ghost of Biafra’ is what Nigeria does not want to confront itself with, or address in truth and justice, to free itself as a nation-state from many years of living in denial and lies. Make no mistake about it: ‘The will of the people, the Biafran spirit,’ is what is propelling the ongoing agitation for the restoration of the Sovereign State of Biafra by Nnamdi Kanu and his IPOB pro-Biafra youth movement and other pro-Biafra campaigners. That is why every relatively conscious Igbo Biafran, is behind Nnamdi Kanu and his struggle for Biafra self-determination and independence from Nigeria. This is independent of whether that person identifies overtly or covertly with his IPOB, or even approves or disapproves of his methodology and rhetoric. If you doubt, let the referendum for self-determination of the Biafran people be conducted today, and the truth will be revealed. This also shows why the Buhari regime must not continue to delude itself, thinking that through intimidation, military and police killings of Igbo youths in the Southeast and continued detention and humiliation of Nnamdi Kanu by the DSS, the time will come when the Biafran people will give up. Be subdued, demoralized, or allow his Fulani people to take over Igboland (or Biafraland) for the evil agenda of Islamization and Fulanization of Nigeria. This will never happen. Indeed, it is a waste of time for the present administration to continue to believe that such a thing as subduing the Igbo nation to take over their ancestral land, Islamize and Fulanize them is possible in this 21st century. The fact is that the people themselves are prepared to die fighting to defend their land and people than surrender their lives and ancestral land to the invading army of the enemy or killer-herdsmen terrorism. The mistake many people still make today, especially, the present regime of President Buhari is to continue to invoke the antics of the Nigeria-Biafra War (1967-1970) as a paradigm for today’s challenges facing Nigeria. People who think in this way forget that we are in 2021 and not in 1967. Today people have known better. Unlike yesteryears, Nigerians now know that the Igbo is not the problem with Nigeria. Everyone now knows where and who are the problem with Nigeria. Certainly, not the Igbos, like many, ignorantly believed during the Nigeria-Biafra War. Moreover, the Nigeria-Biafra War of the ’60s, so to say, was a miniature ‘world war’, whereby all the other ethnic groups in Nigeria and the two Cold-War Super-powers, Britain and USSR (Russia) and their Islamic world Arab ally, represented by Egypt, united as one force to fight the Biafran Igbos for three good years (1967-1970). In spite of the superiority of their armies and weapons, however, Biafrans were able to hold them all to stand still throughout the three years the war lasted. Today, nobody should delude him/herself by thinking that if such a scenario plays out again, God forbid, that those who engineered that war against the Igbo Biafrans in the ’60s will get the same support as they did then from other ethnic groups in the country or even from most of the Western and world centres of power. Times have changed, and today people know better. Furthermore, assuming that Senator Marafa was referring mainly to the Biafran war with Nigeria in the ’60s, said to have ended in 1970, can we really say that ‘Biafra is dead?’ Especially, in the light of the present situation of things in Nigeria, can we really say, “Biafra is dead? Because, if Biafra is dead and buried, as Senator Marafa and his likes would want us to believe, ‘when did Biafra die, who killed Biafra, and who buried it?’ ‘Where was it buried?’ Not even Yakubu Gowon used such words as that of Senator Marafa at the end of the war in 1970 in reference to the fate of Biafra and the Igbo people. Rather, what Gowon said was that there was ‘No victor no vanquished’, in that war between Nigeria and Biafra (1967-1970). In other words, Biafra never died at the end of the war, neither did Biafra surrender. Rather what has happened as Prof Herbert Ekwe Ekwe, succinctly explained, “Is the occupation of Igboland since then by Nigerian Police, Military and Bureaucratic machinery.” In this regard, also, Prof Ekwe Ekwe adds, that, “Some people make the mistake of saying Igbos returned to Nigeria after the Civil War in 1970. The fact is that since 1966 pogroms against the Igbos in the North, and the Igbos returned to their land, the Igbos had since not returned to Nigeria.” Again, all of those who are saying that ‘Biafra is dead and buried, do not want to enter into the real story of Biafra, how and why did Ojukwu decide to declare the Biafra Republic and Independence in May 1967, after the 1966 Igbo pogroms in Northern Nigeria. Have those things that led to the Nigeria-Biafra War in the ’60s been addressed by the gatekeepers of the Nigerian State? You know the answer better. Therefore, those individuals who say ‘Biafra is dead’ do not want to confront themselves with the real issue behind the Biafra question and the reasons for the present agitation for Biafra self-determination and independence! Furthermore, some people want the Igbos to forget the ‘unatoned atrocities’ committed against them as a people by the Nigerian State during the war and thereafter. That is, to forget, how the federal government of Nigeria had, used the Civil War draconian slogan, ‘To keep Nigeria one is a task that must be done, to kill an estimated 3.5 million Biafrans, mostly Igbos. To date, nobody has atoned for the blood of these innocent 3.5 million Biafrans, mostly Igbos killed during the Nigeria-Biafra War (1967-1970) by the Nigerian State. Yet, some want the Igbos to forget it and let the ‘bye gone be bygone’, while the atrocities against them as a people by the State have not stopped, fifty years after the war? Quo Vadis? Some want the Igbos to forget such man’s inhumanity to man. That is, that the Nigerian State-sponsored ethnic-cleansings against them as a people and that such a time be swept under the carpet. People who think this way forget that without atoning for, and appeasing the spirits of the dead, especially, the innocent victims of state-sponsored violence, those spirits of the dead will continue to haunt that country and its citizens forever. This is what is happening in the country all this while. Today, Nigeria is a failed state in the eyes of the world, and some pretend not to know that the country’s negligence of the Biafra Question is the primary cause of it all. Nigeria is yet to heal itself from the war atrocities it committed against the Igbos during the Nigeria-Biafra War (1967-1970). Is this not one of the reasons the country is today soaked in bloodletting across the land, and the government in power is singled out as the primary sponsor and enabler of such terrorism against its own citizens. Moreover, to date, the extra-judicial killings of Igbos at any least provocation has not stopped in Nigeria. It is still going on. Such man’s inhumanity to fellow man cannot just be swept under carpet or expect the victims to accept it as their fate, in the name of ‘One Nigeria’ that has never been. In fact, it appears that the state-sponsored killings of the Igbos have become an unwritten State policy of successive federal governments since the end of the war to the present day. Such that the present administration of President Buhari, as his last ‘civil war’ threat to the Igbo nation, tells us, decided to take it to the ‘second-level, whereby the daily harassment and killing of Igbo youths by security forces at any least provocation means nothing again to most Nigerians. It is for all these, that ‘Biafra is alive and well’ today more than ever. Nnamdi Kanu Phenomenon Here enters the Nnamdi Kanu phenomenon, and why the Federal Government of President Buhari failed to produce him in Court on July 26, 2021, to continue with his trial after abducting and forcefully bringing him back to Nigeria in collaboration with the Kenyan government, on June 17, 2021. In fact, recent events in Nigeria, especially, since President Buhari’s threat to visit the Igbo nation with another ‘genocidal civil war’, which according to him, is the only ‘language they (Igbo people) can understand’, has revealed many things about the fate of the Igbo nation in this contraption, called Nigeria. The President’s statement was part of his outburst response and verbal attacks against the pro-Biafra youth movement of Nnamdi Kanu, the IPOB, clamouring for a referendum for restoration of the defunct Biafra Republic. The question is, “Under the watch of President Muhammed Buhari, with his long history of anti-Igbo resentment, does anybody think that the leader of pro-Biafra youth movement agitating for freedom and social justice for his people, Nnamdi Kanu, will ever receive fair trial and justice in Nigeria?” That is, without serious pressure from both local and international communities on the Nigerian hangman? Very disturbing is the inhuman and crooked way the Nigerian government, in collaboration with their Kenya counterpart, used in bring Kanu back to Nigeria on June 17, 2021. Nigerian government committed the international crime of what legal experts call, extraordinary rendition (kidnapping of a person by the State). Nigerian authorities abducted and tortured Nnamdi Kanu for about 8 days in Kenya, in collaboration with their Kenyan counterpart. And in that state of ‘coma’ and ‘lifeless’, they brought Kanu back to Nigeria in handcuffs, in the most dehumanizing manner never seen in recent history, bypassing all the known international laws and human decency in extradition or repatriation of a political activist, who is running for his dear life from the country of destination (Nigeria). Mind you, Nnamdi Kanu is a political activist fighting for freedom and self-rule for his persecuted people in Biafraland. He is protected by the International Laws and that of the British, which citizen he is since has renounced his Nigerian citizenship many years ago. He was holding his British Passport when he was abducted in Kenya by the Kenyan security operatives at the behest of the Nigerian government. Many people are worried about the state of health and safety of the already tortured and maltreated Kanu in the dungeon of the DSS, known for its long history of brutal torturing of its inmates. This is because, as we said before, the federal government had failed to produce Nnamdi Kanu in court for his trial on July 26, 2021. Kanu was nowhere to be seen in court that day. Moreover, the DSS, Nigeria’s Secret Police that is keeping Kanu in their custody, have continued to refuse to grant access to Kanu’s lawyers, personal medical doctors and family members to see him. This has made some wonder if the Buhari regime has not done something untoward to Kanu in their DSS custody. God forbid! Of course, the government itself knows what will be the consequence if they ever contemplate carrying out such extreme evil acts. Be it as it may, the question on the lips of many people today, is this, “Does anybody think that Nnamdi Kanu in his present travails at the hands of President Buhari’s regime, will ever receive a fair trial, or have his wounded humanity and dignity restored in the Nigeria of today? Time will tell. Because human lives are involved here, and the destiny of an ethnic group, the Igbo nation is what is at stake, we cannot continue to pretend as if such crookedness and barbaric behaviour of the government in power in Nigeria towards an ethnic group and the person of Nnamdi Kanu, in particular, do not matter. In fact, from all look of things, President Buhari and his ruling Oligarchy are not joking. If care is not taking, something worse than what we are witnessing presently may be unleashed not just on Kanu, but on the Igbo nation by the regime. Because they see Ndigbo as a major stumbling block in their quest for the Islamization and Fulanization of Nigeria. This is why we need to begin now to call a spade a spade before it is too late. The time for ‘political correctness’ in addressing this matter, is gone. Let all people of good conscience begin doing something urgent to avert the dangers ahead. As Martin Luther Jr. said, “All that is necessary for the triumph of evil is for good men and women to do nothing.” We need to do everything humanly possible now, to save the life of Nnamdi Kanu and that of his Igbo and Biafran people from the noose of the hangman. A Stitch in Time Saves Nine! By Fr. Francis Anekwe Oborji, a Roman Catholic Priest and a Professor Ordinarius of contextual theology at the Pontifical Urbaniana University, Rome. Disclaimer: The opinion expressed in this article is solely the responsibility of the writer and does not necessarily reflect the views of the publisher. The image is taken from the internet and assumed to be in the public domain. If this breaches the copyrighted material, kindly note that the break of the copyright is not intentional and non-commercial. The copyrighted material in question will be removed upon request and presentation of proof in that case, please contact me via the following email: [email protected]; [email protected]
s3://commoncrawl/crawl-data/CC-MAIN-2021-43/segments/1634323587854.13/warc/CC-MAIN-20211026072759-20211026102759-00308.warc.gz
CC-MAIN-2021-43
23,927
52
https://www.cloudnativecommunity.com/threat-detection-with-azure-defender-for-kubernetes/
code
Threat detection with Azure Defender for Kubernetes Azure Defender for Kubernetes and Azure Defender for Web Apps are available solutions within the Azure Security Center. Today we will focus on Kubernetes. First, we will explain how you can reach a complete on-premises and multicloud threat protection on your Kubernetes cluster. Then we dive a bit deeper and demonstrate how you can connect Azure Defender and Azure Security Center to enable detection mode and auto alerts. Threat detection even on-premises and on other clouds Azure defender for Kubernetes is an add-on on Azure Security Center. It provides cluster-level threat protection for your Kubernetes cluster managed by Azure (AKS). Moreover, you can extend this protection for even on-premises or other clouds by using the Azure Arc extension for Kubernetes. Azure defender for Kubernetes is one of the three other container-based add-ons that Azure Security Center provides. Azure Defender for Kubernetes, Azure Defender for Servers, Azure Defender for Registries and Azure Policy add-on for Kubernetes combined, covers most of your security and compliancy requirements. Each of these solutions are agentless (except for Azure Policy for Kubernetes) and generate alerts when suspicious activities are found. You can use these alerts to quickly remediate current security issues and to improve the security of your containerized ecosystem. Against which threats does the Azure Defender for Kubernetes add-on defend? - Exploitation for Privilege Escalation - Adversaries may exploit software vulnerabilities in an attempt to elevate privileges. Exploitation of a software vulnerability occurs when an adversary takes advantage of a programming error in a program, service, or within the operating system software or kernel itself to execute adversary-controlled code. - Container with a sensitive volume mount detected - Privileged container detected - New high privilege’s role detected - Indicator Removal on Host - Adversaries may delete or alter generated artifacts on a host system, including logs or captured files such as quarantined malware. - Kubernetes events deleted - Exploitation of Public-Facing Application - Adversaries may attempt to take advantage of a weakness in an Internet-facing computer or program using software, data, or commands to cause unintended or unanticipated behavior. The weakness in the system can be a bug, a glitch, or a design vulnerability. - Kubernetes penetration testing tool detected - Digital currency mining container detected - K8S API requests from proxy IP address detected - Implantation of Container Image - Adversaries may implant cloud or container images with malicious code to establish persistence after gaining access to an environment. Depending on how the infrastructure is provisioned, this could provide persistent access if the infrastructure provisioning tool is instructed to always use the latest image. - Container with a sensitive volume mount detected - CoreDNS modification in Kubernetes detected Additional protection with Azure Defender for servers and container registries How to set up detection mode and auto alerts in Azure Defender for Kubernetes? After you have enabled the Azure Defender plans on your subscription, Security Center starts to analyze and combine logs from multiple sources: - Kubernetes API audit logs from the master nodes abstracted by Azure, which is used by Azure Defender for Kubernetes - Log analytics security event logs from the nodes running Kubernetes, which is used by Azure Defender for Servers - Kubernetes workload configuration scraped by the Azure Policy for Kubernetes add-on (in the backend it is based on OPA gatekeeper) to detect misconfiguration of objects in your Kubernetes cluster, which is used by Azure Defender for Kubernetes Now, that Azure Defender is enabled, you can verify the connection between the logs sources and Security Center. First, log in to the Kubernetes cluster of your subscription. Then execute the following CLI command which should trigger an example security alert: kubectl get pods -–namespace=asc-alerttest-662jfi039n Create workflows that auto remediates alerts Now we only touched the detection mode of Azure Security Center which is creating security alerts. However, it is also possible to create workflows that auto remediates alerts. This can be done with the combination of 2 Azure resources – Azure Logic Apps en Azure Functions Apps. You need to configure the Azure Logic App to have an Azure Security Center alert set as trigger. That pulls the right data out of the alert – which cluster, namespace and pod the alert is for. Then it sends the data as arguments to the Azure Function. That can log in on the right cluster and execute the necessary commands to remediate the alert. For instance, killing the pod that is detected as a miner image. If you need support with that, do not hesitate to reach out to us – cloud native solutions and Kubernetes are our dada. We earned a Microsoft Advanced Specialization in Kubernetes on Azure. But besides the theory, we have quite some happy customers and years of field experience earned through those real-life projects.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943562.70/warc/CC-MAIN-20230320211022-20230321001022-00733.warc.gz
CC-MAIN-2023-14
5,193
35
https://communityforums.atmeta.com/t5/Get-Help/Will-plugging-a-USB-2-0-lead-into-a-PCI-USB-3-0-card-make-all/td-p/566182
code
Will plugging a USB 2.0 lead into a PCI USB 3.0 card make all the ports USB 2.0 instead of USB 3.0? I think I heard this happens if you have a USB hub, but I'm not sure if it happens on a Pci usb card? cheers! Huh? Well if I am understanding right - let me break it down: Yes, USB will be as fast as the slowest part of the chain. Meaning USB3 -> USB2 Hub -> USB3 device will be running at USB2.0 speeds. On the other hand, if you are got a USB3.0 card - it'll have support for USB3.0 for each of it's ports: USB3.0 -> USB2.0 device 1 and USB3.0 device 2 - will be both running at USB 3.0 speeds - except the USB 2.0 device. If it is a PCI hub that connects to a USB header on the motherboard - then that might be a different story - but still follows suit about the slowest connection with in the chain still being that controls speeds.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764500758.20/warc/CC-MAIN-20230208092053-20230208122053-00147.warc.gz
CC-MAIN-2023-06
837
5
https://community.spiceworks.com/topic/388235-exchange-2007-admin-auditing
code
I have a question, how would one audit domain, exchange admins for particular event, since these groups are bypassed by default and do not get logged. The idea is, to have same auditing level for everyone in organization to track access to other mailboxes. Is it complicated to remove bypass from these groups or will it mess other things up? Any alternate solutions? Thank you very much Take a look @ this link and see if it helps point you in the right direction I read that article and like 50 others but none i can find that would address my issue. I can remove the bypass that's not a problem, i am just concerned and want to know if that will effect anything else, and if there is best practices for this?
s3://commoncrawl/crawl-data/CC-MAIN-2018-47/segments/1542039749562.99/warc/CC-MAIN-20181121173523-20181121195523-00092.warc.gz
CC-MAIN-2018-47
711
6
http://stackoverflow.com/questions/539116/context-processor-using-werkzeug-and-jinja2/539427
code
My application is running on App Engine and is implemented using Werkzeug and Jinja2. I'd like to have something functionally equivalent of Django's own context processor: a callable that takes a request and adds something to the template context. I already have a "context processors" that add something to the template context, but how do I get this request part working? I implemented context processors as a callables that just return a dictionary that later is used to update context. For example, I'd like to add something that is contained in
s3://commoncrawl/crawl-data/CC-MAIN-2014-49/segments/1416400378724.10/warc/CC-MAIN-20141119123258-00007-ip-10-235-23-156.ec2.internal.warc.gz
CC-MAIN-2014-49
549
2
http://onlineprogramminghomework19494.fireblogz.com/2104569/examine-this-report-on-programming-project-help
code
Whenever a bug is observed, checks are established ahead of the bug is tackled (a bug will not be an error in logic, it is a examination that was not penned) A NASA unbiased test team can produce the check treatments, determined by formal demands and reasonable boundaries, ahead of the software package has actually been published and integrated While using the components. In XP, this idea is taken to the acute degree by composing automated tests (Probably inside of computer software modules) which validate the operation of even small sections of software program coding, as an alternative to only screening the larger features. Excessive programming also introduces many standard values, concepts and methods along with the agile programming framework. Our simplified algorithm seems to get the right system for new buyers or returning types! Putting an buy is swift. Deciding on a professional to rent is straightforward! Welcome to your AllHomewokHelp, a company that offers a complete Answer on your programming demands. We're happy you have chosen the correct homework help services platform to your homework. We're centered out in Australia, but offer you guidance to all The scholars around the world. Our company is pocket-pleasant, and our customer help is prolific. You will be anticipating further more specifics of the costs, solutions and attributes of the solution we offer, but it's good to achieve some Perception in regards to the Programming homework help to start with. Students get goosebumps as soon as they consider producing a application. Cause is easy, Programming is difficult with no training and many of the students don't trouble to spend time creating a code. Programming assignments are time-consuming, tough and appealing at the same time. Programming commences with The essential of producing a Pseudo Code. After you realize that what you must employ, then it is not hard to handle your programming homework. Ideas within the tutors working with AllHomeworkHelp can make it easier so that you can submit evaluation before the deadline. Deciding upon Programming homework help assistance is really a intelligent decision in case your deadline is brief or you happen to be willing to understand. On top of that, you understand how programming performs and what's it about. As you browse and grasp the answer provided by our specialists, you will be able to cope with your programming homework all by yourself. Programming homework help addresses C, C++, Java, PHP, HTML and plenty of more Help with C Programming: AllHomeworkHelp is popular for managing hard C assignments. Programming in C is taken into account challenging as it is not really created and functional as the new frameworks, but it's made use of greatly inside the Electronics marketplace. It is actually effective, as well as code penned in C functions more rapidly than any other language. Not enough libraries and features ensure it is challenging for the developers to make significant organization stage purposes. Regardless of the shortcomings, C is among the recognised and commonly applied programming language, and we're content to help you with all your C homework. C++ homework Help: An additional identify that may be utilised as a synonym to C++ is Object Oriented Programming Language of OOPS. As being the identify indicates, it treats every thing as an object. If we need to generate a application for calculating the mileage of an automobile, C++ will take care of Car being an object and associated attributes since the variables. It really is easier to put in writing code in the shape of objects. The first gain may be the code understandability. Everybody can relate This system to the useful difficulty in the world. or email us at [email protected] You can find in touch for virtually any with programming assignments or projects in any programming language. Our products and services are created by holding college students in mind; Consequently web you can also rating exceptional grades devoid of stressing about your assignments on programming at quite possibly the most inexpensive price selection. Because it is pretty much difficult for all The scholars to beat these challenges, they look for programming assignment producing guidance He took this chance to propose and carry out some modifications in their methods based upon his perform along with his Repeated collaborator, Ward Cunningham. Beck describes the early conception of your approaches:[seven] Undoubtedly, examinations or exams are pretty much generally demanding and discouraging. Though little stress and stress and anxiety could possibly get you going, an excessive amount of it may make you indignant, exhausted and irritated. XP also uses ever more generic terms for procedures. Some argue that these adjustments invalidate prior criticisms; others claim this is just watering the process down. We consider to satisfy each and every person who seeks help from us. This can be the purpose that scholar who has linked to us in the beginning however stay with us. We hardly ever compromised on our top quality, hence men and women discover our services to get very beneficial and primary. Our provider We below at Geeks Programming are in essence taking up The work of helping all these pupils out and providing them with finest programming assignment help they might get. Our extremely experienced and proficient group users can provide you help with your C++ programming assignment and C++ programming homework. The topics which we have dealt with and are extremely effectively Geared up to deal with are on C++ Assignment. The specific listing is talked about under:
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512750.15/warc/CC-MAIN-20181020121719-20181020143219-00433.warc.gz
CC-MAIN-2018-43
5,669
14
https://blogs.oracle.com/glagasse/tags/2008.05
code
By glagasse on Apr 25, 2008 Currently the simplified installer we're using for OpenSolaris 2008.05 (aka Project Indiana) doesn't support specifying zfs options for the zpool that gets created on the target disk during installation. You can always turn options on after installation but compression is one option that isn't applied retroactively and so really benefits either new zfs filesystems created after installation or being turned on when the initial zfs pool is created. Enabling compression for the zfs pool that gets created during installation isn't all that difficult. Here's how you do it. Step 1: Boot the OpenSolaris 2008.05 live media Step 2: Once booted and sitting at the Gnome desktop, open a terminal window by right-clicking on the desktop and click on the open terminal selection Step 3: Create a new file with the following content (vi set_options.sh) until [ "`zpool list rpool`" ]; pfexec zfs set compression=on rpool # For some reason, the rpool/ROOT dataset (which is the root filesystem # doesn't inherit the compression property from the parent # pool like the other datasets. So, we'll just set it manually pfexec zfs set compression=on rpool/ROOT Save the file and make it executable (chmod +x set_options.sh) Step 4: Now run the script (./set_options.sh) Step 5: Double click on the Install icon on the desktop and proceed as normal That's all there is to it. Once you start the installation (after you answer the few questions required) the installer will setup a zfs pool on your target disk. When that happens the script will set the compression property on that pool and the script will exit. Thus your entire installation (at least a very high percentage of it) will be compressed where it can. Laptop users or users that will only have a single disk may also want to change the copies property of the zpool so that in the case of disk errors zfs will have more than one place to look for the data in order to attempt a recovery. Just add the following to the end of the script above. This will store two copies of data instead of just one. pfexec zfs set copies=2 rpool pfexec zfs set copies=2 rpool/ROOT
s3://commoncrawl/crawl-data/CC-MAIN-2016-30/segments/1469257825365.1/warc/CC-MAIN-20160723071025-00014-ip-10-185-27-174.ec2.internal.warc.gz
CC-MAIN-2016-30
2,142
18
https://cris.biu.ac.il/en/publications/blossoming-and-growing-in-the-transition-to-parenthood-4/activities/?type=%2Fdk%2Fatira%2Fpure%2Factivity%2Factivitytypes%2Fattendance%2Forganising
code
Activities per year - 1 Organizing a conference, workshop, ... Pathways and barriers to the transition to parenthood – Existential concerns regarding fertility, pregnancy, and early parenthood. Orit Taubman Ben-Ari (Participant)12 Mar 2018 → 14 Mar 2018 Activity: Participating in or organizing an event › Organizing a conference, workshop, ...
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511369.62/warc/CC-MAIN-20231004120203-20231004150203-00779.warc.gz
CC-MAIN-2023-40
350
5
http://forums.androidcentral.com/t-samsung-infuse/107728-database-storage-nearly-full-jacking-my-phone.html
code
- 145 Posts Database storage is nearly full! Jacking my phone... I really need some help here please. I checked my SD card and phone storage in the settings and this is wat it reads: External SD Card Total Space 29.72GB Available space 8.45GB SD card is mounted Total Space 12.83 available space 10.18 Internal Phone Storage Available space 1.18GB I have memory space available why am I getting this message? The message I get i this: Database storage is nearly full Delete some user created data from Contacts, Message, Calendar, or Call log and try again I've delete a bunch of text Messages and it says same error. Any help please. Last edited by artofdesign; 07-30-2011 at 08:10 PM. - 08-05-2011, 03:24 PM #2 - 145 Posts Re: Database storage is nearly full! Jacking my phone... When the warning came up I could click on it or the notice in the drop down bar, and it tool me to an app list. The top one had something to do with contacts and was like 118mb. When I verified my contacts were backed up, I proceeded to click that app and erase the data in it. It did wipe all my contacts but a simple re-sync and they were back and problem was gone. Not sure what causes this issue yet, but that was my fix...hope it helps.
s3://commoncrawl/crawl-data/CC-MAIN-2014-15/segments/1397609526102.3/warc/CC-MAIN-20140416005206-00430-ip-10-147-4-33.ec2.internal.warc.gz
CC-MAIN-2014-15
1,223
24
https://hubpages.com/business/How_to_become_a_computer_programmer_
code
How to become a computer programmer Computer programming is the profession that is growing faster in terms of number of jobs in the last few years. According to recent studies, computer programming as a profession will be one of the fastest growing occupations. So, if you like computers and would like to have a successful career, computer programming is a great choice for your future. The opportunities available for computer programmers became even more prominent after the popping of the Internet bubble in the year 2000. The companies that remained after that event are much stronger, and the jobs are here to stay. The computer industry has a scarcity of workers, because many people still believe that it is hard to find a job in the IT area. Job titles for computer programming jobs vary widely, depending on the organization, and the type of programming job you will perform. Computer programmer is nowadays a name that is not well considered, since it is used for simpler types of computational programming work. Better job titles also mean that they command better jobs perspectives and remuneration. The most prestigious job titles in this profession are usually called software engineer, computer engineer, systems analyst, and software architect. Such jobs offer excellent perspective for growth, and are available at large companies and smaller companies that target software development. Becoming a well paid computer programmer requires a good education. However, it doesn't need to be expensive education: most professional schools and colleges offer programs to form new computers experts. Although the number of opportunities is big, there is also a huge shortage of specialized people in this area. Every years companies have to hire several computer experts, specially in new areas such web programming, embedded systems, application software, etc. To get the best opportunities, you need to have at least a bachelors degree in programs such as - computer science, - computer engineering, - information systems,
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141171126.6/warc/CC-MAIN-20201124053841-20201124083841-00424.warc.gz
CC-MAIN-2020-50
2,034
11
https://blueridgeblues.org/bluehost-modify-httpd-conf/
code
Bluehost Modify Httpd.conf Locating a high-grade economical web hosting provider isn’t easy. Every web site will certainly have various needs from a host. And also, you have to contrast all the functions of a holding company, all while searching for the most effective bargain feasible. This can be a great deal to sort with, specifically if this is your first time acquiring hosting, or constructing a website. The majority of hosts will certainly offer very affordable introductory rates, only to raise those rates 2 or 3 times higher once your initial contact is up. Some hosts will offer complimentary bonus offers when you register, such as a totally free domain, or a complimentary SSL certification. While some hosts will be able to offer far better performance as well as high degrees of security. Bluehost Modify Httpd.conf Below we dive deep right into the most effective inexpensive host plans out there. You’ll learn what core holding features are necessary in a host and how to assess your own organizing requirements so that you can pick from among the most effective affordable holding suppliers below. Disclosure: When you purchase a host plan via links on this page, we make some payment. This aids us to keep this site running. There are no added prices to you in all by utilizing our links. The listed here is of the very best affordable webhosting plans that I have actually directly utilized and also checked. What We Think about To Be Inexpensive Webhosting When we define a webhosting bundle as being “Affordable” or “Budget plan” what we imply is hosting that falls into the price bracket in between $0.80 to $4 each month. Whilst investigating low-cost hosting suppliers for this overview, we looked at over 100 various hosts that fell into that cost variety. We after that examined the top quality of their least expensive organizing package, value for cash as well as client service. In this short article, I’ll be reviewing this first-rate internet site holding company as well as stick in as much appropriate details as feasible. I’ll look at the features, the rates alternatives, and anything else I can think about that I believe may be of benefit, if you’re choosing to register to Bluhost and obtain your sites up and running. So without additional ado, allow’s check it out. Bluehost is among the most significant web hosting firms in the world, obtaining both enormous marketing support from the business itself as well as associate online marketers who advertise it. It actually is an enormous company, that has actually been around for a long time, has a huge online reputation, and also is certainly among the top choices when it concerns host (certainly within the top 3, at the very least in my book). Yet what is it specifically, and also should you get its services? Today, I will certainly address all there is you need to understand, offered that you are a blogger or a business owner who is seeking a webhosting, and doesn’t know where to start, since it’s a terrific option for that target market generally. Let’s think of, you intend to organize your websites and also make them visible. Okay? You already have your domain name (which is your website destination or LINK) today you intend to “turn the lights on”. Bluehost Modify Httpd.conf You require some hosting… To achieve every one of this, and to make your internet site visible, you require what is called a “server”. A server is a black box, or gadget, that saves all your website data (data such as pictures, texts, video clips, web links, plugins, as well as various other details). Now, this server, needs to be on constantly and also it has to be linked to the internet 100% of the moment (I’ll be stating something called “downtime” later). Furthermore, it also requires (without getting also elegant as well as into details) a file transfer protocol generally called FTP, so it can show web internet browsers your internet site in its designated form. All these things are either costly, or call for a high level of technical skill (or both), to produce and preserve. And you can totally go out there and also learn these points by yourself as well as set them up … yet what about as opposed to you getting and also preserving one … why not simply “renting hosting” instead? This is where Bluehost can be found in. You lease their servers (called Shared Hosting) and also you introduce an internet site utilizing those servers. Given that Bluehost keeps all your documents, the firm likewise permits you to set up your material administration systems (CMS, for short) such as WordPress for you. WordPress is an incredibly preferred CMS … so it simply makes good sense to have that option offered (practically every hosting business now has this alternative also). Basically, you no more require to set-up a server and after that integrate a software program where you can construct your content, individually. It is already rolled right into one bundle. Well … visualize if your server is in your residence. If anything were to occur to it at all, all your files are gone. If something fails with its inner processes, you need a technician to fix it. If something overheats, or breaks down or gets corrupted … that’s no good! Bluehost takes all these problems away, and also looks after everything technological: Pay your server “rental fee”, and also they will certainly care for every little thing. And also when you buy the service, you can after that begin concentrating on adding material to your internet site, or you can put your effort into your advertising and marketing projects. What Provider Do You Receive From Bluehost? Bluehost supplies a myriad of different services, yet the primary one is hosting certainly. The organizing itself, is of different types by the way. You can lease a shared server, have a specialized server, or likewise an online personal web server. For the purpose of this Bluehost testimonial, we will certainly focus on hosting services and also other solutions, that a blog writer or an on-line entrepreneur would require, as opposed to go unfathomable right into the rabbit hole and speak about the other services, that are targeted at even more knowledgeable individuals. - WordPress, WordPress PRO, and shopping— these organizing solutions are the bundles that allow you to hold a website utilizing WordPress and WooCommerce (the latter of which allows you to do shopping). After purchasing any one of these packages, you can begin constructing your website with WordPress as your CMS. - Domain name Marketplace— you can also acquire your domain from Bluehost rather than various other domain registrars. Doing so will make it less complicated to aim your domain name to your host’s name web servers, considering that you’re utilizing the same market. - Email— once you have acquired your domain, it makes good sense to likewise obtain an e-mail address tied to it. As a blog owner or online entrepreneur, you must practically never ever utilize a cost-free e-mail solution, like Yahoo! or Gmail. An e-mail such as this makes you look amateur. Luckily, Bluehost offers you one free of charge with your domain name. Bluehost additionally providesdevoted web servers. And you may be asking …” What is a specialized web server anyhow?”. Well, the important things is, the standard web hosting packages of Bluehost can just so much web traffic for your website, after which you’ll require to upgrade your holding. The reason being is that the common web servers, are shared. What this implies is that server can be servicing 2 or even more web sites, at the same time, among which can be your own. What does this mean for you? It means that the solitary server’s sources are shared, and also it is doing several tasks at any type of offered time. When your web site starts to hit 100,000 site brows through each month, you are going to require a committed web server which you can additionally obtain from Bluehost for a minimum of $79.99 monthly. This is not something yous needs to fret about when you’re beginning but you need to maintain it in mind for sure. Bluehost Prices: Just How Much Does It Expense? In this Bluehost evaluation, I’ll be focusing my focus primarily on the Bluehost WordPress Hosting packages, considering that it’s the most popular one, as well as very likely the one that you’re trying to find and that will certainly match you the most effective (unless you’re a substantial brand name, firm or site). The three available strategies, are as complies with: - Fundamental Strategy– $2.95 each month/ $7.99 routine price - Plus Strategy– $5.45 each month/ $10.99 normal rate - Choice Plus Strategy– $5.45 monthly/ $14.99 normal cost The first cost you see is the cost you pay upon sign up, and the second cost is what the cost is, after the initial year of being with the company. So basically, Bluehost is mosting likely to charge you on an annual basis. And also you can additionally select the amount of years you intend to hold your website on them with. Bluehost Modify Httpd.conf If you select the Fundamental strategy, you will certainly pay $2.95 x 12 = $35.40 beginning today and also by the time you enter your 13th month, you will certainly now pay $7.99 monthly, which is also billed annually. If that makes any type of feeling. If you are serious about your web site, you ought to 100% obtain the three-year choice. This means that for the standard plan, you will certainly pay $2.95 x 36 months = $106.2. By the time you hit your fourth year, that is the only time you will pay $7.99 monthly. If you think of it, this strategy will save you $120 in the course of 3 years. It’s very little, yet it’s still something. If you intend to obtain greater than one internet site (which I extremely advise, as well as if you’re severe, you’ll probably be obtaining more at some time in time) you’ll intend to use the option plus strategy. It’ll enable you to host unlimited internet sites. What Does Each Plan Offer? So, in the case of WordPress hosting strategies (which resemble the shared holding plans, however are extra geared towards WordPress, which is what we’ll be focusing on) the attributes are as follows: For the Standard plan, you get: - One site only - Protected web site via SSL certificate - Optimum of 50GB of storage - Cost-free domain name for a year - $ 200 marketing credit rating Keep in mind that the domains are bought independently from the holding. You can obtain a cost-free domain name with Bluehost right here. For both the Bluehost Plus hosting as well as Choice Plus, you obtain the following: - Limitless number of sites - Free SSL Certification. Bluehost Modify Httpd.conf - No storage space or transmission capacity limit - Totally free domain name for one year - $ 200 advertising credit rating - 1 Office 365 Mail box that is free for 1 month The Choice Plus strategy has an included benefit of Code Guard Basic Back-up, a back-up system where your data is saved as well as replicated. If any accident happens as well as your web site data disappears, you can recover it to its original type with this function. Notice that even though both strategies cost the exact same, the Option Strategy after that defaults to $14.99 per month, routine price, after the collection quantity of years you’ve picked. What Are The Conveniences Of Using Bluehost So, why choose Bluehost over other web hosting services? There are thousands of webhosting, many of which are resellers, however Bluehost is one select couple of that have actually stood the test of time, and also it’s probably the most well known available (and also completely factors). Below are the three major advantages of picking Bluehost as your webhosting company: - Server uptime— your internet site will not be visible if your host is down; Bluehost has more than 99% uptime. This is incredibly crucial when it concerns Google Search Engine Optimization as well as positions. The higher the better. - Bluehost speed— just how your server feedback establishes how rapid your internet site shows on a browser; Bluehost is lighting quick, which indicates you will certainly lower your bounce price. Albeit not the best when it involves packing speed it’s still hugely vital to have a quick rate, to make individual experience better and also far better your ranking. - Unlimited storage— if you obtain the And also plan, you need not worry about how many data you store such as video clips– your storage ability is unrestricted. This is actually essential, due to the fact that you’ll possibly run into some storage concerns later down the tracks, and you don’t want this to be an inconvenience … ever. Finally, client support is 24/7, which means regardless of where you remain in the globe, you can get in touch with the support group to fix your website problems. Pretty standard nowadays, but we’re taking this for provided … it’s likewise extremely essential. Bluehost Modify Httpd.conf Likewise, if you’ve obtained a cost-free domain name with them, after that there will be a $15.99 charge that will certainly be subtracted from the amount you originally bought (I picture this is because it kind of takes the “domain name out of the marketplace”, not sure about this, yet there possibly is a hard-cost for registering it). Last but not least, any demands after thirty day for a reimbursement … are void (although in all honesty … they should possibly be strict below). So as you see, this isn’t always a “no doubt asked” policy, like with a few of the other holding alternatives out there, so make certain you’re all right with the policies prior to proceeding with the holding.
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243991557.62/warc/CC-MAIN-20210517023244-20210517053244-00273.warc.gz
CC-MAIN-2021-21
13,814
82
https://www.vorpx.com/forums/topic/can-i-disable-the-monitor-unsupported-message-without-ctrlaltshift/
code
NReal Air user using VorpX to add some dimensionality to flat games. Got it to work. Very cool stuff. However I have a problem. Given the NReal Air only works when identified as a generic 3d monitor I get the unsupported message on every new game launch and have to do a fancy CRTL+Alt+Shift to dismiss the warning which I can’t do from my Bluetooth keyboard when lying flat on my back in bed. Requires me get up out of bed and use the full size keyboard So my question, is there a way to disable the warning entirely and/or add NReal as a supported profile. It works and it is glorious! You can disable some messages/notifications via the Vorpx config tool however, I’m not sure if you can disable that particular message. Having said that I have run into similar issues as I use a wireless keyboard/pad instead of a keyboard which as you can imagine is missing quite a few keys. I overcome this by binding keys to other keys that I do have. So perhaps you could either use Windows or a 3rd party app and bind “CRTL+Alt+Shift” to a single button on your bluetooth keyboard ? The message is supposed to fade away after a two or three minutes if you don’t close it manually. Not entirely sure if that works currently though. I’ll check that before the next beta 23.1.0 beta release in a few days. Ralf, can we please have an option to disable this? It’s pretty jarring because it only shows up in one eye (using the nreal airs) For me it takes 5-10 minutes to disappear and pressing CTRL + ALT + SHIFT does nothing.up EDIT: I updated to the beta version and now the keyboard shortcut works :)
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707948235171.95/warc/CC-MAIN-20240305124045-20240305154045-00484.warc.gz
CC-MAIN-2024-10
1,605
9
http://optifine-download.com/
code
OptiFine adds support for HD textures and a lot of options for better performance. OptiFine is Completely FREE! It allows Minecraft to run faster and look better with full support for HD textures and many configuration options. “This mod optimizes your minecraft game world and increases the FPS. And of course, the gameplay will become much better and more interesting." Download OptiFine Now OptiFine HD is a performance related plugin that can provide a large FPS boost and dramatically reduce lag. OptiFine also contains many advanced configuration options available from the video settings menu to further tweak performance. Configurable Smooth Lighting From 1% - smooth lighting without shadows to 100% - smooth lighting with full shadows. Connects textures for glass, glass panes, sandstone and bookshelf blocks which are next to each other. Removes the gridlike pattern created by repeating blocks of the same type. Uses rotated and flipped variants of the base block texture.
s3://commoncrawl/crawl-data/CC-MAIN-2014-41/segments/1412037663417.12/warc/CC-MAIN-20140930004103-00469-ip-10-234-18-248.ec2.internal.warc.gz
CC-MAIN-2014-41
986
10
https://ie.nitk.ac.in/virtual-expo/code/navigation_using_RL
code
Navigation using Reinforcement Learning The aim is to train a maze solving agent in a 3D Unity engine environment. To do this we first have to make a 3D maze in Unity as the environment in which the agent will learn to navigate. The goal is to have the agent learn how to efficiently navigate to the location of a target object that is randomly spawned in this maze. The agent has to be designed with an action space that would allow it to freely navigate the entire maze. We also have to keep in mind that the observation the agent takes from the environment is sufficient for it to learn this behavior. Reinforcement learning being the core of the project we have to use a relevant RL algorithm to learn the required behavior. We use Unity’s inbuilt Proximal Policy Optimization (PPO) which is well suited to this task. ● Unity ML-Agents Toolkit (https://github.com/Unity-Technologies/ml-agents) ● Python environment with ml-agents dependencies installed (Tensorflow environment) The first step is to build the environment in Unity which fulfills the criterion mentioned in the problem statement. We built a simple maze with a base and walls that act as obstacles for the agent preventing it from reaching the target easily. We also have to decide the agent and its functionality. We used a cube with a simple action space being the four cardinal directions (Up, Down, Left and Right movement) with which it can navigate the maze as the agent. A stationary cylindrical object was used as a target. The next step was deciding the observations that the agent collected from the surroundings. These observations serve as the input to the PPO algorithm by which the model learns. Initially we used the vector coordinates of both the agent and the target as observations. It is clear to see why this would fail as the trained model has no means to identify obstacles (walls) in its path to the target. To overcome this, we needed to use additional observations and we choose to use Raycast Observations provided by unity. Raycast allows us to project rays of defined maximum length in different directions from the agent. It allows the agent to perceive the surroundings by telling it if the rays hit an obstacle and if so at what distance. With Raycast added on for making observations it was enough information for the PPO algorithm to learn a model that reliably navigates to the target. To train the model we had to come up with a relevant reward scheme that would encourage the agent to learn the right behavior. This is the scheme we decided to use. The agent starts each episode with a fixed positive reward. We then give it small penalties at regular time intervals to encourage it to solve the maze as soon as possible. We give the agent larger penalties if it sticks to a wall. This penalty continues for as long as the agent is in contact with the wall. With the agent observation and reward function as described above we could move on to train the model with Unity’s inbuilt Proximal Policy Optimization (PPO) algorithm. Also we have applied the DQN algorithm to the flappy bird environment to understand the working of the algorithm and its implementation. We succeeded in training a model that can reliably take the agent to the target. Though rarely the agent looks like it is unsure of what action to take, given enough time it will almost always reach the randomly spawned target. We were able to successfully apply the DQN algorithm to the flappy bird environment game. This project was done mainly for learning purposes. The concepts we learn as part of this project are understanding reinforcement learning algorithms and its implementation using tensorflow framework to the environment we created using Unity Platform. Also we have applied the reinforcement learning algorithms to the flappy bird environment. We were able to successfully achieve our project learning outcome. ● Chaitany Pandiya ([email protected]) ● Karn Tiwari ([email protected]) ● K Rahul Reddy ([email protected]) ● Rajath Aralikatti ([email protected])
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337404.30/warc/CC-MAIN-20221003070342-20221003100342-00161.warc.gz
CC-MAIN-2022-40
4,086
24
https://csc.barnard.edu/news/research-fellow-adam-poliak-publishes-two-new-papers-alongside-several-barnard-affiliates
code
The 2021 Conference on Empirical Methods in Natural Language Processing (EMNLP) announced that it has accepted two papers co-authored by Adam Poliak, Roman Family Teaching and Research Fellow, alongside Barnard students and collaborators. The first paper, titled “Characterizing Test Anxiety on Social Media,” was co-authored by Esha Julka ’24 and Olivia Kowalishin ’20 with co-supervisor Jalisha Jenifer, an adjunct assistant professor and postdoctoral research fellow. The paper analyzes discussions of test anxiety online. Julka and Kowalishin will present their work at the Widening Natural Language Processing (WiNLP) Workshop on November 11, 2021. The second paper, titled “Discovering Changes in Birthing Narratives During COVID-19,” was co-authored by Noreen Mayat ’24 and Daphna Spira ’24, and co-supervised by Caitlin Dreisbach, a postdoctoral research scientist at The Data Science Institute. The authors identified changes in online narratives describing birthing experiences during the COVID-19 pandemic. Mayat and Spira will also be presenting their work during the WiNLP Workshop this month. The fifth WiNLP Workshop will be held in conjunction with EMNLP 2021 in Punta Cana, Dominican Republic, in a hybrid (both in-person and virtual) format. The WiNLP acronym stands for Widening NLP, which is meant to establish the workshop as a more welcoming event to members of any underrepresented group. This year’s iteration of the workshop will “seek to highlight women and LGBTQ+ researchers and bring diversity in scientific background, discipline, training, obtained degrees, and seniority.”
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224645417.33/warc/CC-MAIN-20230530063958-20230530093958-00142.warc.gz
CC-MAIN-2023-23
1,626
3
https://yout.com/faq/
code
To cancel subscription please click here Since the way our software works we have no idea how large the recording is going to be of the public stream. So when the first byte is sent the total size of the recording is empty, so the browser does not know what size to expect and shows 0% even though its receiving the recording. This does not mean that it is not recording, in fact it is, be patient. Since we simulate a browser at your request to start the recording and pipe all the content to you we have no way of checking if it was successful or not until the process is complete at which point it is too late to let you know something went wrong, we are working on a neat way to fix this, but in the meantime to mitigate this, simply retry the recording. There are some issues when recording some videos, generally it is that the video isn't available publicly, we have a search feature that you can use to search for another publicly available video with the same title, this generally works. No, you can record any video for free. But, the Pro users have more features, like better quality, clipping, playlist recording, search recording, gif maker, etc. You can put your email or username into the Lost Password Page to reset it. To delete your account please click here
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107879537.28/warc/CC-MAIN-20201022111909-20201022141909-00480.warc.gz
CC-MAIN-2020-45
1,277
7
http://wiki.untangle.com/index.php/Nucli
code
The new Untangle command line interface. What is the command to open the cli? Just type nucli when in the Untangle console. What can the command line configuration tool do? Here's the help output from nucli. > #X - switch effective server to server 'X' -- #3 > %X - display output of background job 'X' -- %1 > attack - send command to Attack Blocker -- enter 'attack help' for details. > backup - backup Untangle server settings -- backup [to_disk|to_usb|to_file <filename>] > cleanup - cleanup client resources, e.g., release stored job outputs, etc. > close - close connection to server #X or host-name -- close #1 > exit - terminate immediately > firewall - send command to Firewall -- enter 'firewall help' for details. > help - display help information > history - display command history, up to 50 events > ips - send command to Intrusion Prevention System -- enter 'ips help' for details. > jobs - list all background jobs currently running. > loadrules - load rules into filter node from given file -- loadrules webfilter filename > open - open connection to server -- open (host-name|ip):port [-l user] > phish - send command to Phish Blocker -- enter 'phish help' for details. > pong - test responsiveness of NUCLI server > protofilter - send command to Protocol Filter -- enter 'protofilter help' for details. > quiet - quiet all but alert level messages > quit - terminate after user confirmation > restore - restore Untangle server settings from local file -- restore <filename.backup>] > router - send command to Router -- enter 'firewall help' for details. > rsh - run command on remote server host -- rsh who > ruby - send Ruby code to sever for execution -- ruby statement | file > save - save output stored with job %X to filename -- save %3 myoutput.txt > servers - list servers currently under management during this session. > sh - run command on local host -- sh ls /dev > source - source (i.e., run) the given script (use '.' as shortcut) -- source filename or . filename > spamblocker - send command to Spam Blocker -- enter 'spamblocker help' for details. > spyware - send command to Spyware Blocker -- enter 'spyware help' for details. > uvm - send command to UVM -- enter 'uvm help' for details. > verbose - set level of messages/chatter from client -- verbose [integer>=0] > virus - send command to Virus Blocker -- enter 'virus help' for details. > webfilter - send command to Web Filter -- enter 'webfilter help' for details. > with - send multiple commands to servers, '##' or 'all' for all servers, '-i' for interactive, '-e' for echo -- with host-name #2 #4 -i -e > !! - execute last/most recent command > !number - execute historical command 'number' -- !5 > !prefix - execute most recent historical command beginning with 'prefix' -- !webfil > Append '&' to any command to run it as a "background" job -- rsh who & > %N - display output associated with command run as background job 'N' -- %1 > When entering a command, press [Tab] for command/word auto-completion.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368707186142/warc/CC-MAIN-20130516122626-00051-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
3,001
45
https://www.vintageunderground.co.uk/a-b-o-u-t
code
You can Visit us in store at : 1 The Ginnel, Harrogate HG1 2RB Hyde Park Corner, Leeds LS6 We also attend a busy schedule of fairs and events across the UK. Here are a couple of useful links for you to find out whats on near you. And don't forget to watch this space for more details!
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488512243.88/warc/CC-MAIN-20210622063335-20210622093335-00322.warc.gz
CC-MAIN-2021-25
284
8
https://support.getdropstream.com/hc/en-us/articles/360016216153-DEAR-Systems-Enable-API-Access
code
The Application Programming Interface (API) allows for automated communication between connected systems. In order to automate fulfillment, API Access must be enabled. If you have not yet gathered your API credentials, follow these steps first: Enter API credentials in DropStream - In your DropStream Dashboard, click Stores. - Click the name of your DEAR Systems store. - In Connection Details, enter your API credentials: - Account ID - Application Key - Optional — Edit the following settings: - Default Box ID - Warehouse location - Import orders for the specified warehouse only - Import Status - Status for order import, one of: - Ordered (default) - Update on Hand — Enable this option to support Inventory Updates. - Click Save changes. Next: Review order status
s3://commoncrawl/crawl-data/CC-MAIN-2021-31/segments/1627046153854.42/warc/CC-MAIN-20210729074313-20210729104313-00355.warc.gz
CC-MAIN-2021-31
775
16
https://animegamematome.tokyo/top-anime-gacha-games-of-2020/
code
TOP ANIME GACHA GAMES OF 2020! Watch us stream games on Twitch: Check out our huge selection of F2P MMORPGs: Today we’re going to talk about the best Anime Gacha games currently available on mobile devices. iOS, Android, even games that’re playable via emulators. There are a lotta mobile games out there – and I’ve thus far played through over 200 different titles for this channel and as such feel as though I’ve definitely played through 10 that I deem worthy of including in a list like this. Now, I know some of you might disagree with one of more of these titles, but remember, this is purely subjective. So if you have your own games you’d like to point out, please go ahead and include them in a comment below! I’d love to know why you think the game deserves to be in a list like this and would love to potentially include it in a list next time! So with that in mind, let’s jump right in. Anime Gacha games in this list: Lord of Heroes Honkai Impact 3rd SUBSCRIBE TO OUR NEW MMOBYTE MOBILE CHANNEL ヽ(´▽`)/: Join ExitLag and play your favorite games without lag! Support us by buying our official MMOBYTE MERCH: FOLLOW US ON SOCIAL MEDIA: FOLLOW STIX ヽ(´▽`)/: FOLLOW MRSSTIX ヽ(´▽`)/: The Elder Scrolls Online in 2020: Blade & Soul in 2020: RIFT in 2020: TERA in 2020: Guild Wars 2 in 2020: Dragon Nest in 2020: The Best Free To Play MMORPGs To Play In 2020 We all love MMORPGs. We either grew up with them, or we’re new to them – either way, we’ve grown to love them. Without MMORPGs I would never have met Mrs Stix. It’s moments like this in MMOs that shape our lives and truly allow us to appreciate the genre, which, granted, has shifted and changed significantly over time. There are 3 types of MMORPGs currently available. Free to Play MMORPGs, which is what you’ll find below, Pay to Play MMORPGs and Buy to Play MMORPGs. Each have their own distinct quality of games, and each provide vastly different experiences to their players. Here you’ll find what is arguably one of the largest, most complete selections of Free to Play MMORPGs – each with their own corresponding reviews, images, news and fully dedicated gameplay, as while this is an MMORPG News website, more than that, we’re gamers that actually enjoy the games we cover.
s3://commoncrawl/crawl-data/CC-MAIN-2022-05/segments/1642320300010.26/warc/CC-MAIN-20220116180715-20220116210715-00511.warc.gz
CC-MAIN-2022-05
2,295
26
https://crunchbang.org/forums/viewtopic.php?id=21311
code
You are not logged in. #For Intel CPU's check with# cat /proc/cpuinfo | grep vmx #For AMD check# cat /proc/cpuinfo | grep svm #if the above commands give you some output you have VT support# Last edited by tradetaxfree (2013-11-07 06:35:28) Atom topic feed Powered by FluxBB Copyright © 2012 CrunchBang Linux. Proudly powered by Debian. Hosted by Linode. Debian is a registered trademark of Software in the Public Interest, Inc.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084890514.66/warc/CC-MAIN-20180121100252-20180121120252-00374.warc.gz
CC-MAIN-2018-05
429
12
https://products.groupdocs.cloud/assembly/family/
code
Generate documents using Cloud SDKs for Python, .NET, Java, PHP, Node.js, Swift, Ruby. Robust Reporting API for Python. Automate document generation by adding text, tables, charts into your reports using Python. Automate report generation on .NET platform using C#, F#, VB.NET. This REST API provides the ability to generate any document structure programmatically. Powerful web-based report generator for Java. Use a wide range of features for programmatically creating documents, including LINQ-based template syntax. Use REST API to generate highly customizable reports in C++. Powerful data visualization options are available to you, including graphs and tables. Dynamically generate reports with beautiful data visualization in Node.js code using templates and data sources. Easily turn your data files into amazing reports with PHP. Fast and efficient creation of Word, PDF documents from templates. Generate effective reports from your Ruby applications. During the report generation process, data from external sources is automatically inserted into your documents. Automate Word, PDF document creation in Swift code. This product will help you quickly send your customers print-ready documents according to your source data. Easily call REST API methods using the 'cURL' command line utility. Our Web Reporting Service is fast and secure.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511220.71/warc/CC-MAIN-20231003192425-20231003222425-00594.warc.gz
CC-MAIN-2023-40
1,348
10
https://techylab.com/1690/user-scripts-clean-url-facebook-google-twitter/
code
Have you ever faced that awkward moment in browsing when you tried to copy a URL from your Google search result and it results in extremely long and weird URL? Have you ever faced slow redirection from Twitter’s “t.co” URL or are you one of the victims who gets modified URL by Facebook? You are in luck as we had promised earlier to cover some useful user scripts. As mentioned in our earlier post, using large number of addons or extensions makes your web browser laggy. Hence below we are sharing a couple of extremely useful user scripts using which you can have original and clean URLs from Google, Facebook and Twitter. To get started with any of the following scripts, you will need to install appropriate user script browser extension or addon. You can follow the procedure of installing addon or extension with installing user scripts thereafter. The below User Scripts will work the same on Google Chrome, Firefox and Opera. UserScript to get clean URL from Google You can install the following user script for getting original URL from Google search results. After installing the above User Script you can get original URL from Google search results. UserScript to get clean URL from Twitter You can install the below User Script for getting original URL from Twitter. After installing the above user script you can get original URL from Twitter. UserScript to get clean URL from Facebook You can install the following User Script for getting original URL from Facebook. After installing the above User Script you can get original URL from Facebook.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662515466.5/warc/CC-MAIN-20220516235937-20220517025937-00545.warc.gz
CC-MAIN-2022-21
1,566
12
https://www.my.freelancer.com/job-search/access-update-database/
code
...scheduled to run automatically or manually triggered. This task is basically to perform the following activities. • I will give you access to cpanel • Create 2 database – one for staging and another for live. In each database, I need the following o Create 8 tables ♣ 7 tables get from API structure ♣ 1 table get from excel • Import data ... Update liondesk CRM with contacts imported from Act!. I have other data sets, but let's start with this one for this job. Read the "importing contacts" instructions attached first. It will require reducing teh act database to 1000 contacts per file. IT would be best to set up a test import file first, then the first 1000 contacts. The ACT ID status ... All Management interface must include features for add, edit/update, delete, view(popup or new page), search, filter, no. of items per page option and sorting feature Programming Language- PHP Infrastructure - Amazon AWS(No need to worry about setup and configurations on AWS) Database: MySQL preferred File Storage: Amazon S3 Server: apache2(php) ...on how to connect and update the Bp Premier Database (where applicable). You will need to connect to the database via an authorised SQL account, these details are provided on request and will depend on the type of integration and the level of access the integration requires. There is no restful API, rather a direct database connection using SQL authenticat... ...executes commands on the OSCommerce database and is a bit of a mess. The current API has individual methods to: Update item stock level, price, item active and weight Update item stock level and whether to disable the item Update item stock level Update item active Update item stock level, price and item active Update item stock level and... ...a directory of "Life Coaches" connected to a database and searchable/sortable by criteria such as name, location, specialties, certification, experience, rating, etc. 2) Each "coach" requires a landing page for their coach’s profile, including various data, biographies, photos and videos. (need database developed as part of this project) 3) Each 'Co... ...PrimeNg collection of UI. Expectations are to use RBAC (for access control) including menu. Key screens include a few simple masters such as customer, supplier, purchase order, type master, asset master, create and update bulk assets based on purchase order and invoicing to customer. Database scripts and any help with MySQL can be provided. Need help ...system This is a multi-tenant system - single application with multiple frontends accessed via different subdomains and custom header, footer. Can be single database for whole system or database per group. Group can have one or more clients. Group is where the user logs in. Client cannot login. Login Username with password Forgotten Password Reset Hello I have a problem with editing some Woocommerce products: when I update data via the administration panel, after clicking the "Update" button, the Apache server hangs (after 60sec when it gets timeout from Nginx proxy). All the changes we made with product title and content (from the wp_posts table) are being saved ok, changes to data such as VBA for Corel Draw Project that will access data from records in a table of a MySQL or similar database on a server, and from the data perform a variety of tasks including: Set measurement units, page height and width Import and position graphics files (including .cdr) from server Scale and place images inside powerclips Find and replace approx 12 Hi developers, I am look...to develop me a tool connected with MS Access DB. User needs to upload an excel file to the access database, replace a field with corresponding Arabic value from the access table, and need to download the excel file. Need just two screens A screen to upload and download excel file A master screen to update the base table. ...login who can see all details of all profiles. Registered users are added in database, they are not displayed on site until they make payment Paid users can access phone numbers of cross gender profiles only by clicking Get Contact information link. i.e Bride can not access contact details of another bride Paid users can express interest in cross gender ...Duration: 1 to 2 Hours Budget: $80 Access Provided: SSH & SFTP - Linux VPS - You must have good linux SSH experience Project Overview: PHP Image Downloading, Re-naming & Optimisation Script to be run as a CRON Job 1) Download images to server - image url listing in database table 2) Re-name each image 3) Update the database table with the new names 4) Run ...to 3 Hours Budget: $30 to $40 Access Provided: SSH & SFTP - Linux VPS - You must have good linux SSH experience Project Overview: PHP Image Downloading, Re-naming & Optimisation Script to be run as a CRON Job 1) Download images to server - image url listing in database table 2) Re-name each image 3) Update the database table with the new names 4) Run ...stored on Microsoft one drive as the data source for tableau dashboard. We would like to connect our tableau to an access online database instead of the excel. The excel set up was just to test the viability of the system. The access will need to have data tables, forms, reports. The reports will need to be printed and should look similar to our current Car booking project website We need...project website We need 1 expert in Codeigneiter and HTML/CSS + SQL Tasks: Refactoring of codes implemented, access the DB and implement Tax rules, Notification triggers 1- Redesign HTML pages 2- Generate Static page to Dynamic 3- Update Database total number of pages 5 Price $200 Time: 1 month to complete A database based application, which allows master user access, as well as a limited access log in. Must be simply and easy to follow, assumed user will have basic exposure of apps, backed up by scroll bar options to search. User will be able to search through 20000 plus products by manufacturer, code or description, divided into various categories ...map/images database App lookup - We'd like to make an Android app for tablet to look-up and display data and images for van/bus pickup spots. These are currently in an Access database, and also in Mysql. The 1st attached pic shows the data points we need. The 2nd pic shows a sample text search form, and a dropdown search we use in an Access database. ... Looking for a way to access my own files from anywhere am trying to map a network drive to a remote server. The server is not on the same network as the computer I am trying to map the drive on. I have the external IP address, the port number, and the drive letter on the server. I have entered http://external IP Address:Port Number/drive letter. The project is a mobile application for Android and iOS, to integrate with a hospital database through an API which the app developer will build. the app has 4 main stakeholders (Hospital, Patient, Doctors). Each stakeholder of the app will have key functions, it's explained as follows: #Hospital 1. Save & Track patients treatment plans and personal
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221210559.6/warc/CC-MAIN-20180816074040-20180816094040-00592.warc.gz
CC-MAIN-2018-34
7,083
20
https://community.netapp.com/t5/Active-IQ-Unified-Manager-Discussions/How-to-make-OCUM-and-ONTAP-GUI-Https-secure/m-p/136375
code
I am in need of help. Whenever we try to access OCUM and Cluster GUI we always get prompted that the site is not HTTPS secured. What is the way to make it HTTPS secure? I tried logging into the cluster and issued the "sec certi create" command with option -typ server and common name as the cluster name, to generate a self signed cert but still it persists for the ONTAP Gui. Ocum also displays the same. Any guidance would be much appreciated. Talking about OCUM, are you talking about the attached screenshot? This is under Chrome. You can click the "Advanced" option and add exception for the "self-assigned" certificate from OCUM. There is a similar option for Firefox or IE also. Yes, i am aware of the option but then again it is just a temp workaround to access the site. Still doesnt rectify the unsecure connection though. I want to make the connection secure, as in https secured. Hello - as Ruijuan points out the message you're getting is from the self-signed certificates leveraged by SystemManager and OCUM. That said, you can install a certificate issued by a trusted CA on both your cluster (thereby addressing the SystemManager warning) as well as install a certificate onto the OCUM server. For our purposes, we chose not to pursue that approach but instead put our infrastructure behind a web load-balancer with internally trusted certificate installed. HTTPS warnings about self-signed certs get stripped before the client sees them and we also consolidate our storage management behind our data center firewall. If you'd like to pursue the cert installation let me know as I took some notes when we first started down that path (i.e. installing trusted CA certs everywhere). That said, the warning is mostly just an annoyance - it doesn't indicate anything other than your browser trying to protect you from a potentially unsecure web site. Since there's no chance someone is trying to spoof your SystemManager/OCUM web sites internally by leveraging a self-signed certificate, it's not really a big deal (unless your internal security scanning tools are lighting you up for it).
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510326.82/warc/CC-MAIN-20230927203115-20230927233115-00710.warc.gz
CC-MAIN-2023-40
2,101
7
https://www.npmjs.com/package/dashmaster
code
Page with top menu and a container where they can add Cards can contain anything: Weather, Metrics, Shortcut, ... Need to define Cards structure and on what they can interact. Cards will be modulable and from extensions placed into Modules to use - BootStrap: Manage columns and line - VueJS: Manage inside of - Jquery: Manage - Material Design for
s3://commoncrawl/crawl-data/CC-MAIN-2018-34/segments/1534221217970.87/warc/CC-MAIN-20180821053629-20180821073629-00012.warc.gz
CC-MAIN-2018-34
348
10
https://sharepoint.stackexchange.com/questions/257627/viewslifetime-is-not-updating-instantly
code
I got a counter to show how many visitors visit the page in my site. Users are visiting the website , but there is no change on the counter. It is the same like no one clicked it. Has it got a timer job? and what is the default frequency? Or how can change the value of counter instantly?
s3://commoncrawl/crawl-data/CC-MAIN-2019-39/segments/1568514573444.87/warc/CC-MAIN-20190919060532-20190919082532-00102.warc.gz
CC-MAIN-2019-39
288
1
http://www.clickindia.com/detail.php?id=143766398
code
Maintain and support Oracle CC&B Customer care and billing system. Plan, install, configure and maintain multiple AIX WebsphereCC...&Benviroments. Install ,configure ,tune, backup & recovery of CC&B application. Ability to solve problems creatively IT Software - System ProgrammingB.Tech/B.E. - Any Specialization, ComputersMCA - ComputersSenior ManagementProgram Manager Candidate having professional certification in Java 8 * Pro-efficiency in embeeded system. * Domain knowledge of energy utility would be preferred. * SQL experience in production grade applications forOrcale DB.
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549424247.30/warc/CC-MAIN-20170723042657-20170723062657-00168.warc.gz
CC-MAIN-2017-30
583
1
https://docs.blesta.com/display/user/cWatch
code
|Table of Contents| cWatch Website Security is a protection tool for your website, web servers and web applications against the increasing sophistication of hacker threats. Learn more about cWatch on their website at https://cwatch.comodo.com/. This module supports the following management features within the client area: - View licenses - Assign domains to licenses - Update FTP credentials for malware scans To install the cWatch module, visit [Settings] > [Company] > [Modules] > Available, and click the "Install" button for cWatch. A message will be displayed, indicating that the module was successfully installed. Then click the "Add Server" button. Enter the details for your cWatch server. |Username||Enter your cWatch username. This is the username you would log into the cWatch admin interface with.| |Password||Enter your cWatch password. This is the password you would log into the cWatch admin interface with.| |Enable SandBox||Check this option to use cWatch sandbox environment for all API requests.| After filling out these options, click "Add Account" to add your cWatch credentials. Configurable Options Overview This module supports configurable options which may alter the provisioning of cWatch licenses. Recommended Field Type |BASIC_DETECTION||integer >= 0||Quantity||The number of basic licenses to provision in cWatch.| |PRO||integer >= 0||Quantity||The number of basic licenses to provision in cWatch.| |PRO_FREE||0, 1||Checkbox||Whether provision a 30 day trial pro license in cWatch.| |PRO_FREE_60D||0, 1||Checkbox||Whether provision a 60 day trial pro license in cWatch.| |PREMIUM||integer >= 0||Quantity||The number of basic licenses to provision in cWatch.| |PREMIUM_FREE||0, 1||Checkbox||Whether provision a 30 day trial premium license in cWatch.| |PREMIUM_FREE_60D||0, 1||Checkbox||Whether provision a 60 day trial premium license in cWatch.| Not Required for Single License Package There are two types of packages (seen below). For Single License packages, configurable options will have no effect on license provisioning. Licenses Added Later Will Expire at a Separate Time In Blesta, when a service is provisioned, we do our best to match the term of the cWatch license to that of the Blesta service. It is possible to add additional licenses after the service has been created by updating the configurable options on the service. Licenses added this way will not expire at the same time as license added at the time of service creation. Instead they will expire after their full term in cWatch (e.g. 1 Year). So if a license is added one day before the Blesta service is up for renewal, the client will only pay for one day, but the provider will still pay for the full year term. Creating Configurable Options The following steps describe how to create configurable options. This section describes the following: - Creating a Configurable Option Group - Creating Configurable Options, and assigning them to the Group (repeat this step as necessary to create all Configurable Options required) Creating an Option Group To create a Configurable Option Group, visit [Packages] > Options, and click the "Create Group" button. |Name||Enter a name for this group.| |Description||Enter a description for this group (optional).| |Package Membership||Leave this section blank, we will add the options to the group when creating the options instead. If you have already created the options, you may add them to the group on this step.| After filling out these options, click the "Create Group" button to create the Option Group. Creating a Configurable Option To create a Configurable Option, visit [Packages] > Options, and click the "Create Option" button. |Label||Enter a label, which will appear above or next to this form field.| |Name||Enter a name, which is the form field name. (Important! This should match an Option Name described above. The module requires specific naming.)| |Type||Select the field type from "Checkbox", "Radio", "Drop-down", and "Quantity".| |Options Section||Set pricing information within the Options section. The fields required here may vary depending on the "Type" selected above.| |Group Membership Section||Add this Configurable Option to the previously created Option Group by moving the Group from the right to the left in the multi-select box.| After filling out these options, click the "Create Package Option" button to create the Option. Repeat as necessary to create all of the configurable options you wish to make available to the client during checkout. Packages define the pricing, welcome email, module and more. Packages can be assigned to Package Groups, and added to Order Forms. To create a Package, visit [Packages] > Browse, and click the "Create Package" button. Creating a Package consists of several sections: The Basic section consists of the following options: |Package Name||Enter the name of this Package, it will be visible wherever services are listed and on any order forms.| |Status||"Active" is the default, "Inactive", and "Restricted" are also available.| |Quantity Available||If this Package has a limited quantity available, enter the quantity, or leave it as "Unlimited".| |Description||Enter a Description for this Package. HTML is allowed, and descriptions appear on order forms.| |Configurable Options||A Configurable Option Group may be selected if previously created, but this module does not support configurable options during provisioning.| |Module||Select "cWatch" for the module.| The Module Options section consists of the following options, which are specific to cWatch: |Credential||Select the admin account to use for creating services under this package.| |Package Type||Single License or Multi License. Single license packages will provision exactly one license of the specified type. Multi license packages will provision a variable number of licenses based on the configurable options purchased with the service.| |License Type||For single license packages only. The type of license that will be provisioned when a service is ordered using this package| |Term||Enter the term for the desired pricing option. For example, if you wish to create a 3 month pricing option, enter 3 here.| |Period||Select the period for this pricing option. "Day", "Week", "Month", "Year", and "One time" are options. The client will be invoiced every "term period", for example every 3 months if 3 is entered for term, and Month is selected for period.| |Currency||Select the currency this pricing option is available for.| |Price||Enter the price for this pricing option.| |Setup Fee||If there is a setup fee, enter it here.| |Cancellation Fee||If there is a fee to cancel early, enter it here.| Click the "Add Additional Price" to add more pricing options. Term Changes Don't Affect cWatch If the pricing term on a service is changed in Blesta, the term for any licenses on the service will remain the same in cWatch. They will not be updated to match the Blesta term. The "Tags" section describes tags that may be used in the welcome email. The welcome email content is inserted into the "Service Creation" email template under [Settings] > [Company] > [Emails] > Service Creation. Only details unique to this service should be entered into the welcome email section for the package. This sample email could be used in the Package Welcome Email section to help you get started. Be sure to enter content for your welcome email in both the HTML and Text sections. If this is the first Package you are creating with this module, select the "Create a New Group" option, and enter a Group name. If you are adding a subsequent Package and wish for it to be part of the same group, select "Select from Available Groups", and move the group from the right to the left of the multi-select box. When finished, click "Create Package" to create this package. The only thing left to do is to add this Package Group to an order form so clients may place orders for your cWatch accounts/licenses. See Creating an Order Form for more details.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100308.37/warc/CC-MAIN-20231201215122-20231202005122-00827.warc.gz
CC-MAIN-2023-50
8,030
72
http://forum.beyond3d.com/showthread.php?p=629297&mode=threaded
code
Originally Posted by drpepper Screw that, just hollow out a 747 and you have better storage capacity. Imagine the red tape you'd have to go through if they went that route (Air force 1)! Actually the best idea would be to bribe Bush into allowing MS to borrow a couple of C5 Galaxy cargo planes for a few days. They'll hold more than some tiny 747.
s3://commoncrawl/crawl-data/CC-MAIN-2013-20/segments/1368706477730/warc/CC-MAIN-20130516121437-00093-ip-10-60-113-184.ec2.internal.warc.gz
CC-MAIN-2013-20
348
3
https://deepmind.com/research/open-source/pycolab
code
A highly-customisable gridworld game engine with some batteries included, useful for discovering and testing reinforcement learning agent capabilities on small problems. 20 Nov 2017 Working with our partners at Google Maps, we used advanced machine learning techniques including Graph Neural Networks,... 03 Sep 2020 The scientific community has galvanised in response to the recent...
s3://commoncrawl/crawl-data/CC-MAIN-2020-45/segments/1603107867463.6/warc/CC-MAIN-20201019232613-20201020022613-00689.warc.gz
CC-MAIN-2020-45
385
5
http://vtech.pulkomandy.tk/doku.php?id=development_tools
code
SunPlus released sources for the C compiler. It doesn't include the assembler and is based on GCC 2.95 so quite hard to compile: https://github.com/vsmile-dev/unsp-gcc XASM is the original assembler provided by the µ'nSP IDE naken_asm has support for µ'nSP and provides a standard include file for SPG200 registers. This early homebrew experiment took an interesting approach of not using an assembler at all. MAME has good support for the V.Smile. Unununium is a standalone emulator, but is known to have some bugs.
s3://commoncrawl/crawl-data/CC-MAIN-2023-06/segments/1674764499816.79/warc/CC-MAIN-20230130101912-20230130131912-00404.warc.gz
CC-MAIN-2023-06
518
6
https://boxcryptor.community/d/13673-boxcryptor-local-cannot-sign-in-after-upgrade
code
Just upgrades BoxCryptor to latest version. As soon as I did that, I cannot sign-in into BoxCryptor - I can enter password, but "Sign-in" button stays disabled all the time. What happened? How can I sign in again into my account? I need to access my files ASAP. OS: Windows 8.1 BoxCryptor version: 2.2.411.228
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296945183.40/warc/CC-MAIN-20230323194025-20230323224025-00204.warc.gz
CC-MAIN-2023-14
309
3
https://www.charityengine.com/forum/show-topic/1656
code
I noticed today that the my aging Xeon D-1540 machine with 1G of memory will no longer get new tasks. Rosetta is still getting tasks. So I'm guessing the minimal size of available tasks has increased? Workloads for those projects come from the projects, so they do change from time to time. Having said that, Cosmology has routinely run out of work (a sign they might not need our help as much as others), so we'll shorly be moving hosts attached to there to another public science project. And I think the replacement needs only 512MB, as it turns out. Stay tuned... Any progress with the replacement project yet?? Graham -- World Community Grid has been added for beta testers, can you confirm whether you see it on your system? Yes, I can see the project now, but no tasks have been allocated yet. I'll check again later in the day. Thanks! Still no tasks. One thing I've noticed is that in my "Projects" listing there is no account number shown next to "World Community Grid". Can you check please. Thanks for the report. It looks like the underlying bug is fixed now, so your next sync should resolve the issue. I've sync'd on each of my three active machines, and there's still no "World Community Grid" account number showing, and no tasks for that project. :( If you sync again, I've turned debugging on for your account, which will let me see more information. I can see that your account does have the right information now, so the question is why it isn't propagating to your machine. OK, I sync'd all three of my active machines in the five-minute period beginning Sat 30 Jan 2021 03:22:00 UTC (14:22:00 AEDT). Still no apparent account number and no tasks. That was helpful, thanks! I see that a bit of WCG config is stuck, so on the next sync we'll detect that, disconnect your machine, then automatically reconnect a minute later. Hopefully this time all will be well. Yes, I sync'd again in the 15-minute period beginning Sat 30 Jan 2021 10:05:00 UTC (21:05:00 AEDT) and all three machines grabbed a WCG task. One of them is executing its new task now. But there's still no Account number shown; will my account be credited for the work done? This won't prevent credit from being awarded, but is still something to look into. Let's track this in the WorldCommunityGrid missing account key thread, since the same question has come up there.
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038065492.15/warc/CC-MAIN-20210411204008-20210411234008-00383.warc.gz
CC-MAIN-2021-17
2,355
16
http://it.toolbox.com/wiki/index.php?title=Installation_of_Oracle_database_10g_on_RHEL_5&oldid=35401
code
Installation of Oracle database 10g on RHEL 5 updated Jan 22, 2011 1:35 am | 116,001 views This manual is directed show how to install Oracle database 10g on RedHat Enterprise Linux 5. The article show the process from system administrator point of view ad try to simplicity most of the tasks not related to system administration will in deep explanation of tasks and impacts of them. Be aware RHEL 5 x86 is not supported platform (in this moment) for Oracle 10g so when you ask questions in metalink don't be surprised get no answer. According to the product documentation supported platforms for x96 are RHEL AS/ES 3.4 or later, RHEL 4, SUSE Linux Enterprise Server 9.0SP2 or later and Asianux 1.0 and 2.0. Additionally you can't expect reliability from this system for production environment. From documentation you read Oracle 10g need at least 1 gigabyte of memory, but the absolute minimum is 512 MB. OK, with so little memory you are on the bottom line for required shared memory, but database can start. for testing 768 MB sound's much better. Similar is the situation with swap. Everything will work fine with only 1024 MB of swap. List of packages you will need for install Oracle 10g on RHEL include binutils compat-db compat-libstdc++ control-center gcc gcc-c++ glibc glibc-common gnome-libs libstdc++ libstdc++-devel make pdksh sysstat xscreensaver setarch libXp (to start runInstaller) Let's create users and groups for installation # groupadd dba # groupadd oinstall # useradd -G dba -d /home/oracle -g oinstall oracle # passwd oracle Next create filesystem for oracle files and database. Do not forget to create appropriate changes in /etc/fstab to mount this filesystem on startup. In documentation of product is mentioned to use only RAID10 array(s) and for production is wise to use hardware based arrays, but here we just play and any filesystem and volume will be OK. Transfer files to the machine and extract zip's somewhere. I write files, because i recommend for installation not only Oracle database server, but 10g Release 2 (10.2.0.3) Patch Set 2 ever only for testing and playing. For more info about the the patch set read document 316900.1 and download file p5337014_10203_LINUX.zip from metalink. Now is time to login on the machine as root to set some parameters in linux kernel and operating system - check if FQHN exist in /etc/hosts - check the id of oracle user to ensure oinstall is primary group of user and user is member of group dba - check for existence of user nobody - check and set if need the parameters for semaphors: semmsl - 250 semmns - 32000 semopm - 100 semmni – 128 semmsl – maximum number of semaphores per semaphore identifier. Should be increased carefully because very big number will eat memory not used later - check and set if need the parameters for shared memory shmall 2097152 shmmax Half the size of physical memory (in bytes) or current value if bigger shmmni 4096 Shared memory explanation shmall - maximum number of shared memory pages. If you set it to too low value can slowdown any program usng shared memory - check and set if need the parameters for maximum number of file handlers, supported by system file-max 65536 - check and set if need the parameters for network ip_local_port_range Minimum:1024 Maximum:65000 rmem_default 1048576 rmem_max 1048576 wmem_default 262144 wmem_max 262144 Network setting explanation ip_local_port_range – define full range of local ports in Linux, normally upper limit is 32000 kernel.shmall = 2097152 kernel.shmmax = 2147483648 kernel.shmmni = 4096 kernel.sem = 250 32000 100 128 fs.file-max = 65536 net.ipv4.ip_local_port_range = 1024 65000 net.core.rmem_default = 1048576 net.core.rmem_max = 1048576 net.core.wmem_default = 262144 net.core.wmem_max = 262144 # sysctl -p Next is time to set some environment variables for oracle user. Do not forget to put the in shell profile for oracle user. They should look's like ORACLE_BASE=/home/oracle ORACLE_HOME=$ORACLE_BASE/product/10.2.0 ORACLE_SID=test01 On this point it is very good idea to check the available diskspace in directory where will be installed oracle – you will need 4 GB average for software and database. To start successfully installer it's need to edit /etc/redhat-release and to change release from 5 to 4. Do not forget to return the value back later, otherwise you will be no able to update your server. Next is time to run runInstall. You will need running X server, because interactive installation need graphic display On the first step we choose advanced installation to have better control over the packages and options to be installed on the server. Later if it's need we can install additional packages almost seamless. Our target is Enterprise Server as more powerful and complex. on the next step Oracle Installer check for prerequisites for installation as physical memory, swap, networking, environment variables, etc. If you get warning about the amount of memory you can skip it without any problem. Next we will install only software without create new database. There is program, named dbca – database configuration assistant which one can help to create new database. Then read the summary screen and go back to change some packages you do not need or other parameter. It's out of scope of this document to discuss the idea and purpose of packages you can find in oracle database. Next we press install and wait a lot, because of very long process of installation. On the bottom part of the screen you can see the path to log file for current installation and you can inspect it if you get some errors or just from curiosity. In on of the stages of installation (almost on the end) you should execute 2 scripts as root user. And at the end we have installed Oracle database 10g. If you have patch mentioned above installation process for patch is similar: runInstaller.... Et voila, we are ready to play and test oracle on our RHEL 5 server :-) Related White Papers and Webcasts Oracle 10g vs DB2 9.5 (Groups) Disclaimer: IT Wiki is a service that allows content to be created and edited by anyone in the community. Content posted to this site is not reviewed for correctness and is not supported by Toolbox.com or any of its partners. If you feel a wiki article is inappropriate, you can either correct it by clicking "Edit" above or click here to notify Toolbox.com.
s3://commoncrawl/crawl-data/CC-MAIN-2014-52/segments/1418802771716.117/warc/CC-MAIN-20141217075251-00076-ip-10-231-17-201.ec2.internal.warc.gz
CC-MAIN-2014-52
6,372
28
https://forum.godotengine.org/t/timer-timeout-signal-not-working/47669
code
My first mistake was using GDscript instead of C# to write this game. I am used to C++ mainly since most of my experience is with unreal but the way variable scope works in GDscript is insanely obtuse and unintuitive to someone who is used to just typing “import” or “#inlcude” to be able to access things. I have multiple Timer() functions in my game. All in their own function. All but one of them work as expected but one of them simply WILL NOT trigger the timeout signal which is then supposed to call a function on timeout. I have spent hours using print statements to determine that the Timer is being started and is reaching 0 but for some reason, isn’t sending the signal. Normally this wouldn’t matter since I could just do “if timer.time_left == 0: timeout_function()” but this particular timer is started every time an instance of a certain class is created and I need to keep track of 1 timer per class instance. Also tried using “await” which also didn’t work because the timeout signal isn’t being sent. I’ll provide the timer function here (variable names have been changed.) print("Clock is ticking for " + new_object.object_name) var mytimer = Timer.new() mytimer.one_shot = false mytimer.paused = false I have pretty much given up using the Timer() function for this since it’s not really designed for having multiple instances apparently. My new strategy has been to add a countdown variable to my class and -=1 from it every time _process() runs. Assuming I want the countdown to last 3 seconds, I set the countdown to 180 since my game runs at 60 fps. BUT this also does not work because you can’t make public variables in GDscript. It’s not possible. Everywhere I look tells me to use this autoload thing in project settings which is useless in my case since that will only give me variables of the class itself. Not a class instance. can’t use @export because its “not allowed at this level” . Basically, I want to be able to access a variable in another function from inside the _process() function in the same script attached to the root node. Really have no idea what to do. I’m about to re write the whole project in C# at this point.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817729.0/warc/CC-MAIN-20240421040323-20240421070323-00759.warc.gz
CC-MAIN-2024-18
2,202
15
https://sec-consult.com/blog/detail/oracle-access-managers-identity-crisis/
code
In this blog post we will demonstrate how minor peculiarities of the cryptographic implementation had a real-life impact on the security of the product. By exploiting this vulnerability we were able to fabricate arbitrary authentication tokens, allowing us to impersonate any user and effectively break the main functionality of OAM. The Oracle Access Manager (OAM) is the component of the Oracle Fusion Middleware that handles authentication for all sorts of web applications. In typical scenarios, the web server that provides access to the application is equipped with an authentication component (the Oracle WebGate). When a user requests a protected resource from the web server, it redirects her to an authentication endpoint of the OAM. The OAM then authenticates the user (e.g. with username and password) and redirects her back to the web application. Since all the authentication is handled by a central application, a user only has to authenticate once to access any application protected by the OAM (Single Sign-On). During a research project, we found that a cryptographic format used by the OAM exhibits a serious flaw. By exploiting this vulnerability, we were able to craft a session token. When a WebGate is presented with this token, it would accept it as a legitimate form of authentication and allow us to access protected resources. What’s more, the session cookie crafting process lets us create a session cookie for an arbitrary username, thus allowing us to impersonate any user known to the OAM. WHO WAS AFFECTED? Both currently supported versions, 11g and 12c were affected by this vulnerability – the scenario described here was only verified with version 12c. A simple Google Dork to find OAM installations yields about 11.800 results, some pointing to high-profile organizations (including Oracle itself). Those are only the installations reachable on the Internet. We responsibly disclosed this vulnerability to Oracle immediately after we identified it in November 2017. Oracle was very responsive and provided a fix with the latest Critical Patch Update (CPU) in April 2018. As this patch was provided in Oracle’s regular update schedule, we expect OAM administrators to have applied the patch by now. If this is not the case for your organization, it’s high time to do so now!1 Moreover, it is advisable to analyze historic logs for the distinct pattern that this attack leaves behind: A successful attack causes a large number of decryption failures resulting from bad padding (javax.crypto.BadPaddingException). Our security advisory contains further information regarding affected versions, vendor timeline etc. THE TECHNICAL DETAILS This section will elaborate on the technical details of the vulnerability. If you are not interested in those, you can skip to the bottom of this article where we provide a demo video showing the attack. On a more technical level, the following happens during an authentication: - The user accesses a protected resource. - The Oracle Webgate component inside the web server answers this request with a redirect to the OAM. An encrypted message (“encquery”) is passed in a URL parameter. - The user authenticates against the OAM (e.g. with username and password). - The OAM redirects the user back to the web server. Information about the successful login is passed in the parameter “encreply”. - The web server redirects the user to the resource that was initially requested. An encrypted authentication token is stored in a cookie (“OAMAuthnCookie”). - The authentication token in the cookie is used from now on to authenticate the user. The values in encquery, encreply and the OAMAuthnCookie are (supposed to be) cryptographically protected against modification. This way, when one of these values is received by the OAM or a WebGate, the contents are (supposed to be) assured to be unmodified, even if they come from a user. The OAM uses a single cryptographic format for all these messages. The secret key used for all of these messages is shared between the OAM and the WebGate. The Cryptographic Format As already hinted before, the flaw lies in the implementation of the cryptographic format. The algorithm that creates the protected messages processes inputs of key-value pairs and, using a shared secret, produces a base64-encoded output string. The main objective of this format is to provide integrity and authenticity. This is how the algorithm works: - The input is formatted in this way: salt=<salt> <key>=<value> [...] validate=<base64 hash> where the salt is a randomly generated value and the parameter validate is a hash over fixed parts of the message (MD5). - This string is then encrypted using a block cipher in CBC mode. The very first thing that comes to mind when analyzing this format is, that none of the cryptographic algorithms used (i.e. the hash and the CBC block cipher) are intended to provide the main objective – authenticity. One could assume that, although it might not exactly be by the book, attacks are impossible since the attacker does not know the shared secret. As people with a cryptography background may have noticed, one thing that particularly stands out is the CBC mode. When used incorrectly, it can be broken using a padding oracle attack. A classical padding oracle attack requires an encrypted input and a padding oracle. A padding oracle is a component that discloses whether a provided encrypted string, when it is decrypted has a valid padding. An oracle that discloses this information might not seem useful at first – but it, in fact, allows us to decrypt and encrypt arbitrary messages. Simply put, a padding is required for block ciphers to be able to encrypt messages with arbitrary lengths. Block ciphers can only deal with blocks of a fixed size (e.g.16 bytes). If we want to e.g. encrypt a message that is 25 bytes long, we would encrypt the first 16 bytes and are then left with 9 bytes. As the block cipher cannot deal with a 9 byte input, we need to append 7 padding bytes. The typical approach to this is to add padding bytes where each byte contains the number of padding bytes (as defined in PKCS#7). E.g. in this case 7 bytes, each containing the value 7 are appended. When no padding would be required, a full padding block is appended (16 bytes, each containing the value 16). An explanation of the padding oracle attack is beyond the scope of this post – for now, it is sufficient to understand that we need to find a way to figure out if an encrypted string, when decrypted, has proper padding. To see if a padding oracle attack is possible we need to observe if the system reacts differently to messages that could not be properly de-padded and messages that could be properly de-padded but fail checks afterwards (e.g. if the de-padded text cannot be properly parsed). When we try both test cases against the encquery parameter, the OAM would respond with a “System error” both times – we therefore cannot easily distinguish between the two cases. Whenever anything doesn’t look right to the OAM a “System error” is shown. So in order for us to distinguish a properly padded message from an improperly padded message, one approach is to make all properly padded messages we use in the attack to look completely legitimate. Obviously, when the OAM encounters a valid message, it would not respond with an error message. If the de-padding fails, we still see the error message. Making Padding Oracle Work As it turns out, the OAM ignores any garbage that is appended to the decrypted message if it is separated from the valid message by a space character. We could try to create a valid message that has a space character at the end. We then append the blocks we want to test for padding validity. A decrypted message with a valid padding would e.g. look like this: <valid message> <decryption of tested blocks>07070707070707 OAM would first check the padding (which would succeed) and then parse the valid message. It would ignore the rest of the message. However, a decrypted message with an invalid padding would e.g. look like this: <valid message> <decryption of tested blocks>8BA09FB1ABC543 OAM would check the padding, find that it is invalid and fail with a system error. Space: The Final Frontier So how do we make sure that the valid message is followed by a space character? – with brute force. First, we need to create a valid message with a length that is exactly divisible by the block length. We need to find a way to influence the plaintext so that the resulting ciphertext meets this criteria. As it turns out, the encquery contains the protected URL that the user initially requested. We can capture the encquery values resulting from accessing URLs of different lengths: As soon as the length of the encquery increases by 16 bytes, we know that the length of the encrypted message is divisible by 16 and the last block consists soley of padding bytes: < valid msg>PPPP < valid msg >PPP < valid msg >PP < valid msg >P < valid msg >PPPPPPPPPPPPPPPP This allows us to discard the last block and continue with the encrypted string that contains only the encrypted string and no padding. We then make sure, that the following block contains a space character at the first position. We can create an encrypted message that contains the valid message without padding, a block we choose as well as the last 2 blocks of the original message (to keep the padding valid). We can arbitrarily choose the block in the encrypted message – we, however, cannot purposefully influence the text the block results to after decryption. Though, we can keep trying random encrypted blocks until the plaintext block matches our needs. < valid msg >< brute force >< last 2 blocks of orig. msg > If the decrypted valid message is not followed by a space character, the message is invalid and a "System error" is shown. We will keep constructing messages with random blocks until eventually, it is accepted by OAM. We then know, that the decryption of our chosen block, by mere chance contains a space character in the first byte: < valid msg > <random data >< last 2 blocks of orig. msg > After this step, the attack is simple: We simply use the message we constructed as a prefix to the blocks we want to test for a valid padding. If the padding is incorrect, the de-padding step fails, resulting in an error message. If the padding is correct, the OAM would properly de-pad the message, parse the valid message at the beginning, and respond with no error message. < valid msg > <random block >< last 2 blocks of orig. msg >< some text ><pad valid?> Putting it all together Padding oracle allows us to decrypt any messages. As all the encrypted messages (encquery, encreply, OAMAuthnCookie) are encrypted with the same key, we can decrypt any of these messages. What is less commonly known, is that a padding oracle attack can also be used to encrypt messages. So if we construct a valid authentication cookie and encrypt it with our padding oracle attack, we can pass it off as valid to the web server. In fact, there is nothing that stops us from doing so: Since the validate value in the encrypted strings is a simple hash rather than an HMAC, we can simply calculate it without needing any secrets. SEC Consult developed a proof of concept exploit script but we will not publish it at this time.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510387.77/warc/CC-MAIN-20230928095004-20230928125004-00733.warc.gz
CC-MAIN-2023-40
11,382
57
http://www.os2voice.org/VNL/past_issues/VNL0605H/vnewsf4.htm
code
VOICE Home Page: http://www.os2voice.org |By Keith Merrington © June 2005| A couple of months ago when reading January's Voice newsletter, I saw in the News Section that a new version of OpenOffice, v1.1.4, had been released and was freely available for download to customers of both the Application Pack 1.2 or OpenOffice.org for OS/2. Now I had purchased OpenOffice for OS/2 last year and had been using that version (1.1.1) on and off for a while. It seemed logical therefore to get the latest version. The OO download via Mensys is a hefty 84MiB zip file which does not include the readme and the MD5 Checksum files. The OS/2 version is different from the Windows version in that Java, the OS/2 install routines, Innotek's font engine and Runtime are included in the zip file. This accounts for the difference in download sizes, 84MiB for OS/2 as against 65MiB for Windows. As in the previous version the Quickstart feature, Mobile Device support, Python support plus specific file dialogs have been removed from the OS/2 version of OO. In this version of OO for OS/2 the Java version has changed from 1.4.2_04 to 1.4.2_05 and Innotek's Runtime is now build 20 (was 18 or 16 in 1.1.1) which includes a few maintenance fixes. Note that both Java 1.4.2_05 and the Innotek's Runtime build 20 are the versions supplied with eCS 1.2! Once you have unzipped ooo114en.zip (...en.zip is the English version) into a temporary install directory you can run the installation program (INSTALL.EXE) from the root of this directory. During the preamble to installing OpenOffice, the presence of a number of items required for OS/2 is checked and, if necessary, installed. The prerequisites are: InnoTek Font Engine for OS/2 (650KiB) InnoTek Runtime (2MiB) Optionally InnoTek OS/2 kit for Java (17MiB) This installation is almost identical to the 1.1.1 and as in that case it starts with an OS/2 window which checks if the InnoTek font engine is installed, then on the presence of the Crystal Audio Drivers (which if detected are disabled to prevent problems with the InnoTek Runtime) and then the InnoTek Runtime. (See Fig 1.) Figure 1: Pre-installation Next you are given the opportunity to update your Java Runtime to 1.4.2_05. Now as I indicated earlier, eCS 1.2 includes the latest versions of both Java and InnoTek's Runtime so if you are upgrading on eCS 1.2 you don't have to install the updated Java version. If, however, you had previously installed OpenOffice 1.1.1. in eCS 1.1 or Warp, you most likely have an earlier Java version installed. It's only when I tried to install the latest Java version on eCS 1.1 that I received an error message telling me that this Java update could not be installed! A more recent version of InnoTek's Runtime was required! Strangely only a check on the presence of InnoTek's Runtime is executed. This meant that I had to break off the install and find a way to install the new InnoTek Runtime by hand. It turned out to be relatively simple. You just go to your unzip directory and look in the PACKS subdirectory and then run the file RT112B20.EXE. To avoid problems installing the new Java version you can first check which InnoTek Runtime version you have installed by typing IWQUERY at an OS/2 prompt. If the number returned is less than 1.12, then your Runtime is an older version and you need to install the new version by the method indicated earlier. I would have preferred that the install program detects which InnoTek Runtime is installed, asks if I want to install the new version together with a note that this is necessary if I want to install the new Java version and only asks if I want to install anything that is not already at the latest level. Ah, Utopia. After selecting to install Open Office 1.1.4, the installation continues further with a graphical interface. After the necessary files have been unpacked do I come across the first difference--apart from some minor textual references to 1.1.4. As shown below in Figure 1 you now have a choice on how you install this update. Figure 2: Installation It can either be a clean install [into a new directory] or an upgrade. Out of curiosity I tried both methods. If you choose to do a clean install, your original installation is left intact. Again the installation continues with the well known screens from 1.1.1. What I found annoying was that in both cases I was again asked for my registration details. This should not be necessary if OO is already installed. The easiest way to enter this data is to use the import feature when asked. If you don't have your registration details on hand you can import the data from the OOwin.ini file. This file can be found in \programs\innowin\Program Files\OpenOffice111\program. The installation is now complete and if you are wondering after doing a clean install to a new directory where 1.1.4 is, all you have to do is to look in the OpenOffice.org 1.1.1 desktop folder. This desktop folder now contains the same well known icons but they now reference the new 1.1.4 versions. Not renaming this folder to, say, 1.1.4 is another small omission. If you still want to use 1.1.1, you need to recreate the necessary objects and a new desktop folder. Personally I would have preferred a new desktop folder when opting for a new directory and renaming the original folder when doing just an upgrade! As I had already installed 1.1.1, I was curious to know what changes/improvements and--maybe a little cynically--new bugs were introduced in this version. Although there is no information on the changes in the documentation provided with this download, there is a detailed list of more than 60 corrections on the Open Office web site. Each item in this list is further specified, but I did not notice any of the bugs which I had run into previously. This list refers to OO114 itself and does not include any specific OS/2 issues. One small bug which I found in the previous version for both Windows and OS/2 was an occasional incorrect file name being displayed in the title bar. This bug is still there. On the positive side after upgrading my dictionaries and all my other options which I had set in 1.1.1 were still intact! I had hopes that with this version that the Open Document dialog had been improved. It is, however, still the same. My main gripe is that there is no direct selection of a disk drive available. You still have to use the directory up icon until you reach the root of the drive you are in, or click and hold it until a menu appears and select the workplace. Only then can you select another drive. I know this is specific to OS/2 but maybe InnoTek can address this sometime. Although I didn't find any new bugs I doubt, if I see some of the problems listed in the newsgroups, that this version resolves many of the existing problems, especially those related to printing. But as people say, "Your mileage may vary." I have been hard pressed to find any differences between this and the previous version, but then with such a large program it is always a question of how you use it. Maybe a fix in this version is manna from heaven for you. My philosophy is if I don't run into any new problems, I upgrade to avoid bumping into problems that have already been solved. I thank InnoTek and Mensys for making this update of OO, Java and the Runtime freely available to existing customers which is not always automatically done in the industry. I also hope that they make OO 2.0 available as soon as it comes out of beta. < Previous Page | Newsletter Index | Next Page > VOICE Home Page: http://www.os2voice.org
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912202199.51/warc/CC-MAIN-20190320024206-20190320050206-00436.warc.gz
CC-MAIN-2019-13
7,577
26
http://www.linuxquestions.org/questions/linux-newbie-8/can-you-watch-movies-on-suse-9-1-a-240825/
code
In SuSE via YaST, search "xine" and uninstall everything that pops up, including Xine-UI, Libxine and Kaffeine. The ones that ship with SuSE remove your ability to play a number of codecs because of copyright issues. So, you have to remove them first before going to the next step. Here's a good little overview: Now, download most of these RPMs and follow instructions on this page: This will get all major video codecs up and running, install libraries to allow you to play back protected DVDs, install a Xine GUI and even add quicktime playback via your browser (trailers at apple.com/trailers/ for example) with the xine-plugin. I find that I no longer need anything to do with mplayer and just stick with xine. In order to get rid of jumpy DVD, from root I type: hdparm -d1 /dev/dvd This does the trick. I even added: hdparm -d1 /dev/dvdram (which points to /dev/dvd, to be safe). To permanently set this so you don't keep running back in to jumpy DVD: Stick that hdparm command into /etc/init.d/boot.local and it will be executed on a reboot. --or (easier way)-- Yast -> Hardware -> IDE DMA > select: UltraDMA/33 (this is what worked for me-might be different for you). Reboot. Let me know how all of this goes.
s3://commoncrawl/crawl-data/CC-MAIN-2017-17/segments/1492917126237.56/warc/CC-MAIN-20170423031206-00307-ip-10-145-167-34.ec2.internal.warc.gz
CC-MAIN-2017-17
1,217
14
https://switter.at/@DeityKuro/101387976845981815
code
@crossposter@renatolond Thank you for getting back to me! The cross poster for me at least chooses when to work. Some days my tweets never get cross posted. Some days all my tweets appear in the space of several days on my switter profile! @DeityKuro@crossposter hmm, I'm going to try to get in touch with Switter again to see if I can figure out, as far as I can see, some images and videos get stuck trying to crossposter over there, I still don't know why 🤔 @DeityKuro I did some investigation on my side and got in touch with @AssemblyFour through email. In the meantime, I'm trying to get lower quality videos for switter to see if it reduces the issues. Let me know if you notice any changes :)
s3://commoncrawl/crawl-data/CC-MAIN-2021-17/segments/1618038066613.21/warc/CC-MAIN-20210412053559-20210412083559-00566.warc.gz
CC-MAIN-2021-17
703
3
http://www.wikicfp.com/cfp/servlet/event.showcfp?eventid=109058&copyownerid=89874
code
ENSsys 2020 : 8th International Workshop on Energy Harvesting & Energy-Neutral Sensing Systems Call For Papers ENSsys 2020 will be held as a virtual event in conjunction with ACM SenSys. Complementing the topics of SenSys 2020, this workshop will bring researchers together to explore the challenges, issues and opportunities in the research, design, and engineering of energy-harvesting, energy-neutral and intermittent sensing systems. These are enabling technologies for future applications in smart energy, transportation, environmental monitoring and smart cities. Innovative solutions in hardware for energy scavenging, adaptive algorithms, and power management policies are needed to enable either uninterrupted or intermittent operation. High quality technical articles are solicited, describing advances in sensing systems powered by energy harvesting, as well as those which describe practical deployments and implementation experiences. ENSsys also offers a platform for innovative future directions by soliciting position papers. Topics of interest include, but are not limited to, the following: - Power management concepts, algorithms and circuits for energy-harvesting sensing systems - Hardware and software concepts, algorithms and circuits for intermittent computing - Middleware and services supporting interoperability between zero-energy networks - Resource management and operating system support for energy-harvesting sensing systems - Network-wide distributed energy management (e.g. routing, adaptive duty cycling, etc.) - Communication in intermittent-power domain - Online measurement of energy intake and consumption - Predicting energy intake and consumption - Ensuring reliable operation in energy-harvesting sensor systems - Modelling, simulation and tools for effective design of future energy harvesting sensing systems - Architectures and standards for energy-neutral, power-neutral or intermittent sensing systems - Internet of (battery-less) things - Experience with real-world deployments and innovative applications We are soliciting four types of submission: - Technical papers (up to 6 pages, plus references), reporting on novel research. Accepted authors will be invited to upload a presentation video (max. 20 mins) prior to the event, with a short live presentation and Q&A session during the scheduled workshop; - Position papers (up to 3 pages, including everything), reporting on new research directions and/or a controversial debate of past research. Accepted authors will be invited to upload a presentation video (max. 10 mins) prior to the event, with a short live presentation and interactive discussion during the scheduled workshop; - Poster papers (up to 2 pages, including everything). Accepted authors will be required to upload a poster and short ''pitch'' video prior to the workshop, and have the option of uploading a longer video (max. 5 mins). Pitch videos will be played prior to the virtual poster/demo session during the live event. - Demo papers (up to 2 pages, including everything). Accepted authors will be required to upload a short demonstration video (max. 5 mins) prior to the event, with discussions in a virtual poster/demo session during the live event. Submissions should be previously unpublished, and not currently under review by another conference or journal. Papers should be submitted for consideration via the workshop website, prior to the submission deadline, and must adhere to the provided formatting guidelines. Papers will undergo double-blind review. They will be assessed for novelty, relevance and quality. Accepted papers will be available on the ACM Digital Library before the workshop. General Chair: Alex Weddell, University of Southampton, UK Technical Programme Chair: Josiah Hester, Northwestern University, USA Video Chair: Jacob Sorber, Clemson University, USA Online Chair: Przemyslaw Pawelczak, TU Delft, The Netherlands Web Chair: Geoff V. Merrett, University of Southampton, UK TECHNICAL PROGRAMME COMMITTEE Mo Alloulah, Nokia Bell Labs, USA Sebastian Bader, Mid Sweden University, Sweden Brad Campbell, University of Virginia, USA Henry Duwe, Iowa State University, USA Maria Gorlatova, Duke University, USA Jeremy Gummeson, University of Massachusetts Amherst, USA Wen Hu, University of New South Wales Polly Huang, National Taiwan University, Taiwan Tianxing Li, Michigan State University, USA Michele Magno, ETH Zürich, Switzerland Shijia Pan, University of California, Merced, USA Pat Pannuto, University of California, San Diego, USA Joshua San Miguel, University of Wisconsin-Madison, USA Anand Savanth, Arm Research, UK Matthias Wählisch, Freie Universität Berlin, Germany
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100674.56/warc/CC-MAIN-20231207121942-20231207151942-00285.warc.gz
CC-MAIN-2023-50
4,690
46
http://www.hotukdeals.com/deals/dell-inspiron-1720-notebook-1-66ghz-119027
code
Please be gentle, it's my first deal (let me know if I make any mistakes, thanks). This notebook has £120 off, free delivery (£60 off), and the voucher is another £54.90 off. Thats a rather nice £234.90 off the original price! (plus quidco for further savings). Intel® Core 2 Duo processor T5450 (1.66 GHz, 667 MHz FSB, 2 MB L2-cache) Genuine Windows Vista® Home Premium - English 1 Year Base Warranty - Collect & Return Jet Black Colour with Matte Finish & 2.0mp camera 17.0" Widescreen WXGA+ (1440x900) TFT Display with TrueLife 2048MB 667MHz Dual Channel DDR2 SDRAM [2x1024] 250GB (5400RPM) SATA Hard Drive nVidia® GeForce Go 8400M GS with 128MB DDR2 dedicated graphic memory Fixed Internal 8X DVD+/-RW Drive including Software Primary 6-cell Lithium-Ion Battery (56 WHr) No Carry Case Dell Wireless 355 Bluetooth 2.0 Module (up to 3Mbps) with Enhanced Data rate - Eur Intel® Pro Wireless 3945 802.11a/b/g Mini-Card - Europe Microsoft® Works 8.0 - English
s3://commoncrawl/crawl-data/CC-MAIN-2017-30/segments/1500549423927.54/warc/CC-MAIN-20170722082709-20170722102709-00164.warc.gz
CC-MAIN-2017-30
967
17
https://forums.developer.ebay.com/questions/51357/test-listings-in-production-environment.html
code
I'm creating a system to receive a notification (poll) when my item is checked out. I'd like to test in production environment, since it is tedious to create test cases in sandbox environment. I researched testing in production environment and found "Test Listings Policy". I tried to list an item in the "Everything Else > Test Auctions" category per the policy, but that category does not exist. In which categories should I list my test item to avoid violating the policy?
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710777.20/warc/CC-MAIN-20221130225142-20221201015142-00660.warc.gz
CC-MAIN-2022-49
475
5
https://forums.comodo.com/t/ch-ch-changes/310340
code
If you go straight to the source, you find that Chrome 53 will block “Flash on the web [which] loads behind the scenes to support things like page analytics”, and that “Chrome 55 will make HTML5 the default experience, except for sites which only support Flash. For those, you’ll be prompted to enable Flash when you first visit the site.”. Not so dramatic, but two more steps in the right direction, to deprecate Flash. Jowa, Thanks for the reply but I’m not really sure it answer’s my questions. Did I miss something and HTML5 is already incorporated in CHROMODO & DRAGON Browsers? If so is there an “On /OFF” Switch for it, like in the Advanced Settings for both browsers you could choose " Let me decide when to run plug -in’s or words to that effect, to more or less create a " Safety Net" like I could with Flash-Player Settings Does this HTML5 fill the void that Flash will leave? and does it perform the same tasks as Flash Player? In regards to “CHROME 55” I guess thats great but I’m not a big fan of that browser. My question was " What effect ( If any) will this have on Chromodo & Dragon Browsers" Perhaps your answer was above my head but I don’t see how Chrome 55 has any bearing on the browsers I utilize daily which I mentioned above. So perhaps someone else could explain If and How it will affect COMODO products HTML5 (the current version of HTML) is well supported by Dragon and Chromodo, as well as by all modern browsers. You can test here how well it is supported: https://html5test.com/ No, you can’t turn HTML off, as that would be like turning the web off. Yes, roughly HTML now performs the same tasks as Flash. Regarding Chrome 55 (and 53), you mentioned upcoming changes in Chrome, and I wanted to clarify what those changes are. Your view seemed to be a bit more dramatic than the actual changes that have been announced. Comodo has not made any announcement regarding Flash in future versions of Dragon and Chromodo. I expect that the announced changes in Chrome will also happen in Dragon and Chromodo. At least if the change is made in the Chromium code, and not in the version of Flash Player which Google builds and includes in Chrome. For further details regarding Dragon and Chromodo, we need an answer from a developer.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224656675.90/warc/CC-MAIN-20230609100535-20230609130535-00475.warc.gz
CC-MAIN-2023-23
2,288
14
https://ru.ifixit.com/Answers/History/220253
code
Оригинальный сообщение: UberFix , If just your back light works, but the image doesn't show, hold the power button and bottom volume button simultaneously, this will do a soft reset and fix that problem. The back light and LCD picture goes through the same cable (the cable up near the top left). The bottom two connections for the screen deal with the digitizer only. Monkeybiten, try the soft reset as well, but you may need to do a hard reset (Google LG G2 hard reset, it will delete everything, so I suggest backing up your info to the cloud). It's quite possible you have a virus (malicious app) that's sucking your phone's resources. You could try an anti-virus. AVG from Google play store is good.
s3://commoncrawl/crawl-data/CC-MAIN-2020-50/segments/1606141182776.11/warc/CC-MAIN-20201125100409-20201125130409-00591.warc.gz
CC-MAIN-2020-50
725
2
https://plainmath.net/95012/we-have-a-current-rating-average-3-3-5
code
Let's say you wanted to calculate, for example, the average (i.e. mean) cost per day for a hotel to accommodate a tourist. If only aggregate cost data is available, is dividing the average cumulative cost for one person's stay by the average person's duration of stay an acceptable method? Would using the median cost and median duration of stay be better? Worse? The same?
s3://commoncrawl/crawl-data/CC-MAIN-2022-49/segments/1669446710218.49/warc/CC-MAIN-20221127073607-20221127103607-00431.warc.gz
CC-MAIN-2022-49
373
1
https://www.purposedbydesign.com/products/ung66177
code
Breckelle Suede Open Toe Stiletto Heel is on back order This simply alluring heel features an open toe silhouette, one band across vamp, fixed ankle strap, and wrapped stiletto heel. Finished with lightly padded insole and back-zip closure. Material: Vegan Suede (man-made) Heel Height: 4" (approx)
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233511023.76/warc/CC-MAIN-20231002232712-20231003022712-00060.warc.gz
CC-MAIN-2023-40
298
5
https://community.t-mobile.com/accounts-services-4/cannot-get-paramount-plus-promotion-code-40135?postid=157109
code
Has anyone found a solution to get the promotion code to generate at https://promotions.t-mobile.com/ParamountPlus?? I typed in my T-Mobile phone number but nothing happens when I click “Continue”, like literally the only thing that happens is my number disappears. The other site I’ve been directed to is https://promotions.t-mobile.com/rebates. But that promotion code is required.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506481.17/warc/CC-MAIN-20230923130827-20230923160827-00888.warc.gz
CC-MAIN-2023-40
389
3
https://sc22.supercomputing.org/presentation/?id=ws_ai4s104&sess=sess462
code
· Contributors · Organizations · Search Automated Continual Learning of Defect Identification in Coherent Diffraction Imaging DescriptionX-ray Bragg coherent diffraction imaging (BCDI) is widely used for materials characterization. However, obtaining X-ray diffraction data is difficult and computationally intensive. Here, we introduce a machine learning approach to identify crystalline line defects in samples from the raw coherent diffraction data. To automate this process, we compose a workflow coupling coherent diffraction data generation with training and inference of deep neural network defect classifiers. In particular, we adopt a continual learning approach, where we generate training and inference data as needed based on the accuracy of the defect classifier instead of all training data generated a priori. The results show that our approach improves the accuracy of defect classifiers while using much fewer samples of data.
s3://commoncrawl/crawl-data/CC-MAIN-2023-23/segments/1685224654097.42/warc/CC-MAIN-20230608035801-20230608065801-00776.warc.gz
CC-MAIN-2023-23
946
3
https://lists.ubuntu.com/archives/ubuntu-users/2011-August/249220.html
code
help with recover data from software raid 1 waldbauernbub at gmx.at Sun Aug 7 19:54:26 UTC 2011 Am 2011-08-02 03:59, schrieb Luis Paulo: > 2011/7/31 Franz Waldmüller<waldbauernbub at gmx.at>: >> I want to recover files from a disk which has been part of a raid1 array. I >> don't want to mount it degraded, as all operations must be read only. >> Can I mount the partiton of the disk as an ext4 filesystem (the raid was >> formatted as ext4.)? >> In my server to harddisks are used in mirrored array to save all important >> /dev/sdb1 and /dev/sdc1 >> today I created another md-device with the created partitions /dev/sdb2 and >> /dev/sdc2. Unfortunately I didn't edit the /etc/mdadm/mdadm.conf file >> When I rebooted the server I checked /proc/mdstat >> and saw the following resync process: >> md1 : active raid1 sdc sdb2 >> 391382976 blocks [2/2] [UU] >> [>....................] resync = 0.1% (745088/391382976) >> That is wrong, as the first device is sdc, but it should be sdc2. >> I halted the server and now have to recover the files from /dev/sdb1. >> /dev/sdc1 could have suffered damage from the resync process. >> I hope that you can help me with your advice. > I don't understand why you don't want to assemble the array as degraded. > The way I'll recover the array will be clearing the super-block of > /dev/sdc1, assemble the array as degraded with dev/sdb1 and then add > /dev/sdc1 (using mdadm commands). At least this is the general idea, I > may (and you must before trying it) look more carefully into it. > After a resync, the array would be functional again. Thank you for your advice. I am not sure about two things: Does this output from mdadm mean, that data is read from sdc and written md1 : active raid1 sdc sdb2 391382976 blocks [2/2] [UU] [>....................] resync = 0.1% (745088/391382976) In this case everything would be fine, as sdb2 was empty. If it is the other way round things are more severe as it would mean writing zeros from sdb2 to sdc. The other option with mounting as degraded is good, too but I as soon as I noticed this strange resync process I shut the server down immediately. It was the only thing I could think at this moment. The harddisk are connect by usb and up to now I don't know how to find out which disk is sdb and which sdc? I attached the disk now to another workstation (backup all data). But is there a possibility look the serial number of the drives up in the server logs? Thanks for your help More information about the ubuntu-users
s3://commoncrawl/crawl-data/CC-MAIN-2020-10/segments/1581875146186.62/warc/CC-MAIN-20200226023658-20200226053658-00296.warc.gz
CC-MAIN-2020-10
2,508
46
https://www.bleepingcomputer.com/forums/t/275677/alternatives-to-google-docs/
code
Posted 02 December 2009 - 09:57 AM The company I work for is looking for an alternative to Google Docs and Spreadsheets. We use these programs currently, but the issue is that we're using them all the time for collaborative stuff and the process is getting really slow. We want to store our documents on the company's server, rather than online, to give us faster access and more security. The program has to work with Windows. I was wondering if anybody knows of any software similar to Google Docs and Spreadsheets that would let us store files on our server but also let us work collaboratively. So far, the stuff I've found allows one or the other, but not both. If anybody knows of any such programs or has used one, please let me know. I'd prefer something that's free, obviously, but won't rule something good out based on price. The programs I've looked into so far are: If you've used these or heard anything about them please let me know. They didn't seem right for us at first glance, but I'd like to hear from someone who's used one or more. Or if you've used something else that sounds about right please tell me.
s3://commoncrawl/crawl-data/CC-MAIN-2018-43/segments/1539583512836.0/warc/CC-MAIN-20181020142647-20181020164147-00026.warc.gz
CC-MAIN-2018-43
1,126
5
https://wiki.math.ntnu.no/tma4220/2021h/general_information
code
Lectures and exercises - Trond Kvamsdal Office 1344, SBII trond [dot] kvamsdal [at] ntnu [dot] no (use TMA4220 in the subject line!) - Davide Murari, room 1356, Sentralbygg II, Davide [dot] Murari [at] ntnu [dot] no NB! Please use TMA4220 in the subject heading in your emails. - A. Quarteroni, Numerical Models for Differential Problems, Springer 2014. - S. Brenner and L. R. Scott (supplementary) The Mathematical Theory of Finite Element Methods, Springer 2010 - Lecture Notes: These will be made available (afterwards) during the semester - Monday 13th of December 2021 at 09:00-13:00. Permitted examination support material: C: - A. Quarteroni: Numerical Models for Differential Problems, Springer. - S. Brenner and L. R. Scott: The Mathematical Theory of Finite Element Methods, Springer. - TMA4220 Lecture Notes Fall 2021 (Front page + 229 pages) - TMA4220 2021H AFEM (Front page + 43 pages) - Rottmann: Matematisk formelsamling - Approved calculator - Final exam counts for 65% - One compulsory project counts for 35% - The project counts 35/100 of the final grade. It is not mandatory, but you will loose these 35 points if it is not done. - In order to pass the course the exam must be passed separately. The combination of exam and project must be passed as well.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296949701.0/warc/CC-MAIN-20230401032604-20230401062604-00065.warc.gz
CC-MAIN-2023-14
1,274
21
https://www.bankofengland.co.uk/statistics/notice/2017/statistical-notice-2017-10
code
- IC / IO Version 3 Schema Documentation The schema documentation for IC and IO forms version 3 (effective from April 2018) have been published on the Data Collection – ‘New and Upcoming’ page, which also includes an updated list of form validations to include full box codes. The OSCA Specification has also been updated to reflect the new form versions. - OSCA Quick Start Guides Previously, there was an OSCA Quick Start Guide and six tutorials on the website. These have been reviewed and replaced by one OSCA Tutorial to provide short overviews on Start-Up, Reporting Schedule, Uploading Forms, Cross Validations, User Accounts and System Issues. These should work alongside the OSCA Specification to act as a refresher on key information. Both documents can be found on the ‘How to submit data’ page of the internet. - Green Notice (nil return)
s3://commoncrawl/crawl-data/CC-MAIN-2021-25/segments/1623488553635.87/warc/CC-MAIN-20210624110458-20210624140458-00015.warc.gz
CC-MAIN-2021-25
860
5
https://community.simtropolis.com/omnibus/simcity-4/reference/appendix-1-idiots-walkthrough-to-40000-r20/
code
Appendix 1: IdOIt’s walkthrough to 40,000 Before you flood my mail, yes I spelt idiots, idoits on purpose. This guide is place here away from the main sections because I thought it to be superfluous as I had believed that PART I enough for your first city. This is a step-by-step guide to 40,000 by year 16. Actually I only got 40,000 a few months into year 16 but lets not quibble over minor details okay? Another reason why I placed this here is because any explanation of why I am doing one thing or another will be very brief or none. Feel free to add other stuff according to your own city’s needs. Take note of the following: 1) Walkthrough Layout: Chronological order. 2) Statistics taken at the start of the year. 3) Construction done at start of the year. 4) The map view refers to the default view. 5) I will be referring to the PART I constantly because I do not want to repeat myself 6) I will not be repeating the word build over and over again. Whenever I mention a structure in BLOCK LETTERS, it means build it. 7) Read PART I, as I may not be restating many of the tips. I will assume you already know them. Try not to let budget fall below 40,000 9) Except for the first few months, you will always be making profits so no business deals 10) Always build when paused. Pop: 39579 > 40,000 (Few months into year 16) Current cash: 65,000 + Time: 16 years Budget: Income: 9156 / Expense: 7625 / Profit: 1531 Map: Mid size Idiot’s Town: YEAR 0 Idiot’s Town: YEAR 1 Idiot’s Town: YEAR 4 Idiot’s Town: YEAR 6 Idiot’s Town: YEAR 7 Idiot’s Town: YEAR 8 Idiot’s Town: YEAR 9 Idiot’s Town: YEAR 10 Idiot’s Town: YEAR 11 Idiot’s Town: YEAR 12 Idiot’s Town: YEAR 13 Idiot’s Town: YEAR 14 Idiot’s Town: YEAR 15 Idiot’s Town: YEAR 16
s3://commoncrawl/crawl-data/CC-MAIN-2018-30/segments/1531676590711.36/warc/CC-MAIN-20180719070814-20180719090814-00166.warc.gz
CC-MAIN-2018-30
1,767
32
https://zamen.app.link/s/9231b062c99518ead631d99332a4e19eb2942f7a70f5be62e2e29f6876252549
code
Zamen | زامن Share Your iOS Notes to Make Them More Useful In all likelihood, what you have in the Notes app on your iOS device are mostly notes to self, that is, notes that are meant to be seen and edited by you and you alone, perhaps because they contain information that other people shouldn't be privy to or simply because they're of no concern to others. But a few of them might benefit from being shared, so that others can also see and edit them, effectively collaborating with you on their modification. Fortunately, it is completely possible to share notes to this end. To be sure, we're not talking about the counterproductive back-and-forth process of sending a note to someone and waiting for it to be sent back to you with the other person's changes. We're talking about cloud-based sharing and collaboration, in which any and all changes are automatically synced across copies of the shared note. And this has been supported in the Notes app since iOS 10, not only for notes that simply contain text but also those that include checklists, sketches, and attachments This means that with shared notes, you can invite, say, members of your family to help you complete a grocery or wish list, your colleagues to further develop project ideas, or your friends to collect links and photos for your next event. Shared notes are viewed and edited just like any other note in the Notes app. Any changes made to them, by anyone with whom they are shared, are automatically reflected across all instances of the notes among the collaborators, who are duly made aware when edits have been made through an indicator in the notes list. The question now is: How do you go about sharing and collaborating on notes?
s3://commoncrawl/crawl-data/CC-MAIN-2019-13/segments/1552912204857.82/warc/CC-MAIN-20190326054828-20190326080828-00503.warc.gz
CC-MAIN-2019-13
1,717
7
https://bheintl.com/home-template/
code
Easy-to-Use Page Builder Build amazing layouts with the Page Builder, no coding knowledge required Quest provides tons of options, from Colors to Layouts. The customisability makes you feelu00a0″Is Quest really free ?” We provide one of the best support you will ever receive on the WordPress.org repo. Try asking us a question.
s3://commoncrawl/crawl-data/CC-MAIN-2023-14/segments/1679296943589.10/warc/CC-MAIN-20230321002050-20230321032050-00247.warc.gz
CC-MAIN-2023-14
332
4
https://forum.plexim.com/7980/how-to-operate-the-pmsm-the-inverter-fed-pmsm-model-generator
code
I'm using the demo model on inverter fed PMSM as the base to build out a different model, but I'm unsure how to operate the machine as a generator? I have an operating point at a certain high speed and for a certain power range (the torque input will vary) so when I give a controlled torque source, my speed seems extremely low (~30 rad/s) and no matter what machine parameters I change I'm not able to get it close to the speeds I'm trying to reach. Does it come down to a matter of tuning or is there something more basic I'm missing? In another instance, I'm trying a simpler open-loop implementation of generating the control signals with a constant torque source. I'm attaching a file of the control loop (OL.png). I have 3 phase reference waveforms using which I generate SVPWM inputs to the switches. For a synchronous machine, shouldn't the machine rotate at a speed of (120*Fo/P) where I can control the speed by changing Fo? However, again I'm not seeing the speeds that I expect.
s3://commoncrawl/crawl-data/CC-MAIN-2023-50/segments/1700679100705.19/warc/CC-MAIN-20231207221604-20231208011604-00606.warc.gz
CC-MAIN-2023-50
991
2
https://mrcote.info/blog/2018/05/16/ledweb/
code
Having taken advantage of a Black Friday sale at BuyaPi.ca and picked up a Raspberry Pi 3 Model B, I then needed something to do with it. I’m not sure how it popped into my head, but at some point I realized my bar absolutely needed a Times Square zipper-type LED display. I mean, it seems so obvious in retrospect. At first I thought about making one but then I thought “hahah yeah right no”. Luckily Adafruit caters to people of a similar mindset, so I got myself a superfancy 64x32 RGB LED matrix. The assembly tested my very rusty soldering skills (and also made me realize how my near vision has degraded in the past ten years…), but it powered up just fine! After that, I thought it would be a neat trick to let visitors draw on the matrix. Of course I don’t know who would actually bother doing that, at least more than once, but I think it would sound cool to mention at a party. Jenn Schiffer’s awesome Make 8-Bit Art! site seemed like a good starting point, so I grabbed the code and started poking around. The first problem was that I needed to export a pixel-by-pixel version of the drawn image, such that each square maps to a single pixel that in turn will map to a single LED. So I needed a 64x32 image, but the PNGs generated by Make 8-Bit Art are scaled up much larger. That didn’t end up being very difficult in the end. I just sample one pixel in the middle of each square and build that into a new image. I created a pull request with my modifications, although I don’t know how generally useful this would be. Next was the task of creating a web service to take the resulting image and display it. I followed the Adafruit guide that recommends using the rpi-rgb-led-matrix library by hzeller and got the demo going. The web service itself was simple, as I only needed to support uploading a picture and sending it to the LED matrix, with code for the latter already existing in the rpi-rgb-led-matrix package. However, writing to the matrix requires root privileges, and I didn’t want to run my web server as root. So instead, I made a very simple daemon that runs as root and takes commands over Redis. The Flask app now handles only file uploads and sending Redis messages to display an image or clear the matrix. I found out later that the guide I was following was using an out-of-date fork of rpi-rgb-led-matrix. Adafruit had forked it to add Python support; however, it was done a bit hackily, so I had to run my daemon from the rpi-rgb-led-matrix directory. I just noticed that Adafruit has updated their guide to use the latest code in that library, which had more thorough Python support added some time ago, so I’ll be updating mine at some point. Hopefully this will let me run the daemon from its own directory. I also set up a WSGI server and got it running with systemd and nginx (see the README for details). Unfortunately I had less luck running the daemon automatically. Running it via systemd would result in my Raspberry PI locking up. Running it from a terminal works fine. I’m guessing the difference is somehow environment related, but as of yet I haven’t been able to figure it out. For now, I run the daemon in a screen session. Maybe this is something else that will be fixed by converting to the latest rpi-rgb-led-matrix code. Last was hacking up Make 8-Bit Art to use my new web service. I added some code to the pixel-by-pixel feature to use the Fetch API to send the created image up to the Pi and then display it. It’s hacky but works fine! Since this is almost certainly of little use to the upstream repository, I created a branch but haven’t bothered submitting a pull request. Since getting this working, I’ve actually had a few people play with it, including my daughter. The display is really nice, with very vivid colours, so it’s an interesting combination of retro and modern technologies. Here’s an example of something simple drawn in the app: And the resulting image on the matrix: It’s a really intense matrix, and I suck at photography, so here’s another shot, with the flash on, so you can see the matrix itself a bit better: My next step is to simplify my fork of Make 8-Bit Art (I don’t need any of the other export options, maybe just “Save” and “Display” buttons). After that, I’d like to extend it to allow more than one image to exist on the Pi at a time. Then I could add a feature to my web service to choose from previously uploaded images, and even to create animations. All in all this has been a fun little project, and as with most, if not all, open-source software, I couldn’t have done it without a lot of help. Thanks to Adafruit, Jenn Schiffer, and hzeller in particular!
s3://commoncrawl/crawl-data/CC-MAIN-2021-21/segments/1620243989812.47/warc/CC-MAIN-20210515035645-20210515065645-00228.warc.gz
CC-MAIN-2021-21
4,707
16
https://ktj.in/event/CodeOSoccer
code
"Code-O-Soccer", a simulation-based strategic coding event, is back again to provide you with the platform where you code the match strategy for a team of three robots and show your coding skills. Teams have been shared a simulator software that runs a Robo-Soccer match. A basic strategy code is provided under sample; the goal of the tournament is to edit the code in innovative ways to optimize your team's performance. • 1st Position: INR 25,000 • 2nd Position: INR 15,000 • 3rd Position: INR 10,000 Send your codes for the attacker, defender, etc. in a zip file to [email protected] Teams will be shared a simulator software that will run a Robo-Soccer match. A basic strategy code will be provided; the goal of the tournament is to edit the code in innovative ways to optimize your team's performance.SETUP: Download the files from the following links and follow the instruction manual to set-up the simulator and debugger on your machine: Follow this link to get the basic sample codes for the attacker, defender, game and goalkeeper. Edit the codes in innovative ways to show your strategic and coding abilities in order to beat the opponents! MANJUNATH - 7384434093 SNEHAL - 8499066600 PRAKHAR - 9933699900
s3://commoncrawl/crawl-data/CC-MAIN-2020-05/segments/1579250608062.57/warc/CC-MAIN-20200123011418-20200123040418-00553.warc.gz
CC-MAIN-2020-05
1,221
15
https://replit.com/talk/share/The-ch1cken-clicker-game-LAUNCH/60783
code
The ch1cken clicker game -- LAUNCH The python tkinker game by idrgplayer inspired this game Rainbow button code source: (Note: the jonathanLab.html, jonathanScript.js, jonathanStyle.css are my friend's versions) Next: anti-auto clicker script, user scripts. Lol, this ridiculous score was gained by the helpers. Wow, it's awesome. It would look better, if you add a background and some animations with CSS. very cool! :) Pretty cool, try changing the css especially for the store: and you should also add more items, like stuff that clicks automatically every second. Also try making a good theme, like cookie clicker makes cookies, and grannies to cook for you, etc.
s3://commoncrawl/crawl-data/CC-MAIN-2022-21/segments/1652662578939.73/warc/CC-MAIN-20220525023952-20220525053952-00722.warc.gz
CC-MAIN-2022-21
667
11
https://issues.qgis.org/issues/21957
code
Bug report #21957 Georeferencer plugin does not work |Affected QGIS version: |Pull Request or Patch supplied: |Crashes QGIS or corrupts data: |Copied to github as #: Georeferencing features is not working and has been like this for almost 2 weeks now. I require this features/plugin with almost all my projects and this has been rather frustrating not been able to use this. The plugin from the python console works but not as well as the built in version. Please could you rectify this? #1 Updated by Borys Jurgiel almost 5 years ago - Resolution deleted ( - Priority changed from High to Normal - Assignee deleted ( - Category changed from Plugin Manager to C++ plugins/Georeferencer Could you please explain what exactly doesn't work for you? Does the plugin crash or doesn't start or is not listed in the plugin manager at all? Do you get any error messages?
s3://commoncrawl/crawl-data/CC-MAIN-2024-10/segments/1707947474808.39/warc/CC-MAIN-20240229103115-20240229133115-00896.warc.gz
CC-MAIN-2024-10
862
13
https://screenshots.debian.net/package/python3-amp
code
Atomistic Machine-learning Package (python 3) DescriptionAmp is an open-source package designed to easily bring machine-learning to atomistic calculations. This project is being developed at Brown University in the School of Engineering, primarily by Andrew Peterson and Alireza Khorshidi, and is released under the GNU General Public License. Amp allows for the modular representation of the potential energy surface, allowing the user to specify or create descriptor and regression methods. Amp is designed to integrate closely with the Atomic Simulation Environment (ASE). As such, the interface is in pure python, although several compute-heavy parts of the underlying code also have fortran versions to accelerate the calculations. The close integration with ASE means that any calculator that works with ASE ─ including EMT, GPAW, DACAPO, VASP, NWChem, and Gaussian ─ can easily be used as the parent method. This package provides the python 3 modules. Upload more screenshots Please help extend the collection of screenshots. Just make a screenshot and upload it here. You don't need to register or anything.Upload a screenshot Hint: upload an image here from your clipboard with Ctrl-V Install this software package If the package is available for the distribution you are currently using on your computer then install the software by clicking on…Install python3-amp
s3://commoncrawl/crawl-data/CC-MAIN-2022-40/segments/1664030337595.1/warc/CC-MAIN-20221005073953-20221005103953-00299.warc.gz
CC-MAIN-2022-40
1,380
7
https://www.datascience.com/blog/topic/best-practices
code
Edward Chenard explains why shoehorning technical experts into manager roles and improperly applying agile methods to data science projects can cost companies.LEARN MORE During the AI in Enterprise panel at H2O World, DataScience.com CSO William Merchan shared how enterprise companies are leveraging artificial intelligence.LEARN MORE During DataScience: Elevate - Spotlight: Women in Tech, experts from Beachbody, Tala, and other companies shared their experiences scaling data science.LEARN MORE Is your IT team using Docker containers to deploy data science models or environments? Here are three best practices for keeping workflows running smoothly.LEARN MORE Learn Data Science , , Data Stories , Data Science Platform , Use Cases , Data Science , Machine Learning , R , Data Science Managers , Data Visualization , IT Management , Perspectives , Artificial Intelligence , Biotech , Docker , Predictive Modeling , Deep Learning , Python , DevOps , Fintech , RStudio , Featured , H2O.ai , Business Use Cases , Digital Transformation , Natural Language Processing , Open Source , DataOps , Education , Events , GitHub , Jupyter , MapR , Recommendation Engines , TensorFlow subscribe to our newsletter Sign up today to receive the latest DataScience content in your inbox.
s3://commoncrawl/crawl-data/CC-MAIN-2018-05/segments/1516084889736.54/warc/CC-MAIN-20180120221621-20180121001621-00083.warc.gz
CC-MAIN-2018-05
1,276
7
https://blog.damato.design/posts/meaningless-curves/
code
The tiered system of design tokens has been fairly well-established to include semantic tokens. Color, typography, and even spacing can be described through semantic means. This drives the question, how do we name other properties semantically to further describe a generic experience? This article at Cloud Four goes into the idea of nested rounding in detail. Essentially, we want the radius on rounded corners between nested elements to follow a shared focus (ie., center of a circle). The math is very simple, here it is using CSS notation: Ultimately, we’d like to think of rounding in terms of semantics. However, because we want the rounding to be derived from elements, we can avoid semantics entirely. In practice, the reason we might use semantics is when we have decisions to make that are more complicated than just on/off. Semantics are used to describe the why we chose this value from a plethora of other possible values. In our rounding treatment, we shouldn’t have more than one value. It should be a binary decision to include rounding or not and let other factors determine how round to achieve the nesting effect. In other words, when curating an experience, we’d like to simply mark elements which should receive nested rounding. Later, we provide some themable amount used by the rounding calculation which affects the rounding of marked elements in a uniform manner. We do not prescribe the rounding amount at any one element explicitly, we simply expect the appropriate nested rounding to exist when turned on. However, we have some problems to try and overcome. The first problem is trying to get the --distance-from-ancestor values for the formula. The ancestor part provides a clue to what makes this so difficult. The nested rounding calculation is dependent on the relationship between two elements. This is different from a semantic spacing approach as we only select a spacing token to convey a relationship. In the rounding formula, the final value is computed using the resulting relationship when the rounding is meant to be applied. When trying to fill the --distance-from-ancestor value, it’s very likely that we will have several elements nested which may or may not include their own methods of supplying space. The properties of gap, and additional transform properties can all have a hand at visually presenting how far two elements are from each other, thereby making the --distance-from-ancestor value very challenging to determine. Let’s assume we have a system which can readily provide the --ancestor-element-radius in a perfect system would also be derived by the formula. So where does the base radius come from that influences all other nested rounding? Would it make sense for the <body/> to declare the first amount of rounding? Conceptually this seems incorrect since we don’t expect the <body/> element to have rounding at all. Though, we can simply choose not to apply rounding at the <body/> and rather only define the value here. Another problem with starting from the top would be that some elements would never receive rounding. If you have a button which expects rounding to appear in two different places, it is possible that they receive different rounding amounts based on how many nested ancestors are marked for rounding between them. This could cause the same button to look different just by its placement within the layout. So, instead of starting at the top, could we start at the bottom? That is, could we declare what the smallest rounding is and then have marked ancestor elements use that value? After all, the center of the radius that determines the rounding must exist inside this element. Perhaps a new calculation would look like this: In this way, the --deepest-element-radius can now be a fixed number, provided by a theme because there should be no smaller rounding applied. All rounding that occurs above this element is derived from this base amount. For the purposes of our exploration, let’s call these deepest elements the rounding focus, as they possess the center which all ancestor element rounding radii would be computed in this system. The logic within marked ancestor elements would identify their deepest rounding focus and calculate the distance between their bounding boxes to determine the --distance-from-ancestor. We already know the difficulties in attempting this from above, but let’s continue assuming we have a system in place which can prescribe the distance somehow. In explaining the logic to calculate the ancestor’s rounding, I simplified the approach dramatically. In reality there’s dozens of considerations that we’d need to account for. One of the largest problems returns back to rounding determined by an element’s existence. Imagine we have a card layout and all cards are marked to include rounding but no cards include any elements which initiate rounding; our “rounding focus” elements. This would mean that none of the cards have rounded corners. When we add our rounded button to one of the cards, rounding would exist only on that card. If you’re thinking we could include a “virtual” rounding focus, a hidden element which triggers rounding, how do we allow the ancestors to measure the distance between edges? It’s possible the cards’ internal structures are completely different between them, making the rounding varied as well. What would be more desirable is for all sibling cards have the same rounding, whether they have a rounding focus or not. Except we’ve already determined that nested rounding is only determined between an element and ancestor, not from siblings. Do we then have further markings for rounded siblings to share values? Which sibling rounding takes priority? We’re not done with problems. If we put the rounding focus element within the card, what distance should we measure? We could take the shortest distance and apply to all corners. However, what happens if we position that button in the center of the card; does the card become a circle because the button is positioned so far from the edges? Ok, perhaps we can set limits on the rounding using max(). But then if this hits the max, outer marked elements would get the same max radius thereby breaking the nesting effect. At this point you might ask why we haven’t done what has been before; create levels of rounding. Since we don’t need to be semantic, maybe this becomes a viable option? Let’s say we start at the base level again with a rounded button, then we have a card component which gets the next level up. What happens when we include a rounded input with a rounded button inside? We would need to insert a rounding level in between. The loom of insertion is the biggest drawback using levels. How could we possibly account for all the layout nesting configurations which may be rounded to avoid levels being added or orphaned? At this point we’re really more in search of a layout system than just a rounding system. Prescribing layouts could warrant the possibility of informing how round parts should be due to restrictions set by components of the system. We could know exactly what elements exist and the amount of space between them. Creating a robust layout system is outside the scope of this exploration since that would attempt to define all possible layouts for any hypothetical experience; a monumental task. So for the moment, I don’t believe there’s any possibility of a semantic nested rounding system due to the natural dependencies on existing elements. We’re unfortunately stuck with a more meaningless system which can provide few nesting effects for curated components. But maybe that’s the point. Other properties are decided in an experience based on qualities like feedback, hierarchy, and relationship: - The color orange often indicates a warning. - Large text can support a section outline heading. - Less space between items means they are related.
s3://commoncrawl/crawl-data/CC-MAIN-2024-18/segments/1712296817200.22/warc/CC-MAIN-20240418061950-20240418091950-00685.warc.gz
CC-MAIN-2024-18
7,949
36
https://snailseyeview.blogspot.com/2009/04/ive-been-poring-over-real-estate.html
code
- Enough room for my library - Large garden - Copious wildlife - Good internet connection Okay, that last one was greeted with hearty chortles when I mentioned it. But there's always satellite broadband. If it's not raining. Which it usually is. Oh, sod it. Semaphore, anyone? Anyhoo, I thought it might be useful to give an idea of where I'll be heading in June. (Which is only … weeks … away now.) The next Snail Shell will be in the central/southern Atherton Tablelands. (I've used Malanda as a marker on this Google Earth image, although that might not be exactly where I settle.) Why move to the Tablelands? They're in the middle of the Wet Tropics World Heritage Area, which is pretty much a zoological El Dorado. They're also at a high elevation, so are cooler than the coastal lowlands. Don't underestimate the importance of climate. In winter (the drier season), you have to wear long sleeves at night. You might also have to stoke up the combustion heater. Sounds good, doesn't it? And just look what's within a 150km radius ...
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510967.73/warc/CC-MAIN-20231002033129-20231002063129-00780.warc.gz
CC-MAIN-2023-40
1,042
9
https://marketplace.visualstudio.com/items?itemName=DmitriNesteruk.DisableSocialFeatures
code
This add-in hides the following Visual Studio 2013 features: To install, simply unpack into C:\Users\<your_user_name>\Documents\Visual Studio 2013\Addins and you're done. P.S.: this plugin source code is entirely made by Sergey Vlasov, original source availablehere. I simply repackaged it for simpler consumption. Could have been a VSIX but time is short. P.P.S.: oh for the love of Whoever, this system wants me to put at least 280 characters in the description, so I'm typing this instead of doing Monte-Carlo volatility arbitrage simulation on my brand-new cluster of Xeon Phi cards... aaargh!
s3://commoncrawl/crawl-data/CC-MAIN-2022-27/segments/1656104496688.78/warc/CC-MAIN-20220704202455-20220704232455-00375.warc.gz
CC-MAIN-2022-27
597
4
https://krpano.com/plugins/ownplugins/
code
Show your own plugins here - You have developed a plugin and want to show / present / sell it here... - As free or commercial plugin... (no fees, but you must organize / handle the selling by your own, e.g. by a Paypal button) - Just write a short mail. - A plugin page example / template for making an own plugin page. - You can change anything in the plugin.html between the "USER CONTENT" comments. - The plugin page itself can be designed as you want. - Custom CSS styles must be placed in the "plugin.css" file. - The character encoding must be UTF-8.
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233506429.78/warc/CC-MAIN-20230922234442-20230923024442-00779.warc.gz
CC-MAIN-2023-40
556
10
https://www.ibm.com/developerworks/community/blogs/a9ba1efe-b731-4317-9724-a181d6155e3a/entry/limiting_the_amount_of_records_a_user_can_change_status_on_from_a_query?lang=en
code
Limiting The Amount of Records a User Can Change Status On From a Query JasonBryan 270000C3BX Visits (6369) So the next question after setting X amount of records back to their previous statuses, is how can we prevent this from happening again? There is a Select Row Limit setting and that puts a limit on how many records can be selected from the List tab, but when you search using a query, you can then change the status of all the records returned from the query and not run into the limit. The user will see a warning pop up and can then select OK to perform the bulk status change. There is no perfect way or limit to prevent this but the following link to a DCF document on this, provides steps to remove the OK button from the warning message dialog. This is the same message for every application with status functionality, so changing this changes it everywhere. But it does force users to then select from the List tab where the Select Row Limit can be set. OK Button removal steps document: Select Row Limit document:
s3://commoncrawl/crawl-data/CC-MAIN-2019-43/segments/1570987822458.91/warc/CC-MAIN-20191022155241-20191022182741-00440.warc.gz
CC-MAIN-2019-43
1,029
6
https://universal-solder.ca/exploring-the-power-of-espressif-esp32/
code
Exploring the Power of Espressif ESP32 Wi-Fi and Bluetooth BLE in Electronic Projectsvolkerforster In the world of DIY electronics, there’s a remarkable platform that has been winning the hearts of enthusiasts and professionals alike—the Espressif ESP32. With its integrated Wi-Fi and Bluetooth Low Energy (BLE) capabilities, the ESP32 has become a go-to choice for developers, makers, and hobbyists looking to build their own smart devices. In this article, we will delve into the features of the ESP32, its programming environments, and its advantages over the less capable ESP8266 SoC. The Power of ESP32 The ESP32 is a highly versatile system-on-a-chip (SoC) that combines a powerful microcontroller with Wi-Fi and BLE connectivity. This integration allows for seamless communication with other devices and opens up a wide range of possibilities for electronic projects. Whether you’re interested in home automation, robotics, IoT applications, or wearable technology, the ESP32 offers the flexibility and performance you need. One of the key reasons behind the ESP32’s popularity is its compatibility with various programming environments. Here are some notable options: 1. NodeMCU: Based on the Lua scripting language, NodeMCU provides an easy-to-use and beginner-friendly environment for programming the ESP32. With its extensive library support and simplified syntax, NodeMCU enables rapid prototyping and development of IoT projects. 2. Arduino IDE: Known for its simplicity and widespread adoption, the Arduino IDE is a favorite among electronics enthusiasts. The ESP32 can be programmed using the Arduino framework, which offers a vast ecosystem of libraries and examples, making it ideal for both beginners and experienced developers. 3. MicroPython: For those familiar with Python, MicroPython offers a lightweight and efficient environment for ESP32 development. It brings the simplicity and readability of Python to the microcontroller world, allowing developers to quickly leverage their Python skills to create powerful projects. 4. LUA: Similar to NodeMCU, LUA is another scripting language that can be used to program the ESP32. With its compact syntax and low memory footprint, LUA is well-suited for resource-constrained applications and real-time systems. 5. Tasmota: Tasmota is an open-source firmware that provides an alternative option for programming the ESP32. It offers a user-friendly web interface and supports MQTT, making it an excellent choice for home automation projects. ESP32 vs. ESP8266 While the ESP8266 played a significant role in popularizing Wi-Fi-enabled DIY projects, the ESP32 takes the capabilities to a whole new level. Here’s a brief comparison between the two SoCs: Processing Power: The ESP32 boasts a dual-core Xtensa LX6 processor, providing higher processing power and improved multitasking capabilities compared to the single-core ESP8266. Memory: With up to 520KB of SRAM and 4MB of flash memory, the ESP32 offers ample space for storing code, data, and libraries, whereas the ESP8266 has limited memory resources. Connectivity: The ESP32 not only supports Wi-Fi but also integrates Bluetooth Low Energy (BLE) connectivity. This combination makes it ideal for projects that require wireless communication with multiple devices simultaneously. Peripherals: The ESP32 provides a wider range of peripherals, including SPI, I2C, UART, and more GPIO pins. This expanded set of options allows for greater compatibility with various sensors, displays, and other hardware components. The Espressif ESP32 Wi-Fi and Bluetooth BLE SoC has revolutionized the world of DIY electronics, offering a powerful and flexible platform for makers and developers. Its integration of Wi-Fi and BLE capabilities, combined with its compatibility with popular programming environments such as NodeMCU,
s3://commoncrawl/crawl-data/CC-MAIN-2023-40/segments/1695233510238.65/warc/CC-MAIN-20230927003313-20230927033313-00532.warc.gz
CC-MAIN-2023-40
3,841
17